Insurance Bad Faith: Private Investigators and Their Surveillance Practices
Insurance companies often will hire a private investigator to aid in terminating disability insurance claims. Ostensibly, the purpose of a private investigator is to expose dishonest individuals of fraudulent disability insurance claims. A private investigator may even advertise as a “Disability Insurance Fraud Specialist.” All too often, however, insurance companies and their investigators are not seeking to expose fraud, but to manufacture it. They produce “evidence” only to aid in denying disability insurance claims—even wholly legitimate ones. They do so because there is a strong financial incentive to deny disability insurance claims.
Our firm has dealt with these insurance companies and their private investigators time and again. We know how they operate and how to prepare our clients. We have developed a short list of basic information about private investigators so you can know what to expect:
- When are they watching? In a previous post, we noted the five most popular times for disability surveillance: (1) holidays, (2) birthdays, (3) weekends, (4) activities claimant listed in insurance company’s activity log; and (5) near the end of fiscal quarters.
- Who are they? Typically, private investigators are just as the name indicates – private people from private companies. Disability insurance companies contract with these private companies to conduct surveillance on disability claimants.
- What are their surveillance methods? Particular tactics will vary depending upon the private investigator, the disability insurance company and the disability claimant. However, many methods are common across the board. Basically, the private investigator will inconspicuously follow a disabled claimant with a video-capturing device as the disabled claimant undergoes day-to-day activities. If the private investigator has difficulty locating the disabled claimant, the investigator may use different tactics, such as pretexting, stake-outs or tracking devices, to locate and track the claimant. Our last blog post describes these other tactics in detail.