<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-US">
	<id>https://www.insurerbrain.com/w/index.php?action=history&amp;feed=atom&amp;title=Definition%3AComputer_crime</id>
	<title>Definition:Computer crime - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.insurerbrain.com/w/index.php?action=history&amp;feed=atom&amp;title=Definition%3AComputer_crime"/>
	<link rel="alternate" type="text/html" href="https://www.insurerbrain.com/w/index.php?title=Definition:Computer_crime&amp;action=history"/>
	<updated>2026-05-02T15:59:07Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://www.insurerbrain.com/w/index.php?title=Definition:Computer_crime&amp;diff=16833&amp;oldid=prev</id>
		<title>PlumBot: Bot: Creating new article from JSON</title>
		<link rel="alternate" type="text/html" href="https://www.insurerbrain.com/w/index.php?title=Definition:Computer_crime&amp;diff=16833&amp;oldid=prev"/>
		<updated>2026-03-15T08:07:12Z</updated>

		<summary type="html">&lt;p&gt;Bot: Creating new article from JSON&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;💻 &amp;#039;&amp;#039;&amp;#039;Computer crime&amp;#039;&amp;#039;&amp;#039;, within the insurance context, refers to criminal acts carried out through or targeting computer systems, networks, and digital infrastructure — and, more specifically, to the [[Definition:Insurance coverage | coverage]] provisions within [[Definition:Crime insurance | crime insurance]] and [[Definition:Cyber insurance | cyber insurance]] policies that respond to losses caused by such acts. Traditional [[Definition:Fidelity bond | fidelity]] and crime policies began addressing computer crime decades ago through specific insuring agreements covering fraudulent electronic fund transfers and unauthorized system access, long before standalone cyber products existed. Today the term straddles both legacy crime wordings and modern cyber policies, and careful attention to policy language is essential because the two product lines can overlap, leave gaps, or trigger disputes over which responds to a given incident.&lt;br /&gt;
&lt;br /&gt;
🔐 Coverage typically operates through defined insuring agreements that specify the types of computer-related criminal activity the policy will indemnify. A traditional crime policy might cover losses resulting from an unauthorized third party manipulating a computer system to transfer funds, while a [[Definition:Cyber insurance | cyber policy]] may extend to broader consequences such as [[Definition:Business interruption insurance | business interruption]], data restoration costs, [[Definition:Regulatory fine | regulatory fines]], and [[Definition:Liability insurance | liability]] to affected third parties. In practice, social engineering attacks — where an employee is deceived into authorizing a wire transfer — have generated significant litigation over whether the loss falls under the computer crime insuring agreement, the funds transfer fraud clause, or an explicit social engineering endorsement. [[Definition:Underwriter | Underwriters]] across markets in the U.S., Europe, and Asia have responded by tightening definitions, adding sub-limits for social engineering, and requiring dual-authorization controls as [[Definition:Risk mitigation | risk-mitigation]] prerequisites.&lt;br /&gt;
&lt;br /&gt;
⚠️ The rapid evolution of criminal techniques — from ransomware and supply-chain compromises to deepfake-enabled impersonation — keeps computer crime at the forefront of [[Definition:Emerging risk | emerging risk]] discussions among insurers, [[Definition:Broker | brokers]], and regulators. For the insurance industry itself, the threat is dual-edged: carriers must underwrite computer crime exposures for their [[Definition:Policyholder | policyholders]] while simultaneously defending their own operations against the same risks. Adequate coverage depends on aligning crime and cyber policy wordings so that no gap exists between them, a task that demands close collaboration between risk managers, brokers, and underwriters. As regulatory regimes worldwide — from the EU&amp;#039;s DORA framework to evolving cybersecurity mandates in Singapore and the United States — impose stricter obligations on financial institutions, the demand for robust computer crime coverage continues to intensify.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Related concepts:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
{{Div col|colwidth=20em}}&lt;br /&gt;
* [[Definition:Cyber insurance]]&lt;br /&gt;
* [[Definition:Crime insurance]]&lt;br /&gt;
* [[Definition:Social engineering fraud]]&lt;br /&gt;
* [[Definition:Fidelity bond]]&lt;br /&gt;
* [[Definition:Ransomware]]&lt;br /&gt;
* [[Definition:Funds transfer fraud]]&lt;br /&gt;
{{Div col end}}&lt;/div&gt;</summary>
		<author><name>PlumBot</name></author>
	</entry>
</feed>