Author: admin

  • McGriff National Webinar Series

    About the Webinar Series Webinars typically take place on the third Thursday of every month at 2:00 p.m. Eastern time. Each webinar lasts approximately 60 minutes. Registration links are provided below with each webinar; a confirmation email will be sent to the email address provided. Reminder emails will be sent 24 hours and one hour…

  • What to Know Before You Go It “Alone” and Offer a Supplemental Health Program to All Employees

    Has a vendor ever approached you about offering a medical or pharmacy benefit separate from your medical plan? When you offer a program to employees other than those who participate in your medical plan, we refer to it as a ‘stand-alone’ plan. These types of programs can be an inexpensive way to provide at least…

  • Checklist: How to Prepare Your Business for Hurricane Season

    How do you prepare your business to weather the potential damages hurricanes can cause? The good news is that a relatively small investment of time and money now may prevent severe damage and disruption to your business down the road. Here’s a checklist to get you on the right track. 1. Know your building’s vulnerability…

  • Unlocking Potential: How Understanding Human Behavior Enhances Safety and Operational Success

    In today’s complex and rapidly evolving work environments, organizations need effective strategies to enhance safety, improve performance, and cultivate a culture of engagement and accountability. While many companies invest heavily in technology and systems to mitigate risk, one of the most powerful and sustainable approaches remains underutilized: applying the science of human behavior. Understanding why…

  • Insurance Insights for Unmanned Aerial Vehicles

    The use of unmanned aerial vehicles (UAVs), typically referred to as drones, has become increasingly instrumental in a wide range of sectors, including construction, energy, real estate, and government contracting operations. As a result, the need for specialized insurance continues to grow. How Government Contractors Use Drones Many of today’s government contractors use drones as…

  • The Hammer Clause: How It’s Utilized to Resolve Disputes Between Carriers

    When a business faces a liability claim, the complexities of layered insurance policies that come with primary and excess policies can complicate a resolution. One critical tool that comes into play in these situations is the hammer clause and its enforcement through a hammer letter. Understanding how these mechanisms work is important for policyholders. What…

  • How to Make HSAs the 401ks for Health Expenses in Retirement

    HSAs offer a number of benefits beyond spending for the short-term. They can be instrumental in saving for longer-term qualified expenses through proper planning and investing. This session will explore the tax advantages of an HSA, planning strategies for the short and long term, and investment options to build retirement savings. We will also explore…

  • Using Computer-Based Technology to Help Facilitate Safety Performance

    Companies today use a variety of computer-based technology platforms (e.g., Smart Sheet, HammerTech, iAuditor, Origami, etc.) for measuring the performance of safety tasks that help prevent incidents and claims. For the most part, these platforms are blank canvases from which creative safety professionals are developing “leading indicator” masterpieces of safety responsibilities. Some examples we have…

  • Client Advisory: Legal Update for Companies Incorporated in Delaware

    Bylaw provision can reduce litigation costs and streamline litigation Over the past three years, directors and officers of public companies trading in the United States have been named in more in securities claims filings than any prior three-year period in history. The plaintiff-friendly 2018 Supreme Court decision, Cyan, Inc. v Beaver County Employees Retirement Fund, has…

  • Client Advisory: D&O Considerations for New SEC Cybersecurity Rules for Public Companies

    What Do the SEC Rules Require? Registrants must describe their processes for assessing, identifying, and managing material risks from cybersecurity threats in sufficient detail for a reasonable investor to understand. Any third-party service providers that have been incorporated into a company’s risk management processes must also be disclosed. Registrants must describe the board of directors’…