The document discusses the regulatory issues insurance companies face regarding social media, mobile computing, and cloud technology. It notes that state insurance regulators are increasingly treating social media posts as advertising, and the NAIC has issued guidance on complying with regulations related to social media use. The document provides examples of how some major insurance companies incorporate these new technologies and outlines various compliance risks regarding privacy, security, discrimination, and improper marketing.
The implications of socual media for public sector information - a practical guide, presented at 'Managing Public Sector Information' Kable / The Guardian conference 1st March 2011
This presentation was given at the Metropolitan Police Technology in Front Line policing event on 03 June 2012.
Our mobile apps provide public insight, amplify front line police activity, engage communities and help fight crime safely
Proven in use by over 500 officers and tens of thousands of members of the public in the UK.
Tayside Police Mobile App launch presentationAngus Fox
In a continued drive to maximise contact with the people it serves, Tayside Police today launched its Community Smartphone App – the first policing app of its kind in Scotland.
"Tayside residents can now use the app on their smart phones to see what their community officers are doing in their local area, as well as getting a snap shot of current operational policing issues and commitments as they happen." http://www.tayside.police.uk/PressReleases/scottish-first-as-tayside-police-launches-community-app.htm
Open social mobile apps increase community involvement in policing and confid...Angus Fox
Our presentation on how our open social mobile apps increase community involvement in policing and confidence in the criminal justice system, for the College of Policing event on Mobile Apps for policing, given at the Home Office on 26th April 2013
The implications of socual media for public sector information - a practical guide, presented at 'Managing Public Sector Information' Kable / The Guardian conference 1st March 2011
This presentation was given at the Metropolitan Police Technology in Front Line policing event on 03 June 2012.
Our mobile apps provide public insight, amplify front line police activity, engage communities and help fight crime safely
Proven in use by over 500 officers and tens of thousands of members of the public in the UK.
Tayside Police Mobile App launch presentationAngus Fox
In a continued drive to maximise contact with the people it serves, Tayside Police today launched its Community Smartphone App – the first policing app of its kind in Scotland.
"Tayside residents can now use the app on their smart phones to see what their community officers are doing in their local area, as well as getting a snap shot of current operational policing issues and commitments as they happen." http://www.tayside.police.uk/PressReleases/scottish-first-as-tayside-police-launches-community-app.htm
Open social mobile apps increase community involvement in policing and confid...Angus Fox
Our presentation on how our open social mobile apps increase community involvement in policing and confidence in the criminal justice system, for the College of Policing event on Mobile Apps for policing, given at the Home Office on 26th April 2013
Proof of immunity and the demise of privacy 2020 world in 2030Future Agenda
Public concerns about health security override worries about privacy. Governments integrate immunity and health data with national identities facilitated by digital identity platforms. Insufficient regulatory control risks the possibility of pervasive and invasive surveillance.
A pragmatic response to a pandemic is to dial up tracking, tracing and wider bio-surveillance in order to isolate the virus and manage the contagion. But this may come at a cost. Privacy advocates warn that it is precisely in times of crisis that governments focus too much on short term need without robustly exploring the potential consequences; the impact on the right to a private life or the risk of greater surveillance, for example.
This 2030 foresight explores why, while proof of immunity is just one way in which the merging of health and identity technologies can be used, it is also the catalyst for wider change. This will not only be about creating and sharing new kinds of health data but also about new access credentials. Indeed, being asked for proof of immunity could well see people being limited in their freedom of movement, not on the basis of citizenship or wealth, but on their individual health.
For more details see www.futureagenda.org @futureagenda
Remodista = Retail and Mobility Distilled(re – mo – dist – a) – proper n. pl.Remodista is a savvy retailer’s forum for all thingsmobile, taking its name—and mission—from coreprinciples of retail and mobility distilled into onecommunity. Fresh content from industry thoughtleaders and peer reflection meet in a collaborativeenvironment for retailers to learn, share and bringvisionary strategies to market.
Technology Forecast 2013: What State and Local Government Technology Programs Can Expect - by Doug Robinson, Executive Director, National Association of State Chief Information Officers (NASCIO) - Presented by Public Technology Institute, Dec. 19, 2012
This report is intended primarily for business people who are tasked with understanding,
interpreting, and acting on social data—executives, strategic planners, social strategists,
and marketers. It will outline the key challenges of social data, propose a value-based
framework for social analytics, and recommend clear and pragmatic steps that companies
engaged in social media must follow to ensure they are gaining insights, measuring effectively,
interpreting accurately, and taking appropriate action—both today and in the longer term.
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
The american workplace is in a period of unprecedented change as the combination of mobile technology and social media is changing the "who, what, when and where" of work.
Proof of immunity and the demise of privacy 2020 world in 2030Future Agenda
Public concerns about health security override worries about privacy. Governments integrate immunity and health data with national identities facilitated by digital identity platforms. Insufficient regulatory control risks the possibility of pervasive and invasive surveillance.
A pragmatic response to a pandemic is to dial up tracking, tracing and wider bio-surveillance in order to isolate the virus and manage the contagion. But this may come at a cost. Privacy advocates warn that it is precisely in times of crisis that governments focus too much on short term need without robustly exploring the potential consequences; the impact on the right to a private life or the risk of greater surveillance, for example.
This 2030 foresight explores why, while proof of immunity is just one way in which the merging of health and identity technologies can be used, it is also the catalyst for wider change. This will not only be about creating and sharing new kinds of health data but also about new access credentials. Indeed, being asked for proof of immunity could well see people being limited in their freedom of movement, not on the basis of citizenship or wealth, but on their individual health.
For more details see www.futureagenda.org @futureagenda
Remodista = Retail and Mobility Distilled(re – mo – dist – a) – proper n. pl.Remodista is a savvy retailer’s forum for all thingsmobile, taking its name—and mission—from coreprinciples of retail and mobility distilled into onecommunity. Fresh content from industry thoughtleaders and peer reflection meet in a collaborativeenvironment for retailers to learn, share and bringvisionary strategies to market.
Technology Forecast 2013: What State and Local Government Technology Programs Can Expect - by Doug Robinson, Executive Director, National Association of State Chief Information Officers (NASCIO) - Presented by Public Technology Institute, Dec. 19, 2012
This report is intended primarily for business people who are tasked with understanding,
interpreting, and acting on social data—executives, strategic planners, social strategists,
and marketers. It will outline the key challenges of social data, propose a value-based
framework for social analytics, and recommend clear and pragmatic steps that companies
engaged in social media must follow to ensure they are gaining insights, measuring effectively,
interpreting accurately, and taking appropriate action—both today and in the longer term.
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
The american workplace is in a period of unprecedented change as the combination of mobile technology and social media is changing the "who, what, when and where" of work.
Run Away: A Fair and Balanced Look at Privacy in the Age of Location-Based So...Brendan O'Connor
My presentation on Saturday, April 10, 2010 to students at the United World College of the American West in Montezuma, NM. Video is being uploaded to YouTube at http://www.youtube.com/watch?v=_ISOFoQVvqg .
A presentation a friend and I worked on while brainstorming ideas for a technology startup. Our objective was to explore opportunities in industries we're familiar with and industries we believe are ripe for disruption. The presentation lays out key industry metrics and profiles successful companies (somewhat startup-focused) within each industry.
Social Media and Mortgage Regulation: What's Next?Smarsh
As social media use in the lending industry grows beyond advertising and office promotion, it is important to understand the regulatory efforts to monitor and manage what mortgage lenders and brokers are doing in the social space, and how to mitigate the risk of noncompliance. Join Andrea Lee Negroni, JD, and Smarsh Lending Compliance Specialist, Dan Carroll to discuss the current and future state of social media in the mortgage industry.
Social Media for Lenders Webinar featuring Lee NegroniSmarsh
Record keeping rules for mortgage lenders weren’t written with social media in mind. Complying with these rules for loan-related tweets, Facebook messages and LinkedIn communications suggests the proverbial square peg and round hole. Some regulatory agencies mention social media communications but lack rules for it, while others are silent on the subject.
Is social media an unsupervised digital opportunity to advertise and originate mortgages, or a regulatory compliance risk?
Ninety Consulting: The Omnichannel InsurerDan White
Some insurers are already pursuing omnichannel, but other sectors, e.g. retail, are seen as more advanced and could yield lessons for insurers. In Part 1 of this two-part paper, we look at some of the initiatives and issues that are emerging as insurers try to move to an omnichannel approach. In Part 2, released separately, we look at examples and lessons from other sectors and try to answer the question ‘What can insurers learn about omnichannel from other industry sectors?’ We will conclude by making some keynote recommendations and predictions about the changing nature of omnichannel and its impact on the insurance sector.
Carlos Pallordet from timetric delivered this speech on global best practices in financial services in Singapore in April 2014.
The Digital insurer particularly liked the insurance example of successful social media campaigns, the use of charity t engage with customers and some early adoption of allowing consumer reviews on insurance products and services
Identity Theft Coverage - How are Insurers Protecting Their CustomersCorporate Insight
Having personal and credit card data stolen is traumatizing and presents a host of hassles to consumers. As more transactions take place online, opportunities for fraud and identity theft increase.
This slide deck highlights the products and educational content related to identity theft available on the public sites of five leading life insurers. It is noteworthy that MetLife and Nationwide are the only firms we track that offer separate, specialty products focused on protecting clients from identity theft.
How Innovation Is Disrupting the Insurance MarketplaceCapgemini
As digital and data become key innovation enablers, insurers face new threats and opportunities. New entrants are disrupting long standing paradigms of how insurance risk is assessed, how products are distributed, and how insurers service customers.
Digitalization and Analytics acquire new strategic relevance in this context and will fundamentally alter the relationship insurers have with customers and agents. This panel will discuss some of these trends and options available to insurers to address these opportunities.
Presented at Pegaworld 2016.
How Insurers Can Leverage Social and Messaging Apps to Enhance Digital ValueCognizant
Insurance carriers looking to bolster their digital ROI and reach their clientele of millennials most effectively must look beyond mobile apps and online portals, into social and messaging apps. We offer a roadmap and use cases for enhancing insurers' digital presence.
The webinar covers:
• The origin and need for security and privacy in IoT devices
• Elements of the IoT Trust Framework
• Plans for implementation and certification
This webinar was presented by Scott S. Perry CPA and Online Trust Alliance:
Scott Perry is Principle of Scott S. Perry CPA, an expert with more than 25 years of experience as a manager, senior manager and director on the audit firms. A national consulting firm has led him to drive his own licensed, nationally operating CPA firm based in Bellevue, Washington specializing in Cybersecurity Audits.
Craig Spiezle is Executive director of Online Trust Alliance (OTA), a recognized authority on trust and the convergence of privacy, security and interactive marketing promoting a privacy practices, balanced public policy, end-to-end security and data stewardship. Currently Craig is on board Identity Theft Council and a member of InfraGuard a partnership between the Federal Bureau of Investigation and private sector.
Link of the recorded session published on YouTube: https://youtu.be/K3KZHWHO8bg
The future of insurance distribution: New models for a digital customerAccenture Insurance
This report argues that incumbents need to embrace digital disruption, form partnerships and adopt innovative technologies to improve customer engagement and create new opportunities for growth. It introduces five new distribution models that insurers should consider, as well as six ‘lenses’ through which they can be evaluated.
Your insurance clients know that far-sighted players are already confronting the future of insurance distribution. Use this report to help them assess their options.
Annuity and Life Insurance Product Update - Q1 2015Corporate Insight
Our quarterly Annuity and Life Insurance Product Update reviews new products released by annuity carriers and life insurers over the last quarter. This slide deck reviews the new annuity and life insurance products introduced in the first quarter of 2015.
Similar to Social media, mobile computing and the cloud meet insurance regulation (20)
VAT Registration Outlined In UAE: Benefits and Requirementsuae taxgpt
Vat Registration is a legal obligation for businesses meeting the threshold requirement, helping companies avoid fines and ramifications. Contact now!
https://viralsocialtrends.com/vat-registration-outlined-in-uae/
What are the main advantages of using HR recruiter services.pdfHumanResourceDimensi1
HR recruiter services offer top talents to companies according to their specific needs. They handle all recruitment tasks from job posting to onboarding and help companies concentrate on their business growth. With their expertise and years of experience, they streamline the hiring process and save time and resources for the company.
Unveiling the Secrets How Does Generative AI Work.pdfSam H
At its core, generative artificial intelligence relies on the concept of generative models, which serve as engines that churn out entirely new data resembling their training data. It is like a sculptor who has studied so many forms found in nature and then uses this knowledge to create sculptures from his imagination that have never been seen before anywhere else. If taken to cyberspace, gans work almost the same way.
[Note: This is a partial preview. To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
Sustainability has become an increasingly critical topic as the world recognizes the need to protect our planet and its resources for future generations. Sustainability means meeting our current needs without compromising the ability of future generations to meet theirs. It involves long-term planning and consideration of the consequences of our actions. The goal is to create strategies that ensure the long-term viability of People, Planet, and Profit.
Leading companies such as Nike, Toyota, and Siemens are prioritizing sustainable innovation in their business models, setting an example for others to follow. In this Sustainability training presentation, you will learn key concepts, principles, and practices of sustainability applicable across industries. This training aims to create awareness and educate employees, senior executives, consultants, and other key stakeholders, including investors, policymakers, and supply chain partners, on the importance and implementation of sustainability.
LEARNING OBJECTIVES
1. Develop a comprehensive understanding of the fundamental principles and concepts that form the foundation of sustainability within corporate environments.
2. Explore the sustainability implementation model, focusing on effective measures and reporting strategies to track and communicate sustainability efforts.
3. Identify and define best practices and critical success factors essential for achieving sustainability goals within organizations.
CONTENTS
1. Introduction and Key Concepts of Sustainability
2. Principles and Practices of Sustainability
3. Measures and Reporting in Sustainability
4. Sustainability Implementation & Best Practices
To download the complete presentation, visit: https://www.oeconsulting.com.sg/training-presentations
What is the TDS Return Filing Due Date for FY 2024-25.pdfseoforlegalpillers
It is crucial for the taxpayers to understand about the TDS Return Filing Due Date, so that they can fulfill your TDS obligations efficiently. Taxpayers can avoid penalties by sticking to the deadlines and by accurate filing of TDS. Timely filing of TDS will make sure about the availability of tax credits. You can also seek the professional guidance of experts like Legal Pillers for timely filing of the TDS Return.
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
"𝑩𝑬𝑮𝑼𝑵 𝑾𝑰𝑻𝑯 𝑻𝑱 𝑰𝑺 𝑯𝑨𝑳𝑭 𝑫𝑶𝑵𝑬"
𝐓𝐉 𝐂𝐨𝐦𝐬 (𝐓𝐉 𝐂𝐨𝐦𝐦𝐮𝐧𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬) is a professional event agency that includes experts in the event-organizing market in Vietnam, Korea, and ASEAN countries. We provide unlimited types of events from Music concerts, Fan meetings, and Culture festivals to Corporate events, Internal company events, Golf tournaments, MICE events, and Exhibitions.
𝐓𝐉 𝐂𝐨𝐦𝐬 provides unlimited package services including such as Event organizing, Event planning, Event production, Manpower, PR marketing, Design 2D/3D, VIP protocols, Interpreter agency, etc.
Sports events - Golf competitions/billiards competitions/company sports events: dynamic and challenging
⭐ 𝐅𝐞𝐚𝐭𝐮𝐫𝐞𝐝 𝐩𝐫𝐨𝐣𝐞𝐜𝐭𝐬:
➢ 2024 BAEKHYUN [Lonsdaleite] IN HO CHI MINH
➢ SUPER JUNIOR-L.S.S. THE SHOW : Th3ee Guys in HO CHI MINH
➢FreenBecky 1st Fan Meeting in Vietnam
➢CHILDREN ART EXHIBITION 2024: BEYOND BARRIERS
➢ WOW K-Music Festival 2023
➢ Winner [CROSS] Tour in HCM
➢ Super Show 9 in HCM with Super Junior
➢ HCMC - Gyeongsangbuk-do Culture and Tourism Festival
➢ Korean Vietnam Partnership - Fair with LG
➢ Korean President visits Samsung Electronics R&D Center
➢ Vietnam Food Expo with Lotte Wellfood
"𝐄𝐯𝐞𝐫𝐲 𝐞𝐯𝐞𝐧𝐭 𝐢𝐬 𝐚 𝐬𝐭𝐨𝐫𝐲, 𝐚 𝐬𝐩𝐞𝐜𝐢𝐚𝐥 𝐣𝐨𝐮𝐫𝐧𝐞𝐲. 𝐖𝐞 𝐚𝐥𝐰𝐚𝐲𝐬 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐭𝐡𝐚𝐭 𝐬𝐡𝐨𝐫𝐭𝐥𝐲 𝐲𝐨𝐮 𝐰𝐢𝐥𝐥 𝐛𝐞 𝐚 𝐩𝐚𝐫𝐭 𝐨𝐟 𝐨𝐮𝐫 𝐬𝐭𝐨𝐫𝐢𝐞𝐬."
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
Digital Transformation and IT Strategy Toolkit and TemplatesAurelien Domont, MBA
This Digital Transformation and IT Strategy Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 5,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation and IT Strategy Toolkit. It includes all the Frameworks, Best Practices & Templates required to successfully undertake the Digital Transformation of your organization and define a robust IT Strategy.
Editable Toolkit to help you reuse our content: 700 Powerpoint slides | 35 Excel sheets | 84 minutes of Video training
This PowerPoint presentation is only a small preview of our Toolkits. For more details, visit www.domontconsulting.com
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
Cultivating and maintaining discipline within teams is a critical differentiator for successful organisations.
Forward-thinking leaders and business managers understand the impact that discipline has on organisational success. A disciplined workforce operates with clarity, focus, and a shared understanding of expectations, ultimately driving better results, optimising productivity, and facilitating seamless collaboration.
Although discipline is not a one-size-fits-all approach, it can help create a work environment that encourages personal growth and accountability rather than solely relying on punitive measures.
In this deck, you will learn the significance of workplace discipline for organisational success. You’ll also learn
• Four (4) workplace discipline methods you should consider
• The best and most practical approach to implementing workplace discipline.
• Three (3) key tips to maintain a disciplined workplace.
5 Things You Need To Know Before Hiring a Videographer
Social media, mobile computing and the cloud meet insurance regulation
1. Social Media, Mobile Computing and The Cloud:
Why You Need a Current and
Comprehensive Compliance Program
Presentation to
Insurance Industry Charitable Foundation
November 9, 2011
Margaret A. Keane
415 951 1137
mkeane@dl.com
Dewey & LeBoeuf LLP
dl.com
2. TABLE OF CONTENTS
A. Issues Specific to the Insurance Sector
1. Use of Social Media by Farmers and some of its Competitors
2. Insurance Regulators and Social Media
3. The NAIC’s draft White Paper on Social Media in Insurance
4. From the States: Social Media as Advertising and Other Perils
5. Social Media as an Investigative Tool
6. Pointers, Perils and the FTC
B. Workplace Issues
1. Overview of Challenges
2. Hiring Concerns
3. Perils and Pitfalls of Mobile Technology
4. FINRA Guidance on Dual Use Devices
5. The NLRA, Non-disparagement Policies and Termination
6. Genetic Information Non-Discrimination Act
7. Parting Thoughts
Dewey & LeBoeuf LLP | 2
3. The Risks and Rewards
of Social Media Run Throughout Your Relationships
● Claims
● Community Relations
● Customers
● Employees
● Insurance Regulators
● Other Regulators and Enforcers
● Producers
● Underwriters
Dewey & LeBoeuf LLP | 3
4. Perils of Social Media and Mobile Computing
● Misappropriation of sensitive information due to negligent or
intentional security breach
● Reputational damage
● Harassment or bullying of co-workers in social media fora
● Inappropriate and/or defamatory references posted on public sites
● Claims of discriminatory hiring and firing decisions based on
information obtained from social media
● Violations of Genetic Information Non-Discriminatory Act (GINA)
● Wrongful termination claims for decisions and policies that may
violate the National Labor Relations Act
● Unfair insurance/trade practices exposure for inappropriate or
unauthorized endorsements and testimonials
Dewey & LeBoeuf LLP | 4
5. Farmers Insurance Group
• Offers Zynga’s FarmVille players access to its
Farmers-branded Airship, which raised fan base
by more than 100,000 in the first week of the
promotion.
• Ran a Facebook Contest where People could
Enter to Win a Ride on the Farmers Airship, the
Zeppelin Eureka.
• Incorporated Hearsay Social, a social media
platform designed to address compliance needs,
deliver content and provide data analytics; uses
the platform to help 15,000 agents nationwide
maintain their own Facebook pages.
• Launched iClaim which provides an additional
channel to submit claims and communicate with
Farmers.
• Manages active Facebook, LinkedIn and Twitter
Profiles.
Dewey & LeBoeuf LLP | 5
7. State Farm
● Launched a free mobile application, Driver
Feedback, which can turn a cell phone into a
pocket-sized driving coach.
● Held a 6-month ad campaign within the game
Car Town that included branded missions,
virtual item giveaways, and new State Farm-
branded promotions.
● Launched State Farm Go to Bat - Users select
one of the designated charities on State Farm’s
website, then virtually swing. Once a week, for
10 weeks, State Farm will make a donation of
$18,000 to the charity with the highest Go To
Bat game batting average. Also, an individual
winner who goes to bat for the winning charity
will be randomly selected for a trip to Games 3
and 4 of the 2011 World Series.
Dewey & LeBoeuf LLP | 7
8. Progressive
● Launched Snapshot, which plugs into a
car's on-board diagnostic port. Computer
chips collect and store the time of day the
car is operating, as well as speed. The data
are sent to Progressive via wireless
technology, and users can view their results
almost instantly on a website. Drivers can
get discounts of up to 30% in as soon as 30
days.
● Launched mobile application to compare
insurance costs; obtain quotes, make
payments and manage policies; access
insurance information, VINs, policy dates,
insurance coverages, and find nearest
agents and service centers.
● Progressive Flo, a character in
Progressive’s commercials, has a Facebook
Page with approximately 3,000,000 likes.
Dewey & LeBoeuf LLP | 8
9. Allstate
● Launched Digital Locker which makes it easy
to create and manage an inventory of
personal property, so customers will have the
information they need if they ever need to
make a claim.
● Launched Tag In by Allstate which allows
users to send quick messages and GPS
locations to friends.
● Launched Allstate Motor Club, which provides
roadside assistance for users nationwide.
● Launched GoodRide by Allstate – helps users
plan, track and share all rides, maintenance,
and repairs.
● Has its own YouTube channel which includes
a section of information and educational
videos.
Dewey & LeBoeuf LLP | 9
10. Regulators Are Stepping In
● State insurance regulators beginning to address the use of social
media in the insurance industry and treating it as advertising.
– Several state insurance regulators have Facebook pages.
– At least 3 states—Virginia, Massachusetts and New York—have
provided specific guidance that marketing communications through
social media platforms will be considered advertisements.
– At least 6 states—Ohio, New Hampshire, Idaho, Colorado, Arizona, and
California—and the NAIC include electronic communications,
broadcasting, or transmissions within their definitions of advertisement.
– NAIC has a Social Media Working Group, chaired by Keith Nyhan of
New Hampshire Department of Insurance. Draft Working Paper on
Social Media issued on July 29, 2011.
Dewey & LeBoeuf LLP | 10
14. NAIC Released Draft
White Paper on Use of Social Media in Insurance
● The Social Media Working Group’s White Paper, which borrows
heavily from FINRA’s Notice to Members 10-06, has not yet been
adopted by the Market Regulation & Consumer Affairs Committee.
However, it prescribes methods for insurers to comply with
regulatory guidance in their use of social media, and may
foreshadow future regulations.
● The White Paper focused on:
– The use of social media in the business of insurance
– Identifying and providing guidance on actual and potential regulatory
and compliance issues with the use of social media in insurance
Dewey & LeBoeuf LLP | 14
15. Context:
Common Uses of Social Media in the Insurance Sector
Insurers
● Tool to build trust and engagement and convey valuable information for
consumers.
● Means to obtain and verify information during the hiring process.
● Forensic tool to investigate potential fraud in the underwriting and claims process.
● Facilitate claims handling.
● Method of more timely addressing public relations crises.
Producers
● Ability to disseminate information. Can be product info or general public service.
● Tool to access networking opportunities.
● Means to engage customers and build personal brand, provide rapid responses to
questions.
Consumers
● Learn about products and rates, ask questions, rate insurance companies and
producers, and complain about negative experiences with companies/producers.
Dewey & LeBoeuf LLP | 15
16. NAIC White Paper:
When is an Insurer Responsible?
“Generally speaking, if the social
media communications can be
attributed to a carrier, regulators will
do so. Thus, protocols and
procedures should be developed, in
place, and followed regarding social
media usage by independent
agents, as the regulatory emphasis
in regards to social media will be on
the “agency” and not the
“independence”.
Dewey & LeBoeuf LLP | 16
17. White Paper:
When is an Insurer Responsible for Content?
● Insurers will likely be held accountable for social media content posted to or on any of
their own directly sponsored sites, and possibly for their producer’s social media
content.
● An insurer will likely be held accountable for all social media content, with limited
exceptions, posted to/on any of its associated entities’ sponsored sites/spaces
● Static communications are subject to existing advertising, marketing and customer-
relation regulatory frameworks. (Static communications remain posted and visible until
changed by someone with access to do so. Ex. Biographic materials, backgrounds and
wall information.)
● Retention and record keeping requirements do apply to the interactive content on a
social media website controlled by an insurer or one of its associated entities.
● Insurers are not responsible for the interactive content of 3rd party, non-associated
entities’ contributions
● If 3rd party content is attributable to an insurer because the insurer was involved with the
preparation of the content, the insurer will be accountable for the content, per the
“entanglement theory.”
● If 3rd party content is explicitly or implicitly endorsed by the insurer it becomes
attributable to the insurer per the “adoption theory.”
Dewey & LeBoeuf LLP | 17
18. White Paper:
The Many Facets of Compliance
● “As with all forms of communication and interaction between insurance
companies and their associated entities and consumers, the insurance
company must supervise and monitor communication closely in order to
comport with existing regulations.”
● Insurers should adopt comprehensive policies, procedures and controls that
comply with relevant State regulatory guidelines, including:
– Advertising and marketing laws and regulations
– Consumer complaints
– Endorsements of and to individuals and companies
– Privacy Laws – Federal laws including HIPPA, Gramm-Leach-Bliley
(“GLB”), Children’s On-Line Privacy Protection Act (“COPPA”), State
privacy laws such as California’s Insurance Information and Privacy
Protection Act (IIPPA)
– Record Retention Requirements
– Security Breach Notification Statutes
– Supervision, Monitoring and Training
– Suitability Requirements
Dewey & LeBoeuf LLP | 18
19. White Paper:
Regulatory Guidance
● Insurers should restrict producers from engaging in business
communications on unsupervised social media sites.
● Absent policies and procedures to ensure regulatory compliance, producers
should be prohibited from using social media to promote an insurer or its
products.
● Insurers should adopt policies reasonably designed to ensure that
electronic communications or communications attributed to them are
accurate and timely, not misleading.
● With regard to recommendations for specific insurance products, insurers
should ensure that its communications or communications attributable to it
are suitable to all potential recipients. Alternatively, an insurer could prohibit
interactive electronic recommendations for specific products.
Dewey & LeBoeuf LLP | 19
20. White Paper:
Regulatory Guidance (cont’d.)
● An insurer may employ risk-based principles to determine the extent to
which the review of its electronic social media communications is necessary
to properly supervise its business.
– Insurers could adopt procedures that require pre-approval of some or
all interactive electronic social media communications prior to posting.
– Insurers could alternatively review communications post-use.
● Insurers should have record retention policies and procedures for social
media communications, as well as appropriate privacy protections for social
media communications.
● Insurers should train their producers in accordance with their developed
policies and procedures to guide producers’ social media use (or risk
liability for their misuse).
Dewey & LeBoeuf LLP | 20
21. From the States:
Social Media Considered Advertisements/Marketing Material
● In Virginia, advertisement in the context of life insurance and annuities includes
websites and other Internet displays or communications, social media, or
other forms of electronic communications.
● In Massachusetts, marketing or marketing material in the context of health
benefit plans includes “Social media sites including networking sites, blog
postings and smartphone applications created by or for a Carrier, Insurance
Producer or other entity for presentation to or use by the insurance buying
public.”
● The use of a Linked-In profile page or a similar website for the promotion of
insurance, insurers, or insurance agents or brokers constitutes an
advertisement, announcement, or statement under New York Law. OGC
Opinion No. 10-11-07 (dated November 22, 2010).
Dewey & LeBoeuf LLP | 21
22. From the States:
Electronic Communications Considered Advertisements
● Ohio, New Hampshire, Idaho, Colorado mirror the NAIC Model Laws’ definition of
advertisement in the context of accident and health/sickness insurance - an
advertisement shall include printed and published material, . . . web sites and
other internet displays or communications, other forms of electronic
communications, billboards and similar displays. Ohio Admin. Code 390-8-07;
N.H. Code Admin. R. 2601.3; IDAPA 18.01.24 Section 010; 3 CCR 702 Reg. 4-2-3
Section 4.
● In California, in the workers compensation context, advertisements include any
form of communication, in writing, photograph or picture, electronic broadcasting
or transmission. Cal. Code Regs. tit. 8, Section 9820.
● Because insurers’ use of social media will be regulated akin to traditional
insurance marketing or advertising, social media communications must comply
with advertising and marketing laws and regulations, among others. Because
electronic advertising transcends state boundaries, insurers must be aware of
multi-state advertising laws.
Dewey & LeBoeuf LLP | 22
24. More Regulatory Pitfalls
● An insured may attempt to submit a claim or complaint
through an insurer’s Facebook page—insurers should
consider including a disclaimer regarding the proper
reporting of insured claims and a link to the insurer’s
claim form and/or other contact information.
● The use of social media is subject to state insurance
laws that govern unfair trade practices—insurers
should be aware of applicable laws and take great care
to follow their own privacy policies.
● As many states, including California, require that
marketing be conducted in the insurer’s name, if an
insurer is using a Twitter account, compliance
professionals should ensure that the account name
satisfies this requirement.
Dewey & LeBoeuf LLP | 24
25. Romano v. Steelcase:
Are Social Media Postings Discoverable in Personal Injury Cases?
● Injured woman sued furniture company for damages suffered when
she fell off a Steelcase chair
● Steelcase sought her Facebook and MySpace postings to show
that she had an active lifestyle and was not confined to bed as
alleged.
● Court concluded that she had no expectation of privacy as to her
Facebook and MySpace postings.
● “Thus, when Plaintiff created her Facebook and MySpace accounts,
she consented to the fact that her personal information would be
shared with others, notwithstanding her privacy settings. Indeed,
that is the very nature and purpose of these social networking
sites.”
● Same logic should apply in claims litigation, but case law is
evolving.
Dewey & LeBoeuf LLP | 25
26. Practice Pointers: Avoiding Regulatory Pitfalls
● Set clear expectations regarding online privacy when using corporate network
● Establish protocols for monitoring 3rd party posts and use disclosures that
adequately inform users.
● Set policies ensuring that insurers are appropriately identifying, monitoring,
responding to, tracking, and retaining records of complaints communicated
through social media.
● Ensure that personnel communication on behalf of the company is licensed
where necessary. Note that often, if an advertisement constitutes a solicitation
in a particular state then the advertising-insurer must be licensed in said state.
Dewey & LeBoeuf LLP | 26
27. Practice Pointers: Avoiding Regulatory Pitfalls (cont’d)
● Supervise producers and employees to ensure that
– only approved sites are being used;
– that any restrictions regarding use of approved sites are being followed;
– that static advertising is being pre-approved;
– and that only those permitted to use social media are using it; and
– use of social media in investigations is documented
Dewey & LeBoeuf LLP | 27
28. Geolocation Tracking and Telematics
● FTC: Geographic location is sensitive
information
● If a service provider links location to a
specific device of a specific person, provider
must:
– Give notice about how location information
will be used, disclosed and protected,
– State whether the provider will share location
information with third parties and identify
them,
– Advise users how they can terminate the
location-based services, and
– State how long information will be retained
Source: CTIA – The Wireless Association, Best Industry Practices and Guidelines for
providers of location based services
Dewey & LeBoeuf LLP | 28
29. The FTC Speaks:
Privacy by Design – FTC Proposal, December 2010
● Build privacy protections into everyday business practices:
– Provide reasonable security
– Collect only data needed for specific business purpose
– Retain data only as long as needed for that business purpose
– Safely dispose of data no longer needed
– Implement reasonable procedures to promote data accuracy
● Companies should implement and enforce procedurally sound
privacy practices throughout their organizations, including employee
training and conducting privacy review when developing new
products and services on a systemic basis
Dewey & LeBoeuf LLP | 29
30. The FTC Speaks:
FTC Testimonial Guidelines
● Governs endorsements and testimonials in advertising
● No private right of action; may be enforced by FTC under section 5
of the FTC Act
● Advertisers are subject to liability for false or unsubstantiated
statements made through endorsements
● Advertisers subject to liability for failing to disclose material
connections between themselves and endorsers
● Endorsements relating the experience of a customer must disclose
generally expected performance
Dewey & LeBoeuf LLP | 30
32. Managing Change in the Workplace:
Some of Today’s Challenges
● Lack of clear precedent: courts and legislators lag behind while agencies
run ahead
● Social networking: lines between work and life continue to blur
● New communication channels: instant messaging as corporate tool and
texting is not just for teens
● Electronic discovery: the document that would not die
● Workplace privacy: does it exist?
● Anywhere, anytime access: security risk and other challenges of mobile
computing
● The 24/7 workplace and the FLSA
● Control is a remnant of days gone by
● Generational differences affect communication styles
Dewey & LeBoeuf LLP | 32
33. Social Media Policies 1.5
● 85% of financial services professionals under 50
are using social media. Ledermark survey, April
2010
● 45% of their employees don’t have a social media
policy or prohibit its use entirely. Ledermark
survey
● 31% completely prohibit employees from visiting
social networking sites while at work. Robert Half
Technology survey, May 2011
Dewey & LeBoeuf LLP | 33
34. Online Social Networks
● Facebook has over 700 million users
● Approximately 67 million users per day
access Facebook through Android and
iPhone apps.
● Linked in – 120 million plus members
● 110 million tweets are sent daily
● Don’t think your employees are out
there? Think again. Type your
company’s name into the search engine
of any social networking site.
(Source: thenextweb.com/facebook/ 2011/094/23/the-number-
growth-and-evolution-of-the-behemoth-that-is-facebook/)
Dewey & LeBoeuf LLP | 34
35. Getting to Know You:
Using Social Networking in the Hiring Process
● 24% of employers had hired a staff member based on their social
networking profile
● 33% decided not to make job offer to candidate after seeing profile
(photos of drugs/drinking or inappropriate behavior were the most
popular reasons for eliminating candidate)
● 16% of employees changed their web profiles to enhance their
professional images
● 22% of companies check candidates' profiles on
Facebook/MySpace before deciding to hire them (this has doubled
since 2006)
● 9% said they planned to review potential employees' social
networking pages in the future
Source: www.Careerbuilder.com/Article/(B-533)
Dewey & LeBoeuf LLP | 35
36. Getting to Know You:
Risks of Using Social Networking Websites in the Hiring Process
● Risk of making employment decisions based on
inaccurate, irrelevant or false info
● Online social networking profiles often present
personal information that would not properly be
subject to inquiry during the hiring process
● Potential to eliminate applicants based on
protected class status in violation of federal and
state anti-discrimination laws
● Need to balance applicant’s rights with employer’s
need to screen candidates thoroughly
Dewey & LeBoeuf LLP | 36
37. Getting to Know You:
Risks of Using Social Networking Websites in the Hiring Process
● Employers must have procedures for use of online data when
making employment decisions
– Determine when on-line searches will be used in hiring and promotion
process
– Decide whether to inform applicants about on-line searches and
whether to ask for email addresses, user names and blog post
– Comply with FCRA if using third parties to conduct search
– Do not engage in unauthorized access of password protected sites
Dewey & LeBoeuf LLP | 37
38. Are You at Work?
Mobile Technology Blurs the Line Between Home and Work
● By one estimate, 72% of Americans check their
email on weekends and vacations and 42% check
email while home sick.
Source: www.kikabink.com/news/most-workers-addicted-to-email-2-out-of-3-u-
s-and-u-k-workers-check-mail-outside-business-hours/ (citing Harris Interactive
research)
● iPass Mobile Employee Definition: Employee using
a mobile device who accesses networks (other than
corporate LAN or WLAN) for work purposes
● Average mobile worker works 240 hours per year
longer than work force in general
● 43% of mobile workers keep smart phone at arm’s reach when they sleep
● 96% of mobile workers under 45 have smart phones
● 35% of mobile workers check email first thing upon awakening
Source: The iPass Global Mobile Workforce Report, August 2011
www.mobile-workforce-project.ipass.com/cpwp/wp-
content/files_mf/ipass_mobileworkforcereport-q-3_2011.pdf
Dewey & LeBoeuf LLP | 38
39. Yours, Mine and Ours:
A New World of Sharing
How do you use your smartphone?
Source: The iPass Global Mobile Workforce Report, http://
mobile-workforce-project.ipass.com/cpwp/wp-
content/files_mf/ipass_mobileworkforcereport_q3_2011.pdf
Dewey & LeBoeuf LLP | 39
40. Yours, Mine and Ours:
A New World of Sharing (Cont’d)
Do you use your tablet primarily as a personal or work device?
Dewey & LeBoeuf LLP | 40
41. I Owe You What?!
Mobile Devices and Wage and Hour Obligations
● The average professional spends
50 minutes a day sending e-mails
after work
(Source: Cohesive Knowledge Solutions, 2008)
● Companies need to manage risk by:
– Updating policies and handbooks
related to use of personal devices
– Don’t give mobile devices to non-
exempt employees
– Implement policies that restrict non-
exempt workers use of company-
issued devices
FAD Media, Inc.
Dewey & LeBoeuf LLP | 41
43. Living Together:
The Ongoing Employment Relationship
● Decide whether or not to monitor - virtually all employers retain the right to
monitor and address personal use of the employer’s system
● Develop policy on use of personal devices in the workplace
● Put your policies on personal use and privacy rights into clear and unequivocal
language and communicate it to your employees
(Ex. You have no expectation of privacy in connection …)
● If employees can access the employer’s system remotely, require employees
to provide access to remote devices used to access system
● Require employees to provide immediate notice, and consent to remote wipe,
is a mobile device is lost
● FOLLOW YOUR POLICY CONSISTENTLY
● Revise policy as technology evolves
● Don’t make employment decisions turn on trivial matters
Dewey & LeBoeuf LLP | 43
44. FINRA’s Latest Guidance on Dual Use Devices:
Regulatory Notice 11:39, August 2011
● Recordkeeping
● Q1: Does determining whether a communication is subject to the
recordkeeping requirements of SEA Rule 17a-4(b)(4) depend on whether
an associated person uses a personal device or technology to make the
communication?
● A1: SEA Rule 17a-4(b)(4) requires a firm to retain records of
communications that relate to its "business as such."
This analysis does not depend upon the type of device or technology used
to transmit the communication, nor does it depend upon whether it is a firm-
issued or personal device of the individual; rather, the content of the
communication is determinative.
For instance, the requirement would apply if the electronic communication
was received or sent by an associated person through a third-party's
platform or system. A firm's policies and procedures must include training
and education of its associated persons regarding the differences between
business and non-business communications and the measures required to
ensure that any business communication made by associated persons is
retained, retrievable and supervised.
Dewey & LeBoeuf LLP | 44
45. FINRA’s Latest Guidance
Accessing Social Media Sites From Personal Devices
● Q14: May associated persons use personal communication devices and other
equipment, such as a smart phone or tablet computer, to access firm business
applications and perform business activity if the firm employs technology that
enables the firm to keep records and supervise the activity?
● A14: Yes. Firms may permit their associated persons to use any personal
communication device, whether it is owned by the associated person or the
firm, for business communications. Of course, the firm must be able to
retain, retrieve and supervise business communications regardless of
whether they are conducted from a device owned by the firm or by the
associated person.
. . . firms should have the ability to separate business and personal
communications, such as by requiring that the associated persons use a
separately identifiable [secure] application on the device for their business
communications. . . If the firm has the ability to separate business and
personal communications, and has adequate electronic communications
policies and procedures regarding usage, then the firm is not required to
supervise the personal emails made on these devices. Of course, firms
also are free to treat all communications made through the personal
communication device as business communications.
Dewey & LeBoeuf LLP | 45
46. Breaking Up is Hard to Do:
From Dooce to the NLRB
● Dooced: Termination based on a blog posting; see www.dooce.com
(blog of woman who was fired after writing about employer on blog)
● NLRB v. American Medical Response Company, Case No. 34-
CA-12576 (Connecticut, 2011). Employee terminated for criticizing
her supervisor on Facebook in violation of policies. Important case
because it challenged both the firing decision AND the employer’s
policies. Case recently settled.
● NLRB v. Hispanics United of Buffalo (“HUB”), September 2, 2011.
First ruling by an NLRB Administrative Law Judge, ruled that HUB
violated the NLRA when it terminated five employees for criticizing
a sixth co-worker on Facebook
“It is irrelevant to this case that the [Facebook posters] were not trying
to change their working conditions and that they did not communicate
their concerns to HUB”
Dewey & LeBoeuf LLP | 46
47. NLRB Position on Social Media Practices and Policies:
My Workforce Isn’t Unionized. Why Should I Care?
● Portions of the NLRA apply to ALL
private employees.
● Specifically, employers can’t punish
employees for discussing working
conditions or unionization.
● Agency has taken aggressive stance on
terminations as discipline for critical
posts on social media.
● NLRA gives employees the affirmative
right to engage in concerted action for
mutual benefit and protection.
Dewey & LeBoeuf LLP | 47
48. NLRB Acting General Counsel Releases Report
on Social Media Cases: August 18, 2011
● Report provides analysis of 14 cases
involving employer’s social and general
media policies submitted to NLRB’s Division
of Advice.
● Four cases found protected activity where
employees posting on Facebook were
discussing terms and conditions of
employment with fellow employees. Four
other cases found activity was not protected.
● In five cases, Division of Advice found that
some provisions of employers’ social media
policies were unlawfully over-broad.
Dewey & LeBoeuf LLP | 48
49. Breaking Up is Hard to Do:
Insurance is a Competitive Business
● Tell employees that their company issued
electronic devices will be “scrubbed” or
“wiped” in the event of termination and get
written acknowledgement.
● Draft non-solicit and non-competes that
provide that communications to clients on
social networking sites, including but not
limited to Facebook, LinkedIn and Twitter,
will be deemed a solicitation in breach of
covenants.
Dewey & LeBoeuf LLP | 49
50. Breaking Up is Hard to Do
Carol Bartz “Quits” Yahoo Board
On Thursday, Bartz said, in a sassy interview with
Fortune, that she was staying on as a director. “Ms.
Bartz is obligated to resign from the board and we
expect her to do so,” the board’s spokesman said after
the interview was published. She resigned the next
day.
After calling the board members “doofuses” who “f-ked
me over,” we have to imagine any future board
meetings would have gotten just a wee bit awkward.
www.mogulite.com
Dewey & LeBoeuf LLP | 50
51. Genetic Information Nondiscrimination Act of 2008 (GINA)
● Illegal to discriminate against employees or applicants because of genetic
information
● Employers may not use genetic information in making employment
decisions and may not request, require or purchase genetic information
● Any employer that possesses genetic information about an employee must
maintain such information in separate files; and must treat it as a
confidential medical record and may disclose it only under very limited
circumstances
● Prohibition on requesting information defines “request” to include
“conducting an internet search on an individual in a way that is likely to
result in a covered entity obtaining genetic information.” 29 C.F.R. §1635
● Safe harbor for inadvertent acquisition applies where employer
“inadvertently learns genetic information from a social media platform where
he or she was given permission to access by the creator of the profile at
issue (e.g., a supervisor and employee are connected on a social
networking site and the employee provides family medical history on his
page).” 29 C.F.R. §1634
Dewey & LeBoeuf LLP | 51
52. Guidelines for All
● Decide whether to permit/prohibit/limit or encourage blogging using
company resources or time
● Prohibit disclosure of trade secrets or confidential info and violation
of harassment policies
● Direct employees to use disclaimers
– “This post reflects my personal views, not those of the company”
● Be careful about threatening disciplinary action for disparaging
statements; consider NLRA implications
● Have employees execute current confidentiality agreements and
non-disclosure agreements
● Review non-competes to address use of LinkedIn and other social
media sites to evade non-compete and non-solicit obligations
Dewey & LeBoeuf LLP | 52
53. E-Discovery and Privacy
● Sensitive personal information is everywhere…
– Instant messages
– E-mails
– Text messages
– Online registrations
– Social networking
● All of these electronic records could be discoverable in litigation,
and could be monitored by an employer
● Privacy concerns are closely related to document management and
e-discovery
Dewey & LeBoeuf LLP | 53