A Full Service MGA: Brokerage . Commercial Property & Casualty . Garage Earthquake, Flood and Landslide (D.I.C.) . Personal Lines . Pollution . Storage Tanks Environmental Liability . Professional Lines . Surety Bonds . Transportation
Send us your unique and hard-to-place Commercial Auto risks. We have access to some of the top markets, including an exciting new appointment! }
Public Auto (Incl. Sightseeing Vans)
}
Monoline Cargo
}
Long/Intermediate/Short Haul
}
Rental Operations
}
Household Goods/Movers
}
Unique Classes
}
Mobile Mechanics
}
Simple 1-page quote sheets available at our
}
Service Garage
website to streamline submitting and quoting!
If it has to do with wheels—we can help. Have you tried GUS lately?
Serving over 2,200 agents throughout Washington and Oregon, and a proud supporter of IIABO. Washington 2
P: 800.562.8095
submissions@gogus.com
Oregon P: 866.528.2918
What if everything had the same longevity as a Western National Underwriter?
We’re proud that our underwriters average more than 15 years of serving you and your Western National clients. You can get more done when your underwriter has a long shelf life. The proof is in the partnership. Fall 2012 • The Oregon Agent
3
FALL 2012
IIABO Office 5550 SW Macadam Suite 305 Portland, OR 97239 Phone: 503-274-4000 Fax: 503-274-0062 Toll Free: 866-774-4226
INSIDE THIS ISSUE:
IIABO Staff Directory Executive Vice President Jim Perucca jimp@insureoregon.org
Vice President Marketing & Communications Barb Demings barbd@insureoregon.org Assistant Vice President Education & Finance Tyra Dressel tyra@insureoregon.org
6
Letter from the President
8
IIABO 2012-2013 Leadership
10 “Bring Your Own Device” Opportunities and Risks
Director Agency Products & Services Abby Kahl abbyk@insureoregon.org
14 Negotiating the Sale
IIABO Lobbyist Roger Beyer roger@rwbeyer.com
16 IIABO 84th Annual Convention & Trade Show Photo Recap 18 The Asset Protection Model
For more information on advertising, contact Jim Aitkins Blue Water Publishers 22727 - 161st Avenue SE Monroe, WA 98272 360-805-6474 fax: 360-805-6475 jima@bluewaterpublishers.com
25 2012 Trusted Choice® Big “I” National Golf Championship 26 Agency Strategies to Send & Receive Personal Data Securely
The Oregon Agent is the official magazine of the Independent Insurance Agents and Brokers of Oregon and is published four times yearly. IIABO does not necessarily endorse any of the companies advertising in this publication or the views of its writers.
29 The Reality of Texting for Insurance Agencies
THANK YOU ADVERTISERS: AAA 13
Grange Inc.
5
Preferred Property Program
Agency Software
21
Griffin Underwriting
2
Ron Rothert Insurance Services 15
Astonish Results
31
Hull & Company, Inc.
23
Burns & Wilcox
4
9
Superior Underwriters
15
IES 7
TAPCO 23
Capital Insurance Group
25
Imperial PFS
28
Western National Ins Group
CharityFirst Insurance
11
J. R. Johnson
19
Winery Pak
Cooper Construction Co.
23
Liberty Northwest
32
The Oregon Agent • Fall 2012
21
3 19
5
FROM THE PRESIDENT
I
t is a great honor to be elected to a second consecutive term as IIABO President. One year in the office leaves much yet to understand and to accomplish. Before commenting on the future, I would be remiss if I didn’t reflect on the recent 84th Annual Convention, “GET HIGH WITH THE BIG I”. Jon Schallert’s two workshops were among the very best I have ever attended. They were absolutely packed and brought value to agents, exhibitors and company partners alike. Monday night, the comedy and impressions of Jason Hewlett left all in stitches. He was the perfect entertainment for young and old alike. We are also very excited about the Consumer Agent Portal (CAP). We learned much more about CAP from IIABA National Chairman Mike Donohoe and the CAP team of Paul Banuski and Marty Agather. As always, the IIABO staff did a remarkable job of creating a great program and making it run “effortlessly”.
As to the next year of my term, I am committed to find ways to get younger agents more involved in the association. The IIABO board has discussed this issue and we have been in conversations with several company partners. It is critical that we develop the next generation of producers who will evolve into the owners and managers of the future. Activities will be planned that will help make them better at sales, communications, loss control and management. This is a great business, and we perform services critical to industry and commerce. Our products provide the indemnity and resources to rebuild both property and lives after a loss. We should be proud of what we do and strive to communicate how insurance serves and facilitates commerce. I’m looking forward to the next year. I’d love to hear from you. Tell me how we can build a better association and bring more value to our members. If you would like to get involved please give me a call.
ns
the i G y r a G
Gary Githens Beecher Carlson 541-749-4954
Your association staff: Executive VP Marketing & Communications Education & Finance Products & Services Toll Free Numbers: 6
The Oregon Agent • Fall 2012
Jim Perucca Barb Demings Tyra Dressel Abby Kahl
1-866-77-IIABO or 1-866-774-4226
503-274-0583 503-274-4000 ext. 26 503-274-4000 ext. 31 503-274-4000 ext. 23
jimp@insureoregon.org barbd@insureoregon.org tyra@insureoregon.org abbyk@insureoregon.org
Years
20
.
.
.
.
.
.
.
7
2012 - 2013 IIABO LEADERSHIP Gary Githens President Beecher Carlson Bend
8
Steve Wilson Vice President/Education Chair Ashland Insurance, Inc. Ashland
Tom BeLusko Immediate Past President Waltz, Sheridan, Crawford Forest Grove
Keith Blackerby Board Member Bisnett Insurance, Inc. Lake Oswego
Ed Davis Board Member/Legislative Chair MaPS Insurance Services, LLC Salem
Steve Fitzwalter Board Member Rogers, Fitzwalter & Powell Portland
Trish Fulwiler Board Member J.D. Fulwiler & Co. Portland
Jim Ginger Board Member KPD Insurance, Inc. Springfield
Adam Harris Board Member LaPorte & Associates, Inc. Portland
Bradd Hill Board Member Chet Hill Insurance Portland
Greg Horner Board Member USI Northwest Portland
Debbie Krambeal Board Member CAL/OR Insurance Specialists, Inc. Harbor
Ryan Miller Finance Chair Miller Insurance Tualatin
Matthew Pidcock Board Member Valley Insurance LaGrande
Brett Slater Board Member Slater & Assoc. Insurance, Inc. Tualatin
John Timm Board Member Timmco Insurance, Inc. Portland
Brian Wilbur National Director Pacific Insurance Partners Forest Grove
The Oregon Agent • Fall 2012
PROFESSIONAL LIABILITY COVERAGE IS IN THE DETAILS At Burns & Wilcox, no detail is too small to go unnoticed. To ensure we match your clients with the proper professional liability coverage, we look at every possible scenario. From data privacy to miscellaneous errors and omissions, medical malpractice to architects and engineers, our expertise across a wide breadth of categories makes certain nothing is missed. As an international company, our relationships provide us unlimited access to the broadest range of markets. So if you need to find the right policy in a flash, work with the largest independent wholesale broker – Burns & Wilcox. • Commercial • Brokerage
• Personal • Binding
• Professional • Risk Management Services
San Francisco, California | 415.421.4244 toll free 800.759.4855 | fax 415.421.0620 sanfrancisco.burnsandwilcox.com Reno, Nevada | 775.786.6061 toll free 800.249.0119 | fax 775.786.6041 reno.burnsandwilcox.com Salt Lake City, Utah | 801.432.5422 toll free 800.523.1409 | fax 801.944.4893 saltlakecity.burnsandwilcox.com
Fall 2012 • The Oregon Agent
9
“Bring Your Own Device” Opportunities & Risks
By Danielle Johnson Director of IT, InsurBanc What Is BYOD? Many workers today expect the companies they work for to allow them to use their personal mobile devices and personal computers at the office, and/or to provide remote connectivity to the office via personal devices. Technologists dub this trend “BYOD” (bring your own device). Why is BYOD Important? Mobile devices — along with their applications and on-the-go Internet access — provide attractive options for speed, connectivity and productivity. Many people wouldn’t think of spending their workday without a Blackberry, iPhone, Android, iPad or other device to access company systems and data. Most important, senior managers want to use these devices and are using their organization’s technology more because of them. Many employees see their own personal devices as superior to those provided by their employers. Employees also tend to believe they are more productive if allowed to use their own devices for work and data syncing between office and home.
The opportunities of BYOD are present — and here to stay. As an analogy, home security is more complex for a bigger house with more entrances and windows. So too is systems security more complicated as smartphones and other remote devices present new entry points to be analyzed and protected. 10
The Oregon Agent • Fall 2012
With over 25 years focused on the nonprofit community, it’s easy to see why
we’re the nonprofit insurance experts.
Nonprofit Organizations Religious Organizations Social Service Agencies
At Charity First, we insure nonprofits. In fact, that’s all we do. And we have been doing it since our doors opened in 1985 in San Francisco. Today, our organization insures over 5,000 nonprofit organizations throughout the United States. Combine this experience with our sole focus on the nonprofit community and it’s easy to see why we have become the nonprofit insurance experts.
Find out more at www.CharityFirst.com CHARITY FIRST • 1 Market St., Spear Tower, Suite #200 • San Francisco, CA 94105 • Phone: 800-352-2761 Fall 2012 • The Oregon Agent
11
Thus, BYOD is significant because employee-owned devices are now accessing company systems and being used for work purposes presenting security and privacy concerns to the employer. Employers see the inherent value in a more mobile, more connected and more productive workforce. Many employees and managers have no problem connecting and addressing work issues after hours and/or on the weekends. It can be considered a motivational strategy.
unaware of whether their organizations have strategies or controls to enforce mobile security. Further, it found that only 24 percent of respondents believe that “all devices connecting to my intranet are authorized.” Only 17 percent reported that they monitor for rogue connections.
What Are the Security Risks? BYOD mobility offers access to enterprise data, systems and corporate email. Employees can store and process data and connect to networks. While BYOD may be considered necessary and convenient, this type of connectivity can raise significant data security and privacy concerns which lead to potential legal and liability risks.
Malware is on the move. Malware that targets mobile devices is increasing, reported IBM Security Solutions researchers in a fall 2011 whitepaper. Citing an IBM security research report, the whitepaper presented statistics showing that mobile operating systems vulnerabilities tripled from 60 to a projected 180+ from 2009 to 2011.
Consider: 1. The device gets lost or stolen with access to company data and systems. 2. The device contracts a virus or has malware installed that can obtain company logins and data from that device. 3. The personal device user — however good his/her intentions are — can in effect be circumventing company security standards. 4. The company cannot control the use of the personal device should the employee allow children or friends to use the device. 5. The employee may use the device to place files in personal applications in the cloud which may not be secure. 6. The employee plugs a mobile device into the USB port of his or her office computer thereby transmitting a virus to the office desktop. Here are some facts to consider when trying to balance personal device access with security: Employees don’t perceive the risk. Many employees perceive the use of their own devices at work as placing no extra burden on technical support. But dealing with any data or system security issue requires know-how and technical resources. Executives perceive the risk, but aren’t fully ready. In August of 2011, a Deloitte webcast poll of more than 1,000 U.S. information technology and business executives found that 28 percent of respondents believe there are unauthorized personal digital assistants (PDAs) and/or tablets connecting to company systems, especially to email servers. About 87 percent of respondents think their systems are at risk for a cyber attack originating from a mobile security lapse, the poll reported. The same poll found 40 percent of respondents are 12
The Oregon Agent • Fall 2012
Enterprise systems and mobile systems are catching up with each other. While many corporations have for years allowed Blackberry-based access to email and other company systems, users are now demanding that iPhone/Android-based smartphones and tablet computers be provided access to these same services. How do you proceed once BYOD is determined necessary? Since there are risks to the mingling of personal devices and work systems, companies must take the lead in assessing and managing the risks so as to safeguard their systems and data. Some simple steps include: 1. Institute a strong written BYOD Policy that is consistent with the organization’s Employee Handbook policies such as the IT Policy and Acceptable Use Policy. 2. Determine which data to protect. 3. Define what devices will be supported. 4. Determine which employees need remote access via personal devices. Do not open BYOD participation beyond those employees that have a strong business reason for mobile access. 5. Define security requirements. 6. Train and educate employees concerning policy and BYOD use. 7. Monitor employee mobile devices for compliance with your organization’s policy. 8. Secure employee’s authorization to “wipe” the employee’s mobile device remotely (restore to the original factory state), as a condition of giving access to any of the business’s systems.
9. Place controls over access to and use of the company’s wireless internet. For example: do not broadcast your wireless SSID, restrict access to employees only using MAC address filtering in the router and invoke WPA 2 on the router. Security Solutions 1. If an enterprise is allowing employees to use their own mobile devices, the following security measures should be implemented. 2. Require strong phone startup PIN which is at least 6 – 8 characters long. If not supported, use the maximum allowed. Reduce the PIN required timeout setting to no longer than 10 minutes. 3. Require specified encryption and anti-malware software on each device. 4. Require and install mobile tracking software/applications which allow online access to track the location of a lost/ stolen phone and the ability to perform a lock/scream and/ or remote data wipe. Secure employee’s authorization to take these actions on the device if the device is misplaced, lost or stolen, as a condition to giving the employee access to the business’s systems and data. 5. Do not allow “broken”/”rooted”/“jailbroken” devices on your network. These phones have removed limitations installed on the phone by the carrier allowing the user to run apps and files not approved by carriers. This process opens the device up to security risks. 6. Large enterprises monitoring multiple devices and platforms should consider Mobile Device Management (MDM) software. MDM software centrally controls and protects the data and configuration settings for all mobile devices in the network. MDM can also provide a secure document delivery platform and end to end data transmission encryption. The opportunities of BYOD are present — and here to stay. As an analogy, home security is more complex for a bigger house with more entrances and windows. So too is systems security more complicated as smartphones and other remote devices present new entry points to be analyzed and protected. All of the security tips presented here are simply guidelines to aid agencies in diminishing security and privacy risks and managing them. However, none can be guaranteed 100% effective.
ARE YOU LOOkINg fOR AN AddITIONAL REvENUE SOURCE?
AAA Oregon/Idaho Now Offers Select Independent Agents the Opportunity to Sell AAA Memberships.
Why AAA? Additional Revenue for Your Agency Association with a High Quality Brand Trusted, Long-Term Membership Organization − AAA Oregon/Idaho has been in business since 1905.
Largest Membership Organization in North America − More than 53 million members in North America.
Roadside Assistance Network − AAA has nearly 44,000 vehicles in our North America service network. Most Widely Used Roadside Assistance − AAA membership continues to be the most widely used Roadside Assistance Program (RAP) among U.S. households.
Largest Leisure Travel Agency − AAA Travel is the largest Leisure Travel Agency in the U.S.
AAA Member Exclusive Savings − Members saved over $2 billion by taking advantage of AAA discounts including those available through the Show Your Card & Save® program. To find out how to earn extra revenue selling AAA Membership, through your agency call us at 503-597-5824. Learn more about AAA Oregon/Idaho and the benefits of AAA membership by visiting AAA.com. *This program is only available to Independent Agents residing within the AAA Oregon/Idaho coverage area, which includes Oregon and the Southern 34 counties of Idaho.
Danielle Johnson is the VP, Director of Information Technology at InsurBanc, which IIABA and the W.R. Berkley Corporation established to assist independent agencies with their specific banking needs. This article reflects the views of the author and should not be construed as an official statement by ACT.
Fall 2012 • The Oregon Agent
13
Negotiating the Sale For many years we have criticized the common practice of price quoting as the insurance agent’s primary sales method. Price is certainly important. But it’s rarely the only issue facing insurance customers and, while it is the easiest issue to address, there are often more important triggers to buying decisions than price. This article discusses means to negotiate the sale other than price.
By Al Diamond
A
sale is made at the conclusion of a successful negotiation. Buying a car is also a negotiation. Deciding with your spouse on vacation plans is also a negotiation. As a matter a fact, everything we do in life is done through negotiations. More importantly, everything that you want is in the control of others. In order to fulfill your wants or needs, you must somehow get other people to accept or modify your desires. The critical elements in every sale negotiation are: (1) the time element, (2) the knowledge (or information) element, and (3) the power element. Besides these three elements, the key to a successful sale is the meshing of the personality types of the buyer and seller. You may have the best product in the world at the lowest price but, if the buyer hates you or if you dislike the buyer, you probably won’t make the sale. In the sales process, the customer will normally try to exert his POWER, require you to work under his TIME constraints, and LIMIT the information to the minimum required in order to accomplish his goal. Your goal, on the other hand, is to gain as much information about the client as possible, assure yourself sufficient time to go the job done comfortably and professionally, and to balance the power between you and the buyer so that you both treat each other as professionals in a “win/win” scenario. In order to achieve a win/win scenario, you must never permit your negotiations to narrow to just one issue (i.e., price). Of course, cost is always a prime consideration of every insurance buying customer. However, the chances are that he/she has not gone to market solely because of the cost. Your job is to uncover the other issues that have caused the buyer to seek or accept alternative proposals. Some buyers are actually looking for you to hit their “hot buttons” without them bringing them up. However unless we have crystal balls or extremely good luck, we are better off delving to uncover all potential issues before proposing solutions. The second requirement of a win/win scenario is your understanding that different customers want different things. Too many insurance sales people have a single sales methodology that they try to fit in every situation. You must change your sales scenarios to fit the personality of the customer. Finally, price is important, but not all-important...if you accept the premise that the only thing a customer is looking for is price, then we don’t need a salesman do we?! All we need to do is offer a quote machine like many term life
14
The Oregon Agent • Fall 2012
insurance agents have done recently. The three stages of negotiating a sale are: 1. Understanding your prospect’s desires. 2. Gathering sufficient information to respond to the customer’s need. 3. Solving the customer’s problem in a way comfortable to him. Understanding Your Prospect. Learning your prospect’s desires involves asking open ended questions and keeping your mouth shut -- listen to your customer. Believe it or not, the customer will tell you all of his problems and their solutions if you ask properly and listen rather than speak. Your goal in this section of the negotiation is simply to find out what he wants until you are satisfied that you now understand all of his desires (not just the most important one). Gathering Sufficient Information. Many of us gather insurance data mechanically. The use of survey forms is a good idea but should only be the jumping off place, not the “Bible” of information. In the search for information you should think like an underwriter. If you have not gathered sufficient data to make an underwriter comfortable with the risk and the pricing, gather more data. Open ended questions work well here to identify what the incumbent and any competition has suggested as solutions to the customers problems. Write a lot, speak a little. Solving the Problem. The final part of the negotiation is the delivery of your offer of solutions to the customer’s problems. The information that you have gathered should give you sufficient data to formulate a proposal and quote. However, the information that you have written about your customer’s desires (not his needs) should give you all of the ammunition you need to formulate your proposal in a user-friendly way to respond to your customer’s personal desires in a way acceptable to him. If you follow these rules of negotiating a sale, and do so diligently, you will find your hit rate rising, and your retention rate based on a relationship that you build with your customers, rather than on price alone. Copyright 1996-2011 by Agency Consulting Group, Inc. Used with permission.
Fall 2012 • The Oregon Agent
15
IIABO 84th Annual Convention & Trade Show Sunriver Resort, Sunriver, OR August 26 – August 28, 2012
“GET HIGH WITH THE BIG ‘I’”
Keith Blackerby; and Adam Harris
“I was curious how the event would turn out without CE. Very pleasantly surprised! Jon Schallert is an excellent speaker and the information was great! He made being creative sound “doable”!” Pat Morrill, SAIF Corporation
Tyra Dressel; Sheryl Holland; and Jim Perucca
“Very impressed with this great group of agents and the IIABO organization. Feels good to see a group of professionals getting together and doing some forward thinking for their industry, instead of sitting around just waiting and hoping for a shift in the market. Keep up the good work!” Darren Eversole Indemnity Excess & Surplus Agency
Monday Banquet “I just opened my agency and found the information I gained at the conference to be invaluable. I was able to gather information in just one day that normally takes weeks.” Linda Dugan Linda Dugan Insurance
Mike Donohoe, Chairman IIABA “I was very impressed with the content of the classes and how well attended the convention was. I will most certainly be back next year. I felt it was a good investment of time and money. ” Jason Jordan, Ross & Associates Insurance Services, Inc.
“Great marketing and networking event….and, I learned a lot!” John Cowdrey, JC4 Incorporated
John Schallert Workshop
Sunday Balloon Fest Party “Year after year, the staff of the IIABO continue to do an outstanding job showing appreciation to sponsors and exhibitors!” Cindy Brunner, Imperial PFS 16
The Oregon Agent • Fall 2012
Sunday Balloon Fest Party
Ann & John Timm; and Barb Casey
Adam & Emily Rothert; and Jan & Mark Rothert
Barb Demings; Jim Perucca; and Tyra Dressel
Brian Pargeter; Jim & Pat Ginger; and Penny Pargeter “This conference is one of the most cost-effective opportunities we have to take the pulse of what’s happening for independent agents and the companies and vendors that serve them. And it’s a lot of fun!.” Charles Anderson, MULTICO
Sunday Balloon Fest Party Frank Lemma; Neen & Steve Fitzwater; and Ed Davis
“Anyone who missed the IIABO convention presentations by Jon Schallert has a lot of catching up to do. Those of us who stayed indoors at Sunriver have a leg up on our competitors and are already transforming our agencies into destination businesses.” John Timm, Timmco Insurance
“The convention is a great opportunity to experience face to face conversations with many individuals and companies associated with our industry.!” Jim Ruiz, Miller Insurance
Exhibit Hall
IES - Jeremy Reedal; and Darren Eversole
Out to Pasture Sanctuary Raffle
Rick & Diane Holland
“If you’re an agency owner concerned about the future, legislative issues, growth of the independent agency system as well as your agency, you don’t want to miss an IIABO convention!” John Forsyth Field Waldo Insurance, Inc. Lance & Jacki Adams; and Chris Greig Fall 2012 • The Oregon Agent
17
Asset Protection
The
Model
The Asset Protection Model (APM) is a radical change in agency operations and relationships with both current and prospective clients. It converts agencies from price-driven quote machines always trying to ‘get it cheaper’ as a method of gaining clients to relationship-driven businesses becoming true consultants to their clients, whether the APM agency writes the insurance account or not. By Al Diamond
W
e experienced a huge “surge” of contacts after our recent “DO YOU WANT FRIES WITH THAT” article discussing the cross-selling aspect of the Asset Protection Model. Both e-mails and calls requested more information about the APM and how it works. Of course, APM agencies have already put these principals into action and are converting new clients at a rate that they never imagined before. But so many agents still don’t know the concept that we decided to release our FAQ (Frequently Asked Questions) to provide the thousands of readers a fuller insight into our Relationship Selling Model that acquires clients instead of selling insurance.
18
The Oregon Agent • Fall 2012
PRELUDE What We SAY Is Not What They Hear!! – “Fugedaboudid” Does Not Mean, “Forget About It!” When we “preach” relationship-driven instead of price-driven client acquisitions many agents hear us say that price should not be important or relevant to a client. WE KNOW THAT ALL CLIENTS ARE CONCERNED WITH PRICE AND, FOR MANY, IT IS THEIR PRIMARY CONCERN!! We (you and I) are like that, too! We don’t like to overpay for anything and we seek price breaks without giving up quality in all of the products and services that we purchase. However, for whatever reasons (there are thousands), we do not buy the least expensive cars, clothes, or food. Other
WITH JUST ONE CALL YOU CAN WRITE THEM ALL.
888-386-5701 With customized programs from one market covering wineries, distilleries, breweries and wine and liquor stores, opportunities abound. Check out the one exceptional source for all of your specialty program needs by visiting www.PakPrograms.com
Your business. Our specialty. UNDERWRITTEN BY MEMBER COMPANIES OF GREAT AMERICAN INSURANCE GROUP.
Fall 2012 • The Oregon Agent
19
things enter into our buying decisions regarding those things prospective clients. It converts agencies from price-driven that we feel are important in our lives. I have never heard a quote machines always trying to ‘get it cheaper’ as a method friend boasting about going of gaining clients to to the cheapest surgeon to relationship driven have his procedure done, have businesses becoming Our study of insurance agencies over the last 30 you?? true consultants to the years has proven that the greatest relationship Why, then, do agents beclients, whether the builders have the most loyal clients and that those lieve that price is the only conAPM agency writes clients will stay with the agent even if the price is sideration in clients’ insurance the insurance account a little higher than that of the competition. These buying decision? Because it or not. are the clients that may use other agents who offer is a convenient excuse for not quotes, but will go back to where their loyalty lies controlling a client relationHow Is the APM ship!! If price is the ONLY Different from the to get their insurance coverage. These are the consideration, then we cannot traditional agency? clients that we want for our own agency/clients. blame our lack of relationship The APM will (lack of value added services make you differthat make our relationship ent than most of the with a client strong) for clients leaving us for our competitor. If other agencies (and direct writers) in the U.S. The most visible price is the ONLY consideration, it supports our efforts to quote change is the elimination of quoting. Agents who claim that everything with everyone every year seeking the lowest price price is the only objective of the insurance customer are not (and assuming that the lowest price will win). candidates for the APM. The next most prevalent change is the Our study of insurance agencies over the last 30 years has increased level of activity and dedication of producers. Every proven that the greatest relationship builders have the most producer must be dedicated to establishing and maintaining loyal clients and that those clients will stay with the agent even relationships with clients and prospects. Successes are defined if the price is a little higher than that of the competition. These by the conduct (and resultant documentation) of sales calls with are the clients that may use other agents who offer quotes, prospects and clients, each delivering value-added services but will go back to where their loyalty lies to get their insurmost of which are not even available from competitor agencies. ance coverage. These are the clients that we want for our own Ten to twenty sales calls each week is not unusual for APM agency/clients. producers. Clients and prospects are visited at least four times So we developed a Relationship Selling process that aceach year (or as often as they desire agency services). Producknowledges that most insurance products are generic, that pricers do NOT service or market accounts --- they are dedicated ing is transitory (sometimes a little higher, sometimes a little to relationship building and maintenance (the strength of most lower than competitors) and that the most important things that good producers). an agency can bring to its clients are a combination of professional attention to insurance programs and other value-added Is the APM a Quick Fix to my production problems? services that other agents can’t provide. NO, the APM is NOT the magic bullet that will give you Our Asset Protection Model also recognizes that commerimmediate results – it takes training, hard work and commitcial exposure is only one (and sometimes not the greatest) of ment. If you have “RIP” (Retired In Place) producers, they will the client’s assets that need protection. Others, while, perhaps not easily convert to a results-based, activity-required system not as important or generating as much premium, are as critical like the APM. to the client as their commercial protection. We all have a faLike any behavior modification (i.e. changing eating habits vorite story about the crisis reaction of an important client to an for life to reduce weight and mass), APM changes that are made uninsured (or underinsured) loss of relatively minor proportion slowly and in a disciplined manner will last while changes that (compared to the value of his business). So a part of the APM are made fast will fail. The measuring stick of success of the is the mandatory review of every insurable (and many uninsurAPM is the number of sales calls that are made weekly and the able) client assets. development of relationships from those sales calls (as documented by Call Reports and the enriched Prospect and CusFREQUENTLY ASKED QUESTIONS tomer Relationship Data Bank). Whether used for one producer What Is It? or for an entire agency, the extraordinary success of the APM The Asset Protection Model (APM) is a radical change will not be fully reflected for as much as three years (although in agency operations and relationships with both current and client conversions will be made during the first year, as well). 20
The Oregon Agent • Fall 2012
June 2011
We See a Bright Future More options await you with Preferred Property Program’s umbrella policies Our umbrella programs are designed to offer the most comprehensive coverage so the future is never in doubt. Our umbrella liability policies are written by XL Insurance, with Chubb Insurance Group for the excess layer, featuring flexible, broad coverage that includes: • $5 to $25 Million in umbrella coverage with up to $50 Million in total limits. • Hi-Rise apartments up to 35 stories eligible, with higher eligible by referral. • Excess of D&O, General Liability, Auto, Employers Liability, Employee Benefits and more. • Developer-sponsored boards eligible.
Contact us for a quote:
888.548.2465 A subsidiary of
JGS
info@umbrellaprogram.com www.umbrellaprogram.com
®
Service is our specialty; protecting you is our mission ®
960 Holmdel Road, Holmdel, NJ 07733 XL Insurance is the global brand used by XL Group plc's insurance companies. Preferred Property Program’s XL policies are underwritten by Greenwich Insurance Company.
INSURANCE
Scalable Insurance Software Solutions Agency Software Inc has software solutions designed to match virtually any sized agency and any budget
Come visit us at www.agencysoftware.com See if EasyApps, EZAgent, or AgencyPro are a right fit for your agency Your Local Insurance Software Solution since 1988
215 W Commerce Dr, Hayden, ID 83835
800-342-7327
Fall 2012 • The Oregon Agent
21
The agency must stand ready to support its producers (if they are doing the right things consistently) for that period of time before the steady flow of successes become prevalent. THE ASSET PROTECTION MODEL AND RELATIONSHIP SELLING Relationship Selling is a misnomer. The word “selling” should not be in the title. A better title would be Relationship Acquisitions defining how the agency is to acquire new clients through the evolution of strong relationships until the client, himself, insists that the agency become his representative for insurance programs. We already know that agencies’ best customers are ones with whom the owner (or producer) has developed strong business relationships. Every agent tells us of clients who trust the agency so much that they don’t go “shopping” for insurance every year. They simply count on their insurance professional to do the “right” job for the client. Unfortunately, most clients don’t fall into that category of “strong relationships”. The rest of the clients have chosen the agency because they brought them a better price for the insurance product. And, unless a relationship is built after the sale, they tend to shop and potentially leave the agency when a still better priced product becomes available. The APM avoids the purely price-driven client in favor of the clients (of other agents) who are very loyal and resist any other agent (including our own) competing with their insurance agents. The APM promises to deliver value added services including analysis of all insurance risk to assets, but to neither quote nor accept the prospect as a client until the clients understands the difference between the incumbent and the APM agency. The APM training teaches producers how to establish relationship and avoid price-competition. Simultaneously, it teaches service staff how to support relationships by word and deed, no longer acting as highly paid message takers for the producers and owners. The APM rewards the producers with strong commissions. But it also rewards service and administrative staff with incentive compensation built on their assumption of full control of the service load for their book of business. THE ASSET PROTECTION MODEL AND CROSS-ANALYSIS OF ALL INSURABLE RISK When we train APM to producers and to agency staff we stress that the goal of the agency is to MAKE SURE THAT THE CLI22
The Oregon Agent • Fall 2012
ENT’S ASSETS ARE PROTECTED, not to sell them insurance. Once you allay the client’s suspicion of your analysis (by assuring them that you will neither quote nor write the client’s insurance account unless the client asks you to become their agent) the client is much more open to the analysis and you can praise good insurance programs as well as critique coverage issues. Of course, you actually have to mean what you say – don’t quote their insurance. If you reverse yourself, then they consider you “just another insurance agent trying to sell me something”. Asset Protection is not a matter of one line of insurance. So, regardless of the results of your initial analysis, if you’ve properly explained the uniqueness of APM and your agency, you will establish a follow-up appointment to review the next form of asset evaluation (personal lines, long term care, life insurance, health insurance….) with yourself or with the most logical person in the agency to accomplish this. The second evaluation is followed by as many as needed to assure you that you have reviewed, analyzed and made recommendations for all of the client’s insurable assets. If the client refuses, that’s fine. You’ve made the attempt and you so note in your file. But you will continue to offer because without full access to all assets for review YOU CAN’T PERFORM THE EXPANDED VALUE-ADDED SERVICE OF AN APM AGENT for that client.
17448 Tapco Ad- Oregon Fall 2012.pdf
1
8/30/12
8:45 AM
Tree Trimmers Coverage in a five-minute phone call.
Call. Quote. Bind. Using TAPCO’s courteous and prompt call center, Tree Trimmers coverage can be quoted, bound and delivered to your e-mail inbox quickly and accurately during one five-minute phone call. CGL Coverage Available: • Primary limits up to $3 million Occurrence/Aggregate • Additional Interests—$100 each Blanket Additional Insured option available • Excess or Umbrella limits up to $5 million • Errors and Omissions Coverage Part • Available Coverages: ■ Medical Payments—$5,000 limit ■ Pesticide/Herbicide Applicator Coverage—Policy Limits ■ In-Transit Pollution Coverage— $25,000 occurrence/$100,000 aggregate ■ Property Damage Extension (Care, Custody, Control)— $5,000/$25,000 limits (optional higher limits available) • $1,000 minimum deductible required • Loss prevention brochure available Inland Marine Contractors Equipment: • Scheduled Equipment • Miscellaneous Tools • All risk coverage available * Available coverages and markets may vary dependent upon risk characteristics.
The TAPCO Service Pledge • “A”-rated non-admitted carrier • Competitive pricing • Fast policy turnaround • In-house financing available
• $10 credit to your personalized TAPCO EZ Bucks Visa debit card with each policy • Visa, MasterCard and ACH payments accepted
• Quick claims handling
1,000 Strong
More than 1,000 classes of P&C business written under binding authority.
877-TAPCO-99
(877-827-2699) www.gotapco.com
Fall 2012 • The Oregon Agent
23
THE ASSET PROTECTION MODEL AND ANALYSIS OF NON-INSURABLE RISK As insurance agents, we have naturally become fixated on “insurable” risks. However, many clients have un-insurable risks to their assets associated with their businesses or with their personal life. While we do not make a fee or commission for identifying and assisting in the protection against uninsurable risks, it is a class of risk that needs to be addressed and, in most cases, is woefully lacking among most business owners. For instance government regulation requires adherence to federal standards for business owners. Most small business owners either aren’t aware of the regulations at all or know what acronyms like FMLA, FLSA, EEOC, ADA and IRCA stand for but don’t know how to adhere to them. APM agents are taught the details of these important regulations to the employers and can audit and correct manuals and procedures to help clients avoid a myriad of fines and penalties from the government and lawsuits from unhappy employees. Other loss control, employee benefits and safety modules exist to further add value to your association with client companies. THE ASSET PROTECTION MODEL AND PRODUCER TRAINING Even our best producers have grown up in our industry as price-quoters. “Let us give you a quote” is a great incentive for the prospect to interact with the agency, but in most cases (average agency hit rate on quotes is now 12%) a very poor way of spending agency time and money. The APM concentrates on re-training producers into ways of establishing and strengthening relationships without EVER talking about quoting and, in fact, refusing to write a prospects insurance until and unless the client desires the agency to be their insurance consultant for all lines. Even if the customer thinks he’s doing us a favor by allowing us to write one line, he is diminishing our position as his APM consultant if we become “another” of his agents. Similarly, we refuse to quote one or a few carriers against other agents because it brings us down to their level of competition. We would rather evaluate those proposals and counsel the client toward the best of the group. In that way we become the “trusted advisor” and will eventually acquire all of the client’s insurance program. THE ASSET PROTECTION MODEL AND PRODUCER COMPENSATION Producers continue to be compensated based on the revenue base for which they are responsible. The APM only works if the result is strong enough relationships to assume permanent control of client’s insurance programs. However, a producer’s compensation in the APM model is more stable (a monthly compensation based on the commission size of the producer’s book of business in the last year) and is sensitive to growth 24
The Oregon Agent • Fall 2012
(providing bonuses during the year in which sales are made) and level of sales call activity. Sales Call Activity as a baseline for compensation is unique to the APM and assumes that if relationships are created and strengthened through visits several times each year, that the results will be new clients from those relationships as they mature. Every relationship matures in its own time. We know it is “ripe” when it ‘falls from the tree’ – the prospect asks us to become his agent. If we try to pick the fruit before it’s ripe it will not provide the taste and nutrients we expect and there’s no way to re-hang the fruit on the tree. So we continue to build the relationships and document the growth until it ripens on its own. The APM has a unique feature that is a Self-Terminating Producer Agreement if a producer does not follow through with the relationship building as directed. A relationship not pursued will quickly spoil and be useless. It must be pursued and nurtured at least four times each year to mature properly. If the activity levels are not maintained, the producer acknowledges that he is less likely to convert that client and will find his monthly compensation reduced. He can certainly regain his compensation position by a resurgence of contacts (we are not interested in reducing compensation unnecessarily). This compensation adjustment is in recognition that only the producer, himself/ herself can motivate themselves to be active. If they are not active enough to mature the prospects into clients, they should not expect to be paid based on the expectation of a high percentage of conversions. THE ASSET PROTECTION MODEL AND PRODUCER MANAGEMENT Producers are not to be treated like children, having to account for every moment of the day. Their activity reports will tell the agency how effectively he has spent his time. Every sales call must generate a Call Report that is used simultaneously as a tickler for future events for that prospect and to build the prospect file with intelligence about the account. Producer compensation is dependent upon the delivery of Call Reports on every physical sales call and a Monthly Activity Report that will determine whether the sales call volume is sufficient to justify his salary or draw. A Warboard is developed for each producer listing all developing relationships and where each stands in terms of services provided to show them our added value as an agent. Copyright 2007 by Agency Consulting Group, Inc. Used with permission.
2012 Trusted Choice Big “I” National Golf Championship
T
he 44th Annual Trusted Choice® Big “I” National Championship, presented by Texas Mutual, took place at the University of Texas Golf Club the first week of August and is renowned as the nation’s largest junior stroke-play golf tournament. This year’s field featured top junior golfers, ages 13-18, from 38 states who advanced from qualifying tournaments held around the nation. The boys played to a par 71 at 7,031 yards and a course rating of 75.0. The girls played at 6,098 yards with a par of 72 and a course rating of 76.3. Previous participants have included Tiger Woods, Phil Mickelson, Webb Simpson, Jonathan Byrd, Hunter Mahan, Kevin Na, Cristie Kerr, Cheyenne Woods and Grace Park. This year, Oregon saw two boys and one girl qualify to go back to the National Tournament in Austin, Texas, Daniel Badaracco from Clackamas, Ethan Zickel from Hillsboro and Abby Brennan from Eugene. They all had such an amazing time with their host families, great competition and created new friendships from other players across the country. We would like to thank our four corporate sponsors for their continued support through the years; Liberty NW, Safeco Insurance, Capital Insurance Group and Mutual of Enumclaw. Without their help, we would be unable to support our champions at the national tournament each year. Please thank your local representative from each of these companies when you visit with them again. The 45th Annual Trusted Choice Big “I” National Championship will take place at the Country Club of North Carolina the first week in August of 2013. If you would like to learn more about this great event, go to www.bigigolf.com. Mike Eves Committee Chair, IIABA Trusted Choice Big “I” Junior Golf Classic Unified Insurance Group, Corvallis, OR
Fall 2012 • The Oregon Agent
25
Agency Strategies to Send & Receive Personal Data Securely Agents are being increasingly asked by their E&O underwriters whether they encrypt their clients’ personal data when it is being transmitted. This article provides recommendations with regard to two major areas agencies need to address – secure email and securing their websites when personal data is requested. The article also discusses “encryption” and major types of “personal data” that are the subject of the various laws. Finally, the article outlines the type of resources that are available on the ACT website to help agencies address the email and website issues, as well as to develop and implement a comprehensive agency information security policy and program for their agency.
By Jeff Yates
T
he Internet and mobility revolutions have enabled agents and their clients to live in an electronic world where the parties can work and communicate with each other from anywhere, opening up wonderful new opportunities for agencies to reach out to new consumers and provide their clients with enhanced services and responsiveness. These developments, however, have multiplied the security risks that agencies must manage in order to protect their clients’ personal data. It is no wonder then that E&O underwriters extending coverage for data breach to agencies increasingly are asking their applicants whether they encrypt or use other protective measures to safeguard this client personal data when it is being transmitted. This article explores approaches agencies can take to protect personal data in transit and then references a number of resources to assist agencies. Encryption A common question agents ask is: “what is encryption?” When you think of encryption consider those codes the military employs to keep conversations unintelligible to the enemy. You can find many definitions of encryption on the Internet, but I like this simple one from Microsoft: Encryption is a way to enhance the security of a message or file by scrambling the contents so that it can be read only by someone who has the right encryption key to unscramble
26
The Oregon Agent • Fall 2012
it. For example, if you purchase something from a website, the information for the transaction (such as your address, phone number, and credit card number) is usually encrypted to help keep it safe. Use encryption when you want a strong level of protection for your information. Requiring a strong password to gain access to your system is an important security procedure, but it is not the same as encrypting the data within the system. Personal Data What are the types of “personal data” that are most sensitive and need to be encrypted when transmitted? The definition of “personal data” can vary by state and is contained in the state data breach notification and privacy laws, as well as in various federal laws, such as HIPAA (PHI – Protected Health Information). Insurers, too, might employ various definitions of “personal data” in their policies, so it is incumbent upon the agency to be familiar with not only the specific laws but also the coverage definitions that apply to the agency. Note also that the applicable state law is based upon the residency of the individual whose personal data is being protected, not the location of the agency. This is an important consideration for both agencies writing business in multiple states and agencies writing policies that cover individuals who reside in multiple states. With all of the above caveats, the most commonly mentioned types of non-public, individually identifiable
“personal data” covered in the laws are those such as: social security numbers, driver’s license numbers and other government issued ids, debit and credit card numbers and pins, bank and financial account numbers, and protected health information (PHI under HIPAA). While often not mentioned in state laws, other particularly sensitive personal data that should be protected includes information commonly used for security verification (mother’s maiden name, date & place of birth, etc.) or sensitive insurance information (such as jewelry schedules). It is important for agencies to know what types of personal information they collect, where it is retained and who has access to it. They then need to decide whether they really need to keep this sensitive information. For example, many agencies no longer retain copies of bank checks and are careful only to pass along credit card numbers to carriers, but not to retain them, so that they do not become subject to the comprehensive PCI (Payment Card Industry) compliance requirements. These agencies are also extremely careful to shred this personal data as soon as it is no longer needed. Further, if the agency decides it must keep particular sensitive personal data, it should limit access to it to only those employees who need to see it, to maximum extent possible. This is particularly true for Protected Health Information. Finally, the agency should be careful to make sure that this personal data is kept off of PCs, mobile devices, thumb drives, where there is a significant risk of loss or theft.
carrier underwriter does not have to go to a proprietary website to pick up each email (which many underwriters will not do and is inefficient for agency employees to do). TLS is a great solution for business partners where there are frequent email communications going back and forth. Many agencies can implement TLS if they have email servers or hosted solutions that offer TLS. We recommend that the initial TLS set up be handled by the agency’s technology person, who should also verify that the TLS is working properly with each carrier and general agent. You will find a number of resources that explain TLS secure email more thoroughly on the ACT website (see “ACT Resources” below), including a list of carriers which have advised us that they have TLS available. Unfortunately, most agency clients will not have TLS capability and therefore, TLS is not a solution for communications with them. This will require the agency to implement a proprietary email solution as well for these clients. When the agent sends a secure email to the client using one of these proprietary solutions, the client accesses it on the email vendor’s secure website. The secure email tool also enables the client to send a secure email back to the agent, which is very helpful when the client is being asked to complete a D&O application, for example. Fortunately, there are a number of vendors which can help agencies with both TLS hosted emails and proprietary emails, as well as to provide many other useful tools. (Two examples of such vendors are AppRiver and RPost.)
PCs & Mobile Devices Users of PCs and mobile devices should be trained to remove any emails with personal data that may be received on these devices, as soon as they are read. In addition, the agency should audit to make sure any PCs and mobile devices that can access agency applications are password protected. Further, the agency should implement software that can wipe all of the data off of these devices should they be lost or stolen, restoring them to their original manufacturer’s state.
Real Time Today email is used heavily to convey applications and other information between agencies and carriers and general agents, particularly in commercial lines. It is important to note, however, that Real Time offers a more efficient and secure method to handle these communications, where the communications are automatically encrypted and kept within the agency’s and carrier’s management systems. Agencies are heavily using Real Time for personal lines and we need to increase the usage in commercial lines. Many agencies and carriers are already using Real Time to submit commercial lines applications and make quote requests for small commercial business, and some have started to use their realtime functionality to make mid-commercial submissions. In addition, there is great potential for the industry to use Activity Notifications to communicate other types of messages directly between the parties’ systems (such as the need for more underwriting information), without having to manage a morass of emails in employees’ mailboxes. We urge agencies and carriers to continue to push the use of Real Time within their organizations and with their business partners, particularly for commercial lines transactions and communications. Real Time is the workflow of the future for commercial lines, as well as personal lines. Email is not.
Secure Email Email is the first major area where agencies need to begin to encrypt their communications to carriers and clients when personal data is included. Some prominent examples of emails likely to include personal data include: sending insurance applications to carriers for a quote or to clients to complete or to sign, and sending insurance policies to clients. With respect to emails between agencies and carriers (and general agents), ACT recommends that TLS secure email be implemented wherever possible. TLS (Transport Layer Security) is an open standard that once implemented between an agency and a carrier (both parties must have TLS implemented), all of the emails between the partners go securely in a manner that is transparent to the end users. In other words, the agent or
Fall 2012 • The Oregon Agent
27
Agency Websites It is also critical that agencies provide secure website connections for consumers when they ask the consumer to provide personal data on the website – to receive a quote, for example. The website should create a secure “https” tunnel before the consumer can fill out any form that asks for personal data, just as you would experience when purchasing something online or banking online. In addition, if the agency provides a “non-https” protected free-form text field which the consumer can use to contact the agency and make requests, there is some risk the consumer will enter private, personal data. Therefore, it is a best practice to take one of the following steps with regard to this free-form text field: (1) to secure it, (2) change it to specified fields that ask only for basic contact information, such as name, phone number, email, address, or (3) include a note with the free-form text field that it is not secure and should not be used to provide any private personal data. If the agency provides clients with the capability to access their insurance information or documents online, the website should create an “https” connection before any information can be accessed. Once again, agents should work with their website provider to help them with the technical aspects of creating this secure website capability. Some agency E&O providers also require the agency to post a privacy statement on its website(s), if there is an option for the consumer to submit personal data through the website. It is important that the agency customize its privacy statement to track the agency’s particular data collection, usage, sharing, and protection practices with regard to data collected through its website(s). Honda’s financial services website privacy statement provides a good example of the types of information that are typically included in such statements.
a template to build their own customized policy or as a checklist of security issues they should address. For more on TLS secure email, the ACT Security & Privacy page includes articles, FAQs, a recorded webinar and a list of carriers which have implemented TLS. For more on securing your website and managing potential E&O exposures arising from the website, see the article “Don’t Get Caught in the Web.” ACT’s Security & Privacy page also includes sample website disclaimers, a recorded briefing on HIPAA-HITECH requirements for “Business Associates,” and additional articles focusing on: the E&O and security risks arising from the use of social media, precautions to take when using free, public Wi-Fi sites, and how to manage the “Bring Your Own Device” trend where employees are using their personal devices to access business applications. Jeff Yates is Executive Director of the Agents Council for Technology (ACT) which is part of the Independent Insurance Agents & Brokers of America. Jeff can be reached at jeff.yates@ iiaba.net. ACT’s website is www.iiaba.net/act. This article reflects the views of the author and should not be construed as an official statement by ACT.
inspired by
ACT Resources This article has covered a few of the areas agencies must manage when protecting the security of their clients’ and employees’ personal data. ACT has developed several resources for agencies to review as they establish and implement their agency’s comprehensive information security program. All of these resources are included on the Security & Privacy page of the ACT website. These resources include a prototype agency information security policy which agencies can use as 28
The Oregon Agent • Fall 2012
creativity CHALLENGING NEEDS, CREATIVE SOLUTIONS imperial pFs, the leader in premium financing, continues to focus on the success of our agency partners. in today’s volatile credit environment, our experienced staff finds creative solutions to your most complex transactions. We focus on getting the deal done while providing you the highest standards in customer service. ipfs.com marketing@ipfs.com Bothell: 800-888-2750 Spokane: 800-234-7373
The Reality of
TEXTING
For Insurance Agencies Clients are increasingly texting their agents and preferring to receive texts from their agents, creating the challenge as to how agencies manage this form of communication. In this article, the author discusses the challenges agencies face with texting, how agents can send texts to their email to document the conversation and how agents can use their email to send texts to their clients who prefer this method of communication. We are hopeful that more efficient ways to attach texts to agency management systems and to send texts from these systems will be developed in the future.
D
By Pat Alexander uring every meeting I have attended in the last few months, there have been questions and discussions on “should an agency allow texting by its clients and staff and if so, how do we control Errors & Omissions and documentation in our agency management system?” Empowered clients are going to communicate with agents in the manner most convenient to them, so the real issue becomes how is the agency going to manage texting if the client prefers to use it? In this article, I discuss several concerns agencies have with texting, current “best practices” for managing these communications, and the technology options for managing texts and importing them into your systems as I understand them. There may be other options and not everyone uses Microsoft Outlook. Your technology professional should be able to assist you with the details. Agency Concerns 1. If clients are texting staff members on their personal phone, a number of issues come to my mind: a. What if your staff member is on vacation where their phone is not functioning or they are just too busy to take care of the issue? b. What if your staff member is ill and not able to pay attention to incoming messages on a real-time basis? c. What if the individual is actually no longer a staff member? d. What if the individual says they will take care of the request and does, but doesn’t document in the system and something is not correct? I have heard more than one agency principal flatly state that they weren’t going to allow any texting. Others don’t see any way to stop people from texting but don’t know what to do with it and
how to set parameters. A number of people commented that it was seamless to attach an email, voicemail or other documentation in their agency management system, but not so texts. Since it is difficult to manage the capture of the text information, they want to ban receiving texts. We need to remember that capturing email information in an agency management system was not always easy. Once upon a time we copied the emails and pasted them into an activity or note since we couldn’t attach anything to our agency management systems. Through communication with the various agency management vendors from their user groups, the vendors enhanced their systems to handle email attachments. From this grew the ability to easily attach various other attachments and we hope vendors will create streamlined workflows for capturing texts as well, possibly as a part of their mobile apps. The initial attachment functions were “clunky”, but as time and technology have progressed, this function has become more streamlined. In today’s world, texting is a reality. It is not only your young clients that are engaging in this act. Texting eliminates telephone tag, and results in an almost instant response. This is what many of us are programmed to want. Current “Best Practices” I recommend you consider taking the following approach with regard to texting: 1. Do you want to be relevant to your client base? If so, then you must embrace this technology. 2. Set standards and best practices. These really are no different than handling face-to-face conversations, phone calls, emails, etc. Your standard should be that all conversations with the client or with others about the client’s account are to be Fall 2012 • The Oregon Agent
29
documented in the agency management system or the system which you are using to collect client data. 3. Be pro-active and determine how to best receive texts at the agency level and educate your staff and clients. 4. If your client and someone in your agency are friends, inevitably there will be a text on a person phone. Define, train and implement the process to get this moved to an agency level as quickly as possible. I don’t see that there is any more of an errors & omissions exposure in receiving and responding to texts than there are in phone calls, emails or face-to-face conversations. The biggest issue I believe agencies have at this time is how to make this format work for them as seamlessly as possible. Forwarding Texts to Email Here are some thoughts I have on this process that I have picked up from users who have already addressed this issue: 1. As soon as the initial text is received on a personal phone, forward it to your business email address. Text a response back to the client from your business Outlook account. The client’s text response will come back into the email which will let you accumulate the stream of the conversation which can then be attached to the agency management system. 2. Some phones will allow you to capture an entire text conversation. In this case it could be acceptable that the conversation continue on that phone and then be captured and sent to the business email address for attachment into the agency management system. This would be the best approach when the conversation is just a question and answer session. 3. It is important for everyone in the agency to learn how their specific phone works for text forwarding: a. iPhone – http://iphonefaq.org/archives/97335 ; Another approach is to take a picture of your iPhone screen when the text is showing, by pressing the on/off button on the top of the phone simultaneously with the application change button on the bottom front of the phone. This approach creates an image of the entire text message and the picture can then be emailed to your Outlook account. b. Android Phones - Each manufacturer handles this in a different way and I find even some differences within a manufacturer between their phones. It is best to check the operating information for your specific phone for this function. Sending Texts from Email Microsoft Outlook can be used as a tool to manage text messaging with your client. There are several steps to setting up and implementing the use of Microsoft Outlook. However, like anything else that you do, if you invest the time to research, implement and train a process, the rewards will be great. The best place to start the research is on the web at Ste 30
The Oregon Agent • Fall 2012
Up text messaging (SMS) in Outlook. http://office.microsoft. com/en-us/outlook-help/send-and-receive-text-messages-smsHA101823438.aspx#_Toc261416088 Microsoft has done a really good job here of explaining the options available for using Outlook and providing lots of screen shots. Implementing an Agency Text Address I also recommend that the agency implement a way to receive text messages directly. I understand from my tech friends that many VoiP phone systems can have a number set up for receipt of text messages. I am also advised that this works differently with every system and that you will need to work with your phone system provider to get this set up and implemented. Once set up, someone in your agency will need to monitor this number during business hours so that the expected immediate response can be managed. If your agency does not have a VoiP system, another option available for receiving texts at a number that you control is to set up a Google Voice number at https://www.google.com/voice . In the Settings section of your Google Voice account, you will find a place to show the email address for Text Forwarding. When you receive these text messages, they should then be forwarded to the Outlook email address of the individual in your agency who will be handling this client. Once the number is set up, you should promote it to your clients, so that those who want to communicate in this manner can do so. When agency employees receive text messages on their phones, they should let that individual also know there is a number that is attended during business hours and would get attention even when the employee is not available. Finally, some important points about texting to keep in mind: 1. If the client texted you, that is how they would like to communicate, so at least your initial response should be in a text. 2. If the client texted you, they expect an immediate response as that is what the common expectation is with texting. 3. Your employees should know the agency’s procedures for documenting text messages in the agency’s system, just as they would other communications from clients and business partners. Patricia Alexander, CIC is a consultant, coach and mentor with many years of experience in retail agency and MGA settings. She may be reached at pat@patalexander.com. Alexander developed this article for the Agents Council for Technology (ACT), part of the Independent Insurance Agents & Brokers of America. ACT’s Web site is www.independentagent.com/act. This article reflects the views of the author and should not be construed as an official statement by ACT.
Independent Insurance Agents and Brokers of Oregon 5550 SW Macadam, Suite 305 Portland, OR 97239
PRSRT STD U.S. Postage
PAID
Permit No. 592 Pontiac, Illinois
Liberty Northwest® has been creating insurance solutions and providing superior services for businesses in the Northwest since 1923. We know how important it is for our agents to have the right resources to support the needs of their clients, which is why we pride ourselves on strong agent relationships and act with integrity and responsibility. Your success is our success – we are proud to support the Independent Insurance Agents & Brokers of Oregon.
www.libertynorthwest-ins.com Liberty Northwest, 650 NE Holladay Street, Portland, OR 97232 ©2012 Liberty Mutual Insurance