How Employers Create EPLI Exposure by Using Biometric Technology
Biometric technology is increasingly used by organizations, and many employers may be unaware of the laws around its application—or even that they’re using it in the first place.

Biometric technology is increasingly used by organizations, and many employers may be unaware of the laws around its application—or even that they’re using it in the first place.
“The use of telematic devices in monitoring driving behaviors and enhanced data analytics capabilities are among some of the more positive changes,” says independent agent Lydia Ramos. “They allow us to analyze a variety of factors, including traffic patt
Cyber insurance is just one component in protection from cybercriminals. By recommending these additional strategies to customers, you can position yourself as a trusted advisor.
A logic error caused a major outage, impacting critical sectors. What can risk managers and cybersecurity pros learn from the CrowdStrike event?
What is the current best practice for storing those recordings in an agency management system (AMS)?
While cyber exposure is dangerously prevalent, there are tactics that businesses can use to protect themselves and their clients.
Small businesses may be tempted to eliminate professional liability coverage, especially when they haven’t had any claims—that is not a good idea.
Explore how the CrowdStrike event reshaped the understanding of risk and the evolving landscape of digital security.
Cybercrime isn’t going away, so individuals and businesses need to ensure they have protection. These 5 tips will help you guide customers in the right direction.
For the seventh year in a row, the Big “I” and J.D. Power teamed up to measure property & casualty independent insurance agent perceptions of their carriers.