Tuesday, May 17, 2016
Your company may have purchased cyber coverage, but does that mean you have a network breach response plan in place? Parker, Smith & Feek’s Ed Rhone can tell you more in the Puget Sound Business Journal.
Tuesday, April 26, 2016
Employers who sponsor self-funded medical plans must report and pay the ACA Patient-Centered Outcomes Research Institute (PCORI) fees no later than July 31, 2016. Health insurance carriers will pay the fee directly in the case of fully-insured plans.
Wednesday, April 13, 2016
Despite our heightened awareness and best in class cyber controls, most companies will at one time or another experience a cybersecurity event.
Monday, March 28, 2016
Data Security Risk Management Basics
The risks associated with the collection, transfer, and retention of data are real and significant. For a construction company, it is of paramount importance to identify areas of exposure and develop adequate risk management programs that address data privacy and security. To help you get started, here is a list of questions to ask yourself when developing your corporate risk management plan. These should include, but not be limited to, identifying and inventorying your corporate data.
Tuesday, March 22, 2016
Rarely does a week pass when we don’t hear about another major cyber breach, computer virus, or social engineering scam.
Tuesday, March 22, 2016
As part of the ACA employer reporting requirements, certain employers must provide a Form 1095-C or 1095-B to all applicable employees by March 31, 2016. Employers subject to employer reporting requirements who fail to provide the required Form 1095s by the deadline may face penalties similar to those imposed for W-2 reporting.
Background
Tuesday, March 15, 2016
On February 22, 2016, the Departments of Labor, Treasury, and Health and Human Services (“the Departments”) released proposed updates to the Uniform Summary of Benefits and Coverage (SBC) template, instructions, and Uniform Glossary (“glossary”). The proposed documents build largely on the revisions first proposed in December 2014. However, they incorporate additional stakeholder feedback—primarily from the NAIC—and the Departments are requesting public comments through the end of March before the documents are finalized.
Friday, March 4, 2016
Your IT Department has assured the latest updates and patches are in place for your firm’s network and your technology consultants are confident the system is set to prevent a hacking attack. But, just in case, your firm has recently purchased “cyber liability” insurance.
Tuesday, March 1, 2016
Human-based social engineering fraud (sometimes referred to as human hacking) is defined as the art of influencing people to disclose information and getting them to act inappropriately.
Friday, February 5, 2016
Many employers want to provide some type of communication along with or before the distribution of Form 1095s to relevant employees. Although any employee communication must be tailored to meet the employer’s specific circumstances, some general concepts are addressed here that can be adjusted as appropriate to help employees understand why Form 1095s are being provided, what type of information they provide, and how they are to be used.
Friday, January 22, 2016
That preparation should include a review of the business’ insurance portfolio, specifically the ingress & egress coverage, and civil authority coverage of the business’s property policy.
Most standard property policies usually only cover loss “caused by direct physical loss of or damage to property.” Therefore, if a company has a roof collapse due to heavy snow load, it is likely the building and the resulting interruption of business would be covered by the policy. However, if the building or property is not damaged, and the business cannot operate due to the inability of access to the plant, building, or facility due to the weather, is that a covered loss under the property policy? The answer is, “It depends.”
Wednesday, January 20, 2016
To ensure proper data breach response preparedness (and to show proper due diligence), your directors and leadership staff should be asking I.T. and key partners the pertinent questions now, before a breach occurs:
Have we ever had system penetration testing done, and have we reviewed the results?