In This Issue

PRIMA Scholarship Applications

Safety Partners Grant Applications

Free Assessments

Changes to Drug Rule

Thieves Hacking Car Electronics

Tennessee Trivia

Q. What Tennessee lake is touted as the “Turtle Capital of the World?”

Click Here for the Answer

Message from the President

Dawn We are less than a month away from our first annual Risk & Insurance Symposium, set for Monday and Tuesday, Aug. 15-16, at the Cool Springs Embassy Suites in Franklin, Tennessee! Registration has been tremendous, and we have just received notice from the State of Tennessee Comptroller’s Office allowing up to seven (7) hours of eligible CMFO credit for attendees.

This year’s agenda features a number of topics, including:

    Keynote Session – Creating a Culture of Safety and Personal Responsibility
    This intriguing presentation will detail a real-life scenario in which a public works employee was buried after a trench collapsed. Based upon his personal experience, the speaker will teach participants the importance of personal responsibility in safety.

    Privacy & Network Liability
    This session will cover laws that apply to governmental entities, and will provide samples of specific policies local governments should have in place, along with information on evaluating your exposure(s).

    Third-Party Facility Use / Special Events
    Exposures created by third parties and special events will be highlighted in this session, along with protective measures mitigating these risks.

    Accident or Incident Investigation Best Practices
    This session will address best practices for accident or incident investigations, including vehicle accidents, and workers’ compensation and liability claims.

    Defensive Driving ― National Safety Council DDC4 Training
    This nationally recognized course is designed to help minimize auto liability loss exposure for local governments. Participants will learn about the aspects of collisions, defensive driving strategies, methods for avoiding distractions — such as talking and texting, and more. (Note: Seating is limited for this session.)

    Understanding Litigation Filed Against Your Entity
    This session will help participants gain a better understanding of processes and procedures when litigation is filed against your entity. In particular, this session will touch on Title VII, Americans with Disabilities Act (ADA), Family Medical Leave Act (FMLA), Age Discrimination in Employment Act (ADEA), Tennessee Human Rights Act (THRA), Tennessee Public Protection Act (TPPA), and Public Employee Political Freedom Act (PEPFA).

    Top 20 Most-Cited OSHA Standards of 2015
    This session will review the top 20 most-cited OSHA standards of 2015 for local governments.

    Are You Prepared for Tennessee’s Sunshine? (Open Records)
    The Tennessee Public Records and Tennessee Open Meetings Acts establish a number of requirements for governmental entities and governing bodies. In this session, we’ll explore a range of related topics, including what constitutes public records, responding to requests for information, requirements for open and closed meetings, and best practices.

    Municipal Use of Drones and Unmanned Aerial Systems (UAS)
    Drones and UAS can be powerful tools for government and municipalities. This session will illustrate how entities are using them to achieve greater efficiency and safety. Participants will also review relevant state and federal laws, and will gain an understanding of concerns regarding liability and physical damage.

    109th General Assembly Update
    Senator Bill Ketron (R-Murfreesboro) will provide an update on the 2016 session of the 109th General Assembly.

Remember, there is no registration fee to attend the symposium. To register and reserve your hotel room, please visit: We hope to see you there!

Best Regards,
Dawn R. Crawford

PRIMA Institute Scholarship Applications Due in Early August

Applications are now available for Public Entity Partners’s Excellence in Risk Management Scholarship, which provides financial assistance for qualified members to attend the annual PRIMA Institute. Scholarship applications are due by Monday, Aug. 8.

PRIMA Institute is a five-day, comprehensive risk management educational program designed for both new and experienced managers who seek to learn more about emerging trends and best practices. The 2016 PRIMA Institute will be held October 24-28 in Pittsburgh, Pennsylvania.

Visit to learn more about this opportunity or to complete the scholarship application.

For questions about Public Entity Partners’s grant or scholarship programs, contact Tahtia Mitchell at

Return to the top

Safety Partners Grant Applications Now Being Accepted

Applications are currently being accepted for Public Entity Partners’s Safety Partners Matching Grant Program, offered to members with workers’ compensation coverage through Public Entity Partners.

Please note that the deadline for applications is Friday, Aug. 12. However, time is of the essence with this grant, so members are encouraged to apply as soon as possible.

The Safety Partners Matching Grant Program helps eligible PE Partner members purchase safety items designed to reduce workers’ compensation claims. Public Entity Partners will reimburse up to 50 percent of costs for approved, safety-related items

Reimbursable items include expenditures for employee safety devices, equipment and safety training, or employee education/training that is necessary to control an employee safety hazard.

Please visit if you have not already completed your application.

For questions about Public Entity Partners’s grant or scholarship programs, contact Tahtia Mitchell at

Return to the top

Privacy and Network Liability Session Includes Offer of Free Assessments

Public Entity Partners’s upcoming Risk & Insurance Symposium will include a Privacy and Network Liability session led by Viv Gordon of PC Solutions (PCS). In addition to helping PE Partner members understand related laws and best practices, Gordon will be offering free assessments for interested PE Partner members to help identify security risks on their enterprise networks.

These free assessments will help increase awareness of network security risks, and allow members to identify and prioritize potential security gaps for their entities.

Security risks include web file sharing, file storage applications, malicious websites malware threats, server vulnerability and bandwidth issues. PCS will review these issues and provide personalized, comprehensive threat analysis reports that include detected security incidents and recommendations for network protection.

Return to the top

Changes Made to Bureau of Workers’ Compensation Prescription Drug Rule

A new drug formulary rule adopted by the Bureau of Workers’ Compensation now requires prescribers and pharmacies to obtain prior approval for certain medications being filled as part of a claim.

To be accepted, prescriptions must meet specific requirements within the Bureau of Workers’ Compensation formulary listing. Medications not included on the listing can still be prescribed if the treating physician can show that there is no satisfactory substitute. However, prior authorization must be obtained before affected prescriptions can be filled.

Employees whose prescriptions are not included on the formulary listing should make note of these important dates:

  • Medications affected by this rule and prescribed for the first time under claims with a filing date prior to January 1, 2016, will require prior approval for refills beginning February 28, 2017.

  • Medications prescribed and dispensed for the first time under claims dated after January 1, 2016, will require prior approval for refills beginning August 28, 2016.

Each workers’ compensation claimant will be receiving written notification regarding any impact this new rule will have on existing claims.As always, claimants can direct related questions to a workers’ compensation adjuster. Please call 800-624-9698, and we can connect you with someone who can assist.

Public Entity Partners uses Helios for management of pharmacy benefits related to workers’ compensation claims. Please note that Helios is in the process of merging with Optum, a part of United HealthCare. Until the merger is complete, both brands may appear on related sites and documents.

More information can be found on the Bureau’s website at: or

Return to the top

Police and Insurers Say Thieves are Hacking Car Electronics

Publication Date: 07/05/2016
Source: Dow Jones News Service

By Jeff Bennett

Police and car insurers say thieves are using laptop computers to hack into late-model cars' electronic ignitions to steal the vehicles, raising alarms about the auto industry's greater use of computer controls.

The discovery follows a recent incident in Houston in which a pair of car thieves were caught on camera using a laptop to start a 2010 Jeep Wrangler and steal it from the owner's driveway. Police say the same method may have been used in the theft of four other late model Wranglers and Cherokees in the city. None of the vehicles have been recovered.

"If you are going to hot-wire a car, you don't bring along a laptop," said Senior Officer James Woods, who has spent 23 years in the Houston Police Department's auto antitheft unit. "We don't know what he is exactly doing with the laptop, but my guess is he is tapping into the car's computer and marrying it with a key he may already have with him so he can start the car."

The National Insurance Crime Bureau, an insurance-industry group that tracks car thefts across the U.S., said it recently has begun to see police reports that tie thefts of newer-model cars to what it calls "mystery" electronic devices.

"We think it is becoming the new way of stealing cars," said NICB Vice President Roger Morris. "The public, law enforcement and the manufacturers need to be aware."

Fiat Chrysler Automobiles NV said it is unaware of any such incidents involving its vehicles. The auto maker said it "takes the safety and security of its customers seriously and incorporates security features in its vehicles that help to reduce the risk of unauthorized and unlawful access to vehicle systems and wireless communications."

The recent reports highlight the vulnerabilities created as cars become more computerized and advanced technology finds its way into more vehicles. Fiat Chrysler, General Motors Co. and Tesla Motors Inc. have had to alter their car electronics over the last two years after learning their vehicles could be hacked.

Fiat Chrysler last year recalled 1.4 million vehicles to close a software loophole that allowed two hackers to remotely access a 2014 Jeep Cherokee and take control of the vehicle's engine, air conditioning, radio and windshield wipers.

Startups and auto-parts makers also are getting involved in cyber-protections for cars.

"In an era where we call our cars computers on wheels, it becomes more and more difficult to stop hacking," said Yoni Heilbronn, vice president of marketing for Israel-based Argus Cyber Security Ltd., a company developing technologies to stop or detect hackers. "What we now need is multiple layers of protection to make the efforts of carrying out a cyberattack very costly and deter hackers from spending the time and effort."

San Francisco-based Voyomotive LLC is developing a mobile application that, when used with a relay switch installed on the car's engine, can prevent hackers with their own electronic key from starting a vehicle. Its technology also will repeatedly relock a car's doors if they are accessed by a hacker.

This month, U.S. Secretary of Transportation Anthony Foxx is slated to attend an inaugural global automotive cybersecurity summit in Detroit. General Motors Co. Chief Executive Mary Barra and other industry executives are scheduled to speak.

Automotive industry trade groups are working on a blueprint of best practices for safely introducing new technologies. The Auto-Information Sharing and Analysis Center, created by the Alliance of Automobile Manufacturers and the Global Automakers Association, provides a way to share information on cyber threats and incorporate cybercrime prevention technologies.

In the Houston car theft, a home-security camera captures a man walking to the Jeep and opening the hood. Officer Woods said he suspects the man is cutting the alarm. About 10 minutes later, after a car door is jimmied open, another man enters the Jeep, works on the laptop and then backs the car out of the driveway.

"We still haven't received any tips," the officer said.

The thief, says the NICB's Mr. Morris, likely used the laptop to manipulate the car's computer to recognize a signal sent from an electronic key the thief then used to turn on the ignition. The computer reads the signal and allows the key to turn.

"We have no idea how many cars have been broken into using this method," Mr. Morris said. "We think it is minuscule in the overall car thefts, but it does show these hackers will do anything to stay one step ahead."

Return to the top

Tennessee Trivia

Q. What Tennessee lake is touted as the “Turtle Capital of the World?”

A. Reelfoot Lake, home to a number of species, including sliders, stinkpots, mud and map turtles.