While marijuana is still illegal under federal law, what was previously considered a forbidden substance is now part of the mainstream. As public policy evolves, risk professionals must stay abreast of legal and political developments, review and update existing workplace policies, and carefully handle any workers’ compensation, employment practices liability, and other insurance claims in which marijuana use may play a role.
Resource Search
S corporation shareholder agreements should be carefully crafted by legal counsel in order to avoid certain events that can imperil the company’s S election. One important consideration is the language in the shareholder agreement related to nonvoting stock transfer restrictions. Learn how to address this issue—and avoid costly pitfalls—before it arises in the course of estate planning or a private company sale. See how nonvoting shares are needed.
Family offices are a key target for cybersecurity breaches and, with many organizations requiring their employees to work remotely due to the COVID-19 pandemic, the risks have only increased. With cyberattacks on the rise, many family offices are focusing their attention on how to protect themselves. Here’s a look at some of the most common types of cybersecurity breaches and what family offices can do to stay safe.
Although the events of 2020 were unexpected and hard to prepare for, having conversations about processes, assessing risks, and learning to practice decision-making with your family can help when crisis strikes. On this episode of Tolleson Insights, Richard Joyner shares his observations and the lessons learned over the last 18 months from working with families of wealth. He also shares the top three steps families can take to start their preparation process.
In this podcast episode, learn more about the latest updates on mandatory vaccine and mask policies, new action to ban non-compete agreements, a big free speech decision, New York regulatory updates, and a proposed wage and hour rule.
When a catastrophic event occurs and total loss and devastation ensues, the reality is that people may decide not to rebuild, and in some cases abandon their ‘property.’ While the choice remains with the owner of the property as to whether or not to repair, there are conditions within your insurance policy that you need to consider.
Russia has long been designated as a technologically hostile nation. In the leadup to the conflict with Ukraine, Russia launched unprecedented, but predictable, cyber warfare operations against the Ukrainian government and civilian infrastructure. With the situation on high alert and Russia’s aggressive cyber attacks that go beyond Ukraine, a cybersecurity firm provides digital protection recommendations to help high-profile individuals and families protect themselves from the cyber warfare.
Facing more frequent and intense cyber threats, it’s vital that businesses are prepared for the attacks. In this episode of Marsh’s Risk in Context podcast, learn how organizations can build effective cyber incident and ransomware management plans and the actions they can take before, during, and after an attack. An important piece of your plan should include having a go-to list of reliable resources—such as law firms, forensics firms, and various extortion service providers—to act on your behalf in the event of a cyber incident.
When COVID hit, many business owners faced the dire realization that the insurance they paid so much for did not cover the business interruption resulting from the pandemic exposures. To help guard against that type of unexpected disruption in the future, many business owners have set up captives—a lucrative alternative risk financing structure—to navigate the risk and insurance challenges they face.
Cyber-attacks at all levels are not a new phenomenon, nor do the Russians have a monopoly on them. While the Russia/Ukraine crisis is at the forefront, it won’t be the last global event that family offices will need to address when cybersecurity is involved. Family offices, executives, and enterprises can take actions to help alleviate the cyber-attack risk when it comes to cyber retaliation from Russia or other state-sponsored cyber-attacks.