Fines for Non-Compliance Start Before the Penalty

Iratxe Gurpegui
Written by
Iratxe Gurpegui
9 min read
Fines for Non-Compliance Start Before the Penalty

The fine is announced on a Tuesday, but the company started paying for it months earlier, when Legal sent the first preservation notice and Finance froze a payment batch.

That is the part most board reports miss.

The public penalty is clean. One press release. One line in the risk register. But before that number arrives, the organization has already bought external counsel, forensic review, management distraction, delayed deals, tense customer calls, emergency remediation, and sometimes a credibility problem that lasts longer than the sanction itself.

Fines for non-compliance do not start with the regulator's calculator. They start when the company cannot prove what happened, who decided, which control ran, and what was fixed.The penalty is the invoice, not the first cost

Where fines for non-compliance actually begin

Regulators do not only ask whether a rule was broken. They ask what the company knew, what it should have known, what it did to prevent the issue, and how it reacted once the issue surfaced.

That is not theory. It is baked into every major enforcement framework.

Under Article 83 of the GDPR, supervisory authorities must consider the nature and gravity of the infringement, the technical and organisational measures taken before the breach, prior infringements, and the degree of cooperation during the investigation. A company that can demonstrate it had appropriate controls in place — and that it identified and self-reported the problem — is in a structurally different position than one that cannot.

The DOJ Evaluation of Corporate Compliance Programs asks three operational questions: Is the compliance program well designed? Is it adequately resourced and empowered to function? Is it working in practice? The last question is the hardest. It requires evidence, not assertions.

In EU antitrust enforcement, the European Commission's fining methodology accounts for gravity, duration, aggravating and mitigating circumstances, and the existence of a genuine compliance programme. The Commission has been explicit that a programme is only mitigating if it is effective — which means it must be demonstrably embedded in operations, not sitting in a policy folder.

Different regimes, same audit logic: enforcement becomes a reconstruction exercise. Investigators arrive not just to determine whether a violation occurred, but to understand whether the company's governance was capable of preventing or detecting it.

The expensive question is rarely Does the company have a policy? It is sharper: Can the company replay the decision chain without improvising?

If the answer is no, the cost meter has already started.

A compliance officer in a mid-size manufacturer receives an alert. A distributor in a high-risk market may have used improper payments to speed up a public tender. The business says the distributor was approved. Procurement says due diligence was completed. Sales says Legal knew. Legal remembers reviewing the contract, not the beneficial ownership file. The gifts register is separate. Training records are in an LMS. The payment approval was in email.

Nobody is lying. That is the problem.

The company has fragments, not an evidence chain. For the next six weeks, senior people spend evenings rebuilding a history that should have been available in one place: risk rating, approval rationale, red flags, mitigating clauses, payment controls, monitoring results, escalation notes, and remediation.

This is the pre-penalty fine. It is paid in hours, credibility, and negotiating position.

Trigger

Hidden cost before any penalty

Evidence that should already exist

Regulator request or inspection

Emergency document collection, privilege review, executive distraction

Control logs, approvals, risk scores, remediation history

Internal whistleblowing alert

Investigation setup, evidence preservation, interview preparation

Case file, triage rationale, escalation record, prior related controls

Third-party red flag

Contract pause, payment hold, business disruption

Due diligence file, ownership screening, mitigation plan, monitoring notes

Failed control test

Rework, sampling, board reporting, control redesign

Test plan, results, owner response, corrective action tracking

Customer compliance questionnaire

Deal delay, inconsistent answers, trust erosion

Policy evidence, training records, audit trail, exception register

A company may eventually avoid a large sanction. It may self-report, cooperate, remediate, or prove the allegation was limited. But if it has to reconstruct everything manually, it has still paid a fine in operational drag.

The evidence gap changes the enforcement narrative

A defensible compliance programme does not need to track every movement in the company. That would be expensive and unreadable. It needs a reliable spine for the risks that can seriously hurt the business.

That spine has five parts. Each one addresses a specific failure mode that surfaces in enforcement.

1 Obligations mapped to real risk scenarios

Generic risk categories — bribery risk, antitrust risk, data protection risk — are starting points, not risk maps. They tell the compliance team what domain to watch. They do not tell the business what to watch out for.

Real scenarios do. For a manufacturer with a distributor network, that means identifying situations like: distributor commissions in markets with public procurement activity; beneficial ownership structures that could mask a public official; discount approvals in highly concentrated markets where competitors interact; or gifts and hospitality flows during tender periods.

Mapping obligations to these specific scenarios does two things. It makes the risk real for the people who own it: the sales team, the procurement function, the finance controller. And it makes the control design proportionate: the company focuses testing and monitoring effort where the actual exposure sits, rather than spreading thin across everything.

2 Controls with named owners and evidence outputs

Every key control needs to produce something testable. An approval record. A screening result. A signed attestation. A sample test with documented findings. A register entry with a timestamp.

In the distributor scenario, a control that says "we screen third parties before onboarding" is not testable in itself. The testable version says: "The compliance team completes a beneficial ownership screening using provider, documents the result in system, assigns a risk rating, and obtains sign-off from the regional compliance officer before the contract is executed." That version produces evidence. The first version produces a claim.

Named ownership matters for the same reason. A control owned by "the business" or "Legal/Compliance" is owned by nobody. When the control fails — or when it is questioned — there is no one to explain what happened and why. Naming an individual creates accountability and makes the escalation path clear when exceptions arise.

3 Remediation actions treated like commitments

A red flag without a tracked response is just archived anxiety.

When monitoring surfaces a problem — an overdue due diligence renewal, an unexplained payment pattern, a distributor who failed a re-screening — the response needs to be recorded with the same rigour as the flag. That means: a named owner, a deadline, a status field that is actually updated, a validation step to confirm the action was effective, and an escalation trigger if the deadline passes.

In the distributor scenario, the compliance team did identify a red flag — eventually. What they could not show was a coherent record of how it was handled before the regulator asked. The monitoring note existed. The response did not. That gap transformed a managed risk into a governance failure.

4 Testing of operating effectiveness

Control design and control operation are different things. A well-designed control that nobody runs is not a control. A control that runs inconsistently, covers only a subset of the relevant population, or produces exceptions that are never reviewed provides false assurance.

Testing means going back to the evidence outputs defined in step two and checking whether they actually exist, whether they were produced on time, whether exceptions were handled, and whether the control is achieving its purpose. For a company with a distributor network, that might mean sampling a set of third-party files each quarter and verifying that: the onboarding checklist was completed, the risk rating reflects current information, the monitoring schedule was followed, and any red flags were escalated and resolved.

Testing results should be documented, reviewed by a responsible owner, and tracked through to corrective action where the control underperformed. An untested control programme is not a compliance programme. It is a hypothesis.

5 Decision narratives for judgment calls

Compliance is not a binary exercise. Most of the consequential decisions, whether to onboard a distributor despite a red flag, how to handle a gift above the threshold, whether to engage a consultant with a government connection involve genuine judgment. The issue is not that judgment was used. The issue is whether the basis for that judgment was recorded at the time.

Reconstructed rationale is not the same as contemporaneous rationale. A memo written six weeks after the decision, during an investigation, carries far less weight than a brief escalation note written the day the approval was granted. Compliance teams should create a light but consistent practice of recording the key facts, the options considered, the risks weighed, and the conclusion reached — particularly for decisions in grey zones.

This is where a platform like Naltilia earns its place. The value is not automation for its own sake. It is traceability: obligation to risk, risk to control, control to evidence, evidence to action. When that chain is intact, the company under scrutiny does not need to improvise. It can navigate.

Where AI helps, and where it must stop

AI can make this work less painful. It can read large volumes of policies, questionnaires, control descriptions, third-party files, and transaction records. It can flag missing evidence, classify exceptions, prepare draft remediation plans, and remind control owners before the quarter collapses into inbox chasing.

It can also help compliance teams see patterns earlier: repeated overdue due diligence, inconsistent gifts approvals, unresolved high-risk vendors, control owners who always respond late, or policies that no longer match the risk map.

But AI should not be treated as a substitute for accountability.

It should not decide whether to self-report. It should not approve a high-risk third party without human review. It should not make disciplinary decisions. It should not turn a weak process into a polished report that hides uncertainty.

The practical model is clear: AI handles the repetitive assembly work, humans own judgment, escalation, and accountability.

That is not a compromise. It is how compliance stays serious while becoming more tractable.

The uncomfortable takeaway

The question for a board is not only, What could the fine be?

A better question is: If a regulator asked tomorrow, how many days would it take to produce a coherent evidence pack?

If the answer is three weeks of panic, the cost of non-compliance is already present. It is just not booked as a penalty yet.

The companies that handle enforcement best do not wait for a fine to discover their compliance system. They build the evidence trail while the business is running, when facts are fresh, owners are clear, and decisions can still be explained without guesswork.

That is the shift: stop treating compliance evidence as audit debris. Treat it as operational infrastructure. Because by the time the penalty is public, the first fine has already been paid.

Frequently Asked Questions

When do fines for non-compliance really start?

hey start when a company loses control of the evidence trail. The formal penalty may come later, but costs begin with investigations, manual reconstruction, disrupted business, customer concern, and emergency remediation.

Can a strong compliance program reduce a fine?

It can influence the enforcement conversation, especially where regulators consider mitigation, cooperation, remediation, and whether controls were effective in practice. It is not a guarantee. It is a better position from which to explain the facts.

What is the most important evidence to keep ready?

For high-risk areas, companies should keep risk assessments, control records, approvals, exception logs, training evidence, due diligence files, investigation records, and remediation tracking. The evidence should be retrievable and linked to the relevant risk.

Is a policy enough to defend the company?

No. A policy is only the starting point. Auditors and regulators usually test whether it was deployed, understood, followed, monitored, and corrected when it failed.

How should mid-size companies prioritize with limited resources?

They should start with the risks that can create enforcement, debarment, revenue loss, or board-level exposure. For many companies, that means third parties, anti-bribery, antitrust, data protection, sanctions or AML exposure, and AI governance where relevant.

About the Author

Iratxe Gurpegui

Iratxe Gurpegui

I've spent 20 years as a compliance and competition lawyer across Europe and Latin America, and throughout my career, I've seen firsthand how complex and costly regulations can hold companies back. But I've also learned that compliance doesn't have to be a burden, it can be a strategic advantage. My mission is to help companies harness the power of AI, transforming compliance into something faster, simpler, and most importantly, a real driver of growth for businesses.