1) LAWYER
Cyberspace
Reprinted with permission from Cyberspace Lawyer, Volume 21, Issue 2, K
2016 Thomson Reuters. Further reproduction without permission of the
publisher is prohibited. For additional information about this publication,
please visit www.legalsolutions.thomsonreuters.com.
February 2016 â–ª Volume 21 â–ª Issue 2
CYBER INSURANCE AND
SOCIAL ENGINEERING
FRAUD, WHY
VOLUNTARY
TRANSFERS MAY NOT
BE COVERED BY YOUR
INSURANCE POLICIES
by Thomas H. Bentz, Jr.
Thomas H. Bentz, Jr. (thomas.bentz@hkl
aw.com) is a partner at Holland &
Knight where he practices insurance law
with a focus on D&O, cyber and other
management liability insurance policies.
Mr. Bentz leads Holland & Knight’s
D&O and Management Liability Insurance Team which provides insight and
guidance on ways to improve policy
language and helps insureds maximize
their possible insurance recovery.
Introduction
In the last few years, many companies
have purchased cyber liability insurance
to help cover their risk of computer fraud
or attack. However, not all cyber insurance policies are created equal and these
policies may have signiÂŽcant coverage
gaps if they are not properly negotiated.
One of the more common and costly
coverage gaps is the lack of coverage for
“voluntary transfers.” There are many
variations on this scam but essentially, the
CFO receives what appears to be a real
email from a client or vendor asking the
CFO to wire money to an account. The
email often looks completely real and, in
fact, is often the result of a hacker breaking into the client or vendor’s system, allowing the hacker to send messages from
the client or vendor’s actual email address.
Only after wiring the money (often
multiple transfers and increasingly larger
sums) does the CFO learn that he or she
has become a victim of fraud.
We have seen this scam hit companies
large and small and across several industries including banks, manufacturers, retailers and even several law ÂŽrms. And
nearly without fail, all of these companies
are surprised to learn that they are not
insured against this loss because their
policies contain an exclusion that states
that there is no coverage for a “voluntary
parting” (i.e., where the insured voluntarily transfers money to a third party). This
exclusion applies even though the CFO
was tricked into wiring the money.
The most frustrating and unfortunate
part of this situation, is that coverage for
this type of social engineering fraud is
generally available upon request. Moreover, there is usually only a nominal additional premium required for the
coverage. It is just that most companies
do not know to ask for it.
2) February 2016 | Volume 21 | Issue 2
What You Should Do Now to Protect Your
Company
1. Talk to your insurance broker about
social engineering coverage today.
As noted above, social engineering fraud coverage is generally available upon request and
without a signiÂŽcant additional premium. This
type of fraud is not going away and even the
strongest controls can be breached. If you cannot
stop fraud, at least you can minimize its eÂect.
2. Review other potential gaps in your
cyber liability insurance program.
There is no standard cyber liability insurance
form which means that the coverage oÂered by
one insurer may (and often does) diÂer dramatically from that oÂered by another insurer. There
is little agreement between insurers on what
should be covered, when the coverage should be
triggered or even how basic terms should be
deÂŽned. These diÂerences make understanding
what is and is not covered very diÂcult. It also
makes it nearly impossible (or at least foolish) to
purchase this coverage based on price alone.
Companies are well advised to work with an
experienced and knowledgeable insurance professional that understands both what coverage is
available in marketplace and the types of claims
being made on the policies.
3. Understand how your cyber insurance
coverage works with your other insurance
policies.
Cyber liability policies are not the only place
2
Cyberspace Lawyer
where an insured might ÂŽnd coverage for a cyber
event. Depending on the losses and/or allegations, several other types of insurance policies
may also respond to a cyber-related claim.
Understanding where there may be coverage
for a claim as well as how the various lines of
coverage will work together in the event of a
claim is imperative to a strong insurance
program. Coordinating limits, retentions/
deductibles and other coverage requirements may
be diÂcult. In addition, because multiple types of
policies may apply, there may be problems coordinating defense counsel (diÂerent insurers may
not approve of a ÂŽrm required by another insurer
or there may be disagreement between insurers
about reasonable hourly rates). The claims made
requirement of many of these policies may also
present problems for insureds in the event of a
claim. Insureds are well advised to coordinate
their coverage in advance so they are not attempting to resolve these issues for the ÂŽrst time after a
cyber event has occurred.
Conclusion
Cyber insurance is still evolving. Insureds
must take the time to learn what coverage they
need and what coverage they have to ensure they
are adequately protected. In addition, insureds
should have a plan in place to deal with the
complexity of having multiple lines of coverage
that may apply to a single cyber event. A little
preparation can avoid signiÂŽcant problems with
coverage in the event of a claim.
K 2016 Thomson Reuters