The more you have acquired, the higher your risk for litigious encounters. Your financial security could become severely compromised due to accidental events you may have thought were adequately covered. Excess liability insurance responds when the underlying liability limits of your various other policies have been exhausted. It is a critical, but...
We have the answers
Search Results
Home invasion. Carjacking. Stalking threats. Road rage. And now, cyberbullying. These unthinkable crimes can happen every day and almost anywhere in the world. In the unfortunate event that these crimes can happen to you or a family member, there can be peace of mind from having a family protection coverage to help deal with the long and painful af...
One of the best ways to help ensure the safety of your family and friends while aboard your boat is to identify common maintenance items before they become a problem. And if your boat is hauled out for winter storage, there are important recommendations to follow to help ensure that your boat will be ready for safe and reliable cruising again next ...
If your boat is hauled out for winter storage, here are some suggestions on what to do before, during, and after the haulout. Each recommended step will help you ensure that your vessel will be ready for safe and reliable cruising again next year.
In an illustrative, legal analysis on the ownership treatment of bitcoin under the U.S. State property law, the focus turns to California law for guidance on whether bitcoin ownership should be recognized as a property right. Although there are possible challenges to treating bitcoin as property, they do not undercut the legitimacy of such rights o...
The dynamic of having an exciting company with immediate needs juxtaposed against the uncertainty of the company’s growth or other changes in the coming years requires a thoughtful and practical approach when it comes to negotiating lease terms. The issues to consider for these types of leases are not just an “us versus them” or a...
While not every breach involves a type of personal information that requires notification or disclosure, every breach requires attention and an individualized response tailored to the facts and nature of the breach, and an evaluation of how processes can be improved to minimize the risk of future breaches. The most recent Security Breach Notificati...
Fund groups face disruptive developments, as advances in financial technology, often called fintech, continue at an ever more rapid pace. Even as new efficiencies and opportunities blossom, regulators have pushed financial firms to recognize the dangers of technological failures. To prepare for the changes ushered in by fintech, it is important for...
We have all been the new person at some point or another—the new person on the block, the freshman at the big university, a manager in a new office. In such hard-to-navigate situations, training and communications are integral parts of the on-boarding process. When both employee and employer are informed about one another’s needs, personalities, an...
Statistics show that teenagers are more likely than any other age group to be in an automobile accident. In several tragic incidents, the use of a cell phone was involved. Some accidents, however, simply reflected the teenagers’ lack of driving experience. As a parent, you can help your teenager become a safe and skilled driver by setting a good ex...
Cyber threat is as old as the internet itself. While some attacks are politically motivated, the majority are carried out for financial gain. The potential profit to be made with someone’s personal information, particularly if the individual is of high net worth, is great—in fact, it’s a more lucrative industry than the illegal dr...
Terrorism can take many shapes and involve a vast range of political or ideological agendas. But there are common threads linking all acts of terror: they involve the use of threat of violence, they are random—potentially occurring in any country, against any target, at any time—and their ultimate goal is to generate fear. As terror tac...
Wealth attracts attention and an increase in personal risk, including the risk of being kidnapped. Why then is there resistance to security among wealthy individuals and families, whether they come from security-savvy hedge fund managers or young parents of families with extensive financial holdings intent upon raising their children “like ot...
While many individuals may have the skills and experience for a private staffing position, it’s the chemistry and having a system in place that makes it work for all parties. With this guide that includes job descriptions and requirements, discover the actionable insights and best practices for optimizing your private staff throughout the hiring pr...
It’s tempting to imagine the computer systems as airtight vaults, impenetrable and immune to cyberattacks. But this would be a risky move. In reality, IT infrastructure is more like a porous sponge with gaping holes where data can leak when things don’t go according to plan: a staff member might lose a laptop, a system might experience ...