Step 1: Write a carrier-selection policy
The policy does not need to be long. It needs to exist on paper, be signed by an executive, and be applied consistently. State your minimum thresholds: operating authority required, insurance minimums, no Unsatisfactory rating, BASIC alert handling, crash thresholds, OOS thresholds, authority-age handling, MCS-150 currency. Whatever you decide is fine — what matters is that the rule is written, applied, and enforced.
Step 2: Train the team
Every load tender starts with the policy. No exceptions without written justification. No exceptions for big-customer loads, no exceptions for time-sensitive loads, no exceptions ever without sign-off. The operational discipline IS the defense.
Step 3: Implement a screening system
Manual is fine if your volume is genuinely low. Automated is necessary if your volume is moderate or high. Either way, every tender produces a record showing what was checked, when, and what the result was. The record must be machine-verifiable, not a screenshot in a folder.
Step 4: Capture FMCSA data at the moment of tender
A snapshot of SAFER today is not the data the carrier had three months ago. Pull live data at the time of selection and store it. The contemporaneous record is what wins cases — the timestamped FMCSA pull proves what the carrier looked like at the moment you committed.
Step 5: Require carrier safety attestations
The broker can verify public data. Only the carrier can certify that this specific driver, on this specific load, is qualified, sober, rested, and operating a roadworthy vehicle. Get that in writing on every load that requires it under your policy.
Step 6: Maintain a Do-Not-Use list
Carriers with prior bad experiences, prior claims, fatal crashes, or any other deal-breaker get permanently flagged. Tendering to a carrier on your own DNU list is the single worst document a plaintiff's attorney can find in discovery — worse than not having a list at all.
Step 7: Tamper-evident audit trail
Every step in the screening process — the FMCSA pull, the policy application, the rep's decision, the attestation, the sign-off — gets recorded in a hash-chained audit log. The file must be admissible years later, which means it must be cryptographically verifiable and protected against modification. DOTScreener uses SHA-256 chain seeding from the last persisted hash so the chain is continuous and server-authoritative, not just write-time cosmetic.
Step 8: Insurance review
Talk to your insurance broker about your E&O policy. Verify it responds to negligent-selection claims under current case law. Verify the limits are calibrated to current verdict sizes, not 2018 verdict sizes. Older policies have gaps.