![]() |
Cloud Computing: Is Your Company Weighing Both Benefits & Risks? Cloud computing is a landscape-altering technology that is enjoying increasing rates of adoption — often implemented, however, without taking sufficient risk management precautions. While there are numerous advantages to adopting the cloud, there are also abundant risks, and having a comprehensive risk management plan in place is critical. Read the report. |
![]() |
Privacy Insurance: Avoiding the HMO Experience Not all privacy insurance products are created equal. While most policies and endorsements address both first-party and third-party exposures, there are often wide differences in coverage terms, conditions, exclusions and financial limits. Read the report. |
![]() |
Social Media: The Business Benefits May Be Enormous, But Can the Risks - Reputational, Legal, Operational - Be Mitigated? This report discusses the risks and benefits of companies engaging in social media as well as solutions for addressing these risks. Read the report and listen to the podcast. |
![]() |
Data security: Protecting Private Data From Prying Eyes Poses Some Serious Risk Management Questions This Strategic Risk executive report, sponsored by ACE, looks at cyber risks in Europe from European Commissions regulations to cloud computing. Read the report. |
![]() |
Data Risks for Midsized Companies (Crain's Cleveland Business) Toby Merrill, ACE Professional Risk, discusses data security for midsize companies. Read the article. |
![]() |
Preparing for the Inevitable Data Breach: What to Do Before Sensitive Customer and Employee Data is Breached, Stolen or Compromised The first of two podcasts: Panelists discuss developments in state and federal laws requiring more disclosure from companies that experience data breaches. Listen to the podcast. |
![]() |
How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised The second of two podcasts: The discussion focuses on the steps that organizations and their risk managers need to take in order to prepare and respond to a data breach. Listen to the podcast. |