Skip to content

Research and Trends

3 Problems Motor Carriers Face with the SMS Model

Motor Carrier
The Miscommunication and Misuse of Motor Carrier Data

When assessing the safety of a commercial auto operation, there is more freely available information today than ever before. As with all data that is easily accessible in the information age, there are people trying to capitalize on how this information is used. In a prior article, CAB Usage in Underwriting Truckers, we discussed how insurance companies and underwriters utilize this data to try and better determine the safety culture of an operation. However, the use and interpretation of this data is not limited to the insurance industry, which is leading to disputes over the measurements gathered and the availability of data.

First, let’s quickly establish what data we’re talking about. The Federal Motor Carrier Safety Administration (FMCSA) created the Safety Measurement System (SMS), the source of this data, and its associated scoring methodology as part of the CSA 2010 initiative. The intent of the initiative was to make the roadways safer by identifying those trends in motor carriers that might show a direct connection to loss frequency. Determinations for trends and scores are based on the aggregated history of all DOT violations that are discovered during the roadside inspection of a motor carrier, and it is this violation data – ranging from a cracked windshield to speeding in a school zone – that is the focus of the current dispute.

The Problem with the Data
1. The relative scale on which a motor carrier’s SMS score is determined suggests that there will always be a subsection of motor carriers (10%) on the road that are deficient and should be removed from the roadways. Without question, the intent of the SMS model is to make the roadways safer, and eliminating those motor carriers who are presenting a greater hazard to the public by their actions is one of the best ways to go about doing this.  However, without establishing a true baseline by which motor carriers can be judged, a situation is created where the same operation which has been deemed acceptable today may be deemed deficient at the next review. Similarly, an operation in one peer group may be deemed acceptable while an operation with the same history in a separate peer group would be deemed deficient.
The strongest argument in support of the relative scale is that the flexible nature encourages motor carriers to constantly better their operations, and that the number of new entrants into the market will offset the percentages that are being removed from the roadways. Were peer groups not a factor in the model, the argument would have a stronger footing, but with its inclusion in the model, there is still an inconsistency whereby the same quality risk may be deemed both acceptable and unacceptable based solely on the peer group in which they fit.

2. The methodology used to determine the severity weights for each violation has been brought into question by insurers and associations that represent motor carriers, as the stated score isn’t necessarily indicative of an accident. The most frequently cited example of a questionable score is a seat belt violation – where a driver failing to wear his or her seat belt is assigned a severity weight of 7, and considered a greater indicator of accident frequency than violations such as following too close, failing to yield right of way, and failing to obey a traffic control device.Read More »3 Problems Motor Carriers Face with the SMS Model

Reduce Risk from Wearables

Reduce Risk from Wearables
Image courtesy of franky242 at freedigitalphotosnet

With the growth in wearable technology across all types of industries, companies that never before considered themselves in the technology business face new risks they need to be prepared for. Being aware of these threats and following strategies to help protect against them can help businesses focus on the growth opportunities that connected technologies make possible.

How Does Wearable Technology Work?

Wearable technology combines form and function, integrating the functionality of once-bulky devices into wearable gear in the form of watches, eyeglasses and more. These types of devices follow a common basic template for how they work. First, sensors capture impulses and translate them into actionable data. Then, microprocessors extract, transform and load data to a transmittable format. Finally, transmitters wirelessly send data to cloud storage for further processing and reporting.

With applications ranging from health and fitness monitoring to employee monitoring and safety, people can expect tremendous expansion driven by the health care industry, the corporate sector and consumer demand. According to PwC, over 80% of consumers said an important benefit of wearable tech is its potential to make healthcare more convenient, and 68% said they would wear employer-provided wearables streaming anonymous data to an information pool in exchange for lower health insurance costs.¹

What Are the Risks?

Read More »Reduce Risk from Wearables

Travelers’ Cyber Risk Pressure Test

Risk_ControlPut your data and network security to the test.

What if your business was the victim of one of the 41,000 known computer security incidents per day in the U.S.?* In addition to knowledge about cyber insurance coverage options, you’re likely to be looking d for helpful, cost-effective cyber risk management resources.

When it comes to cyber risk, there is a lot at stake: data, reputation and a company’s bottom line. And every business, no matter the size or industry, is at risk of becoming a victim of an accidental or malicious compromise. This brief interactive quiz, which is mobile enabled, is designed to assist you, the business owner, to quickly evaluate and identity pressure points in your cyber risk management strategy.

Managing cyber risk is not a one-and-done process. Over time, your business may grow and change. Your data may represent new categories of information. Your technology hardware and software may be updated or replaced. Your workforce — both the people who use your data and the team responsible for protecting it — may change. And as technology itself evolves, so do the risks associated with it. Complacency can leave your data, your customers, your bottom line and your reputation vulnerable. Failure to address the risk often results in lost revenue, potential liability and high recovery costs. Implementing, maintaining and enforcing procedural and technological controls to protect your critical data and systems are key to the success of your cyber security strategy.

Read More »Travelers’ Cyber Risk Pressure Test