<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-US">
	<id>https://www.insurerbrain.com/w/index.php?action=history&amp;feed=atom&amp;title=Definition%3AEmail_fraud_%28insurance%29</id>
	<title>Definition:Email fraud (insurance) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.insurerbrain.com/w/index.php?action=history&amp;feed=atom&amp;title=Definition%3AEmail_fraud_%28insurance%29"/>
	<link rel="alternate" type="text/html" href="https://www.insurerbrain.com/w/index.php?title=Definition:Email_fraud_(insurance)&amp;action=history"/>
	<updated>2026-05-03T09:09:43Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://www.insurerbrain.com/w/index.php?title=Definition:Email_fraud_(insurance)&amp;diff=19590&amp;oldid=prev</id>
		<title>PlumBot: Bot: Creating new article from JSON</title>
		<link rel="alternate" type="text/html" href="https://www.insurerbrain.com/w/index.php?title=Definition:Email_fraud_(insurance)&amp;diff=19590&amp;oldid=prev"/>
		<updated>2026-03-17T03:50:49Z</updated>

		<summary type="html">&lt;p&gt;Bot: Creating new article from JSON&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;📧 &amp;#039;&amp;#039;&amp;#039;Email fraud (insurance)&amp;#039;&amp;#039;&amp;#039; refers to schemes in which bad actors use deceptive electronic communications — most commonly [[Definition:Phishing | phishing]], [[Definition:Business email compromise (BEC) | business email compromise]], and spoofed sender identities — to manipulate individuals or organizations into transferring funds, divulging sensitive data, or authorizing fraudulent transactions, all viewed through the lens of how insurers underwrite, detect, and indemnify such losses. Within the insurance sector, email fraud sits at the intersection of [[Definition:Cyber insurance | cyber insurance]], [[Definition:Crime insurance | crime insurance]], and [[Definition:Social engineering fraud coverage | social engineering fraud coverage]], and its classification matters enormously because the applicable policy form determines whether a claim is covered, excluded, or subject to a sub-limit.&lt;br /&gt;
&lt;br /&gt;
⚙️ Coverage for email-fraud losses is rarely housed under a single policy type. A traditional [[Definition:Commercial crime insurance | commercial crime policy]] may cover theft resulting from computer fraud, yet many insurers have successfully argued that voluntary transfers induced by a deceptive email do not constitute &amp;quot;direct&amp;quot; computer fraud — a distinction litigated repeatedly in U.S. courts and addressed differently under policy wordings in the London and European markets. To close this gap, underwriters introduced explicit [[Definition:Social engineering fraud coverage | social engineering endorsements]] and standalone [[Definition:Cyber insurance | cyber policies]] with funds-transfer-fraud modules. During the [[Definition:Underwriting | underwriting]] process, carriers typically evaluate an applicant&amp;#039;s email-authentication protocols — such as DMARC, SPF, and DKIM — employee training programs, dual-authorization procedures for payments, and [[Definition:Incident response plan | incident response]] readiness. [[Definition:Premium | Premiums]] and [[Definition:Retention | retentions]] are calibrated to the maturity of these controls, and some insurers mandate baseline security standards before binding coverage.&lt;br /&gt;
&lt;br /&gt;
🔑 The rapid escalation of email-fraud losses — often running into millions of dollars per incident — has reshaped how carriers think about [[Definition:Aggregation risk | aggregation risk]] and policy language precision. Ambiguous wording can leave both policyholders and insurers exposed: policyholders may discover a gap only after a loss, while insurers face adverse court rulings that stretch coverage beyond original intent. Regulators in markets such as the United States, the United Kingdom, and Singapore have encouraged clearer disclosure of what is and is not covered, pushing the industry toward more transparent [[Definition:Policy wording | policy wordings]]. For [[Definition:Insurance broker | brokers]] advising clients, understanding the interplay between crime, cyber, and professional-liability towers is essential to constructing a program that leaves no unintended gap when an employee wires funds to a fraudster posing as the CEO.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Related concepts:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
{{Div col|colwidth=20em}}&lt;br /&gt;
* [[Definition:Business email compromise (BEC)]]&lt;br /&gt;
* [[Definition:Cyber insurance]]&lt;br /&gt;
* [[Definition:Social engineering fraud coverage]]&lt;br /&gt;
* [[Definition:Crime insurance]]&lt;br /&gt;
* [[Definition:Phishing]]&lt;br /&gt;
* [[Definition:Funds transfer fraud]]&lt;br /&gt;
{{Div col end}}&lt;/div&gt;</summary>
		<author><name>PlumBot</name></author>
	</entry>
</feed>