Download

The FIO Report on Insurance Regulation

The report may in hindsight be regarded as more momentous an occasion for the industry and its regulation than the muted initial reaction would suggest. 

The December 2013 issuance of the Federal Insurance Office (FIO) report, How to Modernize and Improve the System of Insurance Regulation in the United States, may in hindsight be regarded as more momentous an occasion for the industry and its regulation than the muted initial reaction might suggest. History’s verdict most likely will depend on the effectiveness of the follow-up to the report by both the executive and legislative branches, but current trends in financial services regulation may serve to increase the importance and influence over time of the FIO even in the face of inaction in Washington.

Insurance regulation has traditionally been the near-exclusive province of the states, a right jealously guarded by the states and secured by Congress in 1945 after the Supreme Court ruled insurance could be regulated by the federal government under the Commerce Clause of the Constitution.

Any fear that the FIO report would call for an end to state regulation proved unfounded, but industry members might be well-advised to prepare for the eventualities that may result as the FIO uses both the soft power of the bully pulpit and the harder power of the federal government to achieve its aims. As the designated U.S. insurance representative in international forums that more and more mold financial services regulation, and as an arbiter of standards that could be imposed on the states, the FIO and this report should not be ignored.

Having met with the FIO’s leadership team, we believe there are concerns that uniformity at the state level cannot be achieved without federal involvement. We further believe the FIO plans to work to translate its potential into an actual impact in the near future, making a clear-eyed understanding of the report and what it may herald for insurers a prudent and necessary step in regulatory risk management.

The concerns

The biggest surprise about the FIO report may well have been that there were no surprises. There were no strident calls for a wholesale revamp of the regulatory system, and praise for the state regulatory system was liberally mingled among the criticisms.

The lack of any real blockbusters in the details of the FIO report may seem to lend implicit support to those who foresee a continuation of the status quo in insurance regulation. But, taken as a whole, this report and the regulatory atmosphere in which it has been released should be considered a subtle warning of changes that may yet come.

The report may quietly help to usher in an acceleration of the current evolution of insurance regulation. The result could be a regulatory climate that offers more consistency and clarity for insurers and reduces the cost of regulation. The result could also be a regulatory climate that offers more stringent regulatory requirements and increases both the cost of compliance and capital requirements. Most likely, the result could be a hybrid of both.

Either way, preparing to influence and cope with any possible changes portended in the report would be preferable to ignoring the portents.

Part of the disconnect between the short-term reception and the long-term impact of this report may be because of the implicit FIO recognition in the report of the lack of political will needed to enforce any real changes in current U.S. insurance regulation, most especially any that would require increased expenditures or personnel at the federal level. In our current economic and political environment, plugging gaps in state regulation by using measures that would require federal dollars may quite reasonably be construed to be off the table.

But the difference between identified problems and feasible solutions may offer an opportunity. States, industry and other stakeholders could act together to bring needed reform to the insurance regulatory system in a way that adds uniform national standards to regulation, reduces the possibility of regulatory arbitrage and maintains the national system of state-based regulation, all while recognizing the industry’s strengths and needs and not burdening the industry with unnecessary, onerous regulation.

There is much to praise in the current state regulatory system. A generally complimentary federal report on the insurance industry and the fiscal crisis of the past decade noted, “The effects of the financial crisis on insurers and policyholders were generally limited, with a few exceptions…The crisis had a generally minor effect on policyholders…Actions by state and federal regulators and the National Association of Insurance Commissioners (NAIC), among other factors, helped limit the effects of the crisis.”

While the financial crisis demonstrated the effectiveness of the current insurance regulation in the U.S., it is also evident that, as in any enterprise, there are areas for improvement. There are niches within the industry – financial guaranty, title and mortgage insurance come to mind – where regulatory standards and practices have proven less than optimal.

There are also national concerns that affect the industry. The lack of consistent disciplinary and enforcement standards across the states for agents, brokers, insurers and reinsurers is one obvious concern. Similarly, the inconsistent use of permitted practices and other solvency-related regulatory options could lead to regulatory arbitrage. At a time when insurance regulators in the U.S. call for a level playing field with rivals internationally, these regulatory differences represent an example of possible unlevel playing fields at home that deserve regulatory attention and correction.

A Bloomberg News story in January 2014, for example, quoted one insurer as planning to switch its legal domicile from one state to another because the change would allow, according to a spokeswoman for the company, a level playing field with rivals related to reserves, accounting and reinsurance rules.

For insurers operating within the national system of state-based regulation, one would hope that that level playing field would cross domiciles, and no insurer would be disadvantaged because of its domicile in any of the 56 jurisdictions.

But perhaps one of the greatest challenges to the state-based system of regulation is the added cost of that regulation, partly engendered by duplicative requests for information and regulatory structures that have not been harmonized among states. How to respond to that may represent the biggest gap in the FIO report. It may also be the biggest opportunity for both insurers and regulators to rationalize the current regulatory system and ensure the future of state-based regulation.

Cost

The FIO report notes that the cost per dollar of premium of the state-based insurance regulatory system “is approximately 6.8 times greater for an insurer operating in the United States than for an insurer operating in the United Kingdom." It quotes research estimating that our state-based system increases costs for property-casualty insurers by $7.2 billion annually and for life insurers by $5.7 billion annually.

According to the report, "regulation at the federal level would improve uniformity, efficiency and consistency, and it would address concerns with uniform supervision of insurance firms with national and global activities."

Yet the report does not recommend the replacement of state-based regulation with federal regulation, but with a hybrid system of regulation that may remain primarily state-based, but does include some federal involvement.

At least one rationale for this is clearly admitted in the report. As it says, "establishing a new federal agency to regulate all or part of the $7.3 trillion insurance sector would be a significant undertaking ... (that) would, of necessity, require an unequivocal commitment from the legislative and executive branches of the U.S. government."

The result of that limitation is a significant difference between diagnosis and prescription in the FIO report. Having diagnosed the cost of the state-based regulatory system as an unnecessary $13 billion burden on policyholders, the FIO's policy recommendations may possibly be characterized as, for the most part, the policy equivalent of "take two aspirin and call me in the morning."

Still, as the Dodd-Frank Act showed, even Congress can muster the will to impose regulatory solutions if a crisis becomes acute enough and broad enough. Unlikely as that may now seem, the threat of federal radical surgery should not be what is required for states to move toward addressing the recommendations of the FIO report.

Indeed, actions of the NAIC over the past few years have addressed much of what is in the FIO report. Now the NAIC, industry and other stakeholders can take the opportunity provided by the report to work to resolve some of the issues identified in it. The possible outcome of an even greater federal reluctance to become involved in insurance regulation would only be a side benefit. The real goal should be a regulatory system that is more streamlined, less duplicative, more responsive, more cost-efficient and more supportive of innovation.

Kevin Bingham has shared this article on behalf of the authors of the white paper on which it is based: Gary Shaw, George Hanley, Howard Mills, Richard Godfrey, Steve Foster, Tim Cercelle, Andrew N. Mais and David Sherwood. They can reached through him. The white paper can be downloaded here

Disjointed Reinsurance Systems: A Recipe for Disaster

Having disjointed systems can mean that each insured risk doesn't have the appropriate reinsurance program associated with it -- and be a recipe for disaster.

Insurers’ numerous intricate reinsurance contracts and special pool arrangements, countless policies and arrays of transactions create a massive risk of having unintended exposure. The inability to ensure that each insured risk has the appropriate reinsurance program associated with it is a recipe for disaster.

Having disjointed systems—a combination of policy administration system (PAS) and spreadsheets, for example—or having systems working in silos are sure ways of having risks fall through the cracks. The question is not if it will happen but when and by how much.

Beyond excessive risk exposure, the risks are many: claims leakage, poor management of aging recoverables and lack of business intelligence capabilities. There’s also the likelihood of not being able to track out-of-compliance reinsurance contracts. For instance, if a reinsurer requires certain exclusion in the policies it reinsures and the direct writer issues the policy without the exclusion, then the policy is out of compliance, and the reinsurer may deny liability.

The result is unreliable financial information for trends, profitability analysis and exposure, to name a few.

Having fragmented solutions and manual processes is the worst formula when it comes to audit trails. This is particularly troubling in an age of stringent standards in an increasingly internationally regulated industry. Integrating the right solution will help reduce risks to an absolute minimum.

Consider vendors offering dedicated and comprehensive systems as opposed to policy administration system vendors, which may simply offer “reinsurance modules” as part of all-encompassing systems. Failing to pick the right solution will cost the insurer frustration and delays by attempting to “right” the solution through a series of customizations. This will surely lead to cost overruns, a lengthy implementation and an uncertain outcome. An incomplete system will need to be customized by adding missing functions.

Common system features a carrier should look out for are:
  • Cession treaties and facultative management
  • Claims and events management
  • Policy management
  • Technical accounting (billing)
  • Bordereaux/statements
  • Internal retrocession
  • Assumed and retrocession operations
  • Financial accounting
  • AP/AR
  • Regulatory reporting
  • Statistical reports
  • Business intelligence
Study before implementing

Picking the right solution is just the start. Implementing a new solution still has many pitfalls. Therefore, the first priority is to perform a thorough and meticulous preliminary study.

The study is directed by the vendor, similar to an audit through a series of meetings and interviews with the different stakeholders: IT, business, etc. It typically lasts one to three weeks depending on the complexity of the project. A good approach is to spend a half-day conducting the scheduled meeting(s) and the other half drafting the findings and submitting them for review the following day.

The study should at least contain the following:

  • A detailed report on the company’s current reinsurance management processes.
  • A determination of potential gaps between the carrier reinsurance processes and the target solution.
  • A list of contracts and financial data required for going live.
  • Specifications for the interfaces.
  • Definitions of the data conversion and migration strategy.
  • Reporting requirements and strategy.
  • Detailed project planning and identification of potential risks.
  • Repository requirements.
  • Assessment and revision of overall project costs.
Preliminary study/(gap analysis) sample:

1. Introduction
  • General introduction and description of project objectives and stakeholders
  • What’s in and out of scope
2. Description of current business setting

3. Business requirements

  • Cession requirements
  • Assumed and retrocession requirements
4. Systems Environment Topics
  • Interfaces/hardware and software requirements
5. Implementation requirements
6. System administration
  • Access, security, backups
7. Risks, pending issues and assumptions
8. Project management plan

The preliminary study report must be submitted to each stakeholder for review and validation as well as endorsement by the head of the steering committee of the insurance company before the start of the project. If necessary, the study should be revised until all parts are adequately defined. Ideally, the report should be used as a road map by the carrier and vendor.

All project risks and issues identified at this stage will be incorporated into the project planning. It saves much time and money to discover them before the implementation phase. One of the main reasons why projects fail is poor communication. Key people on different teams need to actively communicate with each other. There should be at  least one person from each invested area—IT, business and upper management must be part of a well-defined steering committee.

A clear-cut escalation process must be in place to tackle any foreseeable issues and address them in a timely manner.

A Successful Implementation Process
Key areas and related guidelines that are essential to successfully carry out a project.

Data cleansing
Before migration, an in-depth data scrubbing or cleansing is recommended. This is the process of amending or removing data derived from the existing applications that is erroneous, incomplete, inadequately formatted or replicated. The discrepancies discovered or deleted may have been originally produced by user-entry errors or by corruption in transmission or storage.

Data cleansing may also include actions such as harmonization of data, which relates to identifying commonalities in data sets and combining them into a single data component, as well as standardization of data, which is a means of changing a reference data set to a new standard—in other words, use of standard codes.

Data migration

Data migration pertains to the moving of data between the existing system (or systems) and the target application as well as all the measures required for migrating and validating the data throughout the entire cycle. The data needs to be converted so that it’s compatible with the reinsurance system before the migration can take place.

It’s a mapping of all the data with business rules and relevant codes attached to it; this step is required before the automatic migration can take place.

An effective and efficient data migration effort involves anticipating potential issues and threats as well as opportunities, such as determining the most suitable data-migration methodology early in the project and taking appropriate measures to mitigate potential risks. Suitable data migration methodology differs from one carrier to another based on its particular business model.

Analyze and understand the business requirements before gathering and working on the actual data. Thereafter, the carrier must delineate what needs to be migrated and how far back. In the case of long-tail business, such as asbestos coverage, all the historical data must be migrated. This is because it may take several years or decades to identify and assess claims.

Conversely, for short-tail lines, such as property fire or physical auto damage, for which losses are usually known and paid shortly after the loss occurs, only the applicable business data is to be singled out for migration.

A detailed mapping of the existing data and system architecture must be drafted to isolate any issues related to the conversion early on. Most likely, workarounds will be required to overcome the specificities or constraints of the new application. As a result, it will be crucial to establish checks and balances or guidelines to validate the quality and accuracy of the data to be loaded.

Identifying subject-matter experts who are thoroughly acquainted with the source data will lessen the risk of missing undocumented data snags and help ensure the success of the project. Therefore, proper planning for accessibility to qualified resources at both the vendor and insurer is critical. You’ll also need experts in the existing systems, the new application and other tools.

Interfaces

Interfaces in a reinsurance context relate to connecting to the data residing in the upstream system, or PAS, to the reinsurance management system, plus integrating the reinsurance data to other applications, such as the general ledger, the claims system and business intelligence tools.

Integration and interfaces are achieved by exchanging data between two different applications but can include tighter mechanisms such as direct function calls. These are synchronous communications used for information retrieval. The synchronous request is made using a direct function call to the target system.

Again, choosing the right partner will be critical. A provider with extensive experience in developing interfaces between primary insurance systems, general ledgers, BI suites and reinsurance solutions most likely has already developed such interfaces for the most popular packages and will have the know-how and best practices to develop new ones if needed. This will ensure that the process will proceed as smoothly as possible.

After the vendor (primarily) and the carrier carry out all essential implementation specifics to consolidate the process automation and integrations required to deliver the system, look to provide a fully deployable and testable solution ready for user acceptance testing in the reinsurance system test environment.

Formal user training must take place beforehand. It needs to include a role-based program and ought not to be a “one-size-fits-all” training course. Each user group needs to have a specific training program that relates to its particular job functions.

The next step is to prepare for a deployment in production. You’ll need to perform a number of parallel runs of the existing reinsurance solutions and the new reinsurance system and be able to replicate each one and reach the same desired outcome before going live.

Now that you’ve installed a modern, comprehensive reinsurance management system, you’ll have straigh-tthrough automated processing with all the checks and balances in place. You will be able to reap the benefits of a well-thought-out strategy paired with an appropriate reinsurance system that will lead to superior controls, reduced risk and better financials. You’ll no longer have any dangerous hidden “cracks” in your reinsurance program.
This article first appeared in Carrier Management magazine.

Top 10 Mistakes to Avoid as a New Risk Manager

While you may soon be invited to participate on panels and present at conferences, remain humble and teachable. It’s painful to learn humility through humiliation.

The transition into your first risk management job can be difficult. Whether your boss promotes you into your first risk management job or hires you from another organization, you want to excel at your new position over the long haul. In part, that means avoiding mistakes. We often learn our best lessons when we fail, but some mistakes can seriously hurt your risk management program, harm your reputation or even derail your career. Here are 10 mistakes you can avoid.

  1. Don’t rush in with all the answers. You may arrive wanting to form your own alliances and acquire your own team, but avoid making hasty decisions. Give current employees a chance to prove themselves before you transfer them or hire your own team. The same applies to vendor relationships. You can lose a great deal of knowledge about loss history and coverage negotiation if you immediately decide to switch insurance brokers. “Changing brokers can be a great way to create significant coverage gaps or an errors and omissions claim for your friend the new broker,” according to one Atlanta broker. Some vendor alliances, such as relationships with contractors and body shops, may be long-standing, especially in a small town. Rushing in and making changes can cause big ripples in a little pond.
  2. Don’t try to do everything at once. In my teens, I read a book called Ringolevio, about a kid named Emmett Groan growing up in the streets of New York City. One of his compatriots frequently warned Emmett when he was about to rush headlong into a decision, “Take it easy, greasy, you’ve got a long way to slide.” I found that advice very applicable in risk management. If you inherit a big job, you will be faced with hundreds of decisions, some big, some small. Take your time. While you may feel overwhelmed at first, chip away at the organization’s most pressing problems. Put out fires as they arise. Then schedule time for you and your advisers — your brokers, your attorneys, your actuaries and your managers – to develop sound strategies and plans.
  3. Don’t use a shotgun, use a rifle. If the organization is experiencing too many injuries, for example, don’t jump to an obvious solution like using more personal protective equipment. Talk with front-line supervisors, study historical loss data and consider several options before you throw money at a problem. Once in the door, interview employees, talk with other managers, meet with your vendors and set a few important priorities for your first six months in the job. Using a rifle approach means you’ll have to say “No” to some people. This can cause problems. When possible, explain why you’re declining to act on the problems or the specific issues others may present to you. The more transparently you operate, the less criticism you will face. Openness reduces speculation and helps avoid resentment.
  4. Don’t job hop. Most people can be very ambitious early in their careers. Yet too much ambition can hurt your career. Think long and hard before changing jobs. Bad bosses rarely outlast their employees. Deciding to change jobs because of a conflict with a supervisor is often short-sighted. The grass might seem greener on the other side, but sometimes that’s because of a septic tank (to paraphrase a famous comedian). These questions may help you avoid rash decisions.
    • Am I making the change solely to earn more money or for a more prestigious title? If so, will this change “pay for” what I will lose?
    • Am I making the change because I’m feeling unchallenged or bored? If so, what steps can I take to make my current job more challenging? For example, would becoming more active in a trade association, offering expertise to a local nonprofit or mentoring an up-and-coming risk management professional add challenge and interest?
    • How will this affect my retirement financially? Will I be changing retirement systems, or will I lose significant bonuses or vacation because of the change? Always factor those figures into the salary decision. This question becomes more important as retirement age nears.
    • How will this change affect my family and my coworkers? Our coworkers can turn even a challenging job into an appealing one. Do you really want to leave your coworkers? As for family, what ages are your children? Disrupting school-aged children can have negative, long-term consequences.
    • What are the odds I will regret this decision? Go ahead, we’re numbers people. Put a percentage to your decision, then ask yourself if you’re really ready to take that gamble.

    It takes months to settle into a new job. It’s often a year or more before we feel comfortable. Some studies show that many people who change jobs would have done much better if they had stayed put longer. Change for the sake of change frequently is not positive.

  5. Don’t entertain gossip about your predecessors. Some at your new organization may try to build an alliance with you at the expense of your predecessor. Short-circuit these conversations whenever possible. Tactfully turn the conversation to another subject or excuse yourself from the conversation. Try not to make an enemy of the person who is trying to get into your good graces.
  6. Don’t revisit your predecessor’s decisions. Especially when working with unions, you may find people lined up at your door asking you to revisit your predecessor’s judgments. Unless your predecessor’s conclusions hurt your overall program, don’t rush into undoing the decisions and the work he or she completed. You may not be operating under the same set of facts or with the same long-term vision that the former risk manager had at his or her disposal.
  7. Don’t believe your own PR. Never pretend you know more than you know, and don’t start believing your own “press.” While others may soon invite you to participate on panels and present at conferences, remain humble and teachable. It’s terribly painful to learn humility through humiliation.
  8. Don’t fail to communicate. A lack of communication is one of the most damaging mistakes a risk manager can make. A risk manager must have the ear of employees across the organization, from line supervisors to senior management. According to Don Donaldson, president of LA Group, a Texas-based risk management consulting group, “A risk manager needs to be an excellent communicator and facilitate his or her message across the entire organization. In my mind, that requires getting out of the office and pressing the flesh; seeing and being seen and listening, really listening, to determine what is going on in the organization.” Management by walking around is one strong tool in a new risk manager’s tool bag. Once people see that you’re willing to leave your office to discover what is happening, whether it’s on the shop floor or on the sewer line, they’ll more readily accept your expertise and counsel.
  9. Don’t get discouraged. “New risk managers may make the mistake of thinking that risk management is as important to others in the organization as it is to them,” according to Harriette J. Leibovitz, a senior insurance business analyst with Yodil. “It takes time, and more time for some than others, to figure out that you're more than an irritation to the folks who believe they drive all the revenue.” Over time, you will prove your value to the organization many times over. Until that day, quietly do your job and find encouragement from your risk management peers.
  10. Don’t forget to laugh. You will be privy to the peculiarities of human nature both at its finest and at its worst, so don’t forget to find the lighter side of situations when you can. A robust sense of humor will help you through the rough spots and build bonds with your coworkers.

While these are just a few tips to help you in your new role as a risk manager, your peers probably can offer many more ways to ensure success. Over my career in risk management, I have found my fellow risk management professionals to be some of the most generous people in my life, always willing to share their expertise and provide me with a helping hand. Develop and lean on your network. If this is your first job as a risk manager, you’re in for a wonderful experience. Take time along the way to enjoy the experiences, appreciate the great people you will meet and appreciate the lighter side of risk management.

Minority-Contracting Compliance -- Three Risks

Contractors that fail to comply face fines, expensive lawsuits and lost projects -- and executives and employees can even wind up in jail.|

On Jan. 13, 2014, the Department of Justice announced that two former executives of Schuylkill Products had been sentenced to two years in federal prison and forced to pay $119 million in restitution because of their role in what the FBI called the largest fraud involving the Department of Transportation’s Disadvantaged Business Enterprise (DBE) Program. A third individual, the owner of Marikina Construction, the firm that was used as a “front” in the scheme, received a prison sentence of nearly three years. The sentencing of these individuals is not the result of an isolated incident. In recent years, federal prosecutors and the DOT inspector general have significantly stepped up enforcement of DBE and have brought several cases resulting in civil penalties and jail time. Some involved well-known international construction firms and their executives. Here are three reasons why every contractor dealing with a federal, state or local minority contracting program needs to have proper compliance policies and procedures in place: 1.         Jail Time and Civil Fines Contractors that do not comply with the DBE program’s rules and regulations face the very real threat of jail time and civil fines. According to the DOT, DBE fraud now represents more than one-third of the DOT inspector general’s open cases. From Oct. 1, 2003, through Sept. 30, 2008, investigations of DBE fraud allegations resulted in 49 indictments, 43 convictions, nearly $42 million in recoveries and fines and 419 months of jail sentences. From 2009 to 2010, the number of open investigations related to DBE fraud increased by almost 70%. The number of investigations shows no signs of slowing, as the DOT is aggressively hiring additional investigative agents. Under several legal doctrines, a defendant can be held liable when the evidence shows that the defendant intentionally avoided confirming certain facts and learning the truth. 2.         Whistleblower Lawsuits Under the Federal False Claims Act, every disgruntled employee is a bounty hunter. The act authorizes private individuals to bring a civil claim in the name of the U.S. against anyone who fraudulently obtained money or property from the government. The person who brings the action is entitled to 30% of the amount recovered for the government. Contractors can become the target of a False Claims Act case if they submit payment applications to the government that falsely certify that a certain percentage of work was performed by DBE firms. Like in the criminal context, a contractor can still be liable even if it lacks actual knowledge of the DBE fraud. Reckless disregard for the truth or deliberate ignorance are sufficient. 3.         Bid Rejections and Challenges Strict minority set asides or quotas are almost always unconstitutional. Disadvantaged business contracting programs, like the DOT’s DBE, are not quotas (a fact that DOT underlines in its regulations). Rather, they are goals that contractors must use “good-faith efforts” to achieve. In fact, many contractors would be surprised to know that a state transportation agency cannot reject a bid because it fails to include a commitment to subcontract work that meets or exceeds the stated DBE goal. However, for a bid to be accepted, the contractor must be able to demonstrate “good faith efforts” to meet the stated DBE contracting goal. Because most state procurement codes require the award of a contract to the lowest responsible and responsive bidder, failing to document adequate good-faith efforts is grounds for a state transportation agency to reject a bid or for challenge to be filed by a disgruntled bidder. The risks that contractors face with not complying with minority contracting programs, particularly the DOT DBE program, literally cannot be ignored. At best, contractors that fail to comply with the program face significant financial ramifications in the form of fines, expensive lawsuits and lost projects. At worst, executives and employees can wind up in jail.

Wally Zimolong

Profile picture for user WallyZimolong

Wally Zimolong

Wally is one of Super Lawyer Magazine's "rising stars" of construction litigation. He has successfully litigated hundreds of construction-related cases, some that resulted in published court opinions and changes in substantive law. Since graduating from law school in 2002, Wally has dedicated his legal career to representing individuals and companies in the construction industry.

Cybersecurity: Five Tips on Disclosure Requirements

Failure to make adequate cybersecurity disclosures may subject a company to increased risk of enforcement actions and shareholder lawsuits.

With annual reporting season underway, C-suite executives wake to another day and another data breach. Target, Michael’s, Snapchat, Facebook, Twitter, Adobe -- the list goes on and on. By now, all companies should appreciate that, notwithstanding the most robust and sophisticated network security, any company is a vulnerable next “Target” for a serious cybersecurity incident. Consequences typically include negative publicity, reputational damage that hurts customer and investor confidence, lost market capitalization, claims and legal disputes, regulatory investigations -- and falling stock prices. In the wake of its high-profile data breach, Target’s directors and officers were hit on Jan. 29, 2014, with a shareholder derivative action alleging that “Target shares were trading above $63.50 on Dec. 18, 2013, before the news of the data breach and have fallen over 10.5% to $57.60” and that “Target … has suffered considerable damage from breach.”1

In view of the recent high-profile data breaches, and the pervasiveness of cybersecurity incidents in general, companies are well-advised to consider whether their current cybersecurity risk factor disclosures are adequate. Proper attention to cybersecurity risk factor disclosures may assist a company in avoiding a Securities and Exchange Commission (SEC) comment letter. Even more importantly, proper attention to cybersecurity risk factor disclosures may decrease the likelihood that a company will face securities class action litigation and shareholder derivative litigation in the wake of a cybersecurity incident that hurts the company’s stock price -- or, at a minimum, may mitigate a company’s potential exposure in the event of such litigation.

The Form 10-Ks that public companies are preparing to file in the coming weeks present a significant opportunity for companies to review and strengthen their cybersecurity risk factor disclosures. Below are five tips that companies may wish to consider in reviewing the adequacy of their existing cybersecurity disclosures:

SEC Disclosure Guidance

By way of background, companies must keep in mind that, although existing disclosure requirements do not (yet) expressly reference “cybersecurity,” the SEC’s Division of Corporation Finance (SEC staff) has emphasized the importance of appropriate cybersecurity disclosures. In the wake of what it termed “more frequent and severe cyber incidents,” the SEC issued cybersecurity disclosure guidance,2 which advises companies to review, on a continuing basis, the adequacy of their disclosure relating to cybersecurity risks and cyber incidents.3

While acknowledging that no existing disclosure requirement explicitly refers to cybersecurity risks and cyber incidents, the SEC’s guidance stresses that existing requirements oblige companies to make appropriate cybersecurity disclosures. 

SEC Chairwoman Mary Jo White reaffirmed a company’s current cybersecurity disclosure obligations in response to an April 9, 2013, letter received from Senate Commerce Chairman Jay Rockefeller.4 In his letter, Chairman Rockefeller urged the SEC to “elevate [its] guidance,” noting that “investors deserve to know whether companies are effectively addressing their cybersecurity risks.” In response, Chairwoman White emphasized that “[e]xisting disclosure requirements … impose an obligation on public companies to disclose risks and events that a reasonable investor would consider material” and that “cybersecurity risks are among the factors a public company would consider in evaluating its disclosure obligations.”5 Chairwoman White also highlighted that cybersecurity risk “is a very important issue that is of increasing concern” and stated that the SEC “continues both to prioritize this important matter in its review of public company disclosures and to issue comments concerning cybersecurity.”

In its guidance, the SEC staff advises companies to disclose cybersecurity risks consistent with the Regulation S-K Item 503(c) requirements for risk factor disclosures generally, such that the disclosure provided must adequately describe the nature of the material risks and specify how each risk affects the company. The guidance proceeds to advise that appropriate disclosures may include the following:

  • Discussion of aspects of the registrant’s business or operations that give rise to material cybersecurity risks and the potential costs and consequences;
  • To the extent the registrant outsources functions that have material cybersecurity risks, description of those functions and how the registrant addresses those risks;
  • Description of cyber incidents experienced by the registrant that are individually, or in the aggregate, material, including a description of the costs and other consequences;
  • Risks related to cyber incidents that may remain undetected for an extended period; and
  • Description of relevant insurance coverage.6

Although the guidance does not add cybersecurity disclosure obligations, it is abundantly clear that failure to make adequate cybersecurity disclosures may subject a company to increased risk of enforcement actions and shareholder suits in the wake of a cybersecurity incident that hurts a company’s stock price.

The Five Tips

The following five tips may assist companies in reviewing the adequacy of their existing cybersecurity disclosures based on the SEC’s disclosure guidance as well as comments issued to approximately 55 companies over the last two years.

1. Perform a cybersecurity risk asssessment. The SEC staff states in its guidance that it expects companies to evaluate their cybersecurity risks and take into account all available relevant information, including prior cyber incidents and the severity and frequency of those incidents as well as the adequacy of preventive actions taken to reduce cybersecurity risks in the context of the industry in which they operate and risks to that security, including threatened attacks of which they are aware. To facilitate adequate disclosures, companies should consider engaging in a thorough assessment concerning their current cybersecurity risk profile and the impact that a cybersecurity breach may have on the company’s business. In addition to positioning the company to provide adequate cybersecurity risk factor disclosures, the undertaking of a risk assessment is consistent with the National Institute of Standards and Technology’s recently released Preliminary Cybersecurity Framework.7 At a high level, it provides a framework for critical infrastructure organizations to achieve a grasp on their current cybersecurity risk profile and risk management practices and to identify gaps that should be addressed to progress toward a desired “target” state of cybersecurity risk management.8 Although the Cybersecurity Framework is voluntary, organizations are advised to keep in mind that creative class action plaintiffs (and even some regulators) may nevertheless assert that the Cybersecurity Framework provides a de facto standard for cybersecurity and risk management.

2. Consider disclosing prior -- and potential -- breaches. To the extent a company or one of its subsidiaries has suffered a reported or known cybersecurity event, the company should anticipate that the SEC may issue a comment letter if the event is not disclosed. The following comments are typical of what a company might expect to see: 

  • We note that [your subsidiary] announced on its website that a cyber attack occurred during which millions of user accounts were compromised. Please tell us what consideration you gave to including expanded disclosure consistent with the guidance provided by the Division of Corporation Finance's Disclosure Guidance Topic No. 2.
  • We have read several reports of various cyber attacks directed at the company. If, in fact, you have experienced cyber attacks, security breaches or other similar events in the past, please state that fact to provide the proper context for your risk-factor disclosure. 

​Notably, the guidance states that appropriate disclosures may include a description of cybersecurity incidents that are material individually or in the aggregate. And the comments issued to date indicate that where a company states that it has not been the victim of a material cybersecurity event, the SEC nonetheless has requested that the company’s risk-factor disclosure be expanded to state generally that the company has been the victim of hacking -- regardless of the fact that prior events were immaterial. A few of the SEC comments to date include (in summary form):

  • We note your response that the incident did not have a material impact on the company’s business. To place the risks described in this risk factor in appropriate context, in future filings please expand this risk factor to disclose that you have experienced cyber attacks and breaches.
  • You state that you have not experienced a material breach of cybersecurity. Your response does not appear to address whether you are experiencing any potential current business risks concerning cybersecurity. For example, despite the fact you believe you have not experienced a material breach of your cybersecurity, are you currently experiencing attacks or threats to your systems? If you have experienced attacks in the past, please expand your risk factor in the future to state that.
  • We note that your response suggests that you have, in fact, experienced third-party breaches of your computer systems that did not have a material adverse effect on the company’s operations. To place the risks described in your current risk factor in appropriate context, in future filings please expand your disclosure to state that you have experienced cyber attacks and breaches.

​In addition, the SEC’s guidance advises that companies may need to disclose known or threatened cyber incidents together with known and potential costs and other consequences. Companies in targeted industries that have not yet suffered a cybersecurity incident (or are not yet aware that they have suffered an incident) should consider disclosing how the company might be affected by a cybersecurity incident -- even if no specific threat has been made against the company. Below are sample summary comments received by companies based on their particular industry or peer disclosures:

  • We note press reports that hotels and resorts are increasingly becoming a target of cyber attacks. Please provide risk -actor disclosure describing the cybersecurity risks that you face. If you have experienced any cyber attacks in the past, please state that fact in the new risk factor to provide the proper context.
  • Given that other companies in your industry have actually encountered such risks from cyber attacks, such as attempts by third parties to gain access to your systems for purposes of acquiring your confidential information or intellectual property, including personally identifiable information that may be in your possession, or to interrupt your systems or otherwise try to cause harm to your business and operations and have disclosed that such risks may be material to their business and operations, please tell us what consideration you gave to including disclosure related to cybersecurity risks or cyber incidents.
  • We note that the incidences of cyber attacks, including upon financial institution or their service providers, have increased over the past year. In future filings, please provide risk-factor disclosure describing the cybersecurity risks that you face. In addition, please tell us whether you have experienced cyber attacks in the past. If so, please also disclose that you have experienced such cyber attacks to provide the proper context for your risk-factor disclosure.

3. Be specific. The SEC staff has advised that companies should avoid boilerplate language and vague statements of general applicability. In particular, the guidance states that companies should not present risks that could apply to any issuer or any offering and should avoid generic risk-factor disclosure. In addition, the guidance states that companies should provide disclosure tailored to their particular circumstances and avoid generic boilerplate disclosure. Companies that offer generally applicable statements may expect to receive comments such as the following:

  • You state that, “Like other companies, our information technology systems may be vulnerable to a variety of interruptions, as a result of updating our SAP platform or due to events beyond our control, including, but not limited to, natural disasters, terrorist attacks, telecommunications failures, computer viruses, hackers and other security issues.” Please tell us whether any such events relating to your cybersecurity have occurred in the past and, if so, whether disclosure of that fact would provide the proper context for your risk-factor disclosure.
  • We note that you disclose that you may be vulnerable to breaches, hacker attacks, unauthorized access and misuse, computer viruses and other cybersecurity risks and events. Please tell us whether you have experienced any breaches, hacker attacks, unauthorized access and misuse, computer viruses and other cybersecurity risks and events in the past and, if so, whether disclosure of that fact would provide the proper context for your risk-factor disclosures. 

4. Remember that a vulnerability “road map” is not required. Although the SEC seeks disclosures that are sufficient to allow investors to appreciate the nature of the risks faced by a company, it has made clear that the SEC does not seek information that would create a road map or otherwise compromise a company’s cybersecurity. At the outset of its guidance, the SEC staff states that it is mindful of potential concerns that detailed disclosures could compromise cybersecurity efforts -- for example, by providing a “road map” for those who seek to infiltrate a company’s network security -- and that disclosures of that nature are not required under the federal securities laws. The SEC guidance later reiterates that the federal securities laws do not require disclosure that itself would compromise a company’s cybersecurity.

5. Consider insurance. Network security alone cannot entirely address the issue of cybersecurity risk; no firewall is unbreachable, and no security system is impenetrable. Insurance can play a vital role in a company’s overall strategy to address, mitigate and maximize protection against cybersecurity risk. Reflecting this reality, the SEC guidance advises that appropriate disclosures may include a description of relevant insurance coverage that a company has in place to cover cybersecurity risks. The SEC’s guidance provides another compelling reason for companies to carefully evaluate their current insurance program and consider purchasing cyber and data privacy-related insurance products, which can be extremely valuable.9 In the wake of a data breach such as at Target, for example, a solid cyber insurance policy may cover not only liability arising out of potential litigation, such as defense costs, settlements and judgments, but also breach-notification costs and other “crisis management” expenses, including forensic investigation, credit monitoring, call centers and public relations efforts, as well as potential regulatory investigations, fines and penalties. Recent SEC comments have requested information regarding both whether the company has obtained relevant insurance coverage as well as the amount of the company’s cyber liability insurance.

Considering these five tips may assist companies in minimalizing the likelihood of receiving an SEC comment letter (and possibly multiple rounds of comments) and, even more importantly, the likelihood of lawsuits alleging inadequate disclosure in the event of a cybersecurity incident.

1 Collier v. Steinhafel et al., No. 0:14-cv-00266 (D. Minn.) (filed Jan. 29, 2014), at ¶ 76.

2The guidance defines “cybersecurity” as “body of technologies, processes and practices designed to protect networks, systems, computers, programs and data from attack, damage or unauthorized access.”

3SEC Division of Corporation Finance, Cybersecurity, CF Disclosure Guidance: Topic No. 2 (Oct. 13, 2011), available at http://www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htm

4The April 9, 2013 letter is available at http://www.commerce.senate.gov/public/?a=Files.Serve&File_id=49ac989b-bd16-4bbd-8d64-8c15ba0e4e51

5Chairman White’s May 1, 2013 letter is available at http://articles.law360.s3.amazonaws.com/0441000/441415/512013%20Letter%20from%20SEC%20Chair%20White. pdf

6While the majority of the guidance is focused on risk factors, the SEC also advises that cybersecurity disclosures may be appropriate in other areas of a company’s filings, including management’s discussion and analysis “if the costs or other consequences associated with one or more known incidents or the risk of potential incidents represent a material event, trend, or uncertainty that is reasonably likely to have a material effect on the registrant’s results of operations, liquidity, or financial condition or would cause reported financial information not to be necessarily indicative of future operating results or financial condition.”

7The Cybersecurity Framework, available at http://www.nist.gov/itl/upload/preliminary-cybersecurity-framework.pdf.

8Roberta D. Anderson, NIST Unveils Preliminary Cybersecurity Framework, Cybersecurity Alert (Nov. 25, 2013), available at http://www.klgates.com/nist-unveils-preliminary-cybersecurity-framework-11-22-2013/

9 Roberta D. Anderson, Before Becoming The Next Target: Recent Case Highlights The Need To Consider Insurance For Data Breaches, Insurance Coverage Alert (Jan. 16, 2014), available at http://www.klgates.com/before-becoming-the-next-target--recent-case-highlights-the-need-to-consider-insurance-for-data-breaches-01-16-2014/

Next Steps for Insurance Companies in the 'Sharing Economy' (Part 3 of 3)

Given the momentum behind the sharing economy, it may be time for insurers to take a closer look at this emerging market, especially for cars.

As of January 2013, there were 46 active car-sharing programs and over 1 million members in North America alone. Worldwide, car-sharing companies operate in more than 27 countries on five continents with more than 1.7 million members. Given the momentum behind the sharing economy, it may be time for insurers to take a closer look at this emerging market.

Insurers may have an opportunity to lead innovation in the sharing economy, particularly in the car-sharing market. In much the same way as they have provided sound leadership about innovations in the past, the decisions about whether and how to get involved in the sharing economy should start by looking at some basic questions.

What is the market opportunity?

What is the market size now, and what are the projections? The idea of car-sharing is gaining traction, and thus considerable study is being given to its potential. Insurers should ask themselves not only about market growth projections, but also about what portion of those revenues could belong to insurance.

What are the market needs?

Car-sharing companies and renters are reaching out to insurers to provide insight into their unique business models and risk needs. Take advantage of this opportunity to talk in depth with this potential new customer base, and explore different models and products that might meet their needs.

What types of data are needed for accurate risk assessment, and where can that data be obtained?

Car-sharing companies are already capturing information on their owners and drivers. Further, peer reviews are providing additional data not traditionally available to insurance companies. Work with these start-ups to determine what types of data are available, what needs to be captured and how that data can be collected and used.

How can this data be used to assess whether the car-sharing market aligns with your risk appetite?

Most insurance companies have a clearly defined and communicated risk appetite. By its very nature, the car-sharing market will not automatically fit into any pre-established category. By conducting a careful assessment of market potential and available data, insurance companies can determine if they want to explore this opportunity further.

Insurance companies have always been leaders in developing products and services that meet market needs. Today, with more advanced data-capturing mechanisms and predictive analytics, insurers understand each of their customers at a much more granular level. It’s time for insurance companies to apply this same expertise to the sharing economy. It’s time for them to determine if the opportunity is worth the risk.

Striking a Nerve: Google and Insurance

Google is bringing an outside-in, customer-driven approach that is causing insurers to rethink, reimagine and reinvent their visions of a technology-enabled future. 

To say we struck a nerve in the industry with the Google and Insurance: Far Reaching Implications research is an understatement! It was picked up by all the major industry media – in some cases multiple times. It has set a record for downloaded and purchased SMA research, generating a torrent of follow-up calls and discussions. It has been shared and used by executive teams for discussion and strategic planning. The companion blog for the research had nearly 10,000 views – and continues to be posted, tweeted and retweeted a month and half after it was published! 

So why has there been such a strong interest and reaction in the industry?

Well, one reason might be that there is a fascination and admiration for the competitive drive in Google’s transformation from a search engine to an innovator of technologies and solutions like Android, Google cars, Google glasses, wearable devices and others. And then there is the fact that Google is securing a strong, growing (and enviable) customer loyalty. Don’t overlook the challenge to other innovators like Apple, Amazon and Microsoft – it’s impossible to ignore, just like Google's impressive growth and financial results! But the appeal that underpins all of this is Google’s unwavering vision of making information universally accessible and useful. Having a huge imagination that is spearheading innovation in multidimensional ways doesn’t hurt either! 

As Google drives innovation, offering an integrated and seamless customer experience and making available the use of its ground-breaking technologies to people in their everyday lives, the levels of customer intimacy and loyalty continue to increase. In the opposite direction, the vast amount of data becoming available via some of these technologies concerning individuals and their cars, homes and bodies is breath-taking. The change will be transformative! 

This is why the implications for insurance are so great. Google is bringing an outside-in, customer-driven approach to innovation that is causing insurers to rethink, reimagine and reinvent their visions of a technology-enabled future. Google is organizing data, technology and location around people, creating a level of customer empowerment and -centricity unheralded in any industry, let alone insurance. Not only is this powerful, it is fundamentally changing the business of insurance!   

Innovation is no longer just a nice-to-have initiative. It has become a must-have, strategic, core mandate that will define a new era of winners (and losers). Why? Because the increasingly rapid pace of change is challenging decades of business traditions and assumptions and demanding a response. This is unprecedented in the history of the insurance industry. All the while, the changes just keep coming: new technologies, the mash-up of technologies and new uses for these technologies.

These changes are highly disruptive, but they are also transformational. One industry innovation leader whom we recently spoke to about innovation noted that: “There is an outrageous level of individualism – from devices, data and components that will break the traditional infrastructure, culture and systems of traditional insurers.” Companies like Google, Apple, Uber, Zipcar and others, as well as next-gen and emerging technologies, are intensifying this level of individualism. 

Many insurers, large and small, are struggling to get their heads around a comprehensive view or a full understanding of the impact that these influencers will have on the disruption and transformation of the insurance industry. That is why the Google and Insurance research report has provoked such a response in the industry – because it provides insights and a glimpse of the challenges and opportunities for the industry. It also points to why, as an industry, we need to rethink how we respond to and embrace innovation as the core of a new culture and keystone of a new future. 

Other industries, from retail to books, music and movies, have experienced the same thing the insurance industry is now encountering: the very foundations of their businesses are being challenged, requiring novel thinking, experimentation, innovation and adoption of the new and emerging technologies. As one industry leader and CIO recently commented, “Insurers must build knowledge, a network and an ecosystem of outside-in relationships to reimagine and contribute to their company’s future.”

This persistent and continual disruption will necessitate a new way of embracing change and innovation. It will require a culture and model built around continuing collaboration and ideation that extends outside the traditional insurance organization. This is why an innovation mandate is critical.  

The innovation mandate must track and assess trends and influencers both inside and outside the industry, prepare plans and scenarios, experiment and collaborate to gain competitive advantage. Unfortunately, the day-to-day operational demands, time constraints and shortage of expertise or resources for evaluating the many implications for insurance will find most insurers unprepared or unequipped to respond to this level of disruption. More troubling is the way that many insurers are continuing to operate with the long-standing approach of wait-and-see or being a fast follower. With the accelerating release of next-gen technologies, eager competitors, new influencers and increasing customer demands, failing to adopt a culture of innovation and collaboration could create a potentially unsurmountable risk to survival of the business.

For insurers, the coming years promise unparalleled opportunity to increase their value to their customers. Those that are best able to capitalize on the key technology influencers will reap the most in rewards. In contrast, those that do not prepare for the future will find themselves falling behind, losing both competitive position and financial stability. To capture the full potential, insurers must determine to create and participate in an ecosystem of outside experts and resources; inspire their leadership; and enable their journey of change, transformation and innovation. Why will this be so important? Because the ecosystem will integrate new ideas and thinking from outside the organization, and provide that outside-in perspective needed to break legacy assumptions.  

The innovation journey toward rethinking, reimagining and reinventing the business of insurance has started. Strategy Meets Action has joined the journey. Have you?

Dare to Be Different: New Ways to Communicate With Customers

Here is a blueprint for how insurers can go from communications with customers focused on regulated activities to ones that deliver real ROI.|

||
Two insurance industry surveys for 2014, released by J.D. Powers (Auto Purchase and Property Claims), conclude that timely and relevant communication is the dominant factor in customer satisfaction. The studies show the intrinsic value of communication in building trust with customers, resulting in retention and in growth.Roughly 45% of insurers cited customer-experience levers as top business goals in research on customer communication released by Forrester in November 2012. So we would expect insurers to tap into the opportunity to engage customers in ways that drive renewals, deepening relationships and brand affinity. Obvious, right?The reality is a far cry from this.Instead, insurers have been focusing on the very obvious savings from the reduced need to print and mail the communication documents, by pushing the customers to digital channels.Here comes the second paradox.You would hope that customers are now far more engaged through the digital platform. But a survey conducted by Nationwide Insurance reveals that 60% of customers have not read their policy in full in a year, and only one in five customers believed that they completely understood their policy. The top two reasons cited are that documents are too long and too complicated. The Consumer Bill of Rights in Texas is nine pages long -- even those who receive it won't read the full document. For most, buying insurance is like buying a car without knowing if it will accommodate your two wonderful kids, wife, the bags from your normal shopping trips and a stroller. Nearly 85% of communications with a customer after a sale are in categories covered by regulation: contracts, endorsements, notices, amendments, bills and statements, notifications, follow up notices, reminders, etc. According to the Forrester study, two out of three insurers are worried about avoiding noncompliance rather than focusing on communications that can deliver far more measurable returns from better customer engagement. Meanwhile, more than half of customers who file a claim don’t understand how to do so and can have a bad and emotional experience, while those who don't file a claim are never given a way to visualize the protection they enjoy. Are insurers too focused on regulatory issues and not engaged enough with the customers whose hard-earned money they hope to keep receiving? Can insurers build trust with customers and sell more and faster? Our research suggests that some insurers have taken the lead and have implemented communication capabilities that are delivering benefits in silos. But the industry as a whole has not yet unlocked the value of service communication to generate lower-cost relationships and build trust faster, replacing expensive strategies led by marketing. We believe the starting point is to have a good understanding of contact strategy and its nuances, mapped to what customer value at different stages. Here is what insurers can do to go from Regulation to ROI.
  • Produce a blueprint of customer communication touch-points across the product lifecycle. The important factors are: business process, event, frequency, emotion, customer segment, channel and interaction sequence. It's crucial to define the right performance indicators and establish a tracking mechanism. The blueprint will unlock the value of relationship through continuous engagement. Today, communications operations mainly take a “stay out of jail” approach.
  • Make communication proactive, not reactive. Several surveys show that timely communication can limit escalation to 6% of customer issues, whereas delays and unclear communications increase complains by as much as a factor of three. Billing presents the best opportunity to engage customers, through snippets of communication before and after the billing transaction. The same approach can be used to prepare customers for changes in premiums, rather than going through several painful calls around renewals that erode trust. For example, Allstate communicates “reason for premium change,” which reduced the call volume and cost of contact drastically.
  • Make a meaningful channel shift -- Of the increasing number of customers who own a smartphone, 90% want the option of buying and obtaining service through mobile apps. The importance of mobile is demonstrated by the fact that 95% of text messages are opened within seven minutes of being received; insurers should look into using push notification through this low-cost channel. To avoid customer pushback about SMS cost, insurers should look for free-to-end-user (FTEU) SMS, which is cheaper than print-and-mail. An integrated communication center should be developed that spans across digital channels and other communication options, including paper. Investigate the possibilities of social media. Include capabilities for e-signatures.
  • Provide a digital policy with intuitive drilldown into all features. Mobile policy download, catastrophe alerts, billing alerts, claims alerts, mobile ID cards and a digital locker all drive up channel adoption and communication effectiveness, and there is opportunity to go much further in treating a policy as a mobile app.
  • Produce creative content. AT&T's smart video bill directly addresses the population that wants information on-the-go. Smart video is customized for individual customers and helps in visualization of benefits. Allstate’s "Mayhem" advertisement provides this sort of visualization, albeit from a marketing perspective. The same investment can easily be used to address the accessibility requirements for ADA (Americans with Disability Act). GEICO’s coverage coach is an animated tool used for educating the customers as to what coverage can be right for them. Imagine if this visual approach was applied to claims, at the filing stage; it would help customers understand their coverage and reduce complaints. Progressive, GEICO and USAA send periodic news through print and emails that are relevant to the season; for example, something explaining ways to protect a boat or motorcycle during winter. This communication improves customer engagement across the life cycle.
  • Leverage emerging approaches, such as in-car-entertainment, wearable media and the "connected home." Gamification -- using techniques like those for Angry Birds, rather than like a traditional insurance policy -- is another emerging approach that can be used. The customer can also be provided virtual assistance to simulate an accident scene, which will help with an assessment while greatly reducing fraud. Gamification should be used to provide customers a visualization of the claims process and the roles they play, which will improve the experience and increase retention.
  • Understand the customers better – Most insurers deliver marketing messages often but do not see a corresponding lift in their results. This is simply because they aren’t taking advantage of today's data and analytic technology to understand customers as well as they could and to deliver more-individualized, relevant messages. Effective use of all available information about the customer is the cornerstone of this approach. Retailers tend to lead the pack here; insurers can learn from them. Try to sell when the customer is happy; if he is not happy, then create happiness in him and sell. This approach has delivered proven results.
With evolving customer needs and emerging channel and content technologies, insurers have a great opportunity to improve their communication to build trust with their customers, deliver much better returns on their sales efforts and contain most preventable costs, while providing an experience that customers value. Are you up for the challenge?

Nikhil Datar

Profile picture for user NikhilDatar

Nikhil Datar

Nikhil Datar is a customer experience improvement leader helping companies that want to put the customer at the center of their business model. He is a founding member of CXPA. He has led multiple customer experience transformation services and solutions that delivered direct business benefits.


Sathyanarayanan Sethuraman

Profile picture for user SathyanarayananSethuraman

Sathyanarayanan Sethuraman

Sathya Sethuraman is an insurance industry strategist and thought leader with over 20 years of experience. He is a trusted advisor to Fortune 100 global insurance and financial services enterprises and has led large-scale digital transformation initiatives.

Biometrics and Fraud Prevention: Seeing Eye to Eye

Many healthcare insurers are using biometrics to help reduce billing fraud by eliminating the sharing of medical insurance cards between patients.

As more consumers opt for the flexibility of serving themselves, it has become essential for businesses to deploy strong systems to authenticate identity. The challenge is how to reduce fraud without frustrating consumers or compromising the customer experience.

Biometric technology has been seen increasingly as a solution in industries such as financial services, but is there a useful place in insurance? As technology becomes more convenient --and more secure -- many are saying yes.

What’s What in Biometrics

By identifying individuals through their unique physiological or behavioral patterns, biometrics offers a higher level of security, ensuring that only authorized persons have access to sensitive data. Physiological biometrics include fingerprint, face, iris and hand geometry recognition. Behavioral biometrics identify signature and voice verification, including keystroke kinetics that identify a person’s typing habits.

As consumer-centric channels such as mobile and online applications continue to expand, so will the risk of fraud. And while many industries, including insurance, continue to deploy new technologies to stave off attacks, the reality is that the tools and methods by which professional fraudsters operate are becoming increasingly sophisticated.

“While insurers have applied some preventive measures against fraud, the industry as a whole needs to catch up,” says Steve Cook, director of business development, Facebanx. “They must be forward-thinking and recognize the benefits of biometric technology and how it can help in preventing fraudulent activities.”

Reducing Claim Fraud and Protecting Data

One area where biometrics has begun to take hold is healthcare insurance. A study by the Ponemon Institute found nearly 1.5 million Americans to be victims of medical identity theft. Healthcare fraud is estimated to cost between $70 billion and $255 billion a year, accounting for as much as 10% of total U.S. healthcare costs.

Many insurers are using biometrics to help reduce billing fraud by eliminating the sharing of medical insurance cards between patients, or by making it more difficult for a person to assume another’s identity. For example, as an alternative to paper insurance cards, a biometric iris scan can immediately transport proof of a patient’s physical presence at a healthcare facility.

Biometric technology is also assisting healthcare insurers with compliance and data integrity standards — in particular with those set by the Health Insurance Portability and Accountability Act (HIPAA). For example, in addition to adhering to requirements for automatic logoff and user identification, insurers must implement additional safeguards that include PINs, passwords and some method of biometrics.

Fraud Capabilities in Property and Casualty

According to a report by Aite Group, the war against fraud in property and casualty insurance is also escalating. The group estimates that claim fraud in the U.S. P&C industry alone cost carriers $64 billion in 2012 and will reach $80 billion by 2015. Customer contact centers have been hit particularly hard. While the focus on protecting consumer data has primarily centered on online channels, fraudsters are now targeting the phone channel, as well. Leveraging information obtained through social media networks, thieves are manipulating call center representatives and gathering customer information. 

For this reason, biometrics are being deployed. Representatives can cross-reference incoming calls against a watch list of known fraudsters, identifying unique voice prints. Advanced biometric techniques can also identify fraud patterns based on speech analytics, talk patterns and various “red flag” interactions.

Summary

The insurance industry is just beginning to scratch the surface when it comes to identifying areas of fraud management to which biometric science can be applied. 

“Insurance companies [that] are first to adopt this kind of technology will push the fraudsters over to the competition, because fraudsters don’t want their face or voice on a database that they can’t control,” Cook says.

Making the switch to biometric security measures can mean a substantial investment if done on a large scale. Even so, with the proliferation of online channels, consumer conveniences and ever-shifting tactics of fraudsters, deploying some degree of biometric technology will become a competitive necessity. And, as long as the insurance industry continues to expand consumer services because of e-commerce and m-commerce, no doubt new applications of biometrics will come about.

Winning the War Against Opioid Addiction and Abuse

We have come a long way in the battle against opioid addiction in a relatively short time, and a better long-term solution could be just around the corner.|

As we move forward with winning the war against opioid addiction, it can sometimes be challenging to read the daily headlines and stay positive, especially around the holidays. A December article titled "Drug Abusers May be Injuring Pets to Get Pain Killers" shared how police officers and community leaders informed the Ohio attorney general’s office that people have been abusing drugs rightfully prescribed to pets. The US News HealthDay story titled "Secure Your Prescription Drugs When Hosting Holiday Parties" warned readers about the importance of securing prescription drugs in a safe location before guests arrive. When stories deteriorate to addicts intentionally harming their dogs and to people worrying about holiday guests raiding medicine cabinets, rock bottom isn’t far away. However, 2013 positioned us well for achieving improved results during 2014. Some of last year’s positive developments include:

1.   State law changes establishing clearer standards of care, reporting and tracking of controlled narcotics, bans on abused narcotics, etc.

2.   State and federal agencies aggressively prosecuting individuals who prescribe opioids illegally or  operate “pill mills,” revoking registrations of some pharmacies and compelling healthcare providers and pharmacies to surrender or forfeit their medical licenses to state medical/pharmacy boards

3.   Physician-led education efforts like the Physicians for Responsible Opioid Prescribing

4.   Medical boards actively addressing the inappropriate and illegal dispensing of drugs

5.   Heightened awareness of the neonatal abstinence syndrome crisis in the U.S.

6.   Workers' compensation insurers leveraging advanced analytics, physician education efforts, evidence-based pain diagnoses and utilization reviews to reduce injured worker reliance on addictive prescription drugs

7.   The Food and Drug Administration’s Risk Evaluation and Mitigation Strategy

8.   The issuance of the October 2013 Trust for America’s Health report titled “Prescription Drug Abuse: Strategies to Stop the Epidemic”

9.   Continuing prosecution and sentencing of healthcare providers

10. Efforts by national medical organizations

The first eight developments were addressed in the authors’ first quarter 2013 Physician Insurer magazine article titled "The Opioid Abuse Epidemic, Turning the Tide" and our Dec. 2, 2013 Property Casualty 360 Claims Magazine article titled "10 Strategies to Combat the Rx Abuse Epidemic – An Insurers Perspective." This article will expand on the last two developments and share some thoughts on what may be in our future when it comes to winning the war on opioid addiction and abuse. Prosecution and sentencing of healthcare providers 2013 was marked by the successful prosecution and sentencing of healthcare professionals involved in various forms of prescription drug diversion. Arguably the most notable of these was the 39-year prison sentence given to David Kwiatkowski, the former New Hampshire hospital technician who caused dozens of people to become infected with hepatitis C when he injected himself with pain killers using syringes that were then used on patients. Kwiatkowski admitted in August to stealing the drugs and leaving used syringes for hospital use for years, despite knowing he was infected with hepatitis C. His case drew national attention to the problem of prescription drug diversion among healthcare workers; caused a number of institutions to finally take a fresh look at their human resource policies and systems being used to detect diversion; and, has, we hope, sent a strong message of deterrence to all healthcare drug diverters -- it is only a matter of time before you get caught! Efforts by national medical organizations (NMOs) On an extremely positive note, we are beginning to see NMOs join the fight to help stem the opioid epidemic. On Dec. 10, 2013, the American College of Physicians released a position paper titled "Prescription Drug Abuse: A Policy Position Paper From the American College of Physicians." The goal of the paper was to provide physicians and policy-makers with 10 recommendations to address the significant human and financial costs related to prescription drug abuse. The recommendations include support for additional education, a national prescription drug monitoring program, establishment of evidence-based nonbinding guidelines regarding recommended maximum dosage and duration of therapy, consideration of patient-provider treatment agreements and the passage of legislation by all 50 states permitting electronic prescription for controlled substances. In turn, in January 2014, the American Academy of Pediatrics (AAP) Committee on Drugs and Section on Anesthesiology and Pain Medicine issued a report titled "Recognition and Management of Iatrogenically Induced Opioid Dependence and Withdrawal in Children." The clinical report recommended guidelines for prescribers to follow when weaning children from opioids. As noted by lead author Jeffrey Galinkin, MD, "[t]he key reason the AAP was keen to publish this paper and go forward with this guideline is that people are unaware that patients can get drug-specific withdrawal symptoms from opioids as early as five days to a week after having been on an opioid chronically." This recommendation was immediately followed by the Centers for Medicare and Medicaid Services (CMS) Jan. 10, 2014, Federal Register Volume 79, Number 7 publication of proposed rules revising the Medicare Advantage (MA) regulations and prescription drug benefit program (Part D) regulations to help combat fraud and abuse in these programs. The proposed rules include requiring prescribers of Part D drugs to enroll in Medicare, a feature that CMS believes will help ensure that Part D drugs are prescribed only by qualified individuals. As reported by Medscape Medical News, CMS is also seeking the authority to revoke a physician's or eligible professional's Medicare enrollment if:

• CMS determines that he or she has a pattern or practice of prescribing Part D drugs that is abusive and represents a threat to the health and safety of Medicare beneficiaries or otherwise fails to meet Medicare requirements; or

• His or her Drug Enforcement Administration certificate of registration is suspended or revoked; or

• The applicable licensing or administrative body for any state in which a physician or eligible professional practices has suspended or revoked the physician or eligible professional's ability to prescribe drugs.

Furthermore, CMS proposes employing data analysis to identify prescribers and pharmacies that may be engaged in fraudulent or abusive activities. In Table 14 of Federal Register Volume 79, Number 7, CMS’ Office of the Actuary estimates the savings to the federal government from implementing its proposed provisions will be $83 million in calendar year 2015, $132 million in 2016, $171 million in 2017, $364 million in 2018 and $589 million in 2019. Source: CMS Innovation in our future In addition to the above efforts, companies continue to innovate and research new ways to address historical challenges. Vatex Explorations is building a real-time individual-dose monitoring system called Divert-X to reduce drug trafficking, misuse and addictions that result from routine medical care. Divert-X monitors a patient’s individual doses through the electronic transmission of data identifying the time of dose access, location and other measures. The analysis of the data in real time helps physicians and pharmacists identify drug-taking behaviors that fall outside of norms, allowing early intervention before misuse or addiction set in. In 2012, the Food and Drug Administration approved an ingestible sensor that can be used to track real time data about your pill consumptions habits. The sensor, developed by Proteus Digital Health, was first approved for use in Europe before coming to the U.S. The ingestible sensor is part of the digital health feedback system, which includes a wearable sensor and secure app and is largely focused on serving the transplant population and patients with chronic illnesses. The authors could envision a day when the system could help in the battle against opioid addiction. Insurance companies are doing a better job of leveraging advanced analytics to understand their opioid-exposed population and the prescribing habits of the physicians treating their injured workers. Through the review of medical bills (e.g., date and types of service and payment, ICD-9 diagnosis codes, CPT-4 procedure codes, etc.) and pharmacy data (e.g., bill frequency,  aggressive refills, NDC drug codes, quantity used, generic vs. brand, supply days, use of prescriber, pharmacy name, etc.), insurance companies can identify usage and treatment patterns that fall outside of expectations using cluster analyses, association rules, anomaly detection and network “link” analyses. Law enforcement continues to push the envelope in finding innovative ways to combat drug diversion. Take, for example, the strategy developed in consultation with the National Association of Drug Diversion Investigators and Oklahoma Bureau of Narcotics to curb false reporting of the loss or theft of prescription drugs in Stillwater. According to a police spokesman, most physicians in Stillwater require patients to obtain a police report before they will write a replacement prescription for lost or stolen medications. This requirement resulted in an increase in the number of police reports filed, but a new problem emerged. How could anyone determine whether those police reports were legitimate? In response, the Stillwater police department created a database to record the names of any individual who reported the loss or theft of a prescription drug. The department now requires the individual to take a polygraph test before it will accept any subsequent report of a lost or stolen prescription drug. Fail that polygraph, and criminal prosecution may follow. Query: If this strategy were employed nationwide, would the medicine cabinet at home be guarded more closely? Conclusion There is no doubt we have come a long way in the battle against opioid addiction in a relatively short time. Although there is a lot of road left to travel, 2014 is well-positioned to carry forward the effective efforts from last year. Given the innovative spirit of the U.S. and passion of everyone involved in winning this fight, a better long-term solution could be just around the corner.

Kevin Bingham

Profile picture for user KevinBingham

Kevin Bingham

Kevin Bingham, ACAS, CSPA, MAAA, is the chief results officer of subsidiary initiatives at Chesapeake Employers’ Insurance. He has over 27 years of industry experience, including 21 years of consulting.