Travelers 2011 Annual Report Download - page 75

Download and view the complete annual report

Please find page 75 of the 2011 Travelers annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 293

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293

The IAIS is also working with the Financial Stability Board created by the G-20 and is expected to
recommend a methodology for determining whether and which, if any, insurance companies pose a
systemic risk to the global economy. Such insurers would be designated ‘‘globally systemically important
financial institutions’’ (G-SIFIs) and would likely be subject to higher capital requirements, enhanced
supervision or both. The IAIS has not yet decided upon the criteria for or the consequences of such
designation.
Our business success and profitability depend, in part, on effective information technology systems
and on continuing to develop and implement improvements in technology. We depend in large part
on our technology systems for conducting business and processing claims, as well as for providing the
data and analytics we utilize to manage our business, and thus our business success is dependent on
maintaining the effectiveness of existing technology systems and on continuing to develop and enhance
technology systems that support our business processes and strategic initiatives in a cost and resource
efficient manner. Some system development projects are long-term in nature, may negatively impact
our expense ratios as we invest in the projects and may cost more than we expect to complete. In
addition, system development projects may not deliver the benefits we expect once they are complete,
or may be replaced or become obsolete more quickly than expected, which could result in accelerated
recognition of expenses. If we do not effectively and efficiently manage and upgrade our technology
portfolio, or if the costs of doing so are higher than we expect, our ability to provide competitive
services to new and existing customers in a cost effective manner and our ability to implement our
strategic initiatives could be adversely impacted.
If we experience difficulties with technology, data security and/or outsourcing relationships, our
ability to conduct our business could be negatively impacted. While technology can streamline many
business processes and ultimately reduce the cost of operations, technology initiatives present significant
risks. Our business is highly dependent upon our employees’ ability to perform, in an efficient and
uninterrupted fashion, necessary business functions. A shut-down of, or inability to access, one or more
of our facilities; a power outage; or a failure of one or more of our information technology,
telecommunications or other systems could significantly impair our ability to perform such functions on
a timely basis. In the event of a disaster such as a natural catastrophe, terrorist attack or industrial
accident, or due to a computer virus, our systems could be inaccessible for an extended period of time.
In addition, because our information technology and telecommunications systems increasingly interface
with and depend on third-party systems, we could experience service denials or failures of controls if
demand for our service exceeds capacity or a third-party system fails or experiences an interruption. If
our business continuity plans did not sufficiently address such a business interruption, system failure or
service denial, this could result in a deterioration of our ability to write and process new and renewal
business, provide customer service, pay claims in a timely manner or perform other necessary business
functions.
Our operations rely on the reliable and secure processing, storage and transmission of confidential
and other information in our computer systems and networks. Computer viruses, hackers, employee
misconduct and other external hazards could expose our data systems to security breaches, cyber
attacks or other disruptions. In addition, we routinely transmit and receive personal, confidential and
proprietary information by email and other electronic means. While we attempt to develop secure
transmission capabilities with third-party vendors and others with whom we do business, we may be
unable to put in place secure capabilities with all of such vendors and third parties and, in addition,
these third parties may not have appropriate controls in place to protect the confidentiality of the
information.
These increased risks, and expanding regulatory requirements regarding data security, could expose
us to data loss, disruption of service, monetary and reputational damages and significant increases in
compliance costs. As a result, our ability to conduct our business might be adversely affected.
63