Pros And Cons Of Risk Transfer

773 Words2 Pages

Risk Transfer refers to the transferring the burden of loss to another party. This can be done through legislation, contract, insurance or any other means. It can also involve transfer of any kind of risk.
There are lots of definitions to the terminology “Risk Transfer”.
The reason behind this action is to take a particular risk which has the insurance contract and pass it on from one party who does not wish to continue having this risk (the insured) to a party who is willing to accept on the risk for a fee, or premium (the insurer).
Let us now take an example to illustrate the risk transfer scenario. For instance, someone has purchased home insurance in the hope of owning a house. Unfortunately, there occurs an event that causes property damage such as fire or natural disaster. The insurance company in this case will take up the consequences that result from the damage.
Risk Transfer is an ongoing requirement that is always included in the insurance contract even today irrespective of the intricacy and complexity of the insurance instruments in today’s financial market.
Risk Transfer is accomplished via insurance and contracts. There are several layers of protection such as insured status, contracts, and insurance certificates to help protect one’s assets.
Efficient Risk Transfer benefits all the involved parties. An efficient risk transfer strategy involves the following five areas:
Insurance Certificates
• Require insurance certificates from various parties.
• Determine suitable insurance limits.
• Conduct regular annual review of certificates.
• Enforce requirements of insurance certificates.
• Create a filing system that enables annual review of insurance certificates.
Additional Insured status
• Ask for additional insured...

... middle of paper ...

...e cloud provider. This problem may be increased if the when there is multiple transfers of data involve in between federal clouds.
Insecure or incomplete data deletion:
When a request to delete a cloud is made, it is possible that the data is not fully wiped out. Timely deletion of data might also not be possible as extra copies of data might not be available. Also, the disk that saves the data might have already been destroyed. In case of reuse of resources, it might pose a greater height.
Malicious Insider:
While less likely, the damage caused by a malicious insider is much more serious.

Customers Security Expectations:
Customer’s perception of the security levels might be actually different from the security levels defined by the cloud provider.
Availability Chain:
Relying on the Internet connection at the customer’s end might create a single point of failure.

Open Document