Most recently in our series on moving “beyond insurance,” we examined Risk Retention. Now, we undertake the next step in our journey: Risk Control.
If a sex offender wants to attend your church — or is already worshipping with you — how would you respond? Roll out the welcome mat? Exclude them entirely? Try to find middle ground? These are questions church leaders regularly face.
How much do you know about cybersecurity and cyberliability? Is it enough to keep your church safe from massive data or financial loss?
By David O. Middlebrook Churches are some of the most creative places on earth. Every week, church staff is called upon to create sermons, songs, Bible and Sunday school lessons, music, books and teaching materials, and all other kinds of creative works. Churches routinely use media — such as movies and audio clips — to […]
Together in our journey to move “beyond insurance,” we have thus far examined the first two steps in that process: risk identification, analysis and evaluation, as well as risk avoidance. Now, we undertake the next step in our journey: risk retention.
Since the beginning of the United States, marriage has always been subject to detailed rules.
From weddings and banquets, to meetings and basketball practice, chances are your church receives rental requests on a regular basis.
Opening your church’s doors to outside organizations is another way to extend your ministry into your community — but it might also open the door for safety and liability issues, such as property damage, theft, or tumbles on slippery surfaces.
With smart planning, trusted use policies and a thorough review process, it’s possible to protect your place of worship and be a good neighbor. Keep these considerations in mind when renting your facility.
Rarely does a day go by without a headline about data breaches. That’s nothing a church would need to worry about, right? I wish that were true.
A remote roundtable with experts
In our last article, we together began our journey to move “beyond insurance.” We then examined the first step in that process: risk identification, analysis and evaluation. Now, we undertake the next step in our journey: risk avoidance.