Игроки всегда ценят удобный и стабильный доступ к играм. Для этого идеально подходит зеркало Вавады, которое позволяет обходить любые ограничения, обеспечивая доступ ко всем бонусам и слотам.

TRIA Extension Faces Tough Fight

 

On December 31, 2014 the Terrorism Risk Insurance Act, or TRIA, is set to expire. The program, originally enacted in 2002, provides a financial backstop by the federal government in the case of a large-scale terrorist attack. TRIA has been extended twice, in 2005 and 2007, but there is uncertainty as to whether the program will be extended again.

Legislation that would simply extend the program to 2019 has been introduced by Rep. Michael Grimm (R-NY) and Rep. Carolyn Maloney (D-NY). However, Rep. Jeb Hensarling (R-TX), chairman of the House Financial Services Committee, has voiced opposition to extending the program in its present form. The House Financial Services Committee has stated its plans to examine the private sector’s capacity to assess and price for terrorism risk and to consider proposals that would phase out TRIA over time.

Others have expressed arguments against the program’s extension as well. David C. John, senior research fellow in retirement security and financial institutions at The Heritage Foundation, testified before the House Financial Services Subcommittee on Insurance, Housing and Community Opportunity in September 2012 that “we have now reached a point where the private sector is increasingly capable of providing [terrorism] coverage at appropriate prices without government support.”

Maurice R. Greenberg, chairman and CEO of C.V. Starr & Co. and former CEO of American International Group Inc., stated at a press conference at the National Press Club in Washington that the “private market is capable of doing a heck of a lot more” in regards to terrorism coverage than it could at the time of the program’s original authorization. While he did stop short of calling for ending the program, Mr. Greenberg’s statement added to the argument that the private sector is capable of insuring terrorism risks without a federal backstop.

Proponents of the program, including RIMS, argue that a completely private solution is not feasible as terrorism acts are exceedingly difficult, if not impossible, to predict. Without a federal backstop in place, coverage capacity will be significantly reduced, driving prices much higher. This holds especially true in high-risk metropolitan areas such as New York City, Chicago, Los Angeles, etc. Without adequate capacity, many organizations will be forced to self-insure, leaving themselves exposed to an event that could possibly end in bankruptcy.

Supporters of the bill would like to see an extension passed by the end of 2013 so as not to negatively impact policies issued in 2014, but with Congress focused on other priorities, this debate could continue well into 2014 and potentially right up to the deadline of December 31, 2014. Supporters of the program, including RIMS members, are strongly encouraged to reach out to their member of Congress to express their support and need for the program.

Hank Greenberg on Executives, Culture and What to Do With Negative Personnel Directors

In the video above, Maurice “Hank” Greenberg — the 87-year-old architect of AIG and current chairman and CEO of C.V. Starr & Co. — speaks his mind in an interview with Carrier Management

He talks about:

  • his time in the Korean War
  • his “purely by chance” start in insurance after returning stateside
  • how he fired the first personnel director he met in the industry (a “jerk” whose “attitude was very, very negative”)
  • the mark of a good executive (one who “tries to be himself” rather than just following in someone else’s footsteps “to be like them” — “if you don’t think independently, what are you: You’re just a copycat”)
  • How corporate culture evolves over time (“you’ve got to be sensitive to change”)

He has never been a bashful man.

5 Ways Businesses Can Avoid Credit Card Fraud

According to a March 2013 report from the Commerce Department, retail sales increased 1.1% in February to $421.4 billion, marking the biggest surge in the retail space since last September. Elevated sales numbers mean additional credit card transactions and, as a result, an increased risk for fraud.

A recent report from Javelin Strategy & Research found that credit card fraud has increased an alarming 87% since 2010 and accounted for a total loss of approximately $6 billion. Despite mounting evidence of this growing epidemic, loss as a result of credit card fraud has remained the proverbial elephant in the room for many businesses.

Organizations need to increase their awareness of this growing threat and the rather simple steps they can take to prepare themselves. The following are five tips for businesses leaders as they navigate through the economic climate in 2013 and beyond:

  1. Immediately deal with any breach. It’s critical to understand that even if all cautious, conservative steps are taken and the best payment processing security is installed, a breach can still occur. If it does, you must have detailed credit card sales records to refer back to as a means of retracing your steps. This will help in determining when and where the breach took place and therefore mitigate the potential for additional losses. A proper assessment of the initial attack may ultimately provide a trail back to the source of the breach.
  2. Maintain PCI Compliance. Not only is it against card brand regulations if you’re not Payment Card Industry (PCI)-compliant when accepting credit or debit cards, but it’s also an absolute must in today’s economic climate. Make certain your payment processing software security is current and is PA-DSS (Payment Application Data Security Standard)-certified, and that your business receives their PCI-DSS (Payment Card Industry Data Security Standard) certification. PCI certification provides a level of confidence and assurance that a processor has followed and passed a robust set of best practices for securing the information being processed when credit card payments are made. There’s no silver bullet here. You have a responsibility to protect your customer’s credit card information, just like you should be protecting all of your customer data.The depth of the audit required will depend on your business volume and systems but a full PCI audit will offer a scorecard across your business’ payments environment, including all connected back-office applications, allowing you to make critical changes before security holes are exposed by thieves.
  3. Use end-to-end encryption for all sensitive data. End-to-end encryption (E2EE) essentially boils down to scrambling the data sent from one device to another. It starts with your payment capture devices, and goes all the way to the transaction being authorized. E2EE technology prevents the card account data from being stolen electronically and lessens the cost and impact for your business to become PCI-certified. A company’s mobile payment devices, credit card terminals, software applications, and online payment portals need built-in encryption functionality when transmitting customer information. Your company should select a payments provider that is technically savvy. Look for a partner that supports E2EE technology. You’ll need to balance cost versus product and service here. Using the low-cost provider could come at the expense of limited product functionality, potential security holes, and lower levels of customer service.
  4. Prevent tampering. Make certain all employees tasked with the responsibility of accepting credit and debit cards from customers have a working understanding of the looks and functionality of the payment processing equipment they’re using. Scammers often try to tamper with a business’ payment processing equipment in an effort to steal credit card information. Altered equipment usually consists of a small piece of hardware physically attached to the terminal itself. An attentive employee who knows what to look for should be able to easily identify an extra attachment to the device or oddly functioning software.
  5. Refrain from storing credit card numbers. To avoid one of the biggest PCI compliance risks, you should do everything in your power to not store credit cards numbers. Look for a payments provider whose platform is designed so credit card information is never stored at your business site or on your business software. Your provider should be able to process the transaction and then store your customers’ card information in a secure “vault” in the cloud. They should provide you with an encrypted ID, so when you want to do another transaction for that same customer, your software can pass the payments provider the encrypted ID so your company never comes in contact with the stored credit card data.

It’s reasonable to have a healthy level of economic optimism, but critical to take the necessary precautions to protect your company’s assets and security. Apply these tips to help ensure credit card scammers aren’t given the opportunity to steal the fruits of your labor.

Wildfire Lessons from Waldo Canyon

Last summer marked an especially destructive wildfire season in Colorado with insurance claims exceeding $450 million. One fire in particular – the  Waldo Canyon blaze that raged through the Colorado Springs area in June and July – burned more than 18,000 acres, destroyed almost 350 homes and caused the evacuation of more than 32,000 residents.  Reportedly, it was the most expensive fire in state history, causing more than $350 million worth of insurance claims.

Obviously, a fire of this magnitude can teach some valuable lessons for future mitigation efforts and earlier this week the Fire Adapted Communities Coalition (FAC), a national partnership dedicated to promoting best practices to reduce wildfire-related damage, released “Lessons from Waldo Canyon,” an investigative report that examined what happened. The report determined that the fire could have been much worse if it wasn’t for the mitigation efforts of the Colorado Springs Fire Marshal. In one neighborhood alone, mitigation efforts saved millions:

According to estimates provided by the Colorado Springs Mitigation Section and FEMA, the cost benefit ratio for the mitigation efforts for the Cedar Heights neighborhood was 1/257; $300,000 was spent on mitigation work and $77,248,301 in losses were avoided. Combined cost benefit ratio was 1/ 517 for the three neighborhoods with the highest impacts.

The report presented a variety of findings that could help other communities mitigate their own wildfire risk and outlined the importance of proper building construction and maintenance, reduction of fuels for fire, and partnerships with other organizations to spread the preparedness message.

The FAC also developed a companion video entitled, “Creating Fire Adapted Communities: A Case Study from Colorado Springs and the Waldo Canyon Fire” that includes dramatic footage of the fire and interviews with emergency personnel and residents to further drive home these mitigation lessons and hopefully prevent future disasters.