10 min read

Review a Social Audit

A disciplined process for reading an audit report and turning it into judgment, not paperwork.

When to use this playbook

Use this when a new audit report is received and needs review before supplier follow-up begins.

Use it when teams need to separate report quality questions from actual supplier performance questions.

How this source informs this section

Starting your compliance journey with a SMETA audit · p. 2

Sedex is directly relevant here because it lays out the audit-review flow from SAQ and pre-audit pack through interviews, document review, and findings.

Onsite audit process: Management and worker interviews, Document review, Pre-closing meeting, Closing meeting and summary of findings.

Step-by-step guide

1. Check the report basics first: site identity, audit date, audit type, scope, and who conducted it.

2. Scan for severe findings, inconsistencies, or evidence gaps before getting lost in minor observations.

3. Assess whether the findings look proportionate to the site context and whether the narrative supports the grading.

4. Flag any missing evidence, unclear root-cause logic, or report language that looks templated rather than site-specific.

5. Map each material finding into the internal remediation and escalation process.

6. Decide what must be clarified with the auditor, what goes directly to the supplier, and what should be escalated internally.

How this source informs this section

The Home Depot Responsible Sourcing Supplier Manual · p. 11

Home Depot is useful because it makes the reviewer’s evidence bar explicit: records, worker access, and remediation expectations all have to hold together.

Suppliers are expected to actively engage in remediation – including timely preparation and presentation of a Corrective and Preventive Action (CAPA) plan.

Quality checks

The report scope and site identity are clear.

Severe findings are surfaced first, not buried.

Evidence quality is reviewed, not assumed.

The internal next step for each material finding is explicit.

How this source informs this section

Disney International Labor Standards Program Manual · p. 42

Disney's audit-records checklist is a practical reference for what a credible evidence pack should include before reviewers trust the file.

Worker feedback, complaints, and grievance reports, including details of any investigation and resolution.

Failure modes

Accepting weak auditor evidence because the file looks complete.

Treating all findings as equally urgent.

Moving into corrective action plan (CAP) creation before clarifying serious report inconsistencies.

How this source informs this section

Starting your compliance journey with a SMETA audit · p. 3

Sedex explicitly frames the audit as a continuous-improvement tool, which is why buried severity and weak evidence should trigger review instead of blind acceptance.

SMETA audit doesn't aim to judging whether the performance of a site is a 'Pass'. It aims to help the company/site find... areas of continuous improvement.

How Elm AI can help

Elm AI can help put audit convergence into practice by reviewing different social-audit formats, surfacing the findings that matter, mapping them into one brand-specific remediation lens, and translating the result into simple language with a comparable internal score. Every output stays traceable to the original report, and your team remains in control of final judgment.

Sources

Starting your compliance journey with a SMETA audit

Sedex · workflow PDF

Sedex's process PDF is useful for the operational shape of a SMETA audit: SAQ, onsite review, interviews, document checks, findings, and follow-up.

The Home Depot Responsible Sourcing Supplier Manual

The Home Depot · supplier manual PDF

The Home Depot manual makes the operating details concrete: audit access, CAPA requirements, repeated-violation escalation, and subcontracting rules.

Disney International Labor Standards Program Manual

Disney · program manual PDF

Disney's main labor-standards manual for facility authorization, audit expectations, remediation, and unauthorized production controls.