Go Phish: Texas Lawsuit Highlights Need for Tailored Cyber Policies
Time 2 Minute Read
Categories: Cyber

Phishing has been around for decades.  But now, the long-lost ancestor claiming to be a foreign prince is stealing more than your grandmother’s savings.  Phishers are targeting corporations—small and big, private and public—stealing sensitive data and money.  When Policyholders take the bait, they had better have a tailored insurance policy to keep their insurers on the hook as well.

Texas property management company RealPage, Inc. is the latest company to fall victim to a targeted phishing scam.  RealPage uses and controls a software to accept money from residential clients and transfer that money to its property manager clients.  After a phishing scam obtained employee credentials, more than $10 million in funds were diverted from client accounts to the phisher.  RealPage was insured under a $5 million primary insurance policy issued by National Fire Insurance Company of Pittsburgh, Pa. (AIG), and a $5 million excess policy issued by Beazley Insurance Company, Inc., which included coverage for computer fraud, funds transfer fraud, and loss to property that RealPage “owns” and “hold[s] for others.”  Despite the seemingly comprehensive coverage, however, the primary insurer denied coverage based on a lack of ownership of the diverted funds.  RealPage filed suit on June 5, 2019, in the Northern District of Texas against AIG and Beazley, seeking declaratory relief and bringing claims for breach of contract, anticipatory breach of contract, violations of good faith under the Texas Insurance Code.

Insurance coverage disputes for phishing scams and cybercrimes generally are new to Texas, with very few of these suits actually being litigated.  The RealPage dispute serves as reminder that ‘form’ crime and cyber insurance policies may sound good in name, but may not provide coverage suitable for all businesses, including midstream service providers like RealPage.  Policyholders can attempt to protect their information and assets through robust employee training.  But, the best way to not get hooked may be through a comprehensive and tailored cyber insurance policy that fits the policyholders’ particular business model so that coverage is available when employees unknowingly take the bait.

  • Partner

    Mike is a Legal 500 and Chambers USA-ranked lawyer with more than 25 years of experience litigating insurance disputes and advising clients on insurance coverage matters.

    Mike Levine is a partner in the firm’s Washington, DC ...

  • Special Counsel

    A nationally recognized insurance coverage litigator, Lorie handles all aspects of complex, commercial litigation and arbitration for policyholders. Chambers-ranked and recognized as a “top 10 Super Lawyer,” Lorie has ...

  • Associate

    Leah is an experienced trial lawyer in the Litigation section of the Firm’s Houston office. Leah’s practice includes complex commercial litigation, with an emphasis on energy litigation, landlord/tenant litigation ...

You May Also Be Interested In

Time 4 Minute Read

In a recent opinion addressing cross‑motions for summary judgment, a Pennsylvania state court set forth a clear holding that policyholders may recover post-judgment interest under excess liability insurance policies only when the policy language expressly says so—and only when the stated conditions are met. The decision underscores the importance for policyholders to thoroughly examine the defense and payment provisions outlined in their insurance policies.

Time 1 Minute Read

If recent years have taught insurance practitioners anything, it is that the most consequential coverage disputes rarely turn on novelty alone. In 2025, courts continued to resolve high‑stakes insurance disputes by returning to first principles—examining when claims are related, how losses and occurrences are defined and aggregated, and how policy language allocates risk across time and conduct. D&O coverage and other core insurance law issues again occupied center stage, while decisions in property, cyber, and liability disputes reinforced a familiar theme: policy interpretation remains the decisive factor in determining whether coverage is available in an increasingly complex claims environment. As the decisions discussed below demonstrate, 2025 confirmed that even as risks evolve, coverage disputes remain grounded in careful, policy‑specific analysis.

Time 4 Minute Read

In today’s digital world, data breaches due to vendor failures are becoming increasingly common, often resulting in costly fallout. While insurance can provide a safety net, the interaction between cyber insurance and vendor contracts is crucial for effective recovery and risk management. Vendor contracts should not be treated as mere formalities but as vital frameworks that contain specific, detailed provisions regarding data security obligations to ensure accountability and minimize vulnerabilities.

Time 4 Minute Read

In today’s digital world, data breaches due to vendor failures are becoming increasingly common, often resulting in costly fallout. While insurance can provide a safety net, the interaction between cyber insurance and vendor contracts is crucial for effective recovery and risk management. Vendor contracts should not be treated as mere formalities but as vital frameworks that contain specific, detailed provisions regarding data security obligations to ensure accountability and minimize vulnerabilities.

Search

Subscribe Arrow

Recent Posts

Categories

Tags

Authors

Archives

Jump to Page