Dear Valued Customer, This issue of “———————-” focuses on Certificates of Insurance. A Certificate of Insurance validates the existence of an insurance policy, but it is much, much more. In addition to describing the insurance available to the named insured, a certificate may also convey information that the certificate holder is an additional insured under…
A certificate of insurance is a document issued by or on behalf of an insurance company to a third party who has not contracted with the insurer to purchase an insurance policy. The most common type of certificate is that provided for informational purposes to advise a third party of the existence and amount of…
Insurance certificates can be dangerous documents that migrate between the insured, the insurers and many other third parties. These documents can be dangerous because they can be issued without legitimate need, or with inappropriate language which can leave the issuer with the potential for significant errors and omissions situation. To avoid these risks, first ask…
It is very important to read and analyze the language of the contract. For example, consider the situation where someone has written into the verbiage a hold harmless agreement, where the expectation of both insured and third party is that the contract of insurance will provide protection, like so: X Corporation hereby agrees to indemnify…
Immigration and Nationality Act of 1952, (INA) as amended Who is Covered The INA includes provisions addressing employment eligibility, employment verification, and nondiscrimination. These provisions apply to all employers. Basic Provisions/Requirements Under the INA, employers may hire only persons who may legally work in the United States (i.e., citizens and nationals of the U.S.) and aliens…
The mission of U.S. Immigration and Customs Enforcement (ICE) is to protect America from the cross-border crime and illegal immigration that threaten national security and public safety. This mission is executed through the enforcement of more than 400 federal statutes and focuses on smart immigration enforcement, preventing terrorism and combating the illegal movement of people…
Use Form I-9 to verify the identity and employment authorization of individuals hired for employment in the United States. All U.S. employers must properly complete Form I-9 for each individual they hire for employment in the United States. This includes citizens and noncitizens. Both employees and employers (or authorized representatives of the employer) must complete…
Dear Valued Customer, It’s a new era for employer liability strengthened by renewed DHS efforts to target employers who knowingly violate the law. In this issue of “——————” we focus on Immigration Law and Employer Compliance. Statistics from the Department of Homeland Security (DHS) Office of Immigration Statistics indicate that in recent years, the unauthorized…
Dear Valued Customer, A data breach can happen because your system has vulnerabilities that exposes you to hackers and thieves. In this issue of “Waimea News” we focus upon how you can defend against this situation and protect your financial exposure. As you might expect, Cyber Insurance helps your company recoup the costs of an…
Data hackers can cost businesses big money. Travelers, a leading provider of Cyber Insurance, suggests that it could cost somewhere in the neighborhood of $7 million if they suffer a breach. Since any company that accepts electronic payments is at risk, Cyber Insurance has become one of the most important types of insurance any business…
While cyberattacks and data breaches at Fortune 500 companies tend to dominate the headlines, America’s more than 28 million small businesses and their 56 million employees are increasingly vulnerable. Their exposure is much the same as that of larger companies, experts say, but many may overlook or underestimate the threat and may not fully understand…
Cyberattacks can occur in many ways, including: Accessing your personal computers, mobile phones, gaming systems and other internet and Bluetooth connected devices. Damaging your financial security, including identity theft. Blocking your access or deleting your personal information and accounts. Targeting children and adults. Complicating your employment, business services, transportation and power grid. Protect Yourself Against…