Blog

Learn from the pros about risk-mitigation, document tracking, and more, with expert articles from Business Credentialing Services.

More Articles from BCS

Certificate Holders & Additional Insureds: What's the Difference?

Certificate holders possess proof of insurance on commercial general liability policies, while additional insureds are other parties coverage has been extended to, beyond the initial policyholders.
Read Now

What Is a Waiver of Subrogation?

A waiver of subrogation is a contractual provision that indemnifies third-party subcontractors from liability, effectively revoking an insurer's right to recoup losses from a claim concerning third-party fault for incurred damages.
Read Now

The Critical Nature of Workers’ Compensation Insurance

Workers' Compensation Insurance is designed to protect both your business and your employees from suffering any more than necessary after a work-related injury claim.
Read Now

How to Collect & Track Certificates of Insurance

Proper management of insurance documents, like the certificate of insurance, is integral for maintaining vendor/tenant compliance, protecting your business against damage claims, and more.
Read Now

Download the PDF 'Everything You Need to Know About Certificates of Insurance'

This free, introductory resource guide to 'All Things COI' shares valuable insights and tips on tracking, improving and managing the all-important Certificate of Insurance. Download it today!
Read Now

What's the Difference Between Excess and Umbrella Insurance?

Excess and umbrella liability insurance have some important differences, most notably that the former simply provides additional limits to an underlying policy, while the latter also expands coverage to include claims and losses outside its initial scope.
Read Now

Your Complete Guide to Developing an Effective Risk Management Plan

Developing and implementing an effective risk management plan is essential to mitigating threats to your business. This comprehensive guide explains its importance, outlines techniques for identifying and prioritizing threats, and defines key concepts and checkpoints within this five-step process.
Read Now