<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-US">
	<id>https://www.insurerbrain.com/w/index.php?action=history&amp;feed=atom&amp;title=Definition%3ACyber_crime</id>
	<title>Definition:Cyber crime - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.insurerbrain.com/w/index.php?action=history&amp;feed=atom&amp;title=Definition%3ACyber_crime"/>
	<link rel="alternate" type="text/html" href="https://www.insurerbrain.com/w/index.php?title=Definition:Cyber_crime&amp;action=history"/>
	<updated>2026-05-02T18:05:44Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://www.insurerbrain.com/w/index.php?title=Definition:Cyber_crime&amp;diff=10728&amp;oldid=prev</id>
		<title>PlumBot: Bot: Creating new article from JSON</title>
		<link rel="alternate" type="text/html" href="https://www.insurerbrain.com/w/index.php?title=Definition:Cyber_crime&amp;diff=10728&amp;oldid=prev"/>
		<updated>2026-03-11T16:57:00Z</updated>

		<summary type="html">&lt;p&gt;Bot: Creating new article from JSON&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;🔐 &amp;#039;&amp;#039;&amp;#039;Cyber crime&amp;#039;&amp;#039;&amp;#039; encompasses any criminal activity carried out through or targeting digital systems, and in the insurance context it is the underlying peril that drives [[Definition:Cyber insurance | cyber insurance]] claims, shapes policy wordings, and tests the boundaries between traditional [[Definition:Crime insurance | crime]], [[Definition:Professional liability insurance | professional liability]], and technology-specific coverages. Unlike a broader [[Definition:Cyber attack | cyber attack]], which may be motivated by espionage or activism, cyber crime is defined by its criminal intent — financial theft, [[Definition:Fraud | fraud]], extortion, or trafficking in stolen data. For insurers, distinguishing cyber crime from other cyber events matters because policy triggers, exclusions, and even applicable law often hinge on whether the act constitutes a criminal offense.&lt;br /&gt;
&lt;br /&gt;
🕵️ Typical cyber crime schemes that generate insurance claims include [[Definition:Ransomware | ransomware]] extortion, [[Definition:Business email compromise (BEC) | business email compromise]] that redirects wire transfers, [[Definition:Identity theft | identity theft]] rings exploiting [[Definition:Data breach | breached]] credentials, and [[Definition:Funds transfer fraud | funds transfer fraud]] that manipulates payment instructions. When an insured reports a loss, the [[Definition:Claims adjuster | adjuster]] must determine which policy responds: a standalone cyber policy, a [[Definition:Commercial crime insurance | commercial crime]] form, or possibly a [[Definition:Directors and officers liability insurance (D&amp;amp;O) | D&amp;amp;O]] or [[Definition:Errors and omissions insurance (E&amp;amp;O) | E&amp;amp;O]] policy if corporate officers are alleged to have failed in their oversight duties. Overlapping coverages and so-called &amp;quot;silent cyber&amp;quot; exposure embedded in traditional policies have pushed the market toward explicit [[Definition:Cyber exclusion | cyber exclusions]] in non-cyber lines, clarifying that losses with a digital crime origin belong under dedicated [[Definition:Cyber insurance | cyber]] forms.&lt;br /&gt;
&lt;br /&gt;
📊 The financial trajectory of cyber crime losses is reshaping how the insurance industry thinks about portfolio management and [[Definition:Pricing adequacy | pricing adequacy]]. [[Definition:Loss ratio (L/R) | Loss ratios]] in cyber lines spiked dramatically during the ransomware surge of 2020–2021, forcing carriers to impose stricter [[Definition:Underwriting | underwriting]] controls, raise [[Definition:Deductible | deductibles]], and introduce [[Definition:Coinsurance | coinsurance]] requirements. Law enforcement collaboration — such as insurer participation in threat-intelligence sharing through organizations like the FBI&amp;#039;s IC3 — has also become part of the ecosystem, with some policies requiring the insured to notify authorities before the carrier reimburses a ransom payment. As cyber criminals continually adapt tactics, the feedback loop between claims data, [[Definition:Actuarial analysis | actuarial analysis]], and evolving criminal methodologies makes cyber crime one of the most dynamic perils the industry has ever confronted.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Related concepts:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
{{Div col|colwidth=20em}}&lt;br /&gt;
* [[Definition:Cyber insurance]]&lt;br /&gt;
* [[Definition:Ransomware]]&lt;br /&gt;
* [[Definition:Business email compromise (BEC)]]&lt;br /&gt;
* [[Definition:Funds transfer fraud]]&lt;br /&gt;
* [[Definition:Commercial crime insurance]]&lt;br /&gt;
* [[Definition:Cyber attack]]&lt;br /&gt;
{{Div col end}}&lt;/div&gt;</summary>
		<author><name>PlumBot</name></author>
	</entry>
</feed>