Information Technology

Information Technology – or InfoTech/IT – entities manage technology and its processes. Typically, we think of computer programming but it also includes software and computer consulting services, computer hardware supporting those functions, programming languages and data. IT companies may feature any combination of these industry segments. 

IT consulting is also an integral part of computer system design services, which requires integrated applications and systems. Companies providing data-based processing and outsourcing services, such as data entry and transformation, hosting and provisioning of web and application services, data processing infrastructure for back-office functions, and business process management, are also a part of the IT services industry. Today, more and more companies are eager to streamline data storage and processing expenses, which is driving an increase in cloud computing services.

Our focus includes:

  • Software developers – packaged and custom
  • System integrators
  • Software and computer consultants
  • Internet services providers (ISPs)
  • Application service providers (ASPs)
  • Website design companies
  • Computer processing companies
  • Data processing/data archiving
  • Computer maintenance
  • Computer facilities management
  • Network security companies

The InfoTech industry is not immune to claims or suits relating to its own errors or omissions or the ever-changing cyber exposures related to information risks. In fact, it can be one of the biggest exposures this industry faces today. We’ve designed tailored insurance solutions to help address those concerns.

  • Property including inland marine and crime components
  • Errors or omissions liability
  • Information risk
  • General liability
  • Automobile liability
  • Global enhancement endorsements
  • Foreign local admitted policies
  • Umbrella liability
  • Workers compensation

OneBeacon’s experts share their insights through ongoing publications. Review the following white papers and insights for additional information on these subjects:


Mobile and Personal Cloud Computing - The Next Step in Cloud Computing

As the number of internet-enabled mobile devices grows, unfortunately so do malicious web-based threats. So how can businesses manage the opportunities and exposures associated with cloud computing and Mobile Cloud Computing (MCC)? This whitepaper provides an overview of these maturing technologies, security issues and the IT industry countermeasures to address them. As the technology behind cloud computing is the foundation for MCC, this paper provides a discussion of cloud computing before addressing MCC.


Comparing IPv4 vs. IPv6

For the last 35 years, the internet has been operating under Internet Protocol (IP). The internet currently operates on two versions referred to as IPv4 (Internet Protocol version 4) and IPv6 (Internet Protocol version 6). As of December 2014, IPv4 carried 94% of internet traffic. While traffic will continue to grow on IPv6, both versions are expected to coexist for some time. This matter is important for all businesses, but specifically to the technology industry as it affects nearly every technology business – from manufacturer of products such as routers, switches, advanced telecom equipment and networking gear to IoT (Internet of Things) enabled devices.


SSAE 16 & SAS 70

The review and analysis of a company’s internal financial and management controls by outside auditors dates back to 1939 when the first Statement on Auditing Procedures (SAP) was developed. Beginning in 1982, SAPs were replaced by Statement on Auditing Standards (SAS). In 1992, SAS 70 – titled Service Organizations – was developed by the American Institute of Certified Public Accountants (AICPA) to provide a framework for a very detailed examination of a service organization’s financial and operational controls, often including the IT control procedures.


SDN - Software Defined Networking

Software Defined Networking or SDN is an emerging technology that allows for more granular control over a network’s data traffic streams. As this cutting-edge technology is expected to be adopted industry-wide within several years, understanding this technology and its importance to information technology (“IT”) functions is critical. This paper provides an overview of SDN, including what makes it so significant, defines important associated terms, applications and uses, and reviews its benefits and risks.


BYOD Bring Your Own Device

Bring Your Own Device or BYOD is quickly becoming a workplace technology trend. Yes, times are changing and today, this practice is not only okay, but it’s gaining traction – and introducing a new set of risks.


Wireless Mesh Networking

Everyone is familiar with wireless or Wi-Fi networks. We use them at home, at work or at the local coffee shop to surf the internet, access web services, generate emails, manage data, and conduct VoIP-based voice and video calls and so on. Wi-Fi even allows us to use our mobile phones to make calls and save our precious cellular minutes. What can further improve this experience? The answer lies in the next evolution of Wi-Fi, which is referred to as “mesh networking.”


Big Data

Are you being bombarded with emails about “big data”, weekly if not daily? Do you hear the term big data being tossed about as if everyone should know what it is? Then surely, you must be asking yourself – What is big data anyway? This whitepaper will help answer that question through a high level overview of the concept.


The Internet of Things

An emerging technology, the Internet of Things (IoT) is defined, including how it works, its scope, benefits and downsides. Industry standards, government oversights, security and privacy considerations around the IoT are also addressed.


Wireless Encryption

In this paper, we focus on wireless security and encryption systems used to protect data during wireless communications. Primary wireless communication systems include cell/mobile, WiFi, Bluetooth and radio.


Near Field Communication - A New Way to Communicate

The revolution is here!  No, not the TV series; the smartphone revolution. This whitepaper provides an overview of NFC, in particular as it relates to smartphones, standards, usage/applications, security issues, obstacles to market and consumer expectations.



The need for secrets and privacy is ever-present in today’s digital environment. To facilitate these protections, a wide variety of encryption and cryptographic systems are in use.


Data Privacy

Personally Identifiable Information (PII) is so prevalent in our everyday lives that it is difficult not to somehow expose this information to the scrutiny of companies, organizations, or other individuals. Whether it’s making a cell phone call, logging on to the internet, using an ATM or even throwing an old credit card bill into the garbage, there are a myriad of ways in which data can be exposed.