Skip to main content
All Posts By

robintek

Trade Credit Insurance

By Business Protection Bulletin

bb-1701-1Most companies insure virtually every aspect of their business. Yet, believe it or not, fewer than l0% of American businesses protect their primary source of income: their outstanding invoices or accounts receivable (A/R) – even though losses from customers failing to pay invoices are more common than those caused by fire or theft and can be equally, if not more, devastating.

The solution: Trade Credit insurance, (also known as Accounts Receivable insurance) which guarantees payment, up to the amount under the policy, of A/R owed by customers whose receivables are past due, are unable to pay or refuse to do so, or who are in default, This coverage is essential if a significant percentage of your sales are credit based and/or you sell regularly to new customers.

  • By protecting you against losses from bad debts, it enables you to provide more credit to more customers – which means higher sales.
  • A Trade Credit policy protects your company against the financial impact of a customer going bankrupt because the insurance company must pre-approve all orders, carrying Trade Credit coverage provides you with valuable information on the financial stability of your customers. This enables you to offer more aggressive terms and/or solicit larger orders. Trade Credit insurance allows you to increase the size of your working capital. For example, banks might be willing to lend against 90% of your receivables rather than 80%. In today’s restricted financing environment, banks will be more likely to lend to you and to offer better terms.

What’s not to like?

Our insurance professionals would be happy to offer their advice on the Trade Credit policy that’s best for your business. Please feel free to get in touch with us at any time.

What are carrier ratings?

By Business Protection Bulletin

bb-1701-3It’s a tough marketplace and a rough economy. Corporations that everyone assumed were rock solid have suddenly been shown to be paper tigers. Could it happen to your insurance company? A proven way to checking out the financial health of your current or prospective insurance company is to ask for its Best’s Rating. A.M. Best Co. has been rating insurance carriers since 1899. Although there other organizations offer such ratings, Best’s is still the most widely cited.

After evaluating a company’s balance sheet strength, operating performance, and business profile, Best measures it against a series of quantitative and qualitative standards. This results in the assignment of one of two types of rating opinions: a Best’s Rating (A++ to F) or a Financial Performance Rating (9 to 1).

These ratings tell whether the carrier with which you’re dealing has the size and assets to insure your business comfortably. They also allow you to see how a particular company fits with the remainder of your protection program. For example, many Business Umbrella insurers have set a minimum Best rating requirement that must apply to any other company that provides your basic coverages.

Although a strong Best rating doesn’t guarantee an insurer’s future financial performance, it provides a benchmark that policyholders can use to determine whether they’re dealing with a carrier who’s likely to be there at the time of a claim. For more information about Best’s rating system, go to www.ambest.com.

To learn how A.M. Best and other rating organizations rank the companies that insure you, and the implications of these ratings for your insurance program, feel free to get in touch with us.

RECRUITMENT BONUSES: STEPS TO SUCCESS

By Employment Resources

istock-6152028-xsmallRecruitment bonuses can be a powerful tool for growing your workforce. To set an effective price point for employee referral bonuses, consider:

  • The cost of using recruiters (up to 25% of the employee’s first-year salary)
  • The rate of turnover in the position
  • The income generated by the position
  • How strong the need is to find the employee
  • How much your competitors’ referral programs are paying

Now that you have a referral amount in mind:

  • Define the skills, experience, and personality desired on a one-page sheet that employees can use to describe the job opportunity. This reduces the variance in describing the opportunity.
  • On a separate sheet, give them a place to fill in follow up contact information for job prospects.
  • Consider paying the bonus in installments (for example, 1/6 every 30 days). Make it clear that the total award will be paid only if the new employee works the full six months.
  • Some companies include vendors, customers, clients, and others in this process using the same approach. The only caveat here is to watch potential conflicts of interest.

One company that hires predominately customer service reps gives every CSR a stack of business cards so that when they interact with someone who offers good service, they can hand them a card. The back of the card says something to the effect of, “You’ve given me good service today. Our company is always looking for people who can provide good service. If you’re interested, contact us at (123) 456-5678 or go to company.com.” It’s important to provide guidelines for avoiding conflicts of interest. The last thing you want your employees to do is hand those cards out at a client’s office!

Don Phin, Esq. is VP of Strategic Business Solutions at ThinkHR, which helps companies resolve urgent workforce issues, mitigate risk and ensure HR compliance. Phin has more than three decades of experience as an HR expert, published author and speaker, and spent 17 years in employment practices litigation. For more information, visit www.ThinkHR.com.

AGE DISCRIMINATION SUIT – Be Careful About What You Say.

By Employment Resources

mp900385346-2In a case that illustrates how a supervisor’s ill-advised comments can come back to haunt a company, the U.S. Court of Appeals for the Sixth Circuit recently revived a discrimination case by an older employee who had been laid off.

In Sharp v. Aker Plant Services Group, Inc., the plaintiff accused his employer of age discrimination because it terminated him while retaining a younger worker whom he had trained. His supervisor allegedly told him that the company had a succession plan “where you bring in younger people, train them, so that when the older people leave, you’ll have younger people.” The plaintiff also had a recording on which the supervisor said: “We’re all of the same age and we’re all going to retire; I had the opportunity to bring the next generation in, so that’s what we decided to do.”

A lower court held that these statements expressed only a concern for maximizing the firm’s return on investment by retaining employees who would stay with it longer. The appeals court disagreed, arguing that this concern about employees’ potential longevity with the company could be considered a smoke screen for direct evidence of age bias. What’s more, although the supervisor stated that the younger employee was a better performer, he had written a strong letter of recommendation for the plaintiff.

The moral of the story: Keep a close eye on termination decisions that involve older employees.

Article courtesy of Worklaw® Network firm Shawe Rosenthal (www.shawe.com).

Commuting to and from work

By Employment Resources

A frequent question at the Job Accommodation Network is whether the ADA requires employers to provide accommodations for a disabled employee who has trouble getting to and from work because of his or her condition. A related question is whether it makes any difference if the employee’s only disability-related problem is the commute; if once at work, he or she has no problem performing the job.

The answer to the first question is “yes”; employers must consider some accommodations related to commuting problems. The answer to the second question is “no;” it doesn’t matter whether the employee is able to perform the job fully without the need for accommodations at work.

According to informal guidance from the ADA Policy Division of the Equal Employment Opportunity Commission, although employers don’t have to actually transport an employee with a disability to and from work (unless the employer provides this as a perk of employment), employers might have to provide other accommodations, such as changing an employee’s schedule so that he or she can access available transportation, reassigning an employee to a location closer to home when the length of the commute is the problem, or allowing an employee to telecommute.

The underlying reason why employers might have to provide such accommodations is that the employer usually controls employee schedules and work locations; so, when a schedule or work location poses a barrier to an employee with a disability, the employer must consider reasonable accommodation to overcome this problem. As with any accommodation under the ADA, when considering accommodations related to commuting, employers can choose among effective accommodation options and do not have to provide an accommodation that poses an undue hardship.

Linda Carter Batiste, J.D.

The Job Accommodation Network

HO, HO, HO, Host Liquor Liability

By Business Protection Bulletin

mp900382941The holidays are almost upon us and alcohol will be flowing at company parties throughout the land. Beware! If an employee or guest gets inebriated at a social function sponsored by your business and then injures another person, you could be held liable.

Consider this scenario: After polishing off four eggnogs in an hour at the company’s Christmas party, one of your workers toddles off to his car. The employee almost makes it home when he runs a red light and T-bones a car. The car is damaged and injures the driver. The driver then sues your business for negligence in allowing the employee to drive home although he was clearly “under the influence” at the company party.

What’s more, under state and local “social host” laws, your business might face a fine or even imprisonment for continuing to serve alcohol to an adult who is legally drunk.

Under your comprehensive general liability policy is a clause for host liquor liability. The insurance company will pick up the tab for property damage and bodily injuries, up to “each occurrence” or “general aggregate” limits for the CGL. This coverage will also pay for court costs, legal fees, and other expenses – and these payments will not apply to the limits.

Be sure not to confuse host liquor liability insurance with Liquor Liability coverage, which protects businesses that manufacture, serve, or sell alcoholic beverages (such as liquor stores, bars, and taverns) against claims for injuries caused by intoxicated customers. If you’re in one of these businesses, you’ll need both types of policy.

To learn more, feel free to get in touch with our agency at any time.

COLD WEATHER CHECKLIST

By Construction Insurance Bulletin

mp900406748Cold weather will be with us for a few months which can cause a variety of problems for contractors and their employees who work outdoors in winter weather.

To help your workers stay warm and safe on the job, follow these precautions:

  • Make sure that they keep their body temperature at or about normal by wearing layers of clothing, both inside and outdoors.
  • Provide proper rain gear, gloves, good waterproof boots, and an extra pair of clean, dry socks.
  • Have workers protect their neck and ears; they can lose a lot of heat from these areas.
  • Treat frostbite properly. The most important symptom is a numbing effect, which many workers tend to ignore. Other symptoms can include red skin turning to white, poor blood circulation, and blisters. To provide first aid: 1) never rub the frozen part in snow or immerse it in hot water (you can use warm water); 2) cover the affected area with extra clothing or a blanket; 3) get the worker out of the cold; 4) apply loose fitting, sterile dressings and splint and elevate affected extremities if possible; and 5) seek immediate medical attention.
  • Make sure that portable heaters are maintained and inspected on a regular basis. Defective ventilation and incomplete burning of fuel can lead to carbon monoxide poisoning. Locate fuel containers, regulators, piping, and hoses and secure them in sites where they won’t be subject to damage. Protect the valves from damage also.

Remember, the more effectively you help your employees stay warm and safe on the job, the higher their productivity,– and the lower your insurance premiums.

For more information, please feel free to get in touch with our agency’s Construction insurance specialists at any time.

Five Disappointingly Boring Methods of Hackers

By Cyber Security Awareness

hacker-keyboardThe movies tell us that hackers are hip young rebels and international secret agents with black leather jackets, cool shades and wild haircuts. They might work for secret organizations or they might be anarchists trying to shake things up. They stare at fields of green text that only they can comprehend and dance their fingers along the keyboards while shouting about jacking into mainframes and subverting the dot matrix.

Screenwriters have a lot of fun coming up with exciting ways to present the computer criminal, perhaps because the reality is so boring. Here are some of the more disappointing methods hackers use to swipe your stuff:

Mass Data Theft

The recent Ashley Madison hack is eye-opening for a number of reasons, one being that it helps to dispel the myth that hackers tend to specifically target their marks. Selecting a specific individual to steal from, and then succeeding in breaking their security, is actually a lot tougher than stealing from hundreds of people at a time through a single website hack, and hoping you wind up hitting a high-value target.

123456

123456 is the most common password on the planet. It’s easy enough to just guess passwords until you get one right, but it’s even easier to keep trying to log in to different accounts until you find one with 123456 as its password. Again, hackers aren’t picky. They don’t really aim to bust into the White House’s networks or steal code from Apple, they tend to just keep trying different targets until they find one that’s poorly secured.

Physical Theft

Some hackers don’t even use computers, they steal actual credit cards and receipts. Here, again, they tend to be opportunists. Why pickpocket when you can just hang around a coffee shop and wait for someone to forget their wallet on a table?

“Stay Logged In?”

If you ever feel like becoming a cybercriminal, hang around a library for a day, or anywhere else where computers are free for public use. Every time someone packs up and leaves, hop on their computer and find out if they forgot to log out of their bank accounts, Paypal accounts, or email providers. Nine people out of ten remember to log out, but it’s worth turning up nine misses for one hit.

Peekaboo

And then there’s just good old fashioned peeking. It’s not hard to watch someone’s hands as they enter a password, or look over their shoulder when they read their emails.

Data thieves who have any real computer skills are actually relatively few and far between. The vast majority are opportunists. Many of whom might never have considered data or identity theft until they saw that someone forgot their card in an ATM. This is why it’s important to stay secure, not because hackers are so gifted, but because most of them are not, and an unsecure network is a prime target for a lazy opportunist.

3 More Cyber Security Myths

By Cyber Security Awareness

cyber-feb-2016-1We’ve covered the subject of cyber-security myths before, but all it takes is one critical misunderstanding to harm your network, and we could write a phone book’s worth of content on all the misunderstandings floating around out there.

The Internet’s Safer Now

Some users are under the impression that the Internet is no longer the Wild Wild West that it was in the late nineties and early 00’s. Your computer is probably safer, cyber-security software has gotten more advanced, the general public has gotten smarter about web safety, but the Internet itself is still a Petri dish of viruses and worms that have only had greater opportunities to evolve and proliferate over the last two decades. Viruses don’t disappear from the Internet, they keep floating around out there, finding new means of distribution. The Internet is more dangerous than ever, we’ve just gotten a lot tougher.

Security is the Tech Team’s Job

Put simply: leaving security to the techies on staff is a little bit like leaving a tire to the mechanic when it’s low on air. There are a lot of things that you and the rest of your team can do to make the tech team’s job a little easier, and to keep the ship running a little more smoothly. Brief your people on basic security protocol, and you’ll be far less likely to have your tech guy come to you saying that he needs to hire three more people to handle all this extra workload.

It’s All in the Cloud, so What’s at Risk?

Your definition of valuable data might not quite be the same as a hacker’s. You’re thinking about work-related data and personal information. A hacker is looking for any access they can find. A hacker who gains access to your network might not even have any interest in accessing the encrypted information you keep on the cloud, they might be satisfied with simply using your system as a proxy through which to attack other users. Your system is a gateway, it isn’t just a locker for sensitive data, so keeping it empty won’t keep it safe.

Keeping your network safe isn’t that great of a challenge. All it takes is the right software, a little bit of common sense, and a basic sense of responsibility. Invest a little time, money and effort into your system, and it’s not hard to keep it running clean.

Is There Any Such Thing as a Virus-Proof Device?

By Cyber Security Awareness

app-1013616_960_720Is there any such thing as virus-proof? Although devices aren’t typically advertised as being “virus-proof,” many developers certainly enjoy the extra profits that come with being “commonly known” for being virus-proof. The question remains as to whether any device or operating system can ever truly be impervious to infection. Let’s do some myth-busting:When people sing the praises of Linux, un-infectability usually makes the list.

Without judgment, it’s fair to say that there’s an elitist bent to a lot of Linux communities. It’s not the operating system you install on your grandma’s laptop, it’s an OS for techies. If you’re technically inclined, then it does offer a ot of benefits over Windows and Mac operating systems, but is it virus-proof?Well, according to the official website: No.Put simply: Any computer attached to the internet is at risk. So scratch Linux off the list.

Mac Devices and Computers

Apple has been something of a holdout in the push towards open design, which has made it difficult to develop security software for. A great op-ed from back in 2012 does a good job of explaining the company’s mentality. It boils down to: People think Apple products are virus proof only because there aren’t a lot of iOS viruses out there right now. It’s easier to create viruses and worms for Windows, and Windows has been around longer. But more recently, we’ve seen that iOS is anything but impenetrable.

Android

The Android is known to have been designed from the ground up to be virus-resistant, from hardware to operating system. This isn’t the same thing as being virus-proof. Unfortunately, the Android’s permissive app-approval process is a double edged sword, allowing developers to pack apps with all the viruses they like. In short: Android doesn’t make the list, either.There is essentially no such thing as virus-proof. Some devices and operating systems are more resistant to viruses than others, but as long as you’re using the internet or USB drives or any other sort of data-input, you’re at risk.