Beruflich Dokumente
Kultur Dokumente
of Things
in insurance
Shaping the right
strategy, managing
the biggest risks
The Internet of Things in insurance: shaping the right strategy, managing the right risks www.ey.com
Until recently, the Internet of Things (IoT) was on The IoT offers truly disruptive and transformative
the strategic agenda of only the largest and most potential to the insurance industry. Substantial
progressive insurers. The IoT was largely viewed as a mhka\]È]n]fÕjkl%egn]jY\nYflY_]È]paklk^gj
futuristic concept, and many insurers adopted a “wait insurers that can shape the right strategy. This paper
and see” attitude. will outline the key components of such a strategy,
including:
Such a posture is no longer viable. Early adopters have
established a clear and compelling value proposition • Processes, functions and areas where the IoT
by demonstrating how data from in-home and could have the biggest business impacts
automotive sensors, wearable technology, drones, • The biggest and most important risks to manage —
GPS, mobile and telematics devices, networked data security chief among them
appliances and multiple other sources can help
• :]klÕjklkl]hk^gjafkmj]jkk]]caf_lg
grow new business, improve risk assessment and
operationalize — and ultimately monetize — data
proactively engage policyholders in loss prevention.
from the IoT
1
The Internet of Things in insurance: shaping the right strategy, managing the right risks www.ey.com
The IoT:
what it is, why it matters in insurance
The Internet of Things is the network or system • Location-based sensors, such as those in
of interrelated computing devices, sensors, living ^Y[lgja]k$oYj]`gmk]kgjg^Õ[]kYf\af%`ge]
[j]Ylmj]kgjgl`]jgZb][lkl`Yl`Yn]mfaim]a\]flaÕ]jk sensors, including “smart thermostats,” security
and can communicate with other devices on the technologies, such as alarms and cameras, and
network. These objects, or “things,” are capable of industrial control systems
transmitting data. • Other geographic information systems (GIS) that
For insurers, the most impactful data streams and provide geophysical, topographical, climatological
sources from the IoT are likely to include: and hydrological data, as well
Ykaf^gjeYlagfYZgmlmladalq_ja\kYf\Öa_`lhYl`$
• Wearable or personal technology, sometimes
and that may include drone and
[Ydd]\ÉÕll][`$Êg^l]fmk]\afl`][gfl]plg^
satellite imagery
monitoring heart rate, steps walked and other
health-related metrics. This technology is rapidly While this data is directly accessible by or streams
developing, with prototype patches already to insurers via sensors or mobile devices, third-
performing blood work and ECGs and automatically party organizations may also play a role in owning,
administering drug doses. aggregating, and distributing to insurers. All of these
data types are potentially useful for the full range
• Sensors on objects, including personal and
of products and lines of business, from commercial
commercial vehicles and shipping containers, that
0 1 0 10 1 01010
(which was an early adopter and has been an
1
0101010
measure distances traveled, speeds and frequency
and level of braking
1 0 1 0 1 0 1 0 1 01
1 0 10 1 01 0 1010
advanced user of such data for many years), to life,
0101010 0101010
property and casualty and health.
0 1 0 1 0 1 0 1 0 1 0 1
0 1 0 1 0 1 0 1 0 1 0 1
0 1 0 1 01 0 10101
1 1 1
010101010 01010101010101010 01010101010101010 010101010101
1 1 1
010101010 01010101010101010 01010101010101010 010101010101
1
010101010 Wearable 0 1 0on101 Location-based 0 1 101
0Geographic
0 1 0 1 0 1 or 01010
0 1 1
Sensors
0 1 0 1 0 1 0 1 0 1 0 1 0 1
01 0 1 0 1 01 010101
101010101 technology, 01010 1 101010 1
010101
personal objects — sensors in information
1 0 1 0 1 0 1 0 1personal 1 0 1 0 1 0 1 0 1 01 0 1
0 1 0 010101
and
0 1 0 factories,
0
systems
1 10and
101010101sometimes
1 0 1 0
called 101commercial
1 0 1 0 1 0 1 0 1 1 0 1
warehouses,
0 0 10 providing 101010
1010satellites
1 0 1010
1010 1 0 vehicles1
10 0
and 1 0 g^Õ[]kYf\`ge]kÈ
1 0 1 0 1 0
geophysical,
1010 0101010shipping01010101“smart” 0101010 topographical, 0101010
ÉÕll][`Ê
01 0 1 0 1 0 1 1 0 1 01 0 1 0 1
1010101 0 1 0 1 0 1 0101
01containers 0 1 0 1 0 1
thermostats, 01010climatological and
01 0 10 1 010
01 0 1 0 1 0 1 0 10 1
101010101 10101010101010101 10101cameras 101010101 101010101010
alarms and hydrological data
0 1 0
10 10 10
010101010 01010101010101010 01010101010101010 0101010101010
1 1 1
010101010 01010101010101010 01010101010101010 010101010101
1 1 1
010101010 01010101010101010 01010101010101010 010101010101
1 1 1
010101010 01010101010101010 01010101010101010 010101010101
1 1 1
010101010 01010101010101010 01010101010101010 010101010101
1 1 1
010101010 01010101010101010 01010101010101010 010101010101
101
10101010The 0 1 0 1 0 1 0 1 010101 0 1 0 1 0 1 01 010101 0 101010
1 0 1 0 1 0 1 1 0 1 0is 1 0 1 0 1 0 1 0 1 0 1
10101010have traditionally 0101010 010101
ability to directly access customer data via the IoT a new phenomenon for insurers that
01 0 1 0 1 0 1 0 1
relied 0
on 1
brokers.
0 1 0 1 0 1 0 1 0 1 0 1
0 1 01 0 1 0 1 0101010
1010101 1 0 1 0 1 0 1 0 1010101 1 0 1 0 1 0 1 0 1010101 10 1 01 0 10 1010
0 0 0
101010101 10101010101010101 10101010101010101 101010101010
10 10 10
010101010 01010101010101010 01010101010101010 0101010101010
2
010101010
1 010101 010101
101010101 101010101 101010101
The Internet of Things in insurance: shaping the right strategy, managing the right risks www.ey.com
The impact:
today and tomorrow
The IoT’s impact within insurance is coming fully into focus.
At the highest level, better use of IoT and sensor data
means insurers have the opportunity to:
• Establish direct, unmediated customer relationships
ZYk]\gf\aj][lY[[]kklggZb][lan]Yf\mfÕdl]j]\\YlY
• Gain more granular and precise understanding
of who their customers are and how their needs
change over time EY’s 2016
• Individualize offerings of products, features and Sensor survey:
access options
lagging insurers must
For insurers that have relied on agents and brokers,
l`]YZadalqlg\aj][ldqY[[]kkgZb][lan]Yf\mfÕdl]j]\
embrace new data
customer data represents enormous change. In 2016, EY’s global insurance practice
Historically, much customer data was unavailable, [gf\m[l]\YÕjkl%g^%alk%caf\kmjn]q
and the information insurers could access was often lg]phdgj]l`]aehda[Ylagfkg^k]fkgj%
subjective or inaccurate. Consider the common based technology with C-level and
misrepresentation of data around certain behaviors gl`]jk]fagj]p][mlan]k^jgeafkmjYf[]
kegcaf_$Yd[g`gdaflYc]$]p]j[ak]j]_mdYjdq$ead]k and other industries. The objective
driven per week) on insurance applications. The IoT g^l`]_dgZYdj]k]Yj[`oYklg\]Õf]
_j]Yldq]phYf\kl`]mfan]jk]g^Y[[]kkaZd]\YlY$ the ways in which new data and
opening up new possibilities in many functions. emerging technologies might shape
business innovation, product and
Coupled with advanced analytics capabilities, new data
pricing strategies, risk and regulatory
streams and sources have set the foundation for entirely
management, customer engagement
new business models. Usage-based insurance (UBI) —
and operational transformation.
so-called “pay-as-you-live” or “pay-as-you-drive” business
models — have quickly moved out of pilot phases and L`]kmjn]qj]kmdlk[gfÕjel`Yl
proved their viability and value around the world. In insurers lag considerably behind their
fact, there are an estimated 5 million active UBI policies counterparts in other sectors when
in 35 different countries. From this relatively low base, it comes to their ability to optimize
EY estimates that UBI policies will reach 15% market long-term value, collaborate with
penetration by 2020 in Europe, Asia and the Americas. [mklge]jk^gjdgf_%l]jeZ]f]ÕlkYf\
utilize new insights.
3
The Internet of Things in insurance: shaping the right strategy, managing the right risks www.ey.com
4
The Internet of Things in insurance: shaping the right strategy, managing the right risks www.ey.com
5
The Internet of Things in insurance: shaping the right strategy, managing the right risks www.ey.com
Zmqegj]hjg\m[lk&Jakca]jYf\d]kkhjgÕlYZd] L`]Y[lagfhdYf2kh][aÔ[Ôjklkl]hk
customers should not necessarily be encouraged
to renew or make additional purchases. For an • Engage customers to identify
Customer l`]nYdm]l`]qk]]caf]p[`Yf_]
industry obsessed with upselling, such data-driven
data security for data
“downselling” may seem illogical. The business
and privacy • Revisit data protection protocols
case is compelling however, as downselling not only
and new, emerging architectures
ZggklkhjgÕlk$ZmlYdkgghlaear]kl`][mklge]jeap
^gjhjgÕlYZadalq& • Don’t store or maintain
customer data that is readily
Engage underwriting available
9kf]o\YlYkgmj[]k]f`Yf[]l`]nYdm]g^]paklaf_
historical data sets, underwriting teams can — and • <]Õf]f]oim]klagfkl`Ylf]]\
should — play a more active role in product design — Creating an to be asked and answered
especially in the realm of modular and customizable analytics • Create focus on layering insights
product architectures. By marrying different data culture back into business as usual
sets (e.g., GIS and wearable technology), insurers can • Second-guess old architectures
realize step gains in enhancing modeling capabilities. Yf\\jan]kaehdaÕ]\YhhjgY[`]k
• <]n]dghljYfkhYj]flYf\Ö]paZd]
Life product structures and dynamic
payment capabilities for usage-
based and “pay-as-you-go”
models
• Seek to engage customers
based on their needs (not your
products)
6
The Internet of Things in insurance: shaping the right strategy, managing the right risks www.ey.com
ice
an increase in
opportunities as
well as complexity
An
and risk.
An
try
yn
et
us
w or d
k A ny in
7
The Internet of Things in insurance: shaping the right strategy, managing the right risks www.ey.com
As insurers become more reliant on IoT streams, the There are strategic risks to consider as well, including:
stakes surrounding security rise. Among the initial • Imitation risk: Fast followers naturally seek
steps to take: to mimic the product features added by early
• Prepare plans to address customers who demand adopters. Data-driven capabilities — such as risk
more value (e.g., lower premiums or increased models that allow for clearer assessment and
Z]f]Õlk!^gjk`Yjaf_af^gjeYlagf segmentation of customers that enable advanced
• Consider enhancement to generic, blanket privacy personalization — are not so easily replicated.
policy statements and protocols Similarly, innovations in the realm of the digital
[mklge]j]ph]ja]f[]Yj]jYha\dq[geeg\alar]\$
• Don’t store or maintain customer data (especially
while the ability to identify the most valuable and
[]jlYaflqh]kg^h]jkgfYddqa\]flaÕYZd]
predictive third-party data sources is defensible
af^gjeYlagf!l`YlakYnYadYZd]^jge]pl]jfYdhYjla]k
and offers greater long-term value to the business.
• Consider engaging regulators and industry peers
• Perfection paralysis: The old saying that the “great
in developing robust or auditable “Generally
is often the enemy of the good” applies here. There
Accepted Privacy Principles”
is risk that companies will seek ever more clarity or
• Build organizational resilience as part of IoT “perfect vision” via sensor data, without seeking
cybersecurity solutions to drive competitive to act on incremental gains and the immediately
advantage possible (such as alliances with device makers and
Gf]oYqlgj]\m[]]phgkmj]aklg^g[mkgfÕf\af_l`] automakers). Acting too slowly or remaining too
ja_`lhYjlf]jkYf\]pl]jfYdkgmj[]kl`Yl[Yfhjgna\] long in pilot or “science project” phases raises the
and maintain high-value data, though insurers will risk that insurers will be left behind. This applies to
want to vet the security policies and practices of all the IoT security space as well. There is no such thing
data suppliers. Ykh]j^][lk][mjalq&Jakckf]]\lgZ]a\]flaÕ]\mkaf_
a variety of approaches and managed through a
IoT security is an ongoing process with a distinct
sustainable process.
life cycle. It should begin during the earliest phases
of product development and conceptualization, The interconnectivity of people, devices and
and ends only when an IoT-connected device organizations and new access points in today’s
is decommissioned. The critical steps include digital world open up new vulnerabilities where
identity and access management, product security cyber criminals can gain access to sensitive data and
development, security monitoring and vulnerability kqkl]ek&L`]]phYf\]\ghhgjlmfala]kg^l`]AgLYdkg
management, as well as data protection. Zjaf_f]o[gehd]palqYf\jakc&
det l
ec
systems and personnel. ti o
evi
n
sy
d
own
i ty
ng
Data analytic
Social media
Internet of T
BYOD (Bring
a fence is no longer r
Cloud hosti
ou
Big data
attackers at bay.
s
Data
8
The Internet of Things in insurance: shaping the right strategy, managing the right risks www.ey.com
9
EY t9kkmjYf[]tLYptLjYfkY[lagfkt9\nakgjq
About EY
=QakY_dgZYdd]Y\]jafYkkmjYf[]$lYp$ljYfkY[lagfYf\
advisory services. The insights and quality services we
deliver help build trust and confidence in the capital
markets and in economies the world over. We develop
outstanding leaders who team to deliver on our
promises to all of our stakeholders. In so doing, we play
a critical role in building a better working world for our
people, for our clients and for our communities.