Browse Definitions :
Definition

backdoor selling

Backdoor selling is a social engineering practice used by a supplier or seller to gain a competitive advantage prior to negotiations or competition for a contract or sale. The practice reduces the buyer’s leverage and the need for negotiation, thereby often assuring a contract or getting a better price for the seller.

Backdoor selling involves asking questions to acquire information that the buyer wants to protect or that competitors lack. The salesperson would not generally target employees involved with procurement but other staff who are unlikely to recognize the value of the information sought.

A product or goods seller might probe in areas like price, quality, delivery, service life and the performance of competitors. Relative to a contract, a supplier might ask questions about which requirements were most important or how essential deadlines were. Based on this knowledge, a supplier can emphasize requirements and contract elements that are most important; a seller might push for a higher price and include fees that might otherwise have been forgone as an incentive.

By circumventing standard procurement procedures, backdoor selling essentially games the system designed to protect the buyer’s interests and ensure fair competition among suppliers. Gray-area techniques like backdoor selling are often used by experienced sales persons and included in sales training materials. Despite its common use, however, backdoor selling can be considered a low-level form of industrial espionage.

Backdoor selling can also refer to the selling of goods to a consumer outside normal purchasing rules. One example of this type of backdoor selling is sales by wholesalers direct to consumers, contrary to existing agreements with retailers.

See a video demo of backdoor selling and how to protect yourself from it:

This was last updated in June 2016

Continue Reading About backdoor selling

SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • chief risk officer (CRO)

    The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory ...

SearchSecurity
  • encryption key

    In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted ...

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close