Don’t Put All Your Eggs in the Silent-Cyber Basket
Time 3 Minute Read
Categories: Cyber, D&O

The Eastern District of Pennsylvania recently gave another reminder why cyber insurance should be part of any comprehensive insurance portfolio.  In Construction Financial Administration Services, LLC v. Federal Insurance Company, No. 19-0020 (E.D. Pa. June 9, 2022), the court rejected a policyholder’s attempt to find coverage under its professional liability insurance for a social engineering incident that defrauded over $1 million.

Construction Financial Administrative Services, which goes by CFAS, disburses funds to contractors.  One of its clients, SWF Constructors, was hacked, and a bad actor posing as the client asked CFAS to distribute $600,000 to a sham third party.  John Follmer, an executive at CFAS and the only person authorized to approve distribution of funds, approved it.  The next day, the bad actor, again posing as the client, asked Follmer to transfer an additional $700,000.  Follmer approved that distribution too.

Although Follmer approved both distributions, he did not follow the proper protocol for doing so.  The third party was not listed in the approved budget; CFAS never received a copy of an agreement between the client and the third party; CFAS never received a disbursement voucher for the payment; CFAS never received a waiver from the client; and CFAS never received the additional information it needed to account for the disbursement.  Even so, Follmer approved the payment.

After the fraud was discovered, CFAS tried to recover the funds it had been tricked into giving up, but it was too late.  It recovered only $120,000 of the $1,300,000 it lost. 

CFAS filed a claim under its errors and omissions policy—presumably because it did not have separate cyber coverage.  Some non-cyber policies include “silent cyber coverage,” which is coverage not primarily intended to cover cyber losses, but which nonetheless applies to cyber-related losses based on broadly worded insuring agreements.  Federal, CFAS’s insurer, attempted to exclude that sort of silent cyber coverage by including an unauthorized access exclusion in its policy.  That exclusion bars claims “based upon, arising from or in consequence of any unauthorized or exceeded authorized access to, use of or alteration of, any computer program, software, computer, computer system.”

CFAS, in an apparent attempt to avoid that exclusion, did not make a claim for silent cyber coverage; in fact, it did not attempt to claim losses based on the bad actor’s actions at all.  Instead, CFAS claimed that its losses were covered because Follmer had acted negligently by making the disbursements without collecting all of the necessary information.  Although creative, that argument ultimately failed.

The court ruled that CFAS could not escape the broad language of the exclusion—eliminating coverage for all losses “in consequence of any . . . unauthorized access to  . . . computers”—by rebranding the loss as arising from negligence.  Under the law of North Carolina, which controlled, so long as the loss “follows as an effect of” the bad actor’s unauthorized access, it was “in consequence of” the unauthorized access and was therefore excluded.

Construction Financial Administration Services serves as a reminder to policyholders to ensure that proper, comprehensive insurance coverage is in place to cover all reasonably anticipated risks of loss.  In today’s technology-dependent society, that must include robust cyber protection.  Although some policies have traditionally provided “silent cyber coverage,” new, broad exclusions are being introduced to curtail such coverage, making it all the more important for businesses to ensure that their insurance portfolio specifically targets cyber risks.

  • Partner

    Mike is a Legal 500 and Chambers USA-ranked lawyer with more than 25 years of experience litigating insurance disputes and advising clients on insurance coverage matters.

    Mike Levine is a partner in the firm’s Washington, DC ...

You May Also Be Interested In

Time 4 Minute Read

In a recent opinion addressing cross‑motions for summary judgment, a Pennsylvania state court set forth a clear holding that policyholders may recover post-judgment interest under excess liability insurance policies only when the policy language expressly says so—and only when the stated conditions are met. The decision underscores the importance for policyholders to thoroughly examine the defense and payment provisions outlined in their insurance policies.

Time 1 Minute Read

If recent years have taught insurance practitioners anything, it is that the most consequential coverage disputes rarely turn on novelty alone. In 2025, courts continued to resolve high‑stakes insurance disputes by returning to first principles—examining when claims are related, how losses and occurrences are defined and aggregated, and how policy language allocates risk across time and conduct. D&O coverage and other core insurance law issues again occupied center stage, while decisions in property, cyber, and liability disputes reinforced a familiar theme: policy interpretation remains the decisive factor in determining whether coverage is available in an increasingly complex claims environment. As the decisions discussed below demonstrate, 2025 confirmed that even as risks evolve, coverage disputes remain grounded in careful, policy‑specific analysis.

Time 4 Minute Read

In today’s digital world, data breaches due to vendor failures are becoming increasingly common, often resulting in costly fallout. While insurance can provide a safety net, the interaction between cyber insurance and vendor contracts is crucial for effective recovery and risk management. Vendor contracts should not be treated as mere formalities but as vital frameworks that contain specific, detailed provisions regarding data security obligations to ensure accountability and minimize vulnerabilities.

Time 4 Minute Read

In today’s digital world, data breaches due to vendor failures are becoming increasingly common, often resulting in costly fallout. While insurance can provide a safety net, the interaction between cyber insurance and vendor contracts is crucial for effective recovery and risk management. Vendor contracts should not be treated as mere formalities but as vital frameworks that contain specific, detailed provisions regarding data security obligations to ensure accountability and minimize vulnerabilities.

Search

Subscribe Arrow

Recent Posts

Categories

Tags

Authors

Archives

Jump to Page