Skip to main content
Monthly Archives

August 2017

Employment Practices Liability Insurance

By Employment Resources

The purpose of third-party coverage in an Employment Practices Liability (EPLI) policy is to protect an organization and its employees from accusations of wrongful acts committed against customers, clients, vendors, and suppliers. Some EPLI policies also cover wrongful acts committed by third parties against the insured’s employees.

Harassment and all forms of discrimination are covered under wrongful acts. Discrimination claims include discriminatory practices against a person based on their race, religion, age, sex, national origin, disability, pregnancy or sexual orientation. Harassment involves unwanted sexual advances or requests for sexual favors. Both verbal and physical conduct, as well as other forms of harassment that create a hostile or offensive work environment, are covered. Some policies also cover accusations of mental anguish, emotional distress, humiliation and assault.

If your organization has a lot of interaction with the public, it is especially vulnerable to third-party claims like those described above. In some cases, EPLI carriers might not provide third-party coverage to firms with a high potential for claims. What they might offer instead is limited coverage, such as covering accusations of discrimination, but not harassment claims.

To protect your organization from third-party claims, you need to go beyond just purchasing coverage. You must implement policies and procedures that address discrimination and harassment issues, both from the standpoint of an employee’s actions and the actions of third parties. EPLI insurers are increasingly requiring employers to implement these practices before they will issue a policy.

Having policies in place will offer little help to stop third-party claims if employees aren’t adequately trained. New employee orientation programs should include a presentation outlining the organization’s harassment/discrimination policies. The training must also include how to report and handle a third-party claim.

However, hearing the information once is not enough to insure compliance. Employees must be retrained periodically through departmental meetings. To maintain the effectiveness of departmental training sessions, be sure that supervisors are provided with copies of all policy updates and procedural changes.

One important caveat to keep in mind is that most EPLI policies don’t provide third-party coverage for accusations involving the violation of the Americans with Disabilities Act (ADA). Nevertheless, you should review your EPLI policy’s definition of a claim to determine the policy’s interpretation. Many policies define a claim as a “demand for monetary damages.”

This definition can present a problem in an ADA claim, because many of these claims are asking for reasonable accommodations, not monetary awards. That’s why it is important to ensure that your policy’s definition of a claim includes claims for non-monetary damages. A policy with this expanded definition will cover defense costs and indemnity connected with an ADA claim, but will not provide the funds to bring your organization into compliance with the provisions of the law.

Benefits And Risks Of Working As An Independent Contractor Rather Than An Employee

By Employment Resources

Working as an independent contractor rather than an employee is attractive for many reasons. There are a variety of benefits, but be aware of the risks, too.

Benefits of Working as an Independent Contractor

Work for yourself.

As an independent contractor, you enjoy the freedom of being your own boss. Because you’re in charge of your career, you can choose which jobs you take, how much you charge and when you work. If you were an employee, you would have to follow your employer’s timeline and directions for every job.

Earn more.

Independent contractors can make more money than employees because they often receive a bigger cut of the project. This income boost happens because employers don’t have to pay for employee benefits, Workers’ Compensation or Social Security or unemployment taxes.

Pay lower income taxes.

Your tax bill could decrease as an independent contractor. Instead of paying federal and state taxes from each paycheck, you estimate your taxes and pay the IRS four times a year. You can keep your money longer and decide how much you pay, which could allow you to pay fewer taxes.

Enjoy more tax deductions.

Deduct reasonable and ordinary business-related expenses on your annual tax return, including:

  • Office
  • Travel
  • Insurance
  • Equipment
  • Mileage
  • Uniforms
  • Trade conferences and magazines
  • Entertainment and meals

Risks of Working Independent contractors

Experience reduced job security.

When you’re an independent contractor, you’re solely responsible for finding work. You won’t receive a paycheck simply for showing up at the office every day. You also work at the discretion of your clients. If they go through a slow period or decide to use a different contractor, you’re out of work.

Receive no employer-sponsored benefits.

Regular employees often receive a variety of benefits. However, you won’t receive health insurance, paid time off or matching retirement contributions. You also don’t receive unemployment or Workers’ Compensation, which could greatly affect your income if you don’t have work or are injured on the job.

Receive no labor law protection.

Federal and state laws give employees a variety of protections. You aren’t covered by those protections and could suffer exploitation or discrimination.

Risk not getting paid.

If a client decides not to pay you, you have little recourse outside of a lawsuit.

Buy all your equipment.

You’re responsible to provide whatever equipment you need for the job. That means you’ll have to buy or rent any tools you need and store them when the job is completed.

When you work as an independent contractor instead of an employee, you receive benefits and assume risks. Know what you’re getting into as you decide if you should be an independent contractor.

Complaints Should be Confidential

By Your Employee Matters

In a Second Circuit case, Karen Duch sued the State of New York for sexual harassment. Duch, a court officer at the Manhattan Midtown Community Court, spoke with a manager who was also an EEO liaison about ongoing harassment.

Duch told the manager, “I’m telling you as a friend;” when asked if she wanted the harassment reported, she responded “Absolutely not.” Because of this request and despite her EEO responsibilities, the manager did not report the harassment to anyone. In ruling against Duch, the court stated several conclusions that employers should consider:

When harassment comes from a co-worker, rather than a supervisor, the employer is held liable only if it fails to provide a reasonable avenue for complaint or to take appropriate remedial action about a problem they know of.

In this case, Duch had reasonable avenues of complaint, despite the fact the EEO liaison was poorly trained and failed to report her complaints to anyone. Duch acknowledged she could seek assistance from at least five different sources, in addition to the manager.

Also at issue was the question of whether her manager’s failure to react could be imputed to the company. The court reminded us this would be the case when: (a) the official is at a high enough level of management to qualify as a proxy for the company; (b) the official has a duty to act on the knowledge and stop the harassment; or (c) the official has a duty to inform the company of the harassment. The court held that in this case, the manager did not breach her duty to remedy the harassment because she honored an employee’s request to keep her complaint confidential. The court also ruled that the conduct had not reached the point that a manager simply cannot stand by, even if requested to do so by the employee.

Unfortunately for the employer, there was another higher-level executive, whose knowledge of the complaints was imputed to the employer. The court stated that when an employee’s complaint raises the specter of harassment, a supervisor’s purposeful ignorance of the nature of the problem would not shield an employer from liability under Title VII. This holds true even where the executive never learned about, and did not witness, the alleged harassment.

In light of their ruling that a jury could find that there was knowledge of the harassment when Duch requested a schedule change from another manager, a jury could also find that their response was unreasonable. A formal investigation of the complaint did not begin until three months later.

Lesson learned: Be very clear about what you want your managers to do when they suspect or know about wrongful conduct:

What should they do if they know about it but nobody complains?

What should they do if somebody complains to them, but asks them not to say anything?

What should they do when things gets so bad that they should say something despite the employee’s request?

How should they approach someone about what they might suspect is harassing conduct? 

Should they say something like, “Is Bob harassing you? Should I speak to the EEO about this? If you want me to keep it confidential I’m going to write this down to protect the company and myself. If you feel you need help, bear in mind that I’ll always report it to a proper superior or you can go directly to that person without involving me if you want to.”

As always, we recommend that all HR That Works members use the Employee Compliance Survey every six months. If the company had done so in this case, it could have avoided the second-guessing and engaged in appropriate conduct. To read the case, click here.

Benefits and Risks of Hiring Temporary Employees

By Your Employee Matters

As many as two million individuals look for temporary employment each day. Consider the benefits and risks of hiring temporary employees as you decide if this option is right for your company.

Benefits of Hiring Temporary Employees

Save Money

In general, temporary employees are cheaper to employ than permanent ones. That’s because you won’t have to pay to fingerprint and drug test them, and you are exempt from providing benefits. Over time, your company will save money when you employ temporary employees.

Quickly Fill Open Positions

Vacations, maternity or disability leaves, sudden staff departures or busy seasons can tax your workforce. In addition to overwhelmed staff, you could suffer quality control issues or safety challenges. Use temporary employees to help handle the workload and quickly fill open positions.

Part Ways Easily

Firing a permanent employee for incompetence or personality challenges takes time and requires you to follow several laws. Alternatively, you can release a temporary employee fairly easily, allowing you to continue your search for the right candidate for the position.

Fill Permanent Positions

Temporary employees can be excellent candidates for the permanent positions you need to fill. Studies show that they are reliable. They also already know the job, co-workers and procedures and can step into the job with a short adjustment period.

Risks of Hiring Temporary Employees

Training Takes Time

Unless the temporary employee has worked for you before, they will need training on company procedures and the specific job for which they are hired. This training takes time and ties up you or your key employees, which can affect a project’s deadline.

Safety Concerns

Studies show that injuries rise on job sites that employ temporary employees. Despite the best training, a temporary employee might make a safety mistake that jeopardizes everyone. A supervisor will have to observe a temporary employee carefully until there is no doubt that they can perform their job with complete safety.

Decreased Morale

Temporary employees works alongside your permanent employees but do not receive the same benefits. They also may work slowly or make mistakes, which can affect production. These and other challenges can affect morale in your workforce.

Legal Recourse

A workers’ status and eligibility for benefits must be monitored carefully. Be sure to treat temporary employees with the same respect you give permanent employees, too. Any discrepancies could result in legal action against your company.

Temporary employees can benefit your company, but they also carry risks. Be informed with the facts about temporary employees as you make the right choice for your company.

How to Conduct Employee Evaluations

By Your Employee Matters

Employee evaluations are a way for your company to ensure employees performing their jobs properly. They also help your business succeed. Use several tips as you conduct these evaluations thoroughly and fairly.

Gather Relevant Data

Prepare an accurate picture of the employee’s performance across the board and for the entire year when you gather relevant data and statistics. This data can include productivity reports, behavior logs and supervisor’s reports.

Be Specific if Improvement is Needed

It’s not enough to tell an employee that they need to sell more widgets, cooperate better with co-workers or take on a bigger leadership role. You also need to provide measurable suggestions and clear deadlines to help them meet their goals. Consider saying, “You need to sell 20 percent more widgets this quarter” or “I want you to lead the next monthly team meeting.”

Be Honest

Sharing negative feedback can be challenging. However, it will help your employee and company grow, so strive for honesty in your evaluations, even if it’s tough.

Stay Positive

Always include praise in your employee evaluation. Employees who receive positive feedback are more positive, engaged and productive as they do their job.

Ask for Employee Feedback

Use your employee evaluations to build reciprocal relationships. Ask each of your employees to share feedback on your business’s performance. They may see issues you don’t and will feel valued when their opinions are heard.

Consider Evaluation Manners

Because an evaluation can be stressful for you and your employees, use your manners when scheduling and conducting the evaluations.

  • Give your employee plenty of notice so they can prepare.
  • Avoid meeting at high-stress times like Monday morning or during the busy season.
  • Choose a quiet location.
  • Allow plenty of time to discuss positive and negative issues.

Prepare to Disagree

Despite clear evidence, your employees may not agree that they are falling short of expectations. Have a policy in place to handle disagreements.

  • Give the employee an opportunity to prove their side with facts.
  • Ask the employee to write down why they disagree.
  • Include this written report in the official written evaluation.
  • Plan to meet again in a few weeks if necessary to resolve the issue.

Follow Up

After the evaluation, schedule a follow up meeting. It gives you a chance to ensure the employee fixes any problems.

Write a Complete Evaluation

All employee evaluations become part of your employee’s file. Be sure it’s complete, detailed and easy for an outsider to read in case you must share the evaluation for legal or other reasons.

Employee evaluations help your employees and company grow. Consider implementing these tips for your next employee evaluations

Preventing Cybercrimes

By Cyber Security Awareness

Legendary bank robber Willie Sutton supposedly said that he robbed banks because that was where the money was. Many small business owners follow this logic when it comes to computer system security.

They believe that people who rob with a mouse and a keyboard rather than a gun target large corporations, because those businesses have the most money. This leads them to the misguided belief that cybercriminals will not bother them. In fact, the NACHA – The Electronic Payments Association – reports that Eastern European criminal syndicates have targeted small businesses precisely because they have allowed themselves to become easy marks.

Experts in the field estimate that one in five small businesses do not use antivirus software, 60% do not encrypt data on their wireless networks, and two-thirds lack a data security plan. This failure to take precautions makes a small business easy pickings for computer hackers. However, there are several things business owners can do to protect themselves.

Use two-factor authentication. This is a mechanism that requires the user to do more than one thing for authentication. It ordinarily has two components — one thing the user knows (such as a password), the other a randomly generated number that the user must input. The number comes from an electronic token card, which generates a new number every few seconds. If the user enters a number that the system is expecting, the system will authenticate the user.

Inoculate systems against the Clampi Trojan virus. This virus resides on a computer, waiting for the user to long onto financial websites. It captures log-in and password information, relays it to servers run by the criminals, instructs the computer to send money to accounts that they control, or steals credit card information and uses it to make unauthorized purchases. The trojan monitors more than 4,500 finance-related websites.

Be on guard against “phishing” e-mails and pop-up messages. These messages purport to be from legitimate businesses with which the recipient does business. They ask the user to update or verify information, often threatening negative consequences if she fails to do so. Clicking on the links in the messages brings the user to an authentic looking Web site. However, it is actually bogus; the site collects personal information that the collector can use to steal the user’s identity. System users should ignore these messages.

Arrange for financial institutions to alert the business owner should they spot unusual activity involving the firm’s accounts. 

Install firewalls and encryption technology to block uninvited visitors from uploading to or retrieving data from the firm’s servers and to protect data sent on public networks. Intrusion detection systems can inform the business owner of attempts to hack into the network. Be cautious about opening attachments to e-mails, especially if the sender is someone unfamiliar to the user. Attachments may contain viruses or Trojan horses that can steal login information and passwords or corrupt a system.

Protect against intrusion by disgruntled former or current employees. Deactivate passwords for former employees, erect barriers to keep employees from accessing systems unrelated to their jobs, and implement sound accounting procedures for financial transactions.

In addition to these safeguards, small businesses may want to consider purchasing computer fraud and employee theft insurance. These policies will protect the business against those losses that still occur; insurance companies are likely to offer favorable pricing to businesses that take precautions against cybercrime.

One of our professional insurance agents can give advice on the appropriate types and amounts of coverage. Modern technology gives businesses unprecedented abilities, but it also presents significant risks. Every business owner must take steps to keep the cybercriminals out.

Cyber Risks That Affect Consumer Drones

By Cyber Security Awareness

Drones are becoming more popular with consumers. Drone operation does include cyber risks you should understand before you operate your machine.

Remote Takeover

Most drones operate via a Wi-Fi or Bluetooth connection through your smartphone or tablet. The connection may not be secure, though. A hacker can jam, intercept or terminate the connection or GPS, take over your drone and steal it or crash it into something.

Malware

The computer or mobile device you use to operate your drone could become infected with malware. It can affect the connection to your drone and cause the machine to crash and potentially cause physical or property damage.

Access Photos or Videos

A camera attached to your drone can transmit stunning photos and videos from the air. These images are usually transmitted over an unsecured FTP server which a cyber attacker could access and share. This privacy breach is your responsibility.

Ways to Protect Your Drone

Protect your drone from cyber crime when you take several steps.

Ask the seller about their cybersecurity measures.

Most drone sellers include the machine’s cybersecurity information on their website. If you can’t find it, contact the company for additional information.

Test your drone’s security.

Hire a cybersecurity professional to test your drone and ensure it’s safe from cyber threats.

Connect to your drone via radio control.

Use a secure radio control connection since Wi-Fi and Bluetooth connections rely on unencrypted data links that are vulnerable to hackers.

Subscribe to a VPN service.

A Virtual Private Network (VPN) encrypts your internet connection and protects it from hackers.

Install a seL4 operating system.

Equip your drone with new seL4 OS technology. This operating system isolates various functions on the drone, preventing a hacker from taking over your machine.

Install an anti-virus program.

Reduce viruses, malware and other threats when you install protective programs on your computer or mobile device. The most secure programs provide real-time antivirus and anti-theft protection.

Vary your flying habits.

When you fly your drone in the same flight paths and at the same time every day, you make yourself vulnerable to hackers. Instead, vary your flying habits and throw hackers off your trail. Consider flying in remote locations, too.

Purchase drone insurance.

A drone insurance policy provides you and your drone with important coverage. Look for a policy with:

  • Broad, legal and premises liability coverage
  • Personal injury and medical expenses
  • Hull coverage
  • Extra equipment coverage for any on-board cameras, tools and equipment
  • Invasion of privacy

Your drone is vulnerable to several cyber risks. Know the risks and how to stop them so you can enjoy your drone and keep it secure.

Cyber Risks In The Shipping Industry

By Cyber Security Awareness

Over 90 percent of the world’s trade is carried on ships. The shipping industry is essential for the global economy. It’s also a prime target for cyber crime. Whether you work in the industry or are a consumer, understand the cyber risks in the shipping industry.

Piracy

Pirates today still commandeer ships in person, but they also use technology to compromise a ship. They can access its Automatic Identification System (AIS), Electronic Chart Display or Information System (ECDIS) then plan and execute a theft or hold containers for a ransom.

Smuggling

Drug, contraband or other smugglers can access the information system of a ship, shipping company or port. With this control, they can alter shipping records or containers and hide contraband or identify which container holds contraband.

Fraud

Cyber criminals are fraud experts. They can impersonate a company official, client or customer and gain access to sensitive information. They can also access a company’s information system and introduce malware or ransomware, or they can divert, steal or alter shipments.

How to Combat Cyber Risks in the Shipping Industry

Maritime transport experts understand shipping and logistics, but they may not be IT experts. They will need training and professional assistance to navigate the cyber risks they face.

Take cyber risks seriously.

Greater reliance on technology and greater connectivity between industries increase cyber risks today. The shipping industry must take these risks seriously and plan for emerging threats and situations. Otherwise, they compromise their business, security and profitability. A cyber risk assessment gives companies personalized information on the specific cyber threats they face and then offers effective solutions.

Improve protection and loss prevention measures.

Criminals usually target the victim with the most vulnerabilities. Improving security can make the company a less attractive target for cyber crime. It reduces security holes, protects information and establishes a protocol to deal with breaches.

Train employees.

As many as 51 percent of security breaches are performed by an insider in the company who may be vindictive or simply careless. In addition to a strict vetting process, companies can train employees to:

  • Handle data, including file disposal, properly.
  • Recognize fraudulent information requests or data breaches.
  • Protect key information with custody guidelines.
  • Perform strict digital monitoring.

Purchase Adequate Cyber Crime Insurance

Despite strict measures, some cyber risks cannot be prevented. Cyber crime insurance provides a layer of protection and decreases the adverse financial impact of a cyber crime.

Secure the supply chain.

All suppliers and contractors should secure their information systems so it doesn’t introduce malware or other cyber threats into connected systems.

Cyber risks related to shipping industry affect companies and consumers around the globe. Understanding the risks can improve security and protect the economy.

Don’t Delay Reporting Claims

By Construction Insurance Bulletin

Jacqueline Butler did not receive a promotion from the Texas law firm where she worked, and she suspected that her race had something to do with it. In July 2001, she filed complaints with the Texas human rights commission and the federal Equal Employment Opportunity Commission. The EEOC notified the employer, who responded a month later.

The following spring, the EEOC informed Butler that she had the right to sue the employer, which she promptly did. In turn, the employer made a claim with the company that provided its Employment Practices Liability insurance. Four weeks later, the insurance company denied the claim; the employer had no choice but to pay for its own legal defense and any potential settlement. In 2006, the employer sued the insurance company for the costs of its defense, but a federal court in 2007 upheld the claim denial.

Why did the employer’s insurance not pay for a discrimination claim? Because the employer took too long to submit it.

A typical policy requires the insured to give the insurer notice of any claims made against it “as soon as practicable.” In the Texas case, the policy went further — it required written notice to the insurer “as soon as practicable and in no event later than sixty (60) days after such Claim was first made.” The insurer maintained that Butler made her claim in July 2001, when she filed complaints with authorities.

As evidence, it cited the policy’s definition of a “claim” as “any judicial, administrative or other proceeding against any Insured for any Employment Practices Wrongful Act.” Since the complaints filed with the authorities initiated administrative proceedings, the insurer held that they also constituted a claim. In the insurer’s opinion, the policy did not provide coverage if the employer did not give notice within 60 days of when Butler filed the complaints.

The employer argued that, since it notified the insurer within 60 days of receiving notice of the lawsuit, it had complied with the policy’s conditions. However, the court agreed with the insurer.

Insurance companies do not include this language in their policies simply to get out of having to pay claims. The sooner they know about events that might involve coverage, the better they can investigate and prepare legal defense. As time elapses, witnesses’ memories become less reliable, or witnesses might move away, and memos, e-mails, and other types of evidence might become hard to find.

Also, a claimant who has been kept waiting for a length of time might become angry and unwilling to negotiate a settlement. Therefore, even without a firm 60-day deadline, an insurance company might deny coverage when the insured fails to give prompt notice of a claim.

Courts have not developed a standard for what is “prompt” notice, but they normally consider three questions: How long was the delay? What are the reasons for the delay? How does the delay affect the insurer’s ability to handle the claim? Sometimes, a court will excuse a late notice if it decides the insured had a reasonable basis for believing it was not liable for any harm. However, in a situation where an employee has filed complaints with authorities, the court might not agree that such a belief was reasonable.

The safest course for employers is to notify their insurance companies or agents as soon as they become aware of any type of employee complaints to outside authorities. Even if the employer believes the charges to be groundless, it should put the company on notice. Our professional insurance agents can advise you on what the policy requires it to do when a charge is made. The best time to have that discussion is before something happens.

Different Types of Construction Bonds

By Construction Insurance Bulletin

Any construction project is multi-faceted and usually requires a variety of workers, equipment and skills. Construction bonds help to ensure the project is finished properly. Know the different types of construction bonds before you start your next project.

What are Construction Bonds? 

Construction projects of a certain size, type and duration as well as most government and public works projects require construction bonds. Contractors purchase bonds from a surety company. The cost of the bonds depends on the project’s risk and the type and amount of bond required.

You may sometimes hear the term “contract bond” used interchangeably with the term “construction bond.” A contract bond guarantees the fulfillment of a project contract. While contract bonds can be used in any industry, they’re most common in construction.

Different Types of Construction Bonds 

There are several different types of construction bonds.

Bid Bonds

Contractors typically submit bids on projects. Bid bonds ensure the contractors have the funds and financial credentials to accept and complete the job if their bid is accepted. It can also allow the developer to recoup certain costs if the highest bidder retracts the bid or declines the job.

Supply Bonds

Contractors rely on materials, equipment and other supplies when working on a construction project. Supply bonds reimburse the purchaser if the suppliers do not provide the items as listed on the purchase order.

Maintenance Bonds

Upon completion of a project, the owner expects the workmanship and materials to last for a specified time. Maintenance bonds cover any necessary repairs if there’s a defect.

Performance Bonds

After a contractor is awarded the project, performance bonds ensure the contract is fulfilled properly. If it’s not, the project developer can file a claim against the performance bond and use those funds to pay a second contractor to finish the job. Performance bonds are usually purchased for federally funded projects that exceed $100,000.

Payment Bonds

Unfortunately, a lead contractor may go into bankruptcy during a project and be unable to pay subcontractors, suppliers or other workers. Payment bonds cover those services. These bonds are often issued alongside performance bonds because they’re also required for federally funded projects that exceed $100,000.

Subdivision Bonds

Contractors who build or renovate structures within a subdivision will need subdivision bonds. They ensure the sidewalks, waste management systems, streets and other public structures are built according to specification. Otherwise, the bond will pay for the project to be finished properly.

Site Improvement Bonds

Renovation projects to existing properties or older structures are fulfilling but can be challenging. Site improvement bonds ensure these projects are completed properly.

Construction bonds are essential for many projects. Discuss your needs with your insurance agent as you ensure you’re covered with the right bonds for your needs.