• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Management of Insurance Business - E-risk insurance policy.

Extracts from this document...


Management of Insurance Business Project on E-risk insurance policy Submitted By: Abhijeet Pawar 402/10 Introduction Few years ago, Internet was a mystery to many people. Now, organizations and individuals alike want to be a part of the Internet. Nearly all Western companies have a presence on the Internet in the form of a Web site. Their site's uniform resource locator (URL - its electronic `address�) is routinely listed alongside their telephone, fax and e-mail numbers. Connected to Internet are the sites of organizations, businesses, and academic institutions. These sites may carry numerous pages of information and regular publications, and files for visitors to download. Some companies - `e-businesses� - now buys and sells products and services exclusively over the web. E-business requires a secure means of transferring financial information such as credit card details. Unfortunately, as with many other technical innovations there are some threats associated with the usage of Internet. Security is an ever-present problem, specifically for business transactions. Web site contents may have legal implications, and the Internet offers opportunities for the virus infestation of both host and client computers. Furthermore, hackers are always trying to find ways to reach the files stored on a Web server. Consumer intention to adopt e-commerce is a behavioral intention to exchange information online, share confidential and monetary information, and engage in product purchases. ...read more.


This risk is particularly high for companies that deal with price and time-sensitive transactions such as security dealing. --Access violations or failure of computer security. --Programming errors in software used to rate, store or transmit transactions. Programming errors in commercial software have created security breaches that allow unapproved access to information stored by financial programs. --Social engineering, or various human activities to misuse trust to obtain access, passwords, services or other unapproved value from a computer system. The exposure level can be calculated by examining the following elements of risk: * Charge-backs - the risk of refunds on merchant account * Forecast turnover figures - higher turnover can generate higher exposure * Average transaction size - if one sells/buys very high value items (diamonds, cars) this will influence the risk analysis of his transaction * Time from payment to order fulfillment - The longer it takes to dispatch goods to a customer, the greater the risk * Length of trading record - a start-up company (with whom the customer is transacting) presents more risk than a well established business * Business sector classification - different sectors have more or less risk associated with them (for example, CDs can be resold but a flight needs the purchaser to turn up in person) Rating factors * Average transaction value: this is the normal size of transactions that go through one's electronic payment system. ...read more.


Items that are covered include: * Third party libel and slander claims due to email or website content * Claims by employees on breaches of confidentiality * Claims for your own losses from damages caused by computer viruses or hack attacks * Legal expenses incurred in the enforcement of your intellectual property rights on the internet David Walsh, managing director of Click for Cover says, "Fifty-six per cent of UK businesses are either not covered by any insurance policy for damage arising from IT security breaches - or do not know whether they are covered." The Stats The average cost of a serious security breach is �30,000 44% have suffered at least one security breach in the last year Only 28% make staff aware of IT security issues Less than 8% of e-businesses have specific e-risk insurance Target group Club Esurance has been designed to be affordable and simple for both SMEs and brokers to use. A number of business types will not be eligible for cover, including application service providers, broadcasters, internet e-marketplaces, domain name registrars, internet portals, internet search engines, internet service providers, internet hosts... the list goes on. The premium to be charged It should be about 25% more than the normal premium given that there will not be too many policy holders giving rise to a higher risk. Profit margin etc Given high usage and low costs along with extra premium the profit margin would be great. ?? ?? ?? ?? E-risk insurance policy Management of Insurance Business 402/10 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. Marked by a teacher

    business online

    4 star(s)

    layout of the images and display wasn't as clear as a PAD or a PC. Other means of shopping online is phone booths, most modern phone booths have access to the internet and customers can do their shopping or check their messages.

  2. There are many ways in which business can be organized

    by using the passed figures the time processing of any information to the stakeholders is being saved by 70%. Quick decision making: - Effective and optimum decision making is based upon the effective supply of write information at the write time, because the information received after passing the time when it is required is useless and obsolete for the management.

  1. Examine the strengths and weaknesses of the business by performing an internal audit on ...

    The factories used to produce all the clothing are in the Czech Republic, and Hungary. The move away from the UK has many implications: Advantages > The cost of land is cheaper in Hungary and Czech Republic than in the UK, as land is of a much wider availability.

  2. Manzana Insurance - Operations Management

    Most importantly, Fruitvale is plagued by a very high turnaround time resulting in late renewals and increased renewal loss rate. The following exhibit chalks out the current process plan followed at Fruitvale REPORT FOR MANAGEMENT COMMITTEE DISCUSSION Observations and Hypotheses 1.

  1. Implementation of ATMS at SBI. Banks in India are looking at deploying biometric ATMs ...

    The safe door has a combination lock. Each joint custodian holds one key or combination. Combination Keys (passwords) are used by the joint custodians and are to be kept in sealed covers, duly recorded in the Branch Documents Register for use in case of emergency due to the absence of any of the joint custodians.

  2. Business Online

    This objective like any other is exceptionally vital because it customer perception that drives purchases and customer loyalty. Extract of Sainsbury's Mission About Customers * To deliver our mission, and restore profitable growth we are focusing on our three bubbles: > outstanding quality and choice in food and then importantly,

  1. The Classification of Sainsburys

    Sainsbury's Supermarkets 778 692 766 732 522 Home base 26 16 55 75 57 Shaw's - 41 38 53 80 Sainsbury's Bank - (6) (15) (5) 3 Sainsbury's Egypt - - - - (11) Other operating activities (1) 2 10 12 16 803 745 854 867 667 Year 2000 costs - - (20)

  2. Infrastructure of E - business

    Furthermore, this approach exhibits a network effect - the greater the proportion of applications that are working together, the more powerful the system as a whole becomes. As the next generation of e-business applications, not only is there a need for integration with back-end systems, but an increasing requirement for Web-based systems for PAL to work together.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work