84 resultados para Monoline Insurer Downgrade
Resumo:
The financial crisis of 2007-2008 led to extraordinary government intervention in firms and markets. The scope and depth of government action rivaled that of the Great Depression. Many traded markets experienced dramatic declines in liquidity leading to the existence of conditions normally assumed to be promptly removed via the actions of profit seeking arbitrageurs. These extreme events motivate the three essays in this work. The first essay seeks and fails to find evidence of investor behavior consistent with the broad 'Too Big To Fail' policies enacted during the crisis by government agents. Only in limited circumstances, where government guarantees such as deposit insurance or U.S. Treasury lending lines already existed, did investors impart a premium to the debt security prices of firms under stress. The second essay introduces the Inflation Indexed Swap Basis (IIS Basis) in examining the large differences between cash and derivative markets based upon future U.S. inflation as measured by the Consumer Price Index (CPI). It reports the consistent positive value of this measure as well as the very large positive values it reached in the fourth quarter of 2008 after Lehman Brothers went bankrupt. It concludes that the IIS Basis continues to exist due to limitations in market liquidity and hedging alternatives. The third essay explores the methodology of performing debt based event studies utilizing credit default swaps (CDS). It provides practical implementation advice to researchers to address limited source data and/or small target firm sample size.
Resumo:
This chapter analyses the obligations insurers and insureds owe each other and the remedies which follow a breach of obligation.
Resumo:
In Suncorp Metway Insurance Limited v Brown [2004] QCA 325 the Queensland Court of Appeal considered the extent of the duty of cooperation imposed on a claimant under s45 of the Motor Accident Insurance Act 1994 (Qld). The issue is an important one because it affects virtually all claims made under the Act.
Resumo:
Empirical evidence suggests that ambiguity is prevalent in insurance pricing and underwriting, and that often insurers tend to exhibit more ambiguity than the insured individuals (e.g., [23]). Motivated by these findings, we consider a problem of demand for insurance indemnity schedules, where the insurer has ambiguous beliefs about the realizations of the insurable loss, whereas the insured is an expected-utility maximizer. We show that if the ambiguous beliefs of the insurer satisfy a property of compatibility with the non-ambiguous beliefs of the insured, then there exist optimal monotonic indemnity schedules. By virtue of monotonicity, no ex-post moral hazard issues arise at our solutions (e.g., [25]). In addition, in the case where the insurer is either ambiguity-seeking or ambiguity-averse, we show that the problem of determining the optimal indemnity schedule reduces to that of solving an auxiliary problem that is simpler than the original one in that it does not involve ambiguity. Finally, under additional assumptions, we give an explicit characterization of the optimal indemnity schedule for the insured, and we show how our results naturally extend the classical result of Arrow [5] on the optimality of the deductible indemnity schedule.
Resumo:
Empirical evidence suggests that ambiguity is prevalent in insurance pricing and underwriting, and that often insurers tend to exhibit more ambiguity than the insured individuals (e.g., [23]). Motivated by these findings, we consider a problem of demand for insurance indemnity schedules, where the insurer has ambiguous beliefs about the realizations of the insurable loss, whereas the insured is an expected-utility maximizer. We show that if the ambiguous beliefs of the insurer satisfy a property of compatibility with the non-ambiguous beliefs of the insured, then there exist optimal monotonic indemnity schedules. By virtue of monotonicity, no ex-post moral hazard issues arise at our solutions (e.g., [25]). In addition, in the case where the insurer is either ambiguity-seeking or ambiguity-averse, we show that the problem of determining the optimal indemnity schedule reduces to that of solving an auxiliary problem that is simpler than the original one in that it does not involve ambiguity. Finally, under additional assumptions, we give an explicit characterization of the optimal indemnity schedule for the insured, and we show how our results naturally extend the classical result of Arrow [5] on the optimality of the deductible indemnity schedule.
Resumo:
In the midst of health care reform, Colombia has succeeded in increasing health insurance coverage and the quality of health care. In spite of this, efficiency continues to be a matter of concern, and small-area variations in health care are one of the plausible causes of such inefficiencies. In order to understand this issue, we use individual data of all births from a Contributory-Regimen insurer in Colombia. We perform two different specifications of a multilevel logistic regression model. Our results reveal that hospitals account for 20% of variation on the probability of performing cesarean sections. Geographic area only explains 1/3 of the variance attributable to the hospital. Furthermore, some variables from both demand and supply sides are found to be also relevant on the probability of undergoing cesarean sections. This paper contributes to previous research by using a hierarchical model and by defining hospitals as cluster. Moreover, we also include clinical and supply induced demand variables.
Resumo:
Insurance fraud continues to be a major problem worldwide. This article will canvass recent legal developments in relation to selected issues and matters of particular concern to the insurance industry. This article is confined to fraudulent claims. Fraud may arise at various points in the insurance relationship, including initial fraud on placement and fraudulent breach of contract by the assured. Fraud at the outset by the assured is treated differently from innocent or negligent conduct. "Fraud" in the context of this paper embraces all claims where an insured intednds to deceive an insurer by getting out i money to which the insured knew he had no right. This article will examine fraudulent insurance claims.
Resumo:
Dentists have the privilege of possessing, administering and prescribing drugs, including highly addictive medications, to their patients. But because drugs are often vulnerable to being abused by all members of society, including dentists and their patients, and because drugs can be dangerous, they are tightly regulated in Canada by the federal and provincial/territorial governments. Regulatory and professional dental bodies also provide guidance for their members about how to best administer and prescribe drugs. This chapter outlines the regulation by federal and provincial/territorial governments in this area, examines the professional practice requirements set out by regulatory/professional bodies and the issue of drug abuse by dental professional and patients. It is important to note from the outset that governmental and professional regulations, policies and practices differ from province to province and territory to territory. This chapter aims to alert dentists to possible legal and professional issues surrounding the possession, administration and prescription of drugs. For detailed specific information about regulation, policies, ethical standards and professional practice standards in Canada or their province/ territory, dentists should contact their insurer or professional association.
Resumo:
Data flow analysis techniques can be used to help assess threats to data confidentiality and integrity in security critical program code. However, a fundamental weakness of static analysis techniques is that they overestimate the ways in which data may propagate at run time. Discounting large numbers of these false-positive data flow paths wastes an information security evaluator's time and effort. Here we show how to automatically eliminate some false-positive data flow paths by precisely modelling how classified data is blocked by certain expressions in embedded C code. We present a library of detailed data flow models of individual expression elements and an algorithm for introducing these components into conventional data flow graphs. The resulting models can be used to accurately trace byte-level or even bit-level data flow through expressions that are normally treated as atomic. This allows us to identify expressions that safely downgrade their classified inputs and thereby eliminate false-positive data flow paths from the security evaluation process. To validate the approach we have implemented and tested it in an existing data flow analysis toolkit.
Resumo:
In Australian Meat Holdings Pty Ltd v Sayers [2007] QSC 390 Daubney J considered the obligation imposed on a claimant under s 275 of the Workers’ Compensation and Rehabilitation Act 2003 (Qld) to provide the insurer with an authority to obtain information and documents. The decision leads to practical results.
Resumo:
Pre-contractual material disclosure and representation from an insurance policy proposer is the most important element for insurers to make a decision on whether a proposer is insurable and what are the terms and conditions if the proposal by the proposer is able to be insured. The issue this thesis researches and investigates focus on the issues related to the pre-contractual non-disclosures and misrepresentations of an insured under the principle of utmost good faith, by operation of laws, can achieve with different results in different jurisdiction. A similar disputed claim involving material non-disclosed personal information or misrepresentation at the pre-contractual stage from an insured with respect to both general and life insurance policies settled by an insurer in Australia could be that the policy is set aside ab initio by the insurers in Singapore or China. The jurisdictions this thesis examines are • Australia; • Singapore; and • China including Hong Kong.
Resumo:
In Angus v Conelius [2007] QCA 190 the Queensland Court of Appeal concluded that the obligations under the Motor Accident Insurance Act 1994 (Qld), and in particular s 45 of the Act (duty of claimant to cooperate with insurer), continue beyond the commencement of court proceedings
Resumo:
Purpose – The purpose of this paper is to look at auditor obligations to their clients and potentially to third parties such as investors, with a focus on the quality of financial disclosure in an evolving legal framework. Design/methodology/approach – The article outlines and compares established and emerging trends relative to information disclosure and contractual performance in parallel contexts where information asymmetry exists. In particular, this article considers the disclosure regime that has evolved in the insurance industry to address the substantial imbalance in the level of knowledge possessed by the insured in comparison to the prospective insurer. Abductive reasoning is used to identify causal constructs that explain the data pattern from which the theorised potential for judicial revision of the interpretation of “true and fair” in line with “good faith” in legal regulation is derived. Findings – The authors conclude that there is little doubt that a duty of good faith in relation to auditor-company contractual dealings and potentially a broader good faith duty to third parties such as investors in companies may be on the horizon. Originality/value – In the context of stated objectives by organisations such as the International Federation of Accountants to reconcile ethical and technical skills in the wake of the global financial crisis, there is an increased need to rebuild public and investor confidence in the underpinning integrity of financial reporting. This paper offers a perspective on one way to achieve this by recognising the similarities in the information asymmetry relationships in the insurance industry and how the notion of “good faith” in that relationship could be useful in the audit situation.
Resumo:
Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. The main security claim of PAS is to resist passive adversaries who can observe the whole authentication session between the human user and the remote server. In this paper we show that PAS is insecure against both brute force attack and a probabilistic attack. In particular, we show that its security against brute force attack was strongly overestimated. Furthermore, we introduce a probabilistic attack, which can break part of the password even with a very small number of observed authentication sessions. Although the proposed attack cannot completely break the password, it can downgrade the PAS system to a much weaker system similar to common OTP (one-time password) systems.