Resources

Drones

Drones Industry Maturity Index: Now Why this is important:The ACT Changing Nature of Risk work group feels that use of drones will have a significant impact across the insurance landscape.…

3d rendering delivery drone flying with cityscape background

Unsupported Software and Data Breaches

Agents beware. If you’re running unsupported software on your computer to access the Internet, process emails, or receive files via USB devices, you could be putting your data at risk…

eSignature – Agent and Broker Resources

E-Signatures: Agent & Broker Resources If you don’t offer prospects and customers e-signature functionality now, you probably will before long. And if you don’t, someone else will. Agents and brokers…

SignOn Once

In this June 2014 ACT article, the authors Teresa Addy and Jim Rogers share more background on SignOn Once; as an industry standard, the benefits, and guidance for carrier and…

Combat Cybercrime and Protect Your Agency With Simple Security Steps

What is Cybercrime? Like traditional crime, cybercrime covers a broad scope of criminal activity and can occur anytime and anyplace. What makes it different is that the crime is committed…

Padlock with a tablet, keyboard, mouse and other device. Internet and technology security

“Bring Your Own Device” Opportunities & Risks

By Danielle Johnson, Director of IT, InsurBanc The consumerization of IT revolution — sparked by the iPhone — has shifted the IT culture so that the users are the ones…

smart house, home automation, device with app icons. Man uses his smartphone with smarthome security app to unlock the door of his house.

Agency Strategies to Send & Receive Personal Data Securely

By Jeff Yates, ACT Executive Director The Internet and mobility revolutions have enabled agents and their clients to live in an electronic world where the parties can work and communicate…

Businessmen work with stock market investments using smartphone to analyze trading data. smartphone with stock exchange graph on screen. Financial stock market.

Protecting Agency Customer Information from Identity Theft

by Bill Murray, CISSP IT Risk, Security & Compliance Manager Westfield Group Highlights of Report The federal Gramm-Leach-Bliley Act requires independent agencies and brokers to proactively implement administrative, technical, and…

Agency E&O Considerations When Using Social Media

by Sabrena Sally, CPCU Not a day goes by without my email containing an invitation to join a social networking site. Whether used for business contacts, maintaining contact with friends…