Insurance Agency Office Closing Checklist
Client File and NPI Security
Walk each producer's desk and the CSR pods. Loose ACORD 125/130 applications, dec pages, loss runs, and printed COIs all contain NPI under GLBA and must be in a locked cabinet overnight — not stacked in inboxes. Pay attention to remarketing folders that tend to live on desks for weeks.
Clean-desk policy is a documented control under most agency WISPs and a Part 500 §500.11 expectation for vendors handling NPI. Anything left on a desk after close is treated as an unsecured exposure for the morning audit.
The shred vendor is a Part 500 §500.11 third-party service provider — premature disposal or an unlocked console is a reportable control gap. Verify the slot is closed and the bin is keyed shut.
Applied Epic, AMS360, EZLynx, and each carrier portal session must be fully signed out — not just minimized. Persistent sessions left on shared workstations are the most common finding in agency E&O cyber audits.
Pull any abandoned print jobs from the MFP tray — policy packets, COIs, claim acknowledgement letters often sit overnight. Cancel any held jobs in the device queue before close.
Pending Binders and Claims Handoff
Pull the bind log and confirm each new policy and claim payee was screened against the OFAC SDN list today. A miss at the close step turns into an unauthorized transaction the next morning when premium posts.
Open the bind workflow in the AMS and identify any submissions where the insured expects effective dates before the next business morning. Anything time-sensitive needs an after-hours plan; do not let an indication roll into a quote without an underwriter touching it.
Email the on-call underwriter the submission, signed application, current loss runs, and any binding-authority notes. Confirm carrier appetite and producer state licensing before the handoff — a bind by an unappointed producer is rescindable.
Forward the claims intake line to the contracted TPA or carrier 24/7 number. Texas Chapter 542's 15-business-day acknowledgement clock starts at FNOL receipt regardless of what time the call comes in — gaps in coverage create prompt-pay exposure.
Note any claim approaching a state-specific deadline: TX Chapter 542 acknowledgement or decisioning windows, FL 90-day decision rule, NY 15-day acknowledgement under Reg 64. Add a morning-priority flag in the AMS so the assigned adjuster sees it first thing.
Technology and Backup Verification
Check the backup console for the most recent Applied Epic / AMS360 / EZLynx job status. The GLBA Safeguards Rule and NYDFS Part 500 §500.08 require routine, tested backups of NPI; an undetected silent failure for several days is a documented exam finding.
Open a P1 ticket with the agency's MSP and copy the named CISO designee. A confirmed backup failure is a control deficiency that may trigger a 72-hour notification analysis under the NAIC Insurance Data Security Model Law if recovery is not assured.
Part 500 §500.12(b) requires MFA for any individual accessing the agency's internal network from an external network — including producers connecting from home and any contractor with VPN access. Confirm tonight's remote sessions all show an MFA factor in the access log.
Servers stay up for nightly jobs; user endpoints and MFPs power off. A locked-but-running workstation left overnight is a target for credential-stealing malware and a finding on the next IT audit.
Facility and Physical Security
Premium checks held overnight are commingled-funds and fiduciary risk under most state producer regulations. Drop them in the bank night deposit or lock in the agency safe — not in a desk drawer.
Engage the after-hours HVAC schedule. In coastal or high-humidity offices, do not set back so far that file rooms exceed humidity thresholds — paper claim files and humidor-sensitive records degrade.
Walk each marked exit. Boxes of file storage, printer overflow, or marketing materials cannot block egress paths — this is both an OSHA finding and a property-carrier loss-control inspection point.
Pull the access roster and confirm every issued key and badge is either with its assigned holder or in the lockbox. Terminated producers occasionally retain badges; reconcile here so it surfaces before payroll cutoff rather than at the next quarterly audit.
Last person out arms the alarm, locks the entrance, and signs off below. The closing officer's signature is the documented chain-of-custody record for the night and is what the agency cites if a forced-entry claim arises against the building owner's policy.
Use this template in Manifestly
- Annual Insurance Review Checklist
- Risk Management Checklist
- Commercial Policy Renewal Checklist
- Customer Inquiry Checklist
- Insurance Compliance Checklist
- Cyber Security Checklist
- Claims Investigation Checklist
- Complaint Resolution Checklist
- Financial Audit Checklist
- Data Security Checklist
- Risk Mitigation Checklist
- Customer Service Request Handling Checklist
- Disaster Recovery Checklist
- Policy Renewal Checklist
- Customer Retention Checklist
- Policy Issuance Checklist
- Sales Proposal Checklist
- Claims Auditing Checklist
- Policy Cancellation Checklist
- Customer Onboarding Checklist
- Insurance Training and Development Checklist
- Anti-Money Laundering Checklist
- Training Evaluation Checklist
- Insurance Producer Performance Review
- Cybersecurity Incident Response Checklist
- Office Opening Checklist
- Training Needs Assessment Checklist
- Insurance Committee Meeting Planning Checklist
- Skills Development Checklist
- Audit Preparation Checklist
- Network Security Checklist
- Premium Billing and Collection Checklist
- IT Asset Inventory Management Checklist
- Annual Budgeting Checklist
- Financial Reporting Checklist
- Insurance Agency Lead Generation Checklist
- Compliance Audit Checklist
- Commercial Underwriting Checklist
- Policyholder Feedback Cycle
- Insurance Project Planning Checklist
- Tax Compliance Checklist
- Client Engagement Checklist
- Data Protection Checklist
- Insurance Agency Employee Onboarding
- Enterprise Risk Assessment Checklist
- Training Materials Checklist
- Anti-Fraud Checklist
- Policy Endorsement Checklist
- Quarterly Risk Monitoring Checklist
- Expense Management Checklist
- Insurance IT Security Review Checklist
- Insurance Account Cross-Sell Checklist
- Insurance Project Closure Checklist
- Insurance Marketing Campaign Checklist
- Statutory Financial Reporting Checklist
- Claim Processing Checklist
- Policy Administration Checklist
Ready to take control of your recurring tasks?
Start Free 14-Day TrialUse Slack? Sign up with one click
