The Basics of Commercial Crime Insurance
The consequences of any of the above crimes can be financially devastating for companies and lead to severe reputational harm, making crime insurance an essential part of a company’s arsenal. Additionally, the Employee Retirement Income Security Act of 1974 (ERISA) requires any person handling funds of a qualified employee benefit plan to be bonded, a feature that is typically included in a commercial crime policy.
Key Coverage Provisions
Crime coverage can vary by insurer, but policies generally share the following characteristics:
- A typical crime insurance policy is written on a “named perils” basis, which means that a loss must fall within one of the categories of crime specified in the policy to trigger coverage.
- For commercial crime policies, the limit is usually not aggregated, applying separately to each and every loss.
- Although deductibles apply separately to each loss, a series of acts by the same person or same group of persons are deemed a single loss, and thus subject to one limit and one deductible, regardless of how long the theft continues prior to being discovered. In compliance with ERISA, there is no deductible applicable to losses sustained by benefit plans that are required to be bonded by ERISA.
Coverage Trigger
Commercial crime policies provide coverage in two scenarios:
- Under a “loss discovered” form, coverage applies to loss that is discovered during the policy period regardless of when the act/loss took place, which makes these forms preferable.
- Under a “loss sustained” form, coverage applies when a loss is actually sustained.
Discovery of Loss
There are two instances that trigger the discovery of loss:
- When the insured first becomes aware of facts that would cause a reasonable person to assume that a covered loss has occurred, even if all the facts about the loss are not yet known.
- When legal action is taken against the insured alleging acts that fall within the scope of coverage.
Typically, the insured must provide the insurer with written notice as soon as practicable, but no later than 30 to 60 days after discovery occurs. Usually, the insured must provide a proof of loss within four to six months after discovery. Although most insurers are willing to grant extensions for the filing of proof, the burden of proof of coverage for loss rests solely with the insured.
To aid insureds in developing a robust proof of loss, many policies will provide some coverage for their clients to hire forensic accounts or attorneys. Marsh Risk Consulting’s Forensic Accounting and Claims Services Practice can help insureds develop their proof of loss, which could significantly improve a company’s recovery under a crime policy.
If possible, “discovery” should be limited to specific departments (for example, risk management and legal teams) or persons (risk managers or general counsel).
What’s Typically Not Covered?
Although policies can vary, the following are typically not covered by crime insurance:
- Losses caused by employees after the insured has knowledge of a crime committed by that employee.
- Indirect or consequential losses of any nature, such as business interruption or loss of potential income.
- Legal expenses.
- Expenses incurred in compiling a proof of loss, unless claims/investigative expense coverage is included in the policy.
- Data theft, including theft of a company’s data, trade secrets, client lists, or intellectual property.
- Property damage caused by fire.
- Fines and penalties.
- Salaries and bonuses, commissions, fees, and any associated lost income.
- Losses based solely on inventory records.
What Information is Needed to Get a Quotation?
Insureds will need to complete a comprehensive proposal form to help an insurer understand the risks that the business faces. This form will generally require insureds to provide information on:
- Their size, including revenues, number of employees, locations, and geographic spread.
- The industries in which they operate.
- How accessible cash or high-value items are to employees.
- Systems and controls they have in place to prevent losses, including audit and payment request processes.