skip to main content

News

Arbitration - a Benefit of Non-Subscribing

Employers who subscribe to workers' compensation insurance enjoy the benefit of insulating themselves from litigation brought by employees for work related injuries. Under the worker's compensation system, workers’ compensation benefits are an employee […]

Toolkit for Managing the Eventual Hack: Part 4 of 4

You have dissected your existing business insurance.  You have "armored up" with cyber insurance to insulate and immunize the business risk.  You have put internal controls in place to minimize risk.  Even with all these safeguards, any business with […]

OSHA announces new requirements for reporting workplace injuries

Recently, the United States Department of Labor's Occupational Safety & Health Administration ("OSHA") announced new requirements for the reporting of workplace injuries that are slated to take effect on January 1, 2015. These new regulations apply […]

Nurturing a Culture of Prudent Cyber: Part 3 of 4

In a perfect world, the partnership between a business and its insurance company must be based on full information and informed shared risks.  This is even more true in the world of prudent cyber liability policies and coverage.  Not only is this good […]

Vaccinating Your Business From The Hackers: Part 2 of 4

In Part 1 of our series, we discussed how many traditional insurance policies may leave your business vulnerable in the event of a breach.  Because of this and not surprisingly, the insurance industry has developed new insurance products designed to […]

Dissecting the Anatomy of Cyber Risk: Part 1 of 4

Welcome to Cybersaurus Lex, a weekly blog devoted to our reader's education on cyber risk and data breach.  In this our launch edition, we will dissect the typical business insurance policies and why each may leave your business unclothed in the event […]

Preparing for a Cybersecurity Breach

Even as the economy seems to be improving, company budgets likely remain tight. However, in light of recent large scale data breaches such as K-Mart, Home Depot and Target, companies should be re-assessing their own data security measures. That assessment […]

Evolving Cybersecurity Threats

Personal information—information from your customers, employees, or your business itself—has become currency for criminals. Consequently, evolving cybersecurity threats for every business, regardless of size or industry, should be concerned with […]

Litigation for Non-Subscribers: Prohibited Affirmative Defenses

Although the benefits to becoming a nonsubscriber under the Texas workers' compensation system are manifold, employers who choose to become nonsubscribers do need to be aware of hurdles that the Texas Legislature put into place for those who choose […]

Avoid Social Media Pitfalls: Top 10 Tips

Providers should use privacy settings so as to safeguard their own personal information and content.  But privacy settings are not absolute.  Providers should monitor content posted about them by others to ensure propriety and accuracy.  see AMA […]

Understanding Social Media: Top 10 Tips

Use Facebook, LinkedIn, Twitter, and other social media sites to maintain your professional presence and connect with colleagues, referral sources, and patients.  A patient can "like" your Facebook page and be routed through regular patient intake and […]

Reappointment: Top 10 Tips

As with initial application, a staff person can draft the answers, gather the attachments, and actually submit the reapplication. But the physician must make sure that the application is wholly accurate and complete before signing. Don’t allow staff […]