The Pitfalls of the Small Business Owner Protect Your Assets!

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

The Fundamentals of Insurance Ch.32 – South Western 1997.
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
Basics of Liability Liability Issues and Coverage.
“This workforce solution was funded by a grant awarded under Workforce Innovation in Regional Economic Development (WIRED) as implemented by the U.S. Department.
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.

Contact Information for Presenters. Identify Risk Invent Solutions Integrate Inspire WELCOME: We’re Glad You’re Here! Leveraging Campus Resources to Effectively.
Copyright © 2008 Pearson Addison-Wesley. All rights reserved. Chapter 3 Introduction to Risk Management.
P A R T P A R T Property Personal Property and Bailments Real Property Landlord and Tenant Estates and Trusts Insurance Law 5 McGraw-Hill/Irwin Business.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
Continuity Clinic Liability Insurance 101 Modified from information on
Risk Management & Insurance
Copyright © 2008 by Robert B. Carton Selected Business Law Topics.
Key to the Future Chapter 2, Lesson 2 Warm-Up Questions CPS Questions Note for teacher: Use “Pick a Student” button in CPS.
Identity Theft Insurance Charles P. Orlowicz November CAS Annual Meeting – Session CS04 A division of the property and casualty subsidiaries.
Overview of Cybercrime
Farm Risk Management Joseph Bonelli Department of Extension College of Agriculture and Natural Resources University Of Connecticut 1.
DATE: 3/28/2014 GETTING STARTED WITH THE INTEGRITY EASY PCI PROGRAM Presenter : Integrity Payment Systems Title: Easy PCI Program.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © 2014 CUNA Mutual Group, All Rights Reserved. Understanding Cyber Insurance.
AUGUST 25, 2015 Cyber Insurance:
Introduction to Risk Management
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
Implementing a Medicare Compliance Program. Implementation of Medicare Compliance Program Rules & procedures to reduce chance of wrongdoing High level.
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
13 - 1Copyright 2008, The National Underwriter Company Business Liability Issues in Insurance  What is it?  Business liability is the risk exposure that.
Chapter 37 The Fundamentals of Risk. Risk Risk - can be thought of as the possibility of incurring a loss. There are 4 main types of Risk -  Economic.
AGENDA Meaning of Risk Management Objectives of Risk Management Steps in the Risk Management Process Benefits of Risk Management Personal Risk Management.
Cyber-insurance coverage: do you have it? Robert E. Sumner, IV, Esq. and Tosh Siao of Willis Group September 17, 2015.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Financial Managers Gio Perazo. Job Description The duties of financial managers vary with their specific titles, which include controller controller treasurer.
Copyright © 2008 Pearson Addison-Wesley. All rights reserved. Chapter 3 Introduction to Risk Management.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
The Business Profitability TOTALSOLUTION Program Business Profitability Solutions Like The Fortune 500 Use For The ABC Company August 19, 2014 Presented.
Real Estate Assistant Program Developed for Coldwell Banker Residential Brokerage Colorado
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Restaurant 1. 2 There are several different types of restaurant classifications, including: Family Style Fine Dining Fast Food Buffet.
27-1 Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Directors and Officers and Entities Oh My!! Chris Amrhein, AAI Amrhein and Associates, Inc. Lorton, VA
Understanding and Taking Risks Presented By: Steve Felker /2011.
 Meaning of Risk Management  Objectives of Risk Management  Steps in the Risk Management Process  Benefits of Risk Management  Personal Risk Management.
JEFFREY L. HUNTER SR RISK ANALYST County of Riverside Human Resource Dept. Risk Management Div. Insurance Requirements In Contracts.
PARTNERING TO CREATE THE SAFEST HEALTHCARE SYSTEM Insurance Operations Update HIROC Risk Management Conference April 28, 2014 Heather Brown, Vice President.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
MEDICAL OFFICE COVERAGES. This is a short review over many insurance coverage parts necessary to a doctor’s practice. Not all apply, and there are other.
Retail & Service 1. 2 The Retail & Service industry encompasses a wide variety of businesses. This segment includes: Businesses engaged in selling goods.
Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Insurance - Risk Exposures and Strategic Solutions
Cyber Liability Insurance for an unsecure world
Catholic Radio Association Gallagher Charitable Insurance Services
Cyber Insurance Risk Transfer Alternatives
RISK MANAGEMENT AND INSURANCE
Business Essentials Appendix I Risk Management Eleventh Edition
Financial Institutions – Cyber Risk
E&O Risk Management: Meeting the Challenge of Change
Can Cyber Insurance Stand in the Data Breach
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate the ideas in this article to your team. Feel free to remove these intro pages, and.
Cyber Insurance Overview
Chapter 3: IRS and FTC Data Security Rules
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Cyber Exposures The Importance of Risk Identification and Transfer
By Joseph Carnevale, CIP Partner & Director of Sales
Presentation transcript:

The Pitfalls of the Small Business Owner Protect Your Assets!

As “trusted advisors” we need to assist our clients and work in teams to help them grow and protect their assets. Team Building Trust

Where does the process begin? The process begins with someone being a detective!

Risk Management Process  What are my exposures?  Identify frequency and Severity.  List alternatives. A. Separation. B. Avoidance. C. Retention. D. Insurance. E. Transfer. F. Self-insurance. Regulated at the higher level.  Decide which solution.  Implement.  Monitor!!!!

It takes time and paperwork! Think of a bank closing. Does a bank provide you with money with no questions or paperwork. Think of the closing. Carriers may be providing millions of dollars!

What to expect in a submission Applications. Supplements. Photos. Financials(?). Be specific, clear on concise on your operation… Predictive Modeling!

Additional Considerations  Size of the risk & needs.  Complexity…Highly specialized?  Global – Foreign, Repatriation.  Operating multiple states – Statutorily Regulated.  Services – Loss Control, Audit, Claims, Reviews!

Trends  Employment Practice Liability  Cyber Liability  Environmental l

Pollution: What Can Happen?  Fines & Penalties  Suits  Remediation  Listed on Hazardous Waste & EPA  Unable to Transfer the Asset!

What can cause pollution  Sewage  Organic Matierials  Specific waste materials  Fuels and oils  Chemicals NB: Property Owners, Portfolios, Mfg., Retail, Schools, Colleges, Sports facilities…Pass the cost through triple net lease!

Types of Policies I.Pollution Legal Liability-coverage for site liability to 3 rd parties. II.Site Cleanup and Legal Liability- Covers remediation and 3 rd party liability. III.Contractors Pollution – Provides coverage for contractors for their operations.

Employment Practice Liability Generally cover issues in the following areas:  Gender & Age.  Sexual Harassment.  Wrongful termination.  Breach of contract.  Invasion of Privacy.  Libel & Slander.  Mental Anguish.

Statistics Employee lawsuits have risen 400% in 20 years. Wrongful termination suits have risen 260% in the same time period. 41.5% of these claims have arisen at companies with fewer than 100 employees. At trial, employees have won 63% of the time. Jury trials award around $217,000. To settle before trial they average $75,000. – Per the independent insurance agents of America.

EPLI Fast Tips Limits from $1M to $25M Watch for 3 rd Party Coverage Wage & Hour Act –Sublimit not all provide. Defense Cost Inside or Outside the Limit Watch the BOP free coverage with regard to limits and terms and conditions. Application forms part of the contract! Concealment, Misrepresentation…

Cyber Liability First Party – Many non-IT firms obtain. Notify clients of compromised information, purchase credit monitoring for client, public relation to regain confidence. Third Party – provides the “responsible” party with liability protection for the systems that allowed the breach to occur.

Cyber Facts In 2008, 50% of business said they had 1 to 5 cyber risks. The most expensive threats involve fraud, which averages a loss amount of $500,000. Many of the threats include viruses, abuse, data breach and laptop or pad thefts. By 2012, as many as 36% of all businesses had some real issue.

Considerations Do a risk analysis. Do you collect credit card payments, secure s, secure sites? Read your policy language. Be sure, if it is a throw in your policy you understand your exposure and the coverage. Have a WISP (Written Information Security Program Utilize proper T&C’s on your website and set up management controls. In conclusion, everyone is susceptible to issues!

What just happened? We didn’t solve your insurance issues. We helped identify some key things to look for and trends in the industry to help you and/or your clients to be better prepared. Remember to Complete the Speaker Survey: nsh16.bfbootcamp.net/ ‘click’ on speakers / select your speaker