LBTC Announces New Co-Chairs

LBTC_logo_color

 

We are excited to Announce that The Life Brokerage Technology Committee (LBTC) has elected 3 New Co-Chairs (See complete bios at end of post). The new leadership team brings a vast amount of industry experience to drive LBTC forward in working with its members in solving industry technology pain points and creating process improvement for Life Insurance services. The LBTC new co-chairs will also bring awareness of new innovations to the industry.

 

12345* Pat Wedeking, Vice President of Tellus Brokerage Connections

12345* Marjorie Ma, VP & Head of Product Management of AIG USA Life Insurance

12345* Brian Kirland, Senior Director Sales & Marketing of SuranceBay

 

 

The new co-chairs each represent respectively Distributors, Carriers and Vendors. They will serve a 2-year term. The new co-chairs are supported by the LBTC Steering Committee: Joann Mattson of Highland Capital Brokerage, Jeff Lingenfelter of John Hancock Insurance Company, and Ken Leibow of InsurTech Express. LBTC has 120+ industry members. Please see below on how to join LBTC.

 

The Life Brokerage Technology Committee (LBTC) is an independent working group whose purpose is to exchange information about technology related systems and services related to the marketing, sale, and servicing of insurance in independent distribution channels. Some of LBTC’s past initiatives focused on process improvement and solving technology pain points: Automated-Underwriting, eApp, eDelivery, eSignature, Commission Accounting, and Pending Case Status to name a few. LBTC conducts industry surveys, whitepapers, webinars, media and has a face-to-face meeting at the Annual NAILBA Conference in November. LBTC partners with other industry associations such as NAILBA, ACORD and LIDMA.

 

JOIN LBTC

There is no cost to becoming an LBTC Member. Each person who wants to participate in LBTC in your organization can join. Each person will need to fill out a membership form.  You can join LBTC by downloading the membership form and emailing it to Joann Mattson at jmattson@highland.com. Download LBTC Membership Form: https://lnkd.in/eHhHjfZ

Pat Professional 2012

Pat Wedeking

Pat Wedeking is an industry veteran whose focus has been on process improvement, direct marketing and brokerage business development. Coming from the hospitality business as a PGA apprentice, Pat entered the life insurance business through Northwestern Mutual’s training program.  After 10 years in personal production Pat entered the general agency business with a technology driven brokerage focusing on lead generation a lead relationship management (LRM) system.  This platform served as the foundation of Quick Life which was sold to Crump in 2016.

 

During the growth of the brokerage Pat was the founding President of the Life Insurance Direct Marketing Association known throughout the industry as LIDMA.  This organization focuses on industry technology that improves the process of obtaining insurance and helped usher in the ubiquitous use of electronic payments, signatures and delivery of policies.  Further process improvement initiatives focus on voice signature, data based underwriting and bringing data closer to the point of sale.  After service to LIDMA Pat was elected to the Life Happens board of directors and served as Chairman of that organization in 2017. Since joining Crump Pat has been in business development positions focusing on the use of their transaction center platform and, most recently, with Crump’s IMO division, Tellus Brokerage Connections.  Pat brings energy and a big picture mentality to his endeavors.  He has a wealth of knowledge and industry relationships that will help any organization he serves.

Marjorie Ma photo

Marjorie Ma

Marjorie Ma is the Vice President and Head of Product Management and Market Intelligence, AIG USA Life Insurance. She has over 8 years life insurance experience and is now responsible for Life Insurance Product Development and Management at AIG, including product strategy development and implementation, as well as day-to-day product management across AIG’s broad life product portfolio. She is also leading Market Intelligence Team to collect industry and competitor updates and to provide actionable intelligence to product, pricing, sales, marketing and operation teams.  Marjorie joined AIG in 2012 after obtaining her MBA degree from Rice University and has since worked in the Life Insurance Industry.

 

Brian Kirland 0411181615b

Brian Kirland

Brian J. Kirland received his Economics degree from Saint Mary’s College of California in 1997. He began his career in the financial industry as a Portfolio Manager’s Assistant at NWQ Investment Management. From 1998 until 2014, Brian was a part of a growing technology firm, Xtiva Financial Systems, whose products focused on the Broker-Dealer and Securities industry for Sales compensation. Brian then joined LaserApp Software in 2014, deepening his insurance technology expertise. During his two years with LaserApp, Brian spent his time meeting agency principals and carrier partners helping establish a new business platform for the firm.

 

Brian joined SuranceBay as a National Account Executive in July of 2016 and currently serves as Senior Director of Sales & Marketing and a member of the executive management team. Brian works to increase sales within the distribution channels, carrier partners and vendor integrations for SuranceBay’s flagship product, SureLC™. Since 2009, SuranceBay has been an industry leader in providing innovative licensing and contracting software to independent brokers, agents, and carriers. The recent introduction of complementary tools such as DataLink, SureLC One, Background Screening, and AML training, makes SuranceBay’s SaaS platform a one-stop-shop for over 85% of the independent life insurance agents in the United States. SuranceBay incorporates the assets of more than 600 life insurance carriers with subscriptions from over 800 BGAs, optimizing the workflows of 425,000+ active producers nationwide, and processing over 50,000 monthly contract submissions.

 

Jena Kennedy of LexisNexis on Security and Authentication – iPipeline Pipecast

LNRS_2C_PMS_POS_RGB

.

Consumer security protocols can be daunting, confusing and even downright frustrating. Even the terminology can be bewildering – what’s the difference between verification and authentication? And what is Identity Access Management and why does it matter?

.

Credential stuffing, account takeovers, rat attacks, bots, mules, synthetic identity fraud … it seems that the fraudsters continually evolve their tactics. In this post data-breach world, consumers need to be extra vigilant, just as life carriers do.

.

In this highly informative podcast, Rich Grisham, AVP of Sales and Operations at iPipeline chats with Jena Kennedy, Director for the Life Vertical at LexisNexis Risk Solutions. Jena and Rich share their perspectives on how life carriers can protect their businesses and their customers in this dynamic marketplace.  How can they be sure that they are not only dealing with a real person, but also ensuring that the individual is who they say they are? How can carriers strike the balance between fighting fraud and still providing a great customer experience?

E-Signature Laws Provide Legal Framework For Blockchain

Brian Casey

By Brian Casey

 

Today, there is certainly much hype and hope for successful deployments of distributed ledger, or blockchain, technology especially in the cryptocurrency world. There also seems to be a general perception that there is not a clear, or even an existing legal framework for blockchain transactions, be they commercial or consumer in nature. While there are certainly specific laws that can apply to particular types of blockchain-based transactions, such as federal and state securities laws in the case of cryptocurrency initial coin offerings, many blockchainers may not realize that there is an existing legal framework that readily accommodates a broad base of blockchain transactions; these are state, and in a few cases, the federal, electronic signatures and records laws.

 

Locke Lord blog Sept

These laws apply across many industries, including banking, structured finance, consumer finance, manufacturing and distribution of commercial and consumer goods, but, to make my points concrete, I am going to explain how to apply this framework to an insurance product given my insurance industry focus.

 

The federal electronic signature law, the Electronic Signatures in Global and National Commerce Act,[1] applies only in the three states that have not adopted the model state-based electronic signature law, known as the Uniform Electronic Transactions Act.[2] ESIGN provides for reverse preemption of itself and defers to UETA.[3] Therefore, UETA, which has been adopted in 47 states, is the primary law of the land, which establishes that electronic signatures, formation of electronic contracts, electronic delivery of documents required to be delivered in writing (irrespective of whether they require a signature) and satisfaction of written record retention requirements through electronic records cannot be denied legal effect on the basis of their electronic nature. Therefore, the focus of this article is on UETA and its relationship to blockchain transactions and distributed ledger technology used to create these transactions.

 

Many insurers have relied upon UETA to implement the use of electronic signatures for new insurance policy applications and to satisfy their obligation to deliver insurance policies in written form via electronically delivered insurance policies.

 

To understand why UETA applies to blockchain created transactions, it is important to recognize what types of transactions might be effectuated thereby and the key concepts in and rules established by UETA. Blockchain enabled transactions might include the electronic signature of electronically created contracts, the electronic delivery of documents, the automatic execution of a “smart contract’s” provisions that are triggered when agreed upon third party data, or oracles, enter the blockchain. Blockchains can also serve as the electronic repository for data and records entered into them. The drafters of UETA recognized the concept of a digital asset token in 1999, stating that “[t]he technology has yet to be developed which will allow for the possession of a unique electronic token embodying the rights associated with a negotiable promissory note. Section 16’s concept of control is intended as a substitute for possession.”[4]

 

UETA is intentionally designed to accommodate the advent of future technologies. To be sure, [UETA] has been drafted to permit flexible application consistent with its purpose to validate electronic transactions. [UETA’s] provisions… validating and effectuating the employ of electronic media allow the courts to apply them to new and unforeseen technologies and practices. As time progresses, it is anticipated that what is new and unforeseen today will be commonplace tomorrow. Accordingly, this legislation is intended to set a framework for the validation of media which may be developed in the future and which demonstrate the same qualities as the electronic media contemplated and validated under this Act.[5]

 

User Authentication

Identifying and authenticating electronic signatories is not a new issue or that difficult of a challenge or process. Many businesses using online means for obtaining and receiving electronically signed records from their customers already use customer authentication procedures, such as “shared-secrets” where by a new consumer is authenticated by answering online questions which evoke personal data that would most likely only be known by the consumer (sometimes this data is sourced directly from a consumer report provided by a consumer reporting agency); furthermore, for existing customers, many businesses, especially those in the financial services and insurance industries, customer authentication is a regular business function because of privacy and anti-money laundering compliance obligations. So, the point is that most businesses using e-signature technology already get the authentication issue, and applying that in the blockchain context should be relatively simply.

 

Electronic Signatures

UETA (and ESIGN) provide that electronic contracts and other signed records cannot be denied their legal effectiveness solely because they were created by e-signatures. Thus, to the extent a contract or other document is signed by a user through an (electronic) blockchain, UETA (and ESIGN) step in to support the legality of blockchain effected e-signatures.

 

This article was originally published on June 13, 2018 by Locke Lord as a Law360 article written by Brian Casey. Click the button below to View or Download the Complete Article:

What Every InsurTech Should Know About Privacy and Cybersecurity

by Theodore Augustinos | May 14, 2019 | InsurTech, Privacy/Data Security/Cyber Risk | Bermuda, European Union, Hong Kong, United Kingdom, United States

LL-SQ-RGB-border-c

As an early stage or startup InsurTech, you’re highly focused on all the right things: identifying a challenge for the insurance industry, developing an innovative technical solution, making it practical and scalable, getting it funded, and implementing it. The industry for which InsurTech seeks to develop and deliver solutions is awash, however, in requirements and restrictions related to the collection, use, sharing, and protection of data. What do you need to know about the insurance industry’s privacy and cybersecurity issues that affect your InsurTech solutions?                                                                                                                                                        

Make Privacy and Cybersecurity your Competitive Edge

Insurers, producers and others that are potential sources of funding and potential customers for InsurTech solutions are increasingly focused on privacy and cybersecurity issues. This focus is driven by their developing legal and regulatory environment, and by their interest in mitigating privacy and cybersecurity risk. Your ability to attract interest will only improve if you display awareness of and sensitivity to these issues. Your InsurTech will stand out and enjoy a competitive edge if you have basic answers to the questions any investor or customer will ask about privacy and cybersecurity compliance and risk mitigation. Conversely, your great ideas will be undermined if you give the impression that your solution hasn’t been built with these issues in mind.                                                                                                                                                                                                                                                                                                                                                     

To exploit this potential competitive advantage (and avoid the risk of the uninformed), you may not need to become a privacy and cybersecurity expert, but you do need to have some understanding of the issues that will be of concern to your potential investors and customers.

         

The following are suggestions for turning potential privacy and cybersecurity pitfalls into a competitive advantage.

1. Know what data you collect and process. Privacy and cybersecurity issues are determined by the types of data collected and processed. Make sure you know what your designers and programmers are setting up in terms of types and methods of data collection. Privacy and cybersecurity issues turn on types of data, and you need to have, and to be able to provide, full visibility into your data collection and processing. Companies sometimes collect more data than they intended or knew about, simply because designers and programmers thought additional data sets might be useful someday, or in some future application. Know what data you’re collecting and processing.                                                                                                                                             

2. Appreciate the rules of the road. There is a complex, changing, and increasingly onerous regime of privacy and cybersecurity requirements that affect the customers of InsurTech. Insurers, producers and other users of InsurTech solutions will need to make certain that your solution satisfies these requirements. Assume that any data collected and processed by your solution can be subject to these requirements. You don’t need to be expert in these requirements, but you do need to be aware of them.

 

Basically, depending on what laws and regulations apply, know that information that is identifiable to an individual may be subject to notice, disclosure and other requirements; limits on use and transfer; restrictions on retention; and rights of access, correction, portability and erasure. In some jurisdictions, other types of data including certain commercial data may also be restricted, and data related to military and dual use technologies can also be subject to data export and other restrictions. In addition, InsurTech customers may have contractual obligations or published policies and notices that restrict the collection, use, storage and transfer of certain data. Build your solutions with the understanding that your potential customers may not be able to use them unless they are consistent with these requirements.