|Term||Grouping||Definition / Use||Acronym Breakdown|
|ACORD||Insurance||The Association for Cooperative Operations Research and Development (ACORD) is the global standards-setting body for the insurance and related financial services industries (non-profit, industry-owned organization).||Association for Cooperative Operations Research and Development|
|Actuary||Insurance||An actuary is a person or group that compiles and analyzes statistics and uses them to calculate insurance risks and premiums.|
Example: AIS, ISO, URV, and MSO are actuaries that create manuals of pricing.
|Address scrubbing||Engineering||Address scrubbing is an address-validating system that corrects mistakes.|
Example: If entering 123 Main St., it validates the address and determines that St means Street and Rd means Road.
|Adjuster||Insurance||An adjuster is a person who investigates a claim; they can either work for a company independent of the carrier or work for the carrier.|
|Agency number||Engineering||A unique agency identifier.|
|Agent or Producer||Insurance||The agent or producer is the party that represents the insurance company in the sale of an insurance policy to an insured.|
|Agile||Operations||Agile software development is an umbrella term for a set of frameworks and practices based on the values and principles expressed in the Manifesto for Agile Software Development and the 12 Principles behind it. When you approach software development, it’s generally good to live by these values and principles and use them to help figure out the right things to do given your particular context.|
One thing that separates Agile from other approaches to software development is the focus on the people doing the work and how they work together. Solutions evolve through collaboration between self-organizing, cross-functional teams utilizing the appropriate practices for their context.
|ALAE||Insurance||Allocated loss adjustment expenses (ALAE) are part of an insurer’s expense reserves that are attributed to the processing of a specific insurance claim.|
• These expenses link directly to the processing of a specific claim.
• Will include expenses for third parties such as legal counsel, third-party adjusters, investigators, expert witnesses, arbitrators/mediators, etc.
• Costs incurred to determine the value of the loss and defend and/or settle the claim.
Also see unallocated loss adjustment expenses (ULAE).
|Allocated Loss Adjustment Expenses|
|AM||Services||An account manager (AM) is an employee who is responsible for the day-to-day management of a particular customer's account with the business.||Account Manager|
|Amazon EC2||Engineering||BriteCore uses Amazon Elastic Compute Cloud (Amazon EC2) to provide resizable computing capacity in the cloud. Within minutes, BriteCore can create Amazon EC2 instances (virtual machines over which we have complete control). Amazon EC2 features relevant to DR include:|
1. Amazon Machine Images (AMIs) are reconfigured to launch as part of the recovery procedure and include appropriate pieces of the application stack.
2. Availability Zones are distinct locations engineered to be insulated from failures in other Availability Zones. They provide inexpensive, low-latency network connectivity to other Availability Zones in the same region. By having access to launch instances in separate Availability Zones, BriteCore applications are protected from the failure of a single location. Regions consist of one or more Availability Zones.
|Amazon Elastic Compute Cloud|
|Amazon RDS||Engineering||BriteCore uses Amazon Relational Database Service (Amazon RDS) to set up, operate, and scale a relational database in the cloud. In the preparation phase, Amazon RDS is used to hold critical data in a database that's already running. In the recovery phase, Amazon RDS is used to run the production database. When using multiple regions, Amazon RDS allows BriteCore to copy data from one region to another while also having a read replica running in another location.||Amazon Relational Database Service|
|Amazon Route 53||Engineering||Amazon Route 53 is a highly available and scalable Domain Name System (DNS) web service. It gives developers and businesses a reliable, cost-effective way to route users to Internet applications. Amazon Route 53 includes a number of global load-balancing capabilities (which can be effective when you are dealing with DR scenarios such as DNS endpoint health checks) and the ability to failover between multiple endpoints and even static websites hosted in Amazon Simple Storage Service (Amazon S3).|
|Amazon S3||Engineering||BriteCore uses Amazon Simple Storage Service (Amazon S3). Amazon S3 provides a highly durable storage infrastructure designed for mission-critical and primary data storage. Objects are redundantly stored on multiple devices across multiple facilities within a region, designed to provide a durability of 99.999999999%.||Amazon Simple Storage Service|
|API||Engineering||An application programming interface (API) is a process through which software servers send requests for information and receive information. APIs create frictionless microservice, vendor, and system integrations for accurate information transfer. |
In a matter of seconds, all through API calls, a policyholder app may:
• Send user-submitted risk information to a backend processing system.
• Receive a quote based on the submitted information.
• Provide the policyholder with a quote.
|Application Programming Interface|
|ARR||Finance||Annual recurring revenue (ARR) is a measure of the predictable and recurring revenue components of recurring revenue stream such as subscriptions or maintenance. Annual Recurring Revenue always excludes one-time fees and, for most organizations, would exclude variable, usage, and consumption fees.||Annual Recurring Revenue|
|Asset||InfoSec||An asset is an item of value used for achievement of organizational mission/business objectives. Examples of assets include, but are not limited to, staff, servers, software, information, intellectual property, and applications.|
|Attachments||BriteCore System||Attachments is the screen where documents are stored in BriteCore, whether documents for a contact, policy, or claim. These screens exist throughout BriteCore.|
|Authentication||InfoSec||Authentication is the verification of the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.|
|Back-end developer/support||Engineering||A back-end developer is a type of programmer who creates the logical back-end and core computational logic of a website. The terms front end and back end refer to the separation of concerns between the presentation layer (front end), and the data access layer (back end) of a piece of software, or the physical infrastructure or hardware. The system's ability to recognize inaccurate information and provide feedback.|
Example: Changes made in the docker or terminal are back-end.
|BC||Operations||Business continuity (BC) is the advance planning and preparation undertaken to ensure an organization can operate its critical business functions during emergency events. Events can include natural disasters, a business crisis, pandemic, workplace violence, or any other event that results in a disruption of normal business operation. It's important to remember that you should plan and prepare not only for events that will stop functions completely, but also for those that have the potential to adversely impact services or functions.||Business Continuity|
|BCP||InfoSec||A business continuity plan (BCP) is the documentation of a predetermined set of instructions or procedures that describe how an organization’s mission/business processes will be sustained during and after a significant disruption.||Business Continuity Plan|
|Big Data||Engineering||Big data is infrastructure that stores carrier data and tools used to query and build visualizations on top of the data. Big data also relates to predictive analytics. |
• By inputting IoT (Internet of things), social media, demographic, and website analytics, carriers can create profiles for their customers.
• Through profile comparison, carriers can predict behaviors such as cancellation and renewal likelihood.
• Carriers can even use big data for fraud detection, comparing a claim submission with an insured’s previous claims to check for similar language.
|Blockchain||Engineering||Insurers use blockchain to manage policies and payments. Created with the intention of eliminating unnecessary third-parties in transactions, blockchain offers secure digital record management. |
• Using cryptocurrencies, like Bitcoin, carriers create smart contracts automatically to process transactions when publicly recorded events occur (such as a flight cancellation for travel insurance).
• Records can't be changed or updated, providing a reliable record system.
• Difficulties arise if an error occurred in the original transaction but can't be undone.
• Blockchain is also permissionless, meaning everyone has complete access to read and write transactions, increasing transparency but decreasing privacy.
|BOP||Insurance||A business owners policy (BOP) combines business property and business liability insurance into one convenient policy.||Business Owners Policy|
|Bound or unbound||Insurance||Binding refers to insurance coverage and means that coverage is in place, although a policy has yet to be issued. Binding often takes place through a verbal agreement in person or over the phone.|
|BPL||Services||Business process linkage (BPL) is an approach to diagramming business process workflows showing the key high-level activities that must be performed to complete a key task or achieve a desired objective.||Business Process Linkage|
|BriteCore||InfoSec||Intuitive Web Solutions, LLC d/b/a BriteCore is the provider of an enterprise-level insurance processing suite that combines core, data, and digital solutions into a single cloud-based platform.|
|Business Owner||InfoSec||A business owner is a person or organization responsible for the development, procurement, integration, modification, operation and maintenance, and/or final disposition of an information system.|
|CA||Content analysts (CA) work within BriteCore's Content Team to organize, analyze, and enter client product lines into the software.||Content Analyst|
|Catastrophe||Insurance||A catastrophe is a large magnitude loss that is fairly unpredictable, such as a tornado.|
|Certificate of mailing||Insurance||A certificate of mailing is a state-mandated document that proves you sent the items by registered mail. In BriteCore, this is a standard report that shows which printed deliverables need to be certified by the United States Postal Service to validate that the information was mailed to the insured. An example document that may require a certificate of mailing is a Cancellation Notice.|
|Chatbot||Engineering||Chatbots (through programmed rules or artificial intelligence) interact with users within a chat interface. Insurers can use chatbots to automate customer service and enhance direct distribution processes. There are four major use cases for insurance chatbots:|
1. User-initiated insurance processes, such as FNOL submission or policy application
2. Customer information retrieval directly from your website or insured portal
3. Agent or staff information retrieval from staff portals
4. Product integrations with digital assistants, such as Alexa, Siri, and Google
|CHD||InfoSec||At a minimum, cardholder data (CHD) consists of the full primary account number (PAN). CHD may also appear in the form of the full PAN, plus any of the following: cardholder name, expiration date, and/or service code. In addition, Sensitive Authentication Data is defined as security-related information, including but not limited to card validation codes/values, full track data (from the magnetic stripe or equivalent on a chip), PINs, and PIN blocks, used to authenticate cardholders and/or authorize payment card transactions.||Cardholder Data|
|Claim (or Occurrence)||Insurance||A claim is the reporting of an occurrence of an accident that has damaged property or injured people listed on an insurance policy.|
|Claimant||Insurance||A claimant is the person who reports a claim, requesting compensation from the insurance company by virtue of their insurance policy to repair/restore, replace, or heal their property and/or a person. Claimants include both the insured (policyholder) or a third-party individual whose property or person was damaged/injured by the policyholder.|
|Claims Payment||Insurance||A claims payment is money that is paid to the insured, third-party claimant, or vendors to repair/restore, replace, or heal the risk.|
|CMRR||Finance||Committed monthly recurring revenue (CMRR) is a forward-looking SaaS metric that combines actual monthly recurring revenue (MRR) data with known bookings and churn data. It begins with your existing MRR (for example, last month’s recognized MRR), adds known new bookings, and subtracts known cancellations and downgrades. For businesses that sell annual contracts, you will calculate this as a committed annual recurring revenue (CARR) number.||Committed Monthly Recurring Revenue|
|Code Contribution||Engineering||Clients help develop BriteCore through code contribution:|
1. Provider becomes a BriteCore customer.
2. Provider's developers go through BriteCore training.
3. Developers gain access to BriteCore's repository.
4. Developers work on and submit code to BriteCore's repository.
5. Incoming code must pass strict testing and QA guidelines.
6. Passing code gets merged directly into the system.
|Commit date||Insurance||A commit date is the date a revision or endorsement is put into force.|
|Company Confidential Information||InfoSec||Company confidential information is information appropriate for dissemination among staff, such as employee handbooks and internal process documents. It's information that, if disclosed externally, could harm BriteCore and/or its staff.|
|Computing Asset||InfoSec||A computing asset is a machine (real or virtual) that performs calculations automatically, such as computers, servers, routers, switches, etc.|
|Coverage||Insurance||The name of the specific type of insurance that is placed on a risk in the event it is damaged/injured by certain perils, including the maximum financial benefit the claimant receives to repair/restore, replace, or heal the risk.|
|CPM||Services||Consulting Product Manager|
|CPO||Product||Chief Product Officer|
|Critical System||InfoSec||A critical system is a system that meets one or more of the following criteria:|
• Infrastructure that processes or stores personal data.
• Security infrastructure such as bastion hosts, firewalls, or proxies.
• Third-party services that process or store personal data.
• Third-party services that manage access to personal data.
|Cron||Engineering||The software utility cron is a time-based job scheduler in Unix-like computer operating systems.|
|CSA||Services||Customer service advocates (CSR) are the front line responders for customer service and technical support to our clients.||Customer Service Advocate|
|DAP||Services||Director of Alliances and Partnerships|
|Data||InfoSec||Data refers to information in a specific representation, usually as a sequence of symbols that have meaning.|
|DSAR||InfoSec||A written request made by or on behalf of an individual for the information which he or she is entitled to ask for under privacy regulations such as GDPR and CCPA.||Data Subject Access Request|
|DayCron||Engineering||The software utility cron is a time-based job scheduler in Unix-like computer operating systems.|
|Deficiency||InfoSec||Deficiency is the quality or state of being defective or of lacking some necessary quality or element.|
For those with access:
(Added by Olly Giles)
|Deliverable||BriteCore System||A deliverable is any document that a client of ours formats and potentially prints and mails to a number of parties regarding a policy, such as declarations, invoices, statements, etc.|
|Digital Twin||Engineering||Digital twin refers to a virtual model of real-world processes. Working in tandem with data collected from telematics, IoT devices, and AI machine learning, a digital twin builds virtual models of real-world risks. These models can enhance predictive analytics, risk prediction, and underwriting efficiency.|
|Direct Distribution||Insurance||Through the direct distribution model, insurers use self-service technology to anticipate and meet digital consumer expectations. These initiatives build insurance products from the inside out, starting with customer experience and adapting products to fit ideal experiences.|
Examples: Websites, portals, and apps from which insureds can purchase and maintain insurance products directly, with no middle man.
|Disaster Recovery Plan||InfoSec||A disaster recovery plan is a documented plan outlining how to process critical applications in the event of a major hardware/software failure or facility destruction.|
|DNS||Engineering||A Domain Name System (DNS) is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it translates more readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols. The Domain Name System delegates the responsibility of assigning domain names and mapping those names to Internet resources by designating authoritative name servers for each domain. Network administrators may delegate authority over sub-domains of their allocated name space to other name servers. This mechanism provides distributed and fault-tolerant service and was designed to avoid a single large central database.||Domain Name System|
|DOD||Engineering||Definition of done (DOD): The agreed-upon state of a story at which point updates are complete and the changes are in an environment where the customer can review, approve, and test.||Definition of Done|
|DOR||Engineering||Definition of ready (DOR): The stories at the top of the Product Backlog that the team will be pulling into the Sprint Backlog must be Ready. Some companies actually require a detailed checklist to determine whether a story is “Ready Ready," and not just kind of ready, or sort of ready. The slides demonstrate this process nicely. Simply getting your stories ready will have an immediate and dramatic impact on the Team’s productivity.|
The Product Owner is responsible for putting the features and stories in the backlog. However, the team must work with the Product Owner during Backlog Refinement to help them get the stories into actionable shape. Only then will the team be able to estimate how much work any one story will take and how many Points they can take into a Sprint.
|Definition of Ready|
|DR||Operations||Disaster recovery (DR) involves preparing for and recovering from a disaster. Any event that has a negative impact on a company’s business continuity or finances could be termed a disaster. This includes hardware or software failure, a network outage, a power outage, physical damage to a building like fire or flooding, human error, or some other significant event.|
To minimize the impact of a disaster, BriteCore invests time and resources into planning and preparing for such events. BriteCore trains staff members and documents and updates processes on a regular basis to ensure the DR Plan is effective.
The primary goal of BriteCore’s DR Plan is business continuity. In the midst of any sort of natural disaster, BriteCore strives to ensure system users have optimum access to data and services so that business isn't interrupted. Through a variety of safeguards and features, including using the highest quality networking and hosting services, BriteCore systems have optimum uptime.
|Earned premium||Insurance||Earned premium is the cost of a policy per day; for example, a policy with a written premium of $365 earns $1 of that premium per day.|
|EBITDA||Finance||EBITDA, or earnings before interest, taxes, depreciation, and amortization, is a measure of a company's overall financial performance and is used as an alternative to simple earnings or net income in some circumstances. EBITDA, however, can be misleading because it strips out the cost of capital investments like property, plant, and equipment.|
This metric also excludes expenses associated with debt by adding back interest expense and taxes to earnings. Regardless, it's a more precise measure of corporate performance since it can show earnings before the influence of accounting and financial deductions.
Simply put, EBITDA is a measure of profitability. While there is no legal requirement for companies to disclose their EBITDA, according to U.S. generally accepted accounting principles (GAAP), it can be worked out and reported using the information found in a company's financial statements.
The earnings, tax, and interest figures are found on the income statement, while the depreciation and amortization figures are normally found in the notes to operating profit or on the cash flow statement. The usual shortcut to calculate EBITDA is to start with operating profit, also called earnings before interest and tax (EBIT), and then add back depreciation and amortization.
|Earnings Before Interest, Taxes, Depreciation, and Amortization|
|Elastic IP||Engineering||Elastic IP addresses are static IP addresses designed for dynamic cloud computing. However, unlike traditional static IP addresses, elastic IP addresses enable you to mask instance or Availability Zone failures by programmatically remapping your public IP addresses to instances in your account in a particular region. For DR, you can also pre-allocate some IP addresses for the most critical systems so their IP addresses are already known before disaster strikes. This can simplify the execution of the DR plan.|
|Elastic Load Balancing||Engineering||A load balancer distributes workloads across multiple compute resources, such as virtual servers. Using a load balancer increases the availability and fault tolerance of your applications.|
Elastic load balancing automatically distributes incoming application traffic across multiple Amazon EC2 instances. It enables BriteCore to achieve greater fault tolerance by routing traffic to healthy instances and relaunching instances that become unhealthy. Instance health is continually monitored by the elastic load balancing system. Using a load balancer increases the availability and fault tolerance of your applications.
|Employee||InfoSec||An employee is any person employed by Britecore who resides in a location where Britecore has established a legal entity.|
|Endorsement||Insurance||An endorsement is any change to a policy, such as increasing coverage, decreasing coverage, or changing the mortgagee.|
|Environment||Engineering||An environment refers to a designated instance of BriteCore.|
|Epic||Operations||Epic is an Agile methodology term describing a large chunk of development that is broken down into stories (or issues, as they are known in Jira).|
|ETL||Engineering||Extract, transform, and load (ETL) is a process in data warehousing responsible for pulling data out of the source systems and placing it into a data warehouse.||Extract, Transform, and Load|
|Event||InfoSec||An event is any observable occurrence in an information system.|
|Event Correlation||InfoSec||Event correlation refers to identifying/finding relationships between two or more log entries.|
|Executive Team||InfoSec||The Executive Team consists of staff who oversee a BriteCore division.|
|Exposure||Insurance||Exposure is the combination of a claimant, risk, and coverage that has emerged as a result of a claim.|
|Flat cancel||Insurance||A flat cancel is when a policy is canceled on its effective date.|
|FNOL||Insurance||The initial reporting of a loss to the insurance company by the insured, third-party claimant, or agent. The first notice of loss (FNOL) usually comes before any formal, official claim is filed. There is typically a process consumers and companies follow when making an FNOL. |
Procedures for an FNOL:
The insurance claims process involves a series of procedures from the time the insurer is alerted to when a settlement is made. FNOL starts the wheel of the claims cycle and occurs when the policyholder notifies the insurer of an unfortunate event. In the case of auto insurance, a driver informs the insurance company of a crash that occurred involving a vehicle. The driver is matched with a claims adjuster, whose role is to determine fault and amount of settlement. The adjuster determines the nature and severity of the damage to the policyholder’s vehicle. The adjuster's assessment relies on the police report, the other driver’s testimony, any witness accounts of the incident, a medical examiner’s report, and the damage done to the insured vehicle.
|First Notice of Loss|
|GTM||Product||A go-to-market (GTM) strategy is an action plan that specifies how a company will reach target customers and achieve competitive advantage. The purpose of a GTM strategy is to provide a blueprint for delivering a product or service to the end customer, taking into account such factors as pricing and distribution. A GTM strategy is somewhat similar to a business plan, although the latter is broader in scope and considers additional factors like funding.||Go to Market|
|Hotfix (aka software patch)||Engineering||A hotfix is a code release intended to fix a software issue that can't wait until the next standard release.|
|Hybrid Cloud||Engineering||Hybrid cloud strategies blend traditional on-premises and cloud hosting strategies:|
• Some carriers adopt a hybrid strategy when migrating from on-premises hosting to cloud hosting.
• Insurers interested in integrating a digital cloud strategy can use Amazon Web Services hybrid tools during implementation.
|IM||Insurance||Inland marine insurance (IM) indemnifies loss to movable or specialized types of property, historically developing as an outgrowth of ocean marine insurance. The inland marine insurance definition has evolved over time to cover a wide range of property and materials; property in transit.||Inland marine insurance|
|Incident||InfoSec||An incident is the loss, unauthorized acquisition, use, or disclosure of; or unauthorized access to BriteCore systems or data.|
|Incident Response||InfoSec||Incident response is the counter to and mitigation of violations/breaches of security policies and controls.|
|Independent Contractor||InfoSec||Any person employed by Britecore who resides in a location where Britecore has not established a legal entity.|
|Individual||BriteCore System||An individual is a person in the Contacts module.|
|Information||InfoSec||Information is any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual.|
|Information Security and Compliance Personnel||InfoSec||Information Security and Compliance refers to the BriteCore staff who work in an information/security and compliance capacity. See team page here for specifics on team members.||IS&C Personnel|
|Information Security Management||InfoSec||Information Security Management consists of the senior-most security leader with Security in their title as well as their direct manager.|
|Insurance Company||Insurance||An insurance company is the financially responsible party that compensates a Claimant for their loss by repairing/restoring, replacing, or healing the Claimant’s property or person.|
|Insurance Policy||Insurance||An insurance policy is a legal instrument used to transfer the financial risk to an insurance company of:|
• Property being damaged.
• People or businesses being injured in some manner.
This contract will state the perils covered by the insurance and the amount of compensation to be paid per policy as a whole, per claim/occurrence, and per risk.
|Insured||Insurance||An insured is the policyholder or person who purchased insurance.|
|Internal Adjuster||Insurance||An internal adjuster is an employee of the insurance company who is assigned to manage the claim from FNOL to settlement.|
|ISO||InfoSec||The International Organization for Standardization (ISO) is a global network of the world's leading standardizers. But beyond the task of guiding thousands of documents through drafting, review, voting and publication, they also offer a range of services that support our strategic goals. They work to help raise public awareness of standards and standardization. They promote the teaching of standardization, by participating directly in a joint masters program, helping members to set up similar programs and by maintaining a database of materials related to standards in education at all levels.||International Organization for Standardization
(Yes the letters above read IOS; the org abbreviates as ISO)
|ISO||Insurance||An insurance service office (ISO) takes into consideration the risks that will determine deductibles for products.||Insurance Service Office|
|IVANS||Insurance||Insurance Value Added Network Services (IVANS) is an interface for the exchange of insurance information between property and casualty insurers, agents, and trading partners. It serves as the insurance industry’s exchange connecting insurers, MGAs, agencies and the insured. IVANS cloud-based software automates the distribution and servicing of insurance products. Using the ACORD Automation Level 3 (AL-3) standard, industry partners can electronically exchange information, such as policy/submission information, claims, and accounting data.||Insurance Value Added Network Services|
|Legacy policy||Insurance||A legacy policy is an old policy.|
|Limits||Insurance||The claims system must enforce limits provided from the policy so payments never go over the limits or unless it is approved by a supervisor. Limits coming from the policy will vary by line of business.|
|Line of business||Insurance||Lines of business are classifications of business written by an insurance carrier, such as homeowners, mobile homeowners, farm owners, or business owners.|
|Lines||BriteCore System||Lines is a module in BriteCore and the name for individual coverages/exposures.|
|Log||InfoSec||A log is a record of events occurring within a system.|
|Loss exposure group||Insurance||A loss exposure group is a way to group coverages on a policy. It's often used on farms to insure multiple buildings (such as a farmhouse, barn, or hoghouse) and property items (such as tractors or combines) over a large geographic area.|
|Losses incurred||Insurance||Losses incurred refers to the total amount of money the carrier expects to pay on a claim, equaling the amount paid plus reserves.|
|MDM||InfoSec||Security software that enables organizations to implement policies that secure, monitor, and manage end-user mobile devices, such as laptops and cell phones.||Mobile Device Management|
|MFA||InfoSec||A security enhancement that allows you to present two pieces of evidence (your credentials) when logging in to an account. Your credentials fall into any of these three categories: something you know (like a password or PIN), something you have (like a smart card), or something you are (like your fingerprint). Your credentials must come from two different categories to enhance security, so entering two different passwords would not be considered multi-factor.||Multi-Factor Authentication|
|Microservices||Engineering||Microservice architecture is an alternative way to develop and deploy software applications: |
• Applications are created as a suite of independently deployable component services.
• Microservices run distinct, separate processes and are built with extensive communication capabilities for seamless interaction with other microservices.
Example: An insurer could use a rating microservice to instantaneously provide quotes to an agent, underwriter, and customer front-end portals.
|Modular||Engineering||Modular platforms can be deployed either as an entire integrated platform or made available as standalone elements. |
Example: A claims management module that is part of a broader core platform may be deployed on a standalone basis if the system is modular in nature.
|Monoline insurance||Insurance||A policy that covers one type of insurance; for example, workers compensation or commercial auto are often written as single, or monoline, coverage. A package policy includes two or more lines of insurance coverage.|
|Monolithic||Engineering||Monolithic platforms offer all features and functionality in a single suite: |
• Components of the suite work together to form one, self-contained application.
• Any alterations to the system are made at the platform level.
|Mortgagee||Insurance||A lender; typically a bank.|
|Multi-tenant||Engineering||In multi-tenant hosting, multiple clients work from the same cloud instance and database. Though generally cheaper, overuse can slow the instance and database. Software as a Service (SaaS) platforms, like Adobe Creative Cloud or Netflix, use multi-tenant hosting to provide access to services from a third-party cloud.|
|Multi-state||Insurance||Each state has autonomy over insurance coverage; multi-state insurance is the ease of processing and managing multiple policies in different states.|
|MVP||Product||A minimum viable product, or MVP, is a product with enough features to attract early-adopter customers and validate a product idea early in the product development cycle. In industries such as software, the MVP can help the product team receive user feedback as quickly as possible to iterate and improve the product.|
Because the agile methodology is built on both validating and iterating products based on user input, the MVP plays a central role in agile development.
|Minimum Viable Product|
|MVR||Insurance||Your motor vehicle report (MVR)—also known as your driving record—is essentially a report card for your driving. This is what your life insurance company will look at during the underwriting period.|
Your state’s DMV maintains your MVR or record, which includes your accidents and violations. Some of the types of incidents that would appear on your MVR include:
• Traffic citations.
• Vehicular crimes.
• Accident reports.
• DUI/DWI convictions.
These accidents and violations won't necessarily remain on your MVR forever. Depending on your state and the severity of the violation, an accident or violation may stay on your driving history for several years, or a decade or more.
Many states also use a point-based system to track violations—different types of offenses earn you different amounts of points. Accumulating too many points could result in license suspension or revocation.
Different state DMVs may also maintain multiple versions of your driving history. In Ohio, for example, you can see an unofficial driving record for free, but it only shows the past two years of your driving history. Alternatively, you can pay $5 to see your driver abstract, which shows the past three years of your history. In New York, drivers have both a standard driving record, with recent violations and accidents, and a lifetime driving record that includes every incident and violation from your entire history of driving in that state.
Your driving record isn’t as readily accessible as your credit report (which also affects your insurance ratings), but you can order your MVR from your state’s licensing agency.
|Motor Vehicle Report|
|NIST||InfoSec||NIST is a framework that is composed of guidelines that organizations follow to improve their computer program. Britecore uses NIST 800-53 to improve their cybersecurity program.||National Institute of Standards and Technology|
|On-Premises or Private Cloud||Engineering||Private cloud, on-premises (hosted by the insurer), and vendor-hosted deployment use virtualization tools and dedicated IT resources rather than cloud technology to maintain administration processes. This deployment model is almost obsolete, as 94% of companies use or are actively planning to use cloud services.|
|Organization||Operations||A business in the Contacts module.|
|PAN||InfoSec||Primary account number is also referred to as account number. It is a unique payment card number (typically for credit or debit cards) that identifies the issuer and the particular cardholder account.||Personal Account Number|
|Penetration Testing||InfoSec||The practice of testing a computer system, network, or web application to find security vulnerabilities that an attacker could exploit.|
|Per Location Limits||Insurance||An example of per location limits: Insured is a farmer and has 10 different locations, each with multiple buildings, varying equipment etc. This coverage would be at the location level and could be different for each location.|
|Per Occurrence Limits||Insurance||Per occurrence limits refer to the reporting of an occurrence of an accident that has damaged property or injured people listed on an insurance policy.|
Example: Policy will pay X dollars per person up to Y dollars per occurrence.
|Per Risk Limits|
(per person, for a specific vehicle, building)
|Insurance||Money that is paid to the insured, third-party claimant, or vendors to repair/restore, replace, or heal the risk.|
Example: Limits can be for a specific risk like a car or building, or more general like a per person limit, grouping all people together.
|Peril||Insurance||The cause of a claim, such as wind, fire, flood, earthquake, etc.|
|Persistent Builder||Engineering||A BriteCore tool that helps reconcile a policy's coverages when the policy renews onto a new Lines effective date.|
|Personal Data||InfoSec||Personal data shall be defined as data that consists of PHI, ePHI, PII, PAN, CHD or other data capable of identifying an individual in combination with any one or more of the following data elements:|
• Social security number.
• Driver’s license number or government issued non-driver identification card number.
• Credit or debit card number or Personal Account Number (PAN).
• Financial account number, such as bank account, brokerage account, or insurance policy number.
• Security code, access code, or password that would permit access to a consumer’s account.
• Biometric records.
• Insurance transactions, such as an insurance claim.
|PHI||InfoSec||Protected health information (PHI) is any information in the medical record or designated record set that can be used to identify an individual and that was created, used, or disclosed in the course of providing a health care service, such as diagnosis or treatment.||Protected Health Information|
|PI||Operations||A Program Increment (PI) is a timebox during which an Agile Release Train (ART) delivers incremental value in the form of working, tested software and systems. PIs are typically 8–12 weeks long. The most common pattern for a PI is four development Iterations, followed by one Innovation and Planning (IP) Iteration. A Program Increment is to an ART (or Solution Train), as an Iteration is to the Agile Team. It’s a fixed timebox for building and validating a full system increment, demonstrating value, and getting fast feedback. Each PI uses cadence and synchronization to: |
• Facilitate planning.
• Limit Work in Process (WIP).
• Summarize newsworthy value for feedback.
• Assure consistent, program-level retrospectives.
Due to its scope, the PI provides several observations appropriate for portfolio-level consideration and roadmapping.
|PII||InfoSec||Information that can be used to distinguish or trace the identity of an individual (name, Social Security number, biometric records, etc.) alone or when combined with other personal or identifying information that is linked or linkable to a specific individual (date and place of birth, mother’s maiden name, etc.).||Personally Identifiable Information|
|PO||Product||POs are domain experts that can clearly understand and articulate customer needs, convert those needs into epics, features, and user stories, and submit them to product teams for acceptance into the appropriate backlogs. As work is accepted and implemented by product teams, the PO communicates progress back to the customer, in near-real-time, and regularly hosts live demos in the customer’s UAT environment, potentially at the end of every 2-week iteration.|
POs gather all business requirements for go-live on BriteCore products.
|POs are domain experts that understand and articulate customer needs, convert those needs into epics, features, and user stories, and submit them to product teams for acceptance into the appropriate backlogs. As work is accepted and implemented by product teams, the PO communicates progress back to the customer, in near-real-time, and regularly hosts live demos in the customer’s UAT environment, potentially at the end of every 2-week iteration.
POs gather all business requirements for go-live on BriteCore products.
|Policy Aggregate Limit||Insurance||A large magnitude loss that is fairly unpredictable, such as a tornado.|
Example: On a commercial product liability policy, there may be a limit of $1M for a product. If there are three claims where total Incurred is $500k each, the policy will only pay out to the first two claimants.
*Personal auto doesn't have a Policy Aggregate Limit.
|Policy Level Coverage Limit||Insurance||The maximum amount the insurance company will pay for a particular loss or losses, subject to the terms and conditions of the insurance policy.|
|Policy Print||Engineering||A process that runs each night to print all paper deliverables for clients.|
|Policy type||Product||This is a flexible term that can either refer to a line of business or forms within a line of business, depending upon your setup. Within the insurance world, this may be referred to as an insurance product or insurance package. |
• Line of business
• Policy type/form/insurance package
|Portable Storage Device||InfoSec||A portable device that can connect to an information system (IS), computer, or network to provide data storage. These devices interface with the IS through processing chips and may load driver software, presenting a greater security risk to the IS than non-device media, such as optical discs or flash memory cards. Examples include, but are not limited to USB flash drives, external hard drives, and external solid state disk (SSD) drives. Portable storage devices also include memory cards that have additional functions aside from standard data storage and encrypted data storage, such as built-in Wi-Fi connectivity and global positioning system (GPS) reception. |
Also see Removable Media.
|Postmortem||InfoSec||A process, usually performed at the conclusion of a project or event, to determine and analyze elements of the project that were successful or unsuccessful.|
|PR||Engineering||Pull requests let you tell others about changes you've pushed to a branch in a repository on GitHub. Once a pull request is opened, you can discuss and review the potential changes with collaborators and add follow-up commits before your changes are merged into the base branch.||Pull Request|
|Premium records||Insurance||The daily log of written, earned, and unearned premium.|
|Print_hawk||Engineering||A process that handles sending out print summary emails to the administrators of our clients.|
|Pro-rata premium||Insurance||The cost of a policy for the remainder of the term when the premium is changed.|
|Production||Engineering||Master/final site we go live with.|
|Protection Class||Insurance||The 10 categories used by Insurance Services Office, Inc. (ISO) to rank the fire protection in cities and towns according to the following three factors:|
1. Fire department quality, including distance from the residence to the fire department.
2. Water supply system.
3. Fire alarm and communications systems.
|Public Cloud||Engineering||Public cloud refers to cloud hosting offered by a third-party vendor, such as Amazon Web Services or Microsoft Azure.|
By removing expensive barriers to hosting, maintenance, and upgrading, insurers have complete control over their information. Public cloud hosting can be multi-tenant or single-tenant.
|Public Information||InfoSec||Information approved to be released to the public, such as marketing and sales materials. This may also include information that is commonly available in a public setting, such as organizational contact information and general information regarding products and services.|
|PUM||Services||Total problems that customers reported: (true defects and non-defect-oriented problems) for a time period / total number of license-months of software during a time period||Problems Per User Month|
|Rating rules||Insurance||A rule set, algorithm, or rate chain that determines the premium rate.|
|Recoveries||Insurance||Amounts an insurance company recoups when a claim occurs, which could be from a reinsurance company, another insurance company or vendor (subrogation), or selling the scrap from a loss (salvage).|
|REDIS||Engineering||Remote Dictionary Server (REDIS) is a fast, open-source, in-memory key-value data store for use as a database, cache, message broker, and queue. The project started when Salvatore Sanfilippo, the original developer of REDIS, was trying to improve the scalability of his Italian start-up. Redis now delivers sub-millisecond response times enabling millions of requests per second for real-time applications in gaming, ad-tech, financial services, healthcare, and IoT. REDIS is a popular choice for caching, session management, gaming, leaderboards, real-time analytics, geospatial, ride-hailing, chat/messaging, media streaming, and pub/sub apps.||Remote Dictionary Server|
|Reinstatement||Insurance||Putting coverage back in force after a policy cancels.|
|Reinsurance||Insurance||Insurance for insurance companies.|
|Removable Media||InfoSec||Portable data storage medium that can be added to or removed from a computing device or network. Examples include, but are not limited to optical discs (CD, DVD, Blu-ray); external/removable hard drives; external/removable solid-state disk (SSD) drives; magnetic/optical tapes; flash memory devices (USB, eSATA, flash drive, thumb drive); flash memory cards (Secure Digital, CompactFlash, Memory Stick, MMC, xD); and other external/removable disks (floppy, Zip, Jaz, Bernoulli, UMD). |
Also see portable storage device.
|Reserve||Insurance||The amount of money an internal adjuster estimates will be needed to settle a claim and the costs incurred by the insurance company to manage the claim.|
This is important to the insurer so they know how much money will be needed to meet their financial obligations.
|Restricted Information||InfoSec||Information that, if disclosed, could cause serious and irreparable harm to BriteCore, its staff, or customers. Examples include employee records, customer data, and vendor intellectual property.|
|Revision||BriteCore System||At BriteCore, a legal change to a policy that requires that the policy be revised (amendments made to an existing policy). Revisions can have several states.|
|Risk||Insurance||The item listed on the insurance policy for which insurance has been purchased (car, building, house, equipment, business, person injury). Risk could also be a third party, property, or person.|
|Risk Management||InfoSec||The process of managing risks to organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals resulting from the operation of an information system, and includes: (i) the conduct of a risk assessment; (ii) the implementation of a risk mitigation strategy; and (iii) employment of techniques and procedures for the continuous monitoring of the security state of the information system.|
|RPA||Engineering||Eighty percent of executives state insurers are already investing or planning to invest in Robotic Process Automation (RPA) and AI within the next three years. RPA and AI are similar in their use of computers to process vast stores of data. |
• While AI uses machine learning to learn and improve decisions over time, RPA machines process and make decisions through programming only; RPAs do not make insights on their own, but rather operate by using long, complex algorithms quickly over large sets of data.
• RPAs automate repetitive processes, such as time-consuming duplicate entry.
• Carriers investigated RPA as a way to work around malfunctioning core systems, but these attempts were found unfavorable.
|Robotic Process Automation|
|Rule sets||Insurance||Underwriting or rating rules.|
|SaaS||Product||Software as a Service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.||Software as a Service|
|SAFe||Operations||Scaled Agile Framework (SAFe) promotes alignment, collaboration, and delivery across large numbers of Agile teams. It was developed by and for practitioners, by leveraging three primary bodies of knowledge: Agile software development, lean product development, and systems thinking.||Scaled Agile Framework|
|SBA||Services||Business Analysts are responsible for defining, implementing, and evolving a comprehensive suite of capabilities for our platform. They possess a blend of technical, business, and analytical roles in one. ||Services Business Analyst|
|Scrum||Operations||Scrum is a framework within which people can address complex adaptive problems while productively and creatively delivering products of the highest possible value.|
|Sentinel||Engineering||The sentinel concept and role are at the front lines of BriteCore quality. Individuals who are designated as sentinels are the only users who have merge access to the BriteCore code. On average, sentinels review about three PRs a day. Judgment and wisdom are essential to success in this role.|
|SIEM||InfoSec||A security information event management system (SIEM) is an application that provides the ability to gather security data from information system components and present that data as actionable information via a single interface.|
SIEM is also defined as a set of tools used to manage multiple security applications and devices and to respond automatically to resolve security incidents and provide real-time monitoring and historical reporting of information security events from network, servers, systems, and applications.
|Security Information Event Management System|
|Single Tenant||Engineering||In single-tenant hosting, each client is hosted on its own instance, meaning each client has its own website and database. Single-tenant hosting offers increased flexibility, scalability, and security.|
|SO||Operations||Serve as the primary relationship and backlog manager for implementing and servicing BriteCore customers who run their business on our software.||Service Owner|
|SOC Report||Operations||Both internal and external stakeholders demand trust and transparency. Because risk management is an enterprise-wide concern, many organizations devote significant time and resources to deliver assurance.|
Any organization can provide insight and stakeholder assurance through System and Organization Controls (SOC) reporting. SOC reporting offers a cohesive, repeatable reporting process through which companies can assess once and report out to many stakeholders. SOC reporting can:
• Reduce compliance costs and time spent on audits and filling out vendor questionnaires.
• Meet contractual obligations and marketplace concerns through flexible, customized reporting.
• Proactively address risks across an organization.
• Increase trust and transparency to internal and external stakeholders.
|System and Organization Controls|
|Soft Release||Engineering||Soft release is a BriteCore term that means a client has a release that isn't part of the core product. Soft releases often become part of core software once tested by clients.|
|Staff||InfoSec||Staff include BriteCore employees, independent contractors, and vendor-supplied personnel.|
|SSH||Engineering||Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.|
Use Shell Tool page in Wiki.
Mutual Boiler Re
Regenerate a File
Shell tools > vendors > mbr_generate. When regenerating the file for a given month, use the date of the next month.
To regenerate February files enter 03-YYYY for the month prompt.
INSVista (search for shell tools) https://support.britecorepro.com/insvista/?rq=shell%20tools
|STP||Engineering||Straight-through processing (STP) allows companies to have the same information streamlined through a process across multiple points.||Straight-Through Processing|
|Sublines||Insurance||A subline is a group of line items.|
|System||InfoSec||A system refers to a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.|
|TAM||Finance||Total addressable market (TAM), also called total available market, is a term that is typically used to reference the revenue opportunity available for a product or service. TAM helps to prioritize business opportunities by serving as a quick metric of the underlying potential of a given opportunity.||Total Addressable Market|
|Third-Party Counsel||InfoSec||Britecore’s external legal counsel.|
|Threat Actor||InfoSec||A threat actor is an individual or group that poses a threat.|
|Threat Source||InfoSec||A threat source, or threat agent, is the intent and method targeted at the intentional exploitation of a vulnerability or a situation and method that may accidentally trigger a vulnerability.||Threat Agent|
|TIV||Insurance||Total insurance value (TIV) is a property insurance term that refers to the sum of the full value of the insured's covered property, business income values, and any other covered property interests, which helps the insurance company determine its risk exposure.||Total Insurance Value|
|TL;DR||Operations||Shorthand to add at the end of a long Slack post. Offers a quick summary of lengthy, detailed information.||Too Long; Didn't Read|
|Toggling||Insurance||Toggling refers to the ease of going between two different forms of insurance.|
|Total Incurred||Insurance||Total incurred: Available Reserves + Paid to Date - Recovered|
|UAT||Engineering||User acceptance testing (UAT) is phase of the development release cycle in which clients/customers of the software use the features, typically in a test environment, and report issues and unexpected behaviors. The updates to the software found in UAT can be made and rolled into the software release or planned for a future release.||User Acceptance Testing|
|ULAE||Insurance||Cat Level, Loss Event Level, Claim Level|
Unallocated loss adjustment expenses (ULAE) are more general than allocated loss adjustment expenses (ALAE) and may include overhead, investigations, and salaries. Insurers that use in-house employees for field adjustments would report those expenses as a ULAE.
Also see Allocated loss adjustment expenses (ALAE).
|Unallocated Loss Adjustment Expense|
|Underwriting rules||Insurance||Underwriting rules are a rule set that specifies that, under certain conditions, the company should do this/exclude this, etc. |
Example: An agent quotes a risk number, then underwriting rules say “We won't insure anyone over a 4, stop quoting.”
|Vendor||InfoSec||A vendor is a third-party organizational entity with whom BriteCore contracts and pays for agreed-upon services.|
|Vendor-Supplied Personnel||InfoSec||Vendor-supplied personnel are people employed by a BriteCore vendor who perform services for Britecore. In this relationship, Britecore pays the vendor entity, who in turn pays the individual personnel.|
|Work Stream||Operations||Work stream is the progressive completion of tasks completed by different groups within a company that are required to finish a |
|Written premium||Insurance||Written premium is the cost of a policy.|
|WSJF||Engineering||Weighted Shortest Job First (WSJF) is a prioritization model used to sequence jobs (eg., features, capabilities, and Epics) to produce maximum economic benefit. In SAFe, WSJF is estimated as the cost of delay (CoD) divided by job size. Agile Release Trains (ARTs) provide an ongoing, continuous flow of work that makes up the Enterprise’s incremental development effort. It avoids the overhead and delays caused by the start-stop-start nature of traditional projects, where authorizations and phase gates control the program and its economics. While this continuous flow model speeds the delivery of value and keeps the system Lean, priorities must be updated continuously to provide the best economic outcomes. In a flow-based system, job sequencing, rather than theoretical, individual job return on investment, produces the best result. To that end, WSJF is used to prioritize backlogs by calculating the relative CoD and job size (a proxy for the duration). Using WSJF at Program Increment boundaries continuously updates backlog priorities based on user and business value, time factors, risk, opportunity enablement, and effort. WSJF also conveniently and automatically ignores sunk costs, a fundamental principle of Lean economics.||Weighted Shortest Job First|