

«
2 8
»
THE
INCOMPAS SHOW
I APRIL 10-13, 2016
www.bekapublishing.comDAY 1
THE
INCOMPAS
SHOW
produced isn’t found before it is imple-
mented. A third party depends on this
product or service to operate its business
and its operations are stalled due to the
error, causing them a financial loss.
• A part your company produces is installed in
a piece of equipment. After a short amount
of time, the component simply stops working,
causing the equipment to fail to work, but
otherwise not damaging anything or hurting
anyone. The third party that relies on this
equipment for its business has to stop opera-
tions and suffers a financial loss.
• An employee of your company recommends
that a client make an adjustment to its
network. The client follows the advice and
its network crashes as a result, causing a
time and financial loss for its operations.
In all of these cases, commercial general
liability coverage would not cover a claim or any
costs of litigation because of the presence of an
error and the lack of resulting physical damage
to the third party’s property.
It should be noted that tech E&O policies
usually exclude product recall, but some will
accept damages for loss of use of a failed product.
They also generally exclude non-financial losses
and intentional or dishonest acts.
A lot can be done to reduce or eliminate
exposures through better understanding of the
coverages you have and do not have. Not all
exposures require an insurance policy to control
or avoid a loss.
Contracts can also have a dramatic impact
on your exposure to liability as a result of the
acceptance or transfer of risk. However, some
exposures are best solved by a technology
errors and omissions policy (cyber liability).
Often we think of war being fought with
bombs and bullets, but there is a silent attack
called cyber attack, using only a computer. With
the increase in electronic productivity our lives
are more exposed than ever to an attack that
can grind our business to a stop.
The number of cyber threats we face daily are
becoming staggering. Remember planning for
cyber attacks should be considered when putting
together your company’s emergency plan.
It is essential to conduct a risk analysis to
identify exposures you may have and to what
extent they exist. Purchasing a cyber liability
policy may not meet your needs at all. In fact,
without a thorough analysis of risk and coverage
you may end up buying a cyber liability policy that
only partially meets your needs.
UNITEL can offer special pricing, coverage and
risk management tools to INCOMPAS members.
o
To learn more go to.
unicogroup.com/unitel/,
contact Carl Zeutzius at 402-770-7150 or
czeut- zius@unitelinsurance.com. We’d be happy to meet
with you while at the INCOMPAS Show.
Deploy High Quality FTTH Networks Faster and at Lower Cost
Fiber indexing is a novel approach to FTTH network design.
CommScope’s pre-connectorized plug-and-play solution allows to:
•
Deploy fiber up to 75% faster
•
Reduce the amount of cable required by up to 70%
•
Eliminate the need for fiber splicing
How?
By changing from a star to a
daisy-chain topology for connecting service
terminals, and consolidating functionality
into the service terminal. By using hardened
service terminals with hardened multi-fiber
connectors, this architecture combines the
advantages of a daisy-chain topology with
plug-and-play connectivity.
© 2016 CommScope, Inc. All rights reserved. AD-110055-EN
Contact Walker and Associates for CommScope Solutions
at
1-800-WALKER1
or
walkerfirst.com(Unitel, continued from page 26)
The number of
cyber threats
we face daily
are becoming
staggering.