Hunton Insurance Recovery Practice Head Explains Why Medidata Decision Affirming Phishing Coverage is “Common Sense”
Time 2 Minute Read
Categories: Cyber, Industry News

In a July 9, 2018 article appearing in Insurance Law360, Hunton Andrews Kurth insurance recovery practice head, Walter J. Andrews, explains why the Second Circuit’s decision in Medidata Solutions Inc. v. Federal Insurance Co., No. 17-2492 (2nd Cir. July 6, 2018), affirming coverage for a $4.8 million loss caused by a “phishing” e-mail attack, is a common sense application of the plain language of Medidata’s computer fraud coverage provision.  As Andrews explained, “[c]learly, hijacking — or spoofing — email addresses constitutes an attack on a company's computer system for which a reasonable policyholder should expect coverage. A computer is a computer is a computer. Everyone knows that — except for insurance companies.”

Andrews’ common sense illustration was partly in response to the unsuccessful hyper-technical arguments raised by Medidata’s insurer, Chubb Ltd. a unit of Federal Insurance Co., whereby the insurer contended that Medidata’s loss was not the result of the fraudulent e-mails but, rather, the voluntary acts of the Medidata employees who were duped by them.  That argument was soundly rejected by the Second Circuit, which explained that “[i]t is clear to us that the spoofing attack was the proximate cause of Medidata's losses.  The chain of events was initiated by the spoofed emails, and unfolded rapidly following their receipt.”

The Second Circuit’s rejection of Chubb’s technical application of the term “direct” is particularly significant for policyholders, as it represents an acknowledgment that insurers’ technical and restrictive applications of policy terms like “direct” have no place in a world of sophisticated and multilayered theft and embezzlement schemes, many of which involve the use of computers.  As Andrews further explained, “[the] decision shows that at least one appellate court will give that term a normal meaning and agree that sending emails ‘directly’ uses a computer system to cause a fraudulent transfer.

See our blog posts of August 18, 2016, July 24, 2017, July 25, 2017 and July 9, 2018, for further discussion of the Medidata case and July 6 decision.

  • Partner

    Mike is a Legal 500 and Chambers USA-ranked lawyer with more than 25 years of experience litigating insurance disputes and advising clients on insurance coverage matters.

    Mike Levine is a partner in the firm’s Washington, DC ...

You May Also Be Interested In

Time 1 Minute Read

If recent years have taught insurance practitioners anything, it is that the most consequential coverage disputes rarely turn on novelty alone. In 2025, courts continued to resolve high‑stakes insurance disputes by returning to first principles—examining when claims are related, how losses and occurrences are defined and aggregated, and how policy language allocates risk across time and conduct. D&O coverage and other core insurance law issues again occupied center stage, while decisions in property, cyber, and liability disputes reinforced a familiar theme: policy interpretation remains the decisive factor in determining whether coverage is available in an increasingly complex claims environment. As the decisions discussed below demonstrate, 2025 confirmed that even as risks evolve, coverage disputes remain grounded in careful, policy‑specific analysis.

Time 4 Minute Read

In today’s digital world, data breaches due to vendor failures are becoming increasingly common, often resulting in costly fallout. While insurance can provide a safety net, the interaction between cyber insurance and vendor contracts is crucial for effective recovery and risk management. Vendor contracts should not be treated as mere formalities but as vital frameworks that contain specific, detailed provisions regarding data security obligations to ensure accountability and minimize vulnerabilities.

Time 4 Minute Read

In today’s digital world, data breaches due to vendor failures are becoming increasingly common, often resulting in costly fallout. While insurance can provide a safety net, the interaction between cyber insurance and vendor contracts is crucial for effective recovery and risk management. Vendor contracts should not be treated as mere formalities but as vital frameworks that contain specific, detailed provisions regarding data security obligations to ensure accountability and minimize vulnerabilities.

Time 5 Minute Read

Theft in the cargo industry has skyrocketed in recent years. In the first half of 2024, cargo thefts rose 49 percent and the average loss per shipment by 83 percent. Given these dramatic spikes in cargo theft, policyholders whose operations rely on the safe transportation and trade of cargo should take steps to mitigate against the potential losses of a cargo-theft event. We discuss below the insurance coverage options available to policyholders that can help protect against the risks and losses associated with cargo-related theft if such a loss occurs.

Search

Subscribe Arrow

Recent Posts

Categories

Tags

Authors

Archives

Jump to Page