Skip to main content
All Posts By

robintek

Understanding Building Value

By Construction Insurance Bulletin

con_1209-02One of the ongoing dilemmas in Building insurance claims involves determining a valid cost for the replacement or restoration of damaged property. When this insurance is first written, there are a number of approaches for arriving at a reasonable amount of coverage — yet nearly all of the commonly used methods have their weaknesses.
For example, some businesses want coverage equal to what they have paid for the building. However, this ignores the value assigned to the location, which might have increased (or decreased, depending on the location) significantly. Others prefer using real estate appraisals; but this leads back to the sales price, not the construction price. Square footage and building material cost estimators are also common.

However, even if they are fairly accurate in methodology, they depend on the accuracy of the data put into the formulas (garbage in — garbage out). Add the effect of changing zoning or building ordinances, and it’s no wonder that insurance industry experts estimated that the average commercial building might be underinsured by as much as 40%.

As a construction professional, you’re well placed to know the cost of restoring or rebuilding after a loss. What others “guesstimate,” you must do accurately for a living. Ordinances and zoning laws that are Greek to most people form part of your everyday knowledge base.

We can review the valuations of your buildings and recommend any necessary changes to your coverage. From that point, let’s explore opportunities to improve the accuracy of building valuations for your clients and ours. Perhaps together we can make inroads into that 40% gap.

Understanding Business Income Exclusions

By Business Protection Bulletin

BB_1209-01Many companies buy Business Income insurance to help reduce the devastating effect of a loss on their ongoing operations. Although this coverage is extremely valuable and can help keep your business afloat after a loss, bear in mind that it has a number of exclusions.

For example, coverage usually excludes lost income associated with a contract. If the covered loss affects your ability to meet a contract with a third party, the resulting lost income won’t be covered beyond the “period of restoration.” This period usually begins 72 hours after the loss and ends as soon as your property is restored and/or operational.

Let’s say that you sign a contract with customer ABC to supply materials for a year. A month later, your business suffers a major loss to property, including the materials that ABC agreed to buy from you. Because you’ll now be unable to offer these materials for an indefinite term, ABC has no choice but to find the materials elsewhere. Your property is repaired and operational five months later, ending the “period of restoration.” However, because of the exclusion, your policy won’t cover the remaining six months of lost income from losing the contract.

Review your Business Income policy today to learn its period of restoration. There might be an endorsement available to extend the amount of time that your policy will provide coverage. We can help you determine the period that’s right for you. Just give us a call.

Inland Marine Insurance

By Business Protection Bulletin
Pier Along Islamorada Islamorada, Florida, USA

Pier Along Islamorada Islamorada, Florida, USA

Although you have insured the business property on your premises, this protection does not extend off site – unless you carry Inland Marine insurance.

This type of policy goes back as far as the 17th century when Lloyd’s of London extended coverage on ship cargos beyond ocean voyages to their final destination “inland.” Today, Inland Marine covers the property of a business when it’s in transit – or stored at a location away from the premises – as well as the property of third parties that’s held on the premises. Because this property is essentially “floating,” these policies are also known as Floaters.

Inland Marine coverage would apply in such scenarios as:

  • A truck carrying designer handbags for an upscale department store is hijacked at a rest stop.
  • A hailstorm damages bulldozers on a machinery dealer’s lot.
  • A fire at a dry cleaners scorches customers’ clothing.
  • A defective sprinkler system in a “big box” store warehouse soaks dozens of TVs.

You can buy Inland Marine insurance on either a “named peril” basis (which lists the specific risks covered) or as an “all risk” policy (which covers losses from all causes not specifically listed).

This coverage can provide valuable protection for the mobile or moveable property of almost any business, large or small: everything from camera shops and computer manufacturers through building contractors and jewelry stores to museums/art galleries and trucking companies.

As Business Insurance professionals, we can tailor a comprehensive Inland Marine policy to the needs of your company. Feel free to get in touch with us at any time.

Cell Phones Can Increase Workers Comp Premiums?

By Business Protection Bulletin

WC_1207-03The more your employees use mobile devices on company business, the more likely they are to suffer injuries – and the greater your exposure to Workers Compensation losses – even if the incident occurs off the clock or away from the workplace!

We’re no longer living in a Monday-Friday, 9-to-5 business world. Millions of workers rely on smart phones, laptops, and tablets for company business outside the office, posing a challenge to traditional definitions of work-related claims. Some 35 million Americans are working from homes, cars, airports, subways, the local wireless cafe — even at the beach during vacations! One survey found that nearly three in five respondents (59%) check their office e-mail when on vacation, while 79% pack their laptop along with their swimsuit or skis.

A combination of factors are contributing to the explosive growth of this “cyberworkalohic” behavior: Job insecurity in today’s uncertain economy, pressure (real or perceived) from peers or managers, the demands of working in today’s global, 24-7 business environment — and the blurring of distinctions between office and home environments among younger, tech-savvy workers.

Consider these scenarios:

  • An employee on her evening jog is using her cell phone to check on office e-mails when she stumbles on the curb, falls, and breaks her arm.
  • While stuck in traffic on his way home from work, a man receives a work-related text message that’s so upsetting he rear-ends another car, injuring his back.

What happens if these workers file Workers Comp claims for job-related injuries? That depends. The growth in employees’ work-related use of mobile devices away from the job is so recent that courts haven’t yet ruled on whether such claims are compensable.

To reduce exposing your business to this increasingly widespread risk — which could drive up your Comp premiums — it makes sense to set and enforce clear and comprehensive rules for using mobile devices on company business outside the work environment. The goal of this “best practice” approach is to create a corporate culture that maintains a balance between increasing productivity and keeping your workers as safe, and injury free, as possible — on and off the job.

For advice on designing guidelines for employee use of mobile devices, just get in touch with us.

Understanding How to Implement ADA Regulations

By Business Protection Bulletin

BB_1208-03Although you’re aware of the Americans with Disabilities Act (ADA), you might not understand how to implement it in your small business. The Equal Employment Opportunity Commission (EEOC) can help. The Americans with Disabilities Act: A Primer for Small Business outlines the provisions of the ADA and provides valuable examples, tips, and caveats:

This EEOC publication covers:

  • Who’s protected by Title I of the ADA.
  • How to make ADA services accessible.
  • The use of tax credits and deductions to offset specific costs.
  • How to avoid mistakes when interviewing applicants with disabilities.
  • What questions you’re permitted to ask employees about a medical condition.
  • What to do if safety issues arise.
  • Various aspects of reasonable accommodations requirements.
  • Tax incentives for businesses that hire and retain people with disabilities.

If you provide goods and services to the public, check out the ADA Guide for Small Businesses, a 15-page illustrated guide that presents an overview of some basic requirements for small businesses. It provides guidance on how to make these services accessible and use tax credits and deductions to offset specific costs. You can access the guide at ADA Guide for Small Businesses (HTML) or ADA Guide for Small Businesses (PDF). Spanish, Cambodian, Chinese, Hmong, Japanese, Korean, Laotian, Tagalog and Vietnamese editions are available from the ADA Information Line: (800) 514 -0301 (voice) or (800) 514-0383 (TTY).

Reading up on the ADA can help you avoid costly lawsuits. Get smart on the law — and call us to make sure you have the coverage you need to protect your business against this risk.

The Importance of a Data Security Plan

By Risk Management Bulletin
Computer Technician Examining Server ca. 2003

Computer Technician Examining Server ca. 2003

Probably less than you think.

Three in four U.S. companies don’t have Cyber Risk or Network Security insurance, according to a study by Towers Watson & Co. What’s more, many small and midsized businesses that do carry these policies have left themselves vulnerable to costly losses by failing to develop proactive data security and crisis response plans.

A data security plan begins with the human element. Training employees – particularly those who regularly deal with proprietary information in-house or stored on portable electronic devices – offers a cost-effective approach. A study by NetDiligence found that more than one in four liability data breach claims were due to lost equipment and other staff errors.

To help keep confidential information safe, managers should:

  1. Identify those employees who could create the largest exposures for the company in case of lost or misplaced data and make sure that they’re diligent in protecting this data.
  2. Make compliance with data security procedures a part of worker performance review.

If you should suffer a data security breach, you’ll need a crisis response plan, with responsibilities assigned ahead of time. The risk management and legal departments will deal with coverage-related issues such as cross-policy response and claims processing, while IT managers and auditors investigate the source and extent of the breach. Planning should also include guidelines for contacting law enforcement, and forensic investigators, as well as communicating with providers and business partners to address continuity issues.

The plan should designate personnel to handle media inquiries and public statements, interact with providers, and notify affected customers, using dedicated and updated contact lists.

We can help you create comprehensive, cost-effective protection for your confidential information by combining insurance coverage with risk management techniques.

Your Dog Breed and Homeowners Insurance

By Personal Perspective

pp-1701-1October, Adopt a Shelter Dog month, is a great time to add a dog to your family. Be careful which breed you adopt, though. Insurance companies use data from insurance claims and public health studies to create a high risk dog breed list, and your homeowners insurance premiums can increase based on the type of dog you adopt. You can save money when you choose a dog that’s not on the high risk list.

Working Breed Dogs

Agile, powerful and intelligent, Akitas, Alaskan Malamutes, Doberman Pinschers, Rottweilers and Siberian Huskies are also fiercely protective. If they’re not trained properly, these breeds could be potentially dangerous, especially to young children and small pets.

Terrier Breeds

Loyal and protective, American Pitbull Terriers and American Staffordshire Terriers have been bred to hunt. These traits mean they can become aggressive and tenacious if they’re cornered or frightened by one of your family members or guests.

German Shepherds

Police departments, military personnel and ranch hands appreciate this breed because the dogs are intelligent, hard-working and powerful. They’re also suspicious of strangers and won’t back down, which makes them a challenging breed for inexperienced owners to handle.

Chow Chows

Independent and strong Chow Chows are often kept as companions. These fluffy dogs can be aloof and stubborn, though, and should only be adopted by experienced dog owners.

Miscellaneous Breeds

Wolf Hybrid and Presa Canarios dogs exhibit strength and protective characteristics. However, they can also be unpredictable and quick to attack, making them potentially dangerous breeds. Friendly and docile Great Danes are listed on the high risk list, too, because of their size.

A dog adds fun and companionship to your home and family, and adopting a shelter dog is socially responsible. Before you choose a new pet, though, consider whether or not it will increase your homeowners insurance cost. If so, you may choose a different breed or reduce your home insurance premiums by installing a dog fence or raising your deductible.

Future Security Risks: What’s Coming!

By Cyber Security Awareness

20130611-cyber-eyeMany IT and security professionals will tell you that one of the biggest threats to sensitive data and equipment is not the fact that hackers are just so smart and determined, but that the security is always one step behind the technology.

Hardware and software developers do what they can to launch with built-in security features, but there’s no telling how to handle a threat until you know where those threats are coming from, and you can’t be certain of where those threats are coming from until you’ve already launched. Security, like your immune system, is all about adaptation. Here are some just-over-the-horizon security threats that we may need to combat in the coming years:

Bodyhacking

The FDA approved the DEKA arm, nicknamed Luke, for robot-arm transplant recipient Luke Skywalker, in May of 2014. The arm, developed by DARPA, has led to some speculation of hackers targeting prosthetic limbs. We already know that you can hack a pacemaker, so what’s to stop people from taking control of a pair of prosthetic legs?

Homehacking

Right now, an Internet-of-Things enabled automated home is a rare sight. A handful of people in Silicon Valley may enjoy curtains that open at seven o’clock on the dot and coffee machines that know just how you like it, but it’s not the norm.

Then again, a computer in every home wasn’t the norm twenty years ago, and smartphones were but a dream in 2001. It’s easy to imagine pranksters turning your refrigerator off remotely and letting your food spoil while you’re away for the weekend, or blasting your stereo at full volume while you’re trying to sleep.

Neural Implants

There has been a lot of speculation of late regarding neural implants, connecting the brain directly to the internet with the appropriate machinery. As crazy as it sounds, we’re not that far off.

The major threat with a neural-implant-connected internet might not even be a malicious hacker, but something as simple as a web-surfer suffering a stroke while connected with thousands of other users.

Self-driving Car Hacks

The self-driving car sounds like a great idea, but nobody seems to be willing to rush it into mass-production, and for good reason. The roads aren’t ready, and neither is the technology. Researchers funded by the Defense Department recently ran an experiment and found that it was incredibly easy to hack into a self-driving car and take control.

There’s a lot of new technology on the horizon, and a lot of it is on the brink of becoming as commonplace as the television and the laptop. It’s a brave new world out there, and there’s no way to ensure that your first self-driving car is unhackable, but the good news is that with every successful hack, we learn more about how to prevent it from happening again.

Secure Your Devices

By Cyber Security Awareness

0,,17180223_303,00Staying secure in the office is relatively easy. Sure, you have to be vigilant, but you have a whole team of IT pros, you have office protocol and guidelines, and network security to keep you safe and sound. Once your employees step out of the office, it’s a whole other story. Here are a few of the top security risks outside of the office, compiled from research papers and tech security blogs across the web:

Stolen Phones

This is going to disappoint you: leaks don’t always involve a saboteur in the company, and hacks don’t always involve a team of cyberpunks in black leather jackets. A huge chunk of sensitive data is leaked simply because an employee left their phone on the table when they went to the restroom at a coffee shop.

Even if your employees know better than to be so careless, public WiFi brings its own security risks. When it comes to the really sensitive stuff, it’s a good idea to enforce a company policy that will keep that data where it belongs: on secure, in-office hardware.

Out of Office Notifications

An employee gets a message and their text chat program automatically responds “Out of the office, be back later!” These notifications are great for personal computers, but announcing to the world that your work laptop is on, and unguarded, is like putting a sign up on your front door reading “On vacation, please don’t break in and steal our silverware!” Turning company computers and devices all the way off when not in use will prevent would-be hackers from breaking into unmonitored equipment.

The Disgruntled Former Employee

Once an employee is not only out of the office, but out of the company and off the payroll, what do they have to lose by sharing sensitive information? Well, quite a lot if you make sure that all employees sign a non-disclosure agreement before they begin working for you.

If you keep your turnover rate low by hiring only the best candidates, and if you make an effort to part on good terms when ending a relationship with an employee, you’ll have a bit less to worry about, but the non-disclosure agreement at least gives you some recourse should a former employee go out of their way to make your life a little harder than it needs to be.

By all means, keep your data safe and secure. Hire the top IT people to handle encryption and manage your data center. Just bear in mind that hackers tend to be kind of low-tech and opportunistic, just as quick to snatch a laptop off a coffee table as they are to spend weeks cracking your email password.

Understanding Your Deductibles

By Personal Perspective

pp-1701-4To determine the deductible that provides the greatest value for your insurance dollar, we believe Sherlock Holmes might have made a great insurance agent. Although insurance can sometimes seem complicated, choosing the best deductible for your personal situation can prove an elementary decision.

Deductibles serve a clear purpose. For a given loss, the deductible is the amount you pay out of pocket. The insurance coverage will pay the remainder of the covered loss, up to the available policy amounts. Using deductibles properly can reduce premiums by eliminating smaller claims that most people would never expect their policy to pay anyway. This keeps coverage available as your safety net for large, possibly catastrophic, claims.

How do you decide what’s “small.” How much would you be willing to pay in the event of a claim; and at what point would you want insurance to take over? For some policyholders, especially in tough economic circumstances, this “out-of-pocket” amount might be very small. Recognizing this, the usual Homeowners insurance deductible for many years has been between $250 and $500. The same amounts hold true for Auto insurance.

However, suppose you feel you could comfortably handle a $1,000 or $2,500 deductible? Paying losses lower than those amounts will reduce your premiums — but by how much? Will it put enough money back in your pocket today to make it worthwhile if you file a claim tomorrow?

Before you decide, let us show you what the savings would be. Give our agency a call about your deductibles. If you’re willing to take on a bit more risk today, we can put some money back in your pocket. As Holmes might have said, “It’s a simple premium deduction, dear boy.”