Skip to Content

Expert Commentary


Latest Articles

Security, Catastrophe Risk Management

Managing Terrorism Risk

Nathan Gould | July 24, 2004

In this article, Dr. Nathan Gould explains a three-tiered terrorism risk management plan, including initial and detailed assessments and a variety of risk management techniques.

Claims Practices

Stacking Insurance Limits

Barry Zalma | July 1, 2004

Barry Zalma explains why it is essential to examine the law of the jurisdiction relating to stacking of policy limits and self-insured retentions before making a decision on how to handle a claim.

Cyber and Privacy Risk and Insurance

Indemnity and Insurance Provisions in E-Business Contracts

Michael A. Rossi | July 1, 2004

Mike Rossi explains the impact of e-business activities on legal liability and first-party risks and identifies some of the ways these risks can be managed through indemnity and insurance provisions.

Personal Lines Claims

Residential Water Claims

George Epps | July 1, 2004

George Epps takes a look at residential water claims—what causes them, how repairs are handled, and why restoration contractors are often necessary.

Additional Insured Issues

How Will Courts Construe ISO's New Additional Insured Endorsements?

Joseph Postel | July 1, 2004

While the new Insurance Services Office additional insured forms have been filed, how courts will rule on the coverage changes is anyone's guess. Joe Postel provides an educated prediction.

Reinsurance

Insurer Insolvency and Reinsurance

Larry Schiffer | July 1, 2004

What happens to the reinsurance covering insurance policies when the insurer goes insolvent? Larry Schiffer discusses the issues, including recent case law.

Design and Professional Liability

Making the Most of Standard Indemnity Clauses

Kenneth Slavens | June 19, 2004

Ken Slavens relates the case of Nusbaum v. The City of Kansas City and the Missouri Supreme Court's application of indemnification clauses found in AIA documents.

Internal Controls

Risk Management versus Internal Control

Matthew Leitch | June 1, 2004

If auditors want to adopt the corporate risk register as the basis of their audit planning, they need to adapt their approach in several ways. Matthew Leitch explains.

Cyber and Privacy Risk and Insurance

Protecting Data Assets: Not Just a Cyberspace Issue

Gary Clayton | June 1, 2004

An organization's most valuable asset is the personal information about and trust of its customers. Gary Clayton explains how a security plan and other safeguards are crucial.

Workplace Violence Prevention

Preemployment Screening and Workplace Violence Prevention

James Madero | June 1, 2004

Dr. James Madero discusses how preemployment screening, such as background checks and drug testing, helps prevent workplace violence and costly hiring mistakes.