When Computer Fraud Is Not 'Computer Fraud'
Jeremy M. King writes: Surprisingly, many courts have found that "Computer Fraud" coverage does not apply to a common form of Internet fraud—the email scam—and coverage will depend upon the state's law that applies to the policy. Policyholders need to know the scope of the coverage they have purchased in order to determine whether they are exposed to risks that fall within less-than-obvious gaps in that coverage.
October 14, 2017 at 04:58 PM
18 minute read
Many companies purchase crime insurance policies to cover risks and potential losses that may arise if they are victims of criminal activity. Often, that coverage protects against “Computer Fraud,” and a company justifiably might think that this insurance covers fraud through use of a computer. A company with a limited online presence may decide such coverage is sufficient.
But virtually every enterprise makes use of email, and using email for business operations exposes a company to losses that may not qualify as “Computer Fraud.”
Surprisingly, many courts have found that “Computer Fraud” coverage does not apply to a common form of Internet fraud—the email scam—and coverage will depend upon the state's law that applies to the policy. Policyholders need to know the scope of the coverage they have purchased in order to determine whether they are exposed to risks that fall within less-than-obvious gaps in that coverage.
By now, most people know not to respond to the email from the foreign prince who will gladly give away half his fortune in exchange for a small advance that facilitates a bank transfer. But email fraudsters have become far more sophisticated, and the real risk to a company lies in communications that are ordinary and believable. Email spoofing allows a fraudster to alter the sender address in an email to mislead the recipient about the true origin of the message. The heavy reliance on email as a medium for business communication exposes companies to this risk—impersonation of business partners and counterparties.
Consider the following: Your client receives an email from a regular supplier changing the supplier's payment instructions. The email appears to be sent by the person at the supplier with the proper authority, but months later the supplier contacts your client asking about a failure to make payments. Your client then realizes that the email was doctored to give the appearance of authenticity, and it has been sending months of payments to a fraudster's account. Your client is further surprised when its “Computer Fraud” insurer denies coverage.
|Voluntary Parting
Losses caused by scams are not new, and, historically, the insurance industry has excluded such losses. Property insurance policies and some parts of commercial crime insurance policies typically include an exclusion for loss caused by fraud-by-trick, sometimes referred to as the “voluntary parting” exclusion. Typical language for that exclusion provides that the policy does not cover loss or damage “resulting from voluntary parting with any property … if induced to do so by any fraudulent scheme, trick, device or false pretense.”
In plain English, this means that an insurer will not pay for loss when a con artist uses lies to induce the policyholder to hand over property. Many policyholders are surprised to learn, for example, that a jeweler that delivers valuable property to an individual that appears to be a legitimate armored transport courier may not be covered when it is discovered that the individual was an imposter. PNS Jewelry v. Penn-America Ins., No. BC365430, 2010 WL 685967 (Cal. Ct. App. March 1, 2010). Similarly, a law firm that has sent funds to a client after receiving a cashier's check for those funds may not be covered when it turns out that the cashier's check was a fraud. Martin, Shudt, Wallace, Dilorenzo & Johnson v. Travelers Indem. Co., No. 1:13-cv-0498, 2014 WL 460045 (N.D.N.Y. Feb. 5, 2014).
An email scam parallels the important aspects of the fraud-by-trick scenario. Deception causes the victim to hand over valuable property. But “Computer Fraud” insurance policies seldom include a voluntary parting exclusion. One would expect that if an insurer sought to exclude this type of loss, it would do so using the same language used in other policies. Instead, insurers assert that the email scam is not covered “Computer Fraud” at all.
|Computer Fraud
Most courts agree that a fraudulent email scheme falls outside “Computer Fraud” coverage. While each case turns on the specific facts and policy language presented, common “Computer Fraud” language covers losses “resulting directly from the use of any computer to fraudulently cause a transfer of that property … .” This broad language seems tailor-made to fit an email scam, where the fraudster uses a computer to send a false communication and to manipulate the basic data underlying the communication, i.e., the sender address. But, when confronted with the application of this language to emails scams, courts have balked.
Recently, the Eastern District of Michigan found that “Computer Fraud” coverage did not apply to a scheme in which “fraudulent emails were used to impersonate a vendor and dupe [the policyholder] into making a transfer of funds.” American Tooling Center v. Travelers Cas. & Sur. Co., No. 5:16-cv-12108, 2017 WL 3263356 at *3 (E.D. Mich. Aug. 1, 2017), appeal docketed, No. 17-2014 (6th Cir. Aug. 29, 2017). The court held that there was no hacking or infiltration of a computer system at issue. Instead, the fraudster impersonated the vendor's email address by using the domain rnould.com instead of mould.com. (Did you notice the trick?) The court cited Ninth Circuit authority and stated that the phrase “to fraudulently cause a transfer” actually required “the unauthorized transfer of funds.” Id. (citing Pestmaster Servs. v. Travelers Cas. & Sur. Co., 656 Fed. Appx. 332 (9th Cir. 2016)).
This reasoning has two glaring problems. First, grammatically, the adverb “fraudulently” in the split infinitive modifies the word “cause,” not the word “transfer.” If the policy only applied to fraudulent transfers, it certainly could say so. For years, property policies have used “voluntary parting” language to exclude transfers that are not themselves fraudulent because they were authorized by the deceived party. The “Computer Fraud” language focuses on the fraudulent cause, not the transfer. Second, other standard policy language covers fraudulent instructions to transfer funds. If “Computer Fraud” coverage requires an “unauthorized transfer,” then “Computer Fraud” coverage becomes subsumed within coverage for fraudulent instructions to transfer.
The court restricted coverage because the sheer omnipresence of email would make this “Computer Fraud” coverage overbroad. “[R]eading this provision to cover all transfers that involve both a computer and fraud at some point in the transaction would convert this Crime Policy into a 'General Fraud' Policy.” Id. Other courts have adopted similar reasoning. See Pestmaster Servs. v. Travelers Cas. & Sur. Co., 656 Fed. Appx. 332 (9th Cir. 2016); Apache v. Great Am. Ins. Co., 662 Fed. Appx. 252 (5th Cir. 2016); Incomm Holdings v. Great Am. Ins. Co., 2017 WL 1021749 (N.D. Ga. March 16, 2017).
Against this tide, a recent federal decision in New York has squarely held that policy language must be interpreted according to its plain and ordinary meaning. In a case where a company was defrauded when its own president's email address had been spoofed by a fraudster, Judge Andrew L. Carter granted the policyholder summary judgment on its claim for “Computer Fraud” coverage. See Metadata Solutions v. Federal Ins. Co., 15-cv-0907 (S.D.N.Y. July 21, 2017). The fraudster's email instructed the company's accounting department to transfer money via wire in advance of an anticipated acquisition. The policy in Metadata covered a “fraudulently induced transfer of Money” through use of computer. In finding coverage for the email spoof, the court focused on the sophisticated use of computer code by the fraudster to change the “From” field on the email so that it appeared to have originated with the company president. It was this fake email that caused the money transfer, triggering the “Computer Fraud” provisions. The plain and unambiguous terms of the policy required coverage when a computer was used to perpetrate a fraud.
|Conclusion
Cyber crimes have been making headlines for several years, and the insurance industry continues to create nuanced cyber insurance products for the increasing risk. Sophisticated businesses looking for protection from email spoofing can now purchase the curiously named “Social Engineering” coverage. But not all businesses will purchase complex multi-part cyber liability coverage, particularly when a business neither collects customer data nor relies on the Internet to create revenue. Such businesses may depend on their “Computer Fraud” coverage to protect them against losses from fraud perpetrated via computer.
Unfortunately, courts are not uniform in applying the policy language as written, and any attorney advising his or her client regarding the scope of coverage must address this uncertainty. Hopefully, more courts will follow the Southern District of New York by interpreting the language according to its plain and ordinary meaning, allowing policyholders to analyze and make decisions regarding risk transfer and insurance based upon the policyholder's reasonable expectations as to the plain meaning of “Computer Fraud.” Likewise, a plain language rule encourages an insurer to adopt a conspicuous exclusion for the voluntary parting with funds via email scam if it does not wish to underwrite that risk. It is only through clear and conspicuous language in an insurance policy that policyholders can adequately assess the risks they face, review the coverages available on the market, and make truly informed decisions about the insurance they purchase.
Jeremy M. King is a partner in Olshan Frome Wolosky's insurance law practice.
Many companies purchase crime insurance policies to cover risks and potential losses that may arise if they are victims of criminal activity. Often, that coverage protects against “Computer Fraud,” and a company justifiably might think that this insurance covers fraud through use of a computer. A company with a limited online presence may decide such coverage is sufficient.
But virtually every enterprise makes use of email, and using email for business operations exposes a company to losses that may not qualify as “Computer Fraud.”
Surprisingly, many courts have found that “Computer Fraud” coverage does not apply to a common form of Internet fraud—the email scam—and coverage will depend upon the state's law that applies to the policy. Policyholders need to know the scope of the coverage they have purchased in order to determine whether they are exposed to risks that fall within less-than-obvious gaps in that coverage.
By now, most people know not to respond to the email from the foreign prince who will gladly give away half his fortune in exchange for a small advance that facilitates a bank transfer. But email fraudsters have become far more sophisticated, and the real risk to a company lies in communications that are ordinary and believable. Email spoofing allows a fraudster to alter the sender address in an email to mislead the recipient about the true origin of the message. The heavy reliance on email as a medium for business communication exposes companies to this risk—impersonation of business partners and counterparties.
Consider the following: Your client receives an email from a regular supplier changing the supplier's payment instructions. The email appears to be sent by the person at the supplier with the proper authority, but months later the supplier contacts your client asking about a failure to make payments. Your client then realizes that the email was doctored to give the appearance of authenticity, and it has been sending months of payments to a fraudster's account. Your client is further surprised when its “Computer Fraud” insurer denies coverage.
|Voluntary Parting
Losses caused by scams are not new, and, historically, the insurance industry has excluded such losses. Property insurance policies and some parts of commercial crime insurance policies typically include an exclusion for loss caused by fraud-by-trick, sometimes referred to as the “voluntary parting” exclusion. Typical language for that exclusion provides that the policy does not cover loss or damage “resulting from voluntary parting with any property … if induced to do so by any fraudulent scheme, trick, device or false pretense.”
In plain English, this means that an insurer will not pay for loss when a con artist uses lies to induce the policyholder to hand over property. Many policyholders are surprised to learn, for example, that a jeweler that delivers valuable property to an individual that appears to be a legitimate armored transport courier may not be covered when it is discovered that the individual was an imposter. PNS Jewelry v. Penn-America Ins., No. BC365430, 2010 WL 685967 (Cal. Ct. App. March 1, 2010). Similarly, a law firm that has sent funds to a client after receiving a cashier's check for those funds may not be covered when it turns out that the cashier's check was a fraud. Martin, Shudt, Wallace, Dilorenzo & Johnson v. Travelers Indem. Co., No. 1:13-cv-0498, 2014 WL 460045 (N.D.N.Y. Feb. 5, 2014).
An email scam parallels the important aspects of the fraud-by-trick scenario. Deception causes the victim to hand over valuable property. But “Computer Fraud” insurance policies seldom include a voluntary parting exclusion. One would expect that if an insurer sought to exclude this type of loss, it would do so using the same language used in other policies. Instead, insurers assert that the email scam is not covered “Computer Fraud” at all.
|Computer Fraud
Most courts agree that a fraudulent email scheme falls outside “Computer Fraud” coverage. While each case turns on the specific facts and policy language presented, common “Computer Fraud” language covers losses “resulting directly from the use of any computer to fraudulently cause a transfer of that property … .” This broad language seems tailor-made to fit an email scam, where the fraudster uses a computer to send a false communication and to manipulate the basic data underlying the communication, i.e., the sender address. But, when confronted with the application of this language to emails scams, courts have balked.
Recently, the Eastern District of Michigan found that “Computer Fraud” coverage did not apply to a scheme in which “fraudulent emails were used to impersonate a vendor and dupe [the policyholder] into making a transfer of funds.” American Tooling Center v. Travelers Cas. & Sur. Co., No. 5:16-cv-12108, 2017 WL 3263356 at *3 (E.D. Mich. Aug. 1, 2017), appeal docketed, No. 17-2014 (6th Cir. Aug. 29, 2017). The court held that there was no hacking or infiltration of a computer system at issue. Instead, the fraudster impersonated the vendor's email address by using the domain rnould.com instead of mould.com. (Did you notice the trick?) The court cited Ninth Circuit authority and stated that the phrase “to fraudulently cause a transfer” actually required “the unauthorized transfer of funds.” Id. (citing
This reasoning has two glaring problems. First, grammatically, the adverb “fraudulently” in the split infinitive modifies the word “cause,” not the word “transfer.” If the policy only applied to fraudulent transfers, it certainly could say so. For years, property policies have used “voluntary parting” language to exclude transfers that are not themselves fraudulent because they were authorized by the deceived party. The “Computer Fraud” language focuses on the fraudulent cause, not the transfer. Second, other standard policy language covers fraudulent instructions to transfer funds. If “Computer Fraud” coverage requires an “unauthorized transfer,” then “Computer Fraud” coverage becomes subsumed within coverage for fraudulent instructions to transfer.
The court restricted coverage because the sheer omnipresence of email would make this “Computer Fraud” coverage overbroad. “[R]eading this provision to cover all transfers that involve both a computer and fraud at some point in the transaction would convert this Crime Policy into a 'General Fraud' Policy.” Id. Other courts have adopted similar reasoning. See
Against this tide, a recent federal decision in
Conclusion
Cyber crimes have been making headlines for several years, and the insurance industry continues to create nuanced cyber insurance products for the increasing risk. Sophisticated businesses looking for protection from email spoofing can now purchase the curiously named “Social Engineering” coverage. But not all businesses will purchase complex multi-part cyber liability coverage, particularly when a business neither collects customer data nor relies on the Internet to create revenue. Such businesses may depend on their “Computer Fraud” coverage to protect them against losses from fraud perpetrated via computer.
Unfortunately, courts are not uniform in applying the policy language as written, and any attorney advising his or her client regarding the scope of coverage must address this uncertainty. Hopefully, more courts will follow the Southern District of
Jeremy M. King is a partner in
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllCapital Requirements for Insurance Businesses: What They Are, Why They Matter
18 minute readTrending Stories
- 1Judicial Conference Declines Democratic Request to Refer Justice Thomas to DOJ
- 2People in the News—Jan. 2, 2025—Eastburn and Gray, Klehr Harrison
- 3Deal Watch: Latham, Paul Weiss, Debevoise Land on Year-End Big Deals. Plus, Mixed Messages for 2025 M&A
- 4Bathroom Recording Leads to Lawyer's Disbarment: Disciplinary Roundup
- 5Conn. Supreme Court: Workers' Comp Insurance Cancellations Must Be Unambiguous
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250