Certificate of Insurance Verification: The Complete Guide for Insurance Professionals
Certificate of insurance verification confirms a certificate's authenticity and accuracy before relying on it for contract compliance. This guide covers the 4-step carrier verification protocol, common fraud patterns, the specific visual indicators of altered certificates, and when direct carrier contact is required.
Founder & CEO
Certificate of insurance verification is the process of confirming that a certificate received from a third party represents actual, current, and accurately-described coverage on the underlying policy. The purpose is simple: a certificate is a representation, not a proof. Relying on a certificate without verification means relying on the word of whoever generated the document, which may or may not be the producer of record, the carrier, or an unauthorized party. The stakes are high. Contracts, leases, and government contracting portals condition performance on proof of insurance. When the proof turns out to be fraudulent or outdated, the consequences run from contract termination to criminal prosecution for the person who presented the certificate, and E&O litigation against any insurance professional who accepted it without adequate checks.
This guide walks through the verification protocol that commercial risk managers use for high-value contracts, the specific fraud patterns seen in the field, the visual indicators that reveal altered certificates, and the fields that actually matter when you verify.
Key Takeaways
- Verification has four progressive levels: visual inspection, AMS cross-check, producer confirmation, and direct carrier contact. Each level rules out different fraud patterns.
- The most common fraud patterns are altered policy numbers, post-cancellation reissuance, unauthorized additional insured claims, and fabricated producer codes.
- Specific visual indicators (font inconsistencies in policy numbers, pixelated carrier logos, missing edition-date footers, spacing anomalies in the description of operations) reveal most altered certificates.
- Carrier verification portals (Hartford, Travelers, Chubb, Liberty Mutual, AIG) confirm certificate authenticity in seconds, but their coverage data may lag the actual policy by 24 to 72 hours.
- Verification of a complex commercial certificate takes 8 to 20 minutes manually. Automated tools reduce this to under 2 minutes while improving accuracy.
- BrokerageAudit's COI Manager runs all four verification levels in parallel and logs the audit trail for E&O defense.
Why Verification Matters: The Liability Chain
When a certificate of insurance is provided as proof of coverage in a contract, three parties depend on its accuracy: the party requiring the insurance (the certificate holder), the insured providing the certificate, and the insurance professional who issued or reviewed it.
If the certificate is inaccurate and a loss falls in the gap between what the certificate represents and what the policy actually covers, each party has exposure.
The certificate holder has contractual exposure if they continue the relationship without valid coverage in place. A landlord who accepts a forged certificate and allows a tenant to occupy the premises is in a weaker position when the tenant causes a loss and the tenant's policy turns out not to exist or not to name the landlord as additional insured.
The insured has liability for misrepresentation if they knowingly provided a certificate that does not match the policy. Beyond contract liability, this can be insurance fraud under state law.
The insurance professional who issued or verified the certificate has E&O exposure if they failed to exercise the standard of care required in the industry. Courts treat certificate verification as a competence question for brokers and agents. The standard varies, but the baseline is that a reasonably prudent professional would not rely on a certificate without some verification step.
In multi-party contracts (master service agreements, construction contracts, commercial leases, government contracts), the verification burden typically falls on a risk manager or procurement team. Their process determines whether the certificate actually reduces risk or merely documents that the process was followed.
The Four-Level Verification Protocol
Real-world verification follows a tiered protocol. Each level adds confidence and cost. Low-value certificates may warrant only Level 1. High-value certificates (construction contracts above $1M, long-term leases, government contracts) typically warrant all four levels.
Level 1: Visual inspection. Confirm the form type and edition, check for visual inconsistencies, verify required fields are present.
Level 2: Producer confirmation. Contact the issuing agency to confirm the certificate was generated by them.
Level 3: Policy verification. Confirm that the specific endorsements (additional insured, primary and non-contributory, waiver of subrogation) are on the policy.
Level 4: Direct carrier contact. Speak to the carrier directly using contact information from the carrier's website (not the certificate).
Each level rules out a specific category of fraud. A certificate that passes Level 1 and 2 but fails Level 3 typically represents an agency error or a post-issuance policy change. A certificate that passes Level 1, 2, and 3 but fails Level 4 is rare and usually indicates a deliberate attempt at fraud that circumvented the agency's documentation system.
Level 1: Visual Inspection Indicators
Visual inspection catches the majority of amateur fraudulent certificates. The fraudster typically does not understand the form well enough to fake all the details.
Form edition footer. ACORD 25 certificates should show the edition date in the bottom-right corner, formatted as "ACORD 25 (2016/03)" (the current edition as of April 2026). Missing footers, incorrect edition formats, or very old editions (2010 and earlier) on new certificates are strong indicators of fabrication.
Font inconsistencies in policy numbers. Legitimate certificates are generated from agency management systems that render policy numbers in a consistent typeface. When a certificate has been altered, the tampered field is typically typed over using a different font. Compare the policy number font to the font used in surrounding fields. Mismatches indicate alteration.
Carrier logo integrity. Legitimate carrier logos are rendered from vector graphics or high-resolution images. Fraudulent certificates often show pixelated or jagged logos, evidence that the logo was copied from a screen capture or low-resolution source. Chubb's shield, Travelers' umbrella, and Hartford's stag are particularly common targets.
Producer code format. Each carrier uses a specific format for producer codes. Travelers uses 6-digit numeric codes. Chubb uses alphanumeric codes starting with the state identifier. Hartford uses 10-digit codes with hyphens. A certificate with a producer code that does not match the carrier's format is suspicious.
Spacing anomalies in the description of operations. The description field typically contains standardized text in legitimate certificates. Fraudulent alterations often leave awkward spacing, misaligned text, or obvious edit boundaries.
Effective date inconsistencies. Effective dates that fall on weekends or holidays are suspicious unless the policy was backdated with carrier approval. Effective dates more than 30 days before the certificate issuance date indicate either a newly-renewed policy (check) or a mid-term reissuance (requires more scrutiny).
Level 1 verification takes 30 seconds to 2 minutes. It screens out obvious fraud but cannot catch sophisticated manipulation or legitimate-looking but incorrect information.
Level 2: Producer Confirmation
After visual inspection, the next level is direct contact with the issuing producer.
The contact should not use the phone number or email printed on the certificate itself. A sophisticated fraud often includes valid contact information for the fraudster, who answers the call and confirms the certificate.
Instead, look up the agency independently. State DOI producer lookup tools (CA DOI, NY DFS, TX TDI, FL OIR) confirm the agency's licensing status and current contact information. The agency's website typically lists a main number that routes to the certificate team.
When contacting the producer, confirm:
- The certificate reference number or issuance date
- The insured name
- The certificate holder name
- The policy numbers and carriers
- The specific endorsements claimed on the certificate (additional insured, primary and non-contributory, waiver of subrogation)
Reputable agencies respond to verification requests within 1 business day. An agency that cannot find the certificate in their system, or that pushes back on the verification, is a red flag.
For certificate of insurance representations to third-party certificate holders, many large agencies offer a verification portal where holders can check certificates without phone contact. The Big I (Independent Insurance Agents & Brokers of America) maintains a directory of agencies with verification portals.
Level 2 verification takes 5 to 15 minutes in most cases. It eliminates most certificate fabrication by unauthorized third parties.
Level 3: Policy Endorsement Verification
The hardest fraud to detect is the legitimate-looking certificate where the certificate was issued by the authorized producer but represents endorsements that are not on the policy. This happens in two scenarios: intentional broker misrepresentation, and unintentional documentation errors at the agency.
Verification at Level 3 requires confirmation that the specific endorsements on the certificate match the endorsements on the policy.
For additional insured status. The underlying policy should have a CG 20 10, CG 20 37, CG 20 33, or carrier-specific equivalent endorsement scheduling or blanket-triggering the certificate holder. A certificate showing additional insured status without the corresponding policy endorsement is a misrepresentation regardless of who issued it.
For primary and non-contributory. The policy needs a CG 20 01 or carrier equivalent endorsement. A certificate showing primary and non-contributory without the policy endorsement creates a direct contractual exposure to the certificate holder that the policy will not cover.
For waiver of subrogation. The policy needs a CG 24 04 or carrier-specific waiver endorsement. Certificates routinely show waiver of subrogation when the underlying policy does not have the form.
For blanket additional insured. The policy needs a blanket form (CG 20 33, CG 20 37, CG 20 38, or carrier proprietary). Confirm the specific form and edition and check whether the written contract requirement is met for the certificate holder.
Level 3 verification typically requires the producer to provide a copy of the declaration page and endorsement schedule. Risk managers for Fortune 500 companies and government contracting agencies frequently require this documentation as a matter of course for high-value contracts.
Level 3 verification takes 15 to 45 minutes depending on policy complexity. It eliminates most legitimate-looking but substantively incorrect certificates.
Level 4: Direct Carrier Contact
The highest level of verification bypasses the agency entirely and confirms the policy with the carrier.
Direct carrier contact matters in two specific scenarios: when fraud is suspected at the agency level, and when the stakes are high enough to warrant the carrier's direct confirmation.
How to contact the carrier. Use a phone number or portal URL from the carrier's official website. Do not use contact information from the certificate.
Carrier verification portals. Hartford, Travelers, Chubb, Liberty Mutual, and AIG all operate certificate verification portals. Enter the policy number and producer code (from the certificate) and the system returns the policy status, effective dates, limits, and sometimes the active endorsements. This is the fastest Level 4 verification and typically takes under 2 minutes per policy.
Phone verification for non-portal carriers. Many regional carriers and surplus lines markets do not have automated verification portals. Call the carrier's agency services department using the phone number from their website. Most carriers have a 5 to 15 minute turnaround for verification during business hours.
Email verification. Some carriers accept verification requests by email. The turnaround is typically 1 to 2 business days, which is slower than phone or portal but creates a documentation trail.
Data lag considerations. Carrier portals and agency representatives may show information that lags the actual policy by 24 to 72 hours. Recent endorsements may not appear in the portal yet. For time-sensitive verifications, confirm both the portal data and any pending endorsement requests.
Level 4 verification takes 2 to 20 minutes. It catches fraud that passed Level 1 through 3 and provides documentation at the carrier level that supports E&O defense.
Common Certificate Fraud Patterns
Understanding the patterns helps identify them. Four patterns recur in documented fraud cases.
Altered policy numbers. The fraudster starts with a legitimate expired or canceled certificate and replaces the effective dates and policy numbers to make it appear current. The fonts usually differ between the original pre-printed fields and the altered fields. Carrier logos may show resolution degradation from being copied.
Post-cancellation reissuance. An insured whose policy has been canceled mid-term continues to issue certificates as if the coverage were in force. The policy numbers are real but the coverage has ended. Level 4 verification reveals this within seconds.
Unauthorized additional insured claims. The certificate claims additional insured status for a party that the policy does not actually cover. Sometimes this is producer error, sometimes it is intentional. Level 3 verification catches this, Level 4 confirms it with the carrier.
Fabricated producer codes. A fraudulent certificate uses a made-up producer code or a code belonging to a different producer. Carriers maintain verification portals for producer codes, and many risk management platforms automatically cross-check producer codes against licensing databases.
Cease-and-desist patterns. In one class of fraud, an unlicensed or suspended producer continues issuing certificates under an AMS that no longer has legitimate carrier authority. State DOIs have issued cease-and-desist orders against producers whose certificates continued circulating for months after license revocation.
Fake carrier identities. Less common but increasingly sophisticated. A fraudulent certificate lists a carrier name that sounds legitimate but does not exist or is not authorized in the relevant state. NAIC's company search confirms carrier licensing status.
For each pattern, the specific verification level that catches it differs. A systematic four-level protocol catches all of them.
Fields to Double-Check
Not all certificate fields are equally likely to be manipulated. Focus verification on the high-risk fields.
| Field | Risk Level | Why It Matters |
|---|---|---|
| Policy number | High | Primary target of alteration |
| Effective / expiration dates | High | Determines whether coverage is in force |
| Carrier name and NAIC code | High | Confirms carrier existence and authorization |
| Producer code | High | Confirms authorized issuer |
| Additional insured flag and description | High | Determines whether AI coverage exists |
| Primary and non-contributory flag | High | Determines priority of coverage |
| Waiver of subrogation flag | Medium | Affects carrier's recovery rights |
| Limits of insurance | Medium | Usually reported correctly |
| Insured name and address | Low | Rarely manipulated but match to contract |
| Certificate holder information | Low | Distribution data, not coverage |
The high-risk fields are where fraud concentrates. Verification should focus there.
Tools That Automate Verification
Several tools accelerate certificate verification.
Carrier verification portals. Hartford, Travelers, Chubb, Liberty Mutual, and AIG operate portals that confirm basic policy status. These are the fastest Level 4 verification channels.
Certificate management platforms. Origami Risk, Riskonnect, and Ventiv are enterprise platforms used by Fortune 500 risk managers. They accept certificate submissions, run automated checks against required coverages, and track expiration dates. These platforms focus on tracking and compliance monitoring rather than fraud detection.
AMS-integrated verification. Applied Epic, Vertafore AMS360, HawkSoft, and EZLynx each have certificate issuance and tracking modules that link certificates to underlying policies. For an agency's own outbound certificates, this is the cleanest verification.
Broker-side verification tools. BrokerageAudit's COI Manager runs all four verification levels automatically. It checks form edition and visual integrity, cross-references producer codes against state DOI data, maps certificate representations to the underlying policy endorsements, and (where supported) executes carrier portal verification in parallel.
See also the certificate holder vs additional insured analysis and the certificate issuance workflow for end-to-end processes.
Frequently Asked Questions
How do you verify a certificate of insurance?
Verification follows a four-level protocol. Level 1: visual inspection of the certificate form, edition footer, font consistency, logo integrity, and required fields. Level 2: contact the issuing producer using independent contact information (not the number on the certificate) to confirm the certificate was generated by them. Level 3: confirm that the specific endorsements claimed on the certificate (additional insured, primary and non-contributory, waiver of subrogation) are actually on the underlying policy. Level 4: direct carrier contact using a phone number or portal URL from the carrier's official website to confirm policy status, limits, and endorsements.
What are common certificate of insurance fraud tactics?
Five recurring patterns: (1) altered policy numbers on expired or canceled certificates to make them appear current, with font inconsistencies revealing the tampering; (2) post-cancellation reissuance where an insured continues issuing certificates after the underlying policy has been canceled; (3) unauthorized additional insured claims where the certificate claims coverage not actually on the policy; (4) fabricated producer codes using made-up or borrowed codes; and (5) ceased-authority issuance where a suspended or unlicensed producer continues generating certificates. Each pattern has specific visual and verification indicators.
Can you verify a certificate of insurance with the carrier directly?
Yes. Direct carrier verification is the highest-confidence verification level. Most major carriers (Hartford, Travelers, Chubb, Liberty Mutual, AIG) operate online verification portals where a certificate holder can enter the policy number and producer code to confirm the policy's existence, status, and active endorsements. Regional and surplus lines carriers that do not have portals typically accept phone or email verification requests with 5 minute to 2 business day turnaround. Always use contact information from the carrier's official website, not from the certificate itself, to avoid fraud that includes spoofed carrier contact details.
How long does certificate verification take?
Manual verification takes 8 to 20 minutes for a complex commercial certificate covering multiple policies, endorsements, and third-party rights. Level 1 (visual inspection) takes 30 seconds to 2 minutes. Level 2 (producer confirmation) takes 5 to 15 minutes. Level 3 (policy endorsement verification) takes 15 to 45 minutes. Level 4 (direct carrier contact) takes 2 to 20 minutes depending on whether a portal is available. Automated verification tools like BrokerageAudit's COI Manager run all four levels in parallel and reduce the total time to under 2 minutes per certificate while improving accuracy.
What tools automate certificate verification?
Five categories of tools: carrier verification portals (Hartford, Travelers, Chubb, Liberty Mutual, AIG), enterprise risk management platforms (Origami Risk, Riskonnect, Ventiv) used by Fortune 500 risk teams, AMS-integrated certificate modules (Applied Epic, Vertafore AMS360, HawkSoft, EZLynx) for broker-side issuance and tracking, specialized broker-side verification platforms like BrokerageAudit's COI Manager that execute all four verification levels in parallel, and state DOI producer lookup tools (CA DOI, NY DFS, TX TDI, FL OIR) for producer licensing status confirmation. Each tool category addresses a different stage of the verification protocol.
What fields on a certificate should I double-check?
The high-risk fields for manipulation are: policy number (primary target of alteration), effective and expiration dates (determines whether coverage is currently in force), carrier name and NAIC code (confirms carrier existence and state authorization), producer code (confirms authorized issuance), additional insured flag and description, primary and non-contributory flag, and waiver of subrogation flag. Medium-risk fields include limits of insurance (usually reported correctly) and insured name and address. Low-risk fields include certificate holder information (distribution data only). Verification should concentrate on the high-risk fields and confirm each against the underlying policy endorsements.
Written by Javier Sanz, Founder of BrokerageAudit. Last updated April 2026.
Run all four verification levels automatically on every incoming certificate. BrokerageAudit's COI Manager executes visual inspection, producer confirmation, policy endorsement cross-check, and carrier portal verification in parallel, logging the full audit trail for E&O defense and contract compliance documentation. Explore COI Manager
Related Articles
How To Verify Certificate Of Insurance
A practical guide to how to verify certificate of insurance with real numbers, actionable steps, and expert insights for insurance brokers.
Coi Verification Automation Tools: What Insurance Agencies Must Know
A practical guide to coi verification automation tools with real numbers, actionable steps, and expert insights for insurance brokers.
What Is a Certificate of Insurance: A Comprehensive Analysis for Brokers
A comprehensive analysis of certificate of insurance, covering costs, steps, benchmarks, and tools every insurance agency needs in 2026.
What Is A Certificate Of Insurance
A certificate of insurance is a one-page summary of an active insurance policy, issued on ACORD form 25 for liability or ACORD 27/28 for property. It proves coverage exists but does not create or modify any coverage. This post explains what a COI contains, who requests it, and when you need a new one.
Certificate Of Insurance Requirements Explained: What Insurance Agencies Must Know
COI requirements in contracts determine what coverage an insured must carry and how it must be documented. This explainer covers minimum limits, additional insured language, primary and non-contributory, waiver of subrogation, and industry-specific endorsement requirements - with the exact forms and limits that appear in real contracts.
The Broker's Guide to Who Needs A Certificate Of Insurance
A certificate of insurance gets requested whenever one party needs documented proof that another party carries adequate coverage before a business relationship begins. Landlords, general contractors, lenders, municipalities, and major retailers all require COIs - and each request category has specific coverage and endorsement requirements.
Related insurance terms
More articles in ACORD Forms & Certificates
- Certificate Of Insurance Vs Policy: What Insurance Agencies Must Know
- The Ultimate Guide to COI Tracking and Management in 2026
- Best COI Tracking Software in 2026: A Comparison for Agencies and Risk Managers
- Understanding Automated COI Tracking System for Insurance Brokers
- How to Master Coi Management Platform Comparison in Your Agency
- Coi Tracking Spreadsheet Vs Software: A Practical Guide for Agencies
See where your agency is leaking money
Run a free 14 day audit. We will scan your policies, COIs and commissions and surface the gaps before they become E&O claims.