Please ensure Javascript is enabled for purposes of website accessibility
The IIAW Blog
Blog Home All Blogs

Risky Business - Are Mortgage Companies Requesting Replacement Cost Estimators

Posted By IIAW Staff, Wednesday, May 13, 2020
Updated: Thursday, April 30, 2020

By: Mallory Cornell | IIAW Vice President and Director of Risk Management

 

* This article was featured in our May 2020 Wisconsin Independent Agent Magazine. Read the full May 2020 issue here

 

The coronavirus pandemic is having a tremendous effect on many different aspects of life. While all of this has certainly influenced your personal and professional habits, it’s important to focus on how changes are managed from an operational standpoint within the agency. 

 

It has recently been brought to our attention that mortgage companies are making more frequent requests for replacement cost estimates. While it has always been a fairly common practice for a lender to verify a valid insurance policy is in place, the exposure now is the language used to describe the policy and limits and as well as the documentation requested.

 

 

The Danger of Guarantee

 

Independent agents should always be careful when providing anything at “100%” or “Guaranteed”. There is too much variability and change to offer this wording in the insurance industry. So, what about mortgage company requests for “guaranteed replacement cost”? As a licensed insurance agent, you could face disciplinary actions for misrepresenting the coverage the homeowner has in place as indicated in Wisconsin statute 628.34(1)(a). It is extremely important to standardize the response to these requests from mortgage companies. 

 

Recommended language has been shared from the Florida Association of Insurance Agents (FAIA) and advises agents to use the following: 

 

“It is the practice of this agency to insure structures for their estimated replacement cost as determined by the insurance company. Building limits are estimates only and are arrived at based on information provided by the policyholder and/or industry standard software used to estimate replacement costs. The actual cost to rebuild the structure may exceed the policy limits, especially during a catastrophic event and/or where an ordinance or law impacts repair or replacement.

 

The agency makes no assurances that the policy limits provided will be adequate to rebuild the structure.”

 

Sharing Replacement Cost Estimator (RCE) Documents

 

In an effort to expedite the processing of this request, many agency procedures include sending the RCE to the lender. While this may seem like the easiest solution, it is important to be mindful of any contractual language with carriers and vendors that would prohibit the agent from sharing such documents with a third party. While it may be difficult, at times, to push back on this request it could result in other consequences for the agency. 

 

Take the time to update internal workflows and procedures to ensure your response is consistent and does not create unintended exposures for the agency. Agency exposures greatly increase when operational changes occur, and employees should be diligent about questioning new requests and procedural inconsistencies. 

 

If your agency has any questions regarding agency operations or responses, please reach out to Mallory Cornell at Mallory@iiaw.com.

Tags:  errors and omissions  Replacement Cost Estimator (RCE)  Risky Business 

PermalinkComments (0)
 

Risky Business - Friend or Foe? Don't be a victim of social engineering

Posted By Kaylyn Zielinski, Wednesday, April 29, 2020

By: Mallory Cornell | IIAW Vice President and Director of Risk Management

* This article was featured in our April 2020 Wisconsin Independent Agent Magazine. Read the full April 2020 issue here

As a true crime junkie, the idea of social engineering is intriguing to me; it also presents a significant risk for our members. We are aware of at least two instances of social engineering at our member agencies in 2020 and unfortunately there are likely to be more by year end. To try to prevent additional ‘attacks’, here is some education to share with family, friends and colleagues – because knowledge is the best defense against this type of criminal. 


“Ask any security professional and they will tell you that the weakest link in the security chain is the human who accepts a person or scenario at face value. It doesn’t matter how many locks and deadbolts are on your doors and windows, or if have guard dogs, alarm systems, floodlights, fences with barbed wire, and armed security personnel; if you trust the person at the gate who says 

he is the pizza delivery guy and you let him in without first checking to see if he is legitimate you are completely exposed to whatever risk he represents.” (“What is Social Engineering?”)


Social engineering is when a cyber criminal manipulates a person into providing confidential information. This act is typically done by either posing as a friend or posing as someone you know or by posing as a friend or by acting as another trusted source (think vendor or customer). 


Friends


Oh look, grandma forwarded a cute email chain!


If you receive something that you need to “click on the link” to access or that you need to download, pause and think twice about what (or who) might be hiding behind that request. Links and downloads are some of the easiest ways for has hackers to gain access to your computer, email accounts, social media accounts and contact lists. 


Trusted Sources


I need to make this payment! 


According to an annual data breach report from Verizon, phishing attacks and pretexting are responsible for 93% of successful data breaches. The reason for their success might be the tactics that are used to get the attention of the person on the receiving end. Here are examples of what to look for so you can avoid an expensive breach.

• Displays an urgency to help a friend in need

• Seems to come from a familiar sender either as an email, text, instant message from a well-known company, bank or other institution

• Request for a charitable donation

• Request for you to verify information

• Notification that you’ve won and need to claim your prize

• Posing as a boss or colleague 


It would be very difficult, if not impossible to avoid becoming a target, but you can arm yourself with knowledge so that you don’t fall into a spammers trap. Educate yourself and all employees about what to look 

for to keep your information safe.

Tags:  cybersecurity  phishing  Risky Business  social engineering 

PermalinkComments (0)
 
Page 2 of 2
1  |  2