Case Law[2023] ZAGPJHC 270South Africa
Gerber v PSG Wealth Financial Planning (Pty) Ltd (36447/2021) [2023] ZAGPJHC 270 (23 March 2023)
Headnotes
PDF format RTF format
Judgment
begin wrapper
begin container
begin header
begin slogan-floater
end slogan-floater
- About SAFLII
About SAFLII
- Databases
Databases
- Search
Search
- Terms of Use
Terms of Use
- RSS Feeds
RSS Feeds
end header
begin main
begin center
# South Africa: South Gauteng High Court, Johannesburg
South Africa: South Gauteng High Court, Johannesburg
You are here:
SAFLII
>>
Databases
>>
South Africa: South Gauteng High Court, Johannesburg
>>
2023
>>
[2023] ZAGPJHC 270
|
Noteup
|
LawCite
sino index
## Gerber v PSG Wealth Financial Planning (Pty) Ltd (36447/2021) [2023] ZAGPJHC 270 (23 March 2023)
Gerber v PSG Wealth Financial Planning (Pty) Ltd (36447/2021) [2023] ZAGPJHC 270 (23 March 2023)
Download original files
PDF format
RTF format
Links to summary
PDF format
RTF format
make_database: source=/home/saflii//raw/ZAGPJHC/Data/2023_270.html
sino date 23 March 2023
FLYNOTES:
DUTY TO PROTECT AGAINST CYBERCRIME
CONTRACT
– Financial loss – Cybercrime – Universally
recognised as a scourge – Contractual obligations
to clients
– Client’s email hacked and funds paid out to
fraudster’s account – Duty to employ procedures
and
technological systems to eliminate threats as far as reasonably
possible – No scope to import a proviso that the
client has
the duty to prevent hacking – Investment company liable.
IN THE HIGH COURT OF
SOUTH AFRICA
GAUTENG LOCAL
DIVISION, JOHANNESBURG
Case No:
36447/2021
NOT
REPORTABLE
OF
INTEREST TO OTHER JUDGES
NOT
REVISED
In the matter between:
JAN
JACOBUS
GERBER
Plaintiff
And
PSG
WEALTH FINANCIAL PLANNING (PTY) LTD
Defendant
Coram:
FISHER J
Heard
:
17 January 2023
Delivered
:
23 March 2023
ORDER
I
make an order which reads as follows:
1.
The defendant is to pay the plaintiff the amount of R811 488.98;
2.
The defendant is liable for interest on such amount at the
statutorily prescribe rate on the amount of R250 000.00 from 8
October 2019 (being the date of the first payment) and on the amount
of R561 488.98 (which comprises the second payment of R550 000.00 and
the commission and fees of R11 488.96 charged by the defendant)
from
18 October 2019 (being the date of the second payment);
3.
The defendant is to pay the costs of suit.
JUDGMENT
Fisher J
[1]
This case involves a
claim in contract for loss sustained due to the electronic
transfer
of the plaintiff’s funds which were under the control of the
defendant into the bank account of a fraudster.
[2]
In this
technological age the regulation of financial relationships routinely
takes place by way of email. It has become common for these emails to
be accessed remotely by fraudsters and for the victim’s
computer system to be hijacked. This has become known as ‘hacking’
and the persons who commit this type of crime as
‘hackers.’
[3]
Types of hacking
include crude extortion using sophisticated destructive software
(known as malware) which is installed on the computer system remotely
with ransom then being sought the hackers for its removal;
corporate
espionage and money transfer fraud.
[4]
It has been
recognised by this court and others that this latter type of fraud,
which has become known as Business Email Compromise
(BEC) fraud, is
rife.
[1]
[5]
The crime is
typically committed in anonymity by means of remote engagement
using
the internet and other systems. It is usually of the nature of a
confidence trick – the perpetrators trick the person
who has
control over the transfer of rights in the money into believing that
the transfer into the account controlled by the fraudster
is in
accordance with legitimate instructions. Both parties are victims of
the fraud. The question is: Who should bear the loss
which it
occasions?
[6]
The application of
the settled legal principles in relation to determining
negligence in
claims in delict and the nature and scope of contractual
relationships can be complex in this esoteric cyberspace
where what
can and should have been be done to prevent the hacking of the system
is often difficult to determine.
[7]
It is helpful to
discuss the applicable principles with the material facts
in mind. I
thus move to deal first with these facts.
Material
facts
[8]
The plaintiff has a
share portfolio which has been managed by the defendant
for in excess
of a decade. The portfolio was managed by Mr Jonathan Fisher in his
capacity of representative of the defendant for
some years prior to
the events which led to this case.
[9]
As at September 2019
the plaintiff held investments with the defendant in a
total amount
of R 855 413. This amount was held in shares and cash and these
amounts could be liquidated and paid out in cash
to the plaintiff on
his request. The aim was however that the investment serves as
retirement fund for the plaintiff and his wife.
She also held a
portfolio in her own name.
[10]
Until the hacking incident, which took
place, over the period 03 October 2019 to 05 November
2019, the
relationship had been uneventful.
[11]
The account was a discretionary
account, meaning that the plaintiff put funds at the disposal
of Mr
Fisher who could operate on the account as he saw fit as far as the
reinvestment of dividends and the usual buying and selling
of shares
was concerned. The aim was obviously to get as high a return on these
share trades as possible so that the investment
grew.
[12]
It was thus not necessary that the
plaintiff have much, if any, personal contact with the defendant’s
staff or Mr Fisher. Such contact was rare. The dealings between the
parties entailed no more than a monthly statement being sent
via
email to the plaintiff setting out details of the brokerage activity
on the account.
[13]
On 03 October 2019 there was a
somewhat unusual request which appeared to emanate from the
plaintiff; the plaintiff sought the liquidation and payment of more
than a quarter of his portfolio. This was something that he
had never
sought in all the years that the account had been managed by the
defendant. As I have said, the purpose of the investment
was to fund
retirement. The amount sought to be liquidated was R
250 000.
[14]
There was a further change alluded to
in the email; a change of bank details from the plaintiff’s
Nedbank account which had been on record for years to an account at
First National Bank (FNB).
[15]
Mr Fisher wrote back obligingly by
return email. He said all was in order with the withdrawal
and that
it would take three days for the funds to be made available. Mr
Fisher’s email was carbon copied to his personal
assistant Ms
Jocelyn van Stavel.
[16]
Mr Fisher noted pertinently in the
return email that the bank account mentioned was different
from that
which the defendant had on record for the plaintiff. He asked that a
current FNB statement be sent showing the new details.
Presumably
this was an attempt to verify that the account was not fraudulent.
[17]
An email was then forthcoming in
response. It did not contain a bank statement as requested.
Instead,
it contained a letter – ostensibly from FNB. The letter is
dated 30 September 2019 and appears to bear an official
bank stamp
reflecting that date. It purports to provide details of a bank
account held in the name of the plaintiff. It reflects
that the bank
account was opened in 2002 which would make it 17 years old. It
states that, if the reader, has any queries the writer
can be
contacted at a mobile telephone number provided. Ms van Stavel was
again copied in this response.
[18]
The PSG branches such as the plaintiff
are run on a franchise system. As part of the franchise
arrangement,
they are afforded the use of central client services provided by the
main PSG entity. The central services include
bank account
verification checks and account control and payments. This facility
clearly has, as a main function, the protection
against BEC fraud.
[19]
On 04 October 2019 Ms van Stavel,
instructed by Mr Fisher, sent an email to central client services
asking that the plaintiff’s ‘new account’ be
verified and loaded so that payment could be made thereto.
[20]
A document which is indicated as being
from the Bank Verification Panel of PSG shows that the
search failed.
Details of the verification check disclosed to Mr Fisher and Ms van
Stavel inform that (i) the identity attached
to the account did not
match the client details; (ii) the account was not more than three
months old and (iii) neither the phone
number nor email address
attached to the account was ‘valid’.
[21]
This information notwithstanding,
there was a persistence as to the loading of the bank details.
Mr
Fisher and Ms van Stavel testified that these verification reports
were often unreliable and that thus that they were not regarded
as
conclusive evidence of a fraudulent account.
[22]
Client services furthermore conveyed
that, when asked, FNB was not willing to confirm telephonically
that
the account belonged to the plaintiff.
[23]
It was made clear that client
services had identified a risk attached to the account and
that
consequently it would not accept any liability which arose from
payment into the account. It thus required confirmation from
Ms van
Stavel that payment could indeed be made into the account at the risk
of the defendant.
[24]
Ms van Stavel, duly instructed by Mr
Fisher was undeterred. She next sent an email to the plaintiff’s
email address asking for his confirmation that the account was indeed
his and that payment could be made into his account. Unsurprisingly,
came the response from the hijacked email account that the payment
should indeed be made into the nominated account.
[25]
The first personal communication
between the parties occurred on 08 October 2019. Ms van Stavel
telephoned the plaintiff on his mobile phone. He was driving at the
time and on his way to a mining site where he was working.
She
merely informed him that ‘the money’ would be paid into
his account that day. He responded ‘goed so’
(‘that’s
fine’) – although he did not know to what she was
referring.
[26]
Ms van Stavel testified that
this was a ‘courtesy call’ to let him know that
the money
had been paid.
[27]
Later that day an email was sent from
the hijacked email account asking for proof of payment.
[28]
It is common cause that the plaintiff
had no knowledge of the payment.
[29]
The hackers had thus successfully
achieved payment of R250 000 of the funds from the plaintiff’s
account into the fraudulent account. They decided to continue with
the deceit.
[30]
On 15 October 2019, there was further
activity from the email address. An email was sent to
Ms van Stavel
thanking her for the previous successful transaction and requesting
an additional payment to the FNB account. The
email was copied to Mr
Fisher.
[31]
It was confirmed by Ms van Stavel per
return email that this would be done.
[32]
On 18 October 2019 there was a
communication from the plaintiff’s email address asking
when
payment would be made. The reply came from Ms van Stavel that it
would be forthcoming that same day.
[33]
Payment was again duly made into the
fraudulent account, thus wiping out most of the plaintiff’s
investment.
[34]
Emboldened by the success, the hacker
sought a further source of payment. Ms van
Stavel was
asked for a statement for all the plaintiff’s investments. This
was duly forwarded.
[35]
Ms van Stavel, trying to be
helpful, inquired if the plaintiff wanted a statement relating
to his
wife’s portfolio as well. The answer came back in the
affirmative. There followed a request for a withdrawal of R400 000
from Mrs Gerber’s investment account.
[36]
On 05 November 2019, an email
was sent under cover of which a letter purporting to be
confirmation
of details of a banking account for the payment to Mrs Gerber. It had
a similar get-up to the previous letter.
[37]
Ms van Stavel testified that the email
of 05 November 2019 ‘didn’t look right’.
She
indicated that the language and syntax of the covering email was not
grammatically correct in Afrikaans, which she spoke fluently.
[38]
She thus approached Mr Fisher, who was
in his office, and indicated her disquiet. Mr Fisher
testified that
he had, by this stage, had a conversation with a colleague in the
same brokerage field who had related that hacking
had taken place in
relation to one of his clients in a similar way.
[39]
This insecurity led to a call being
made by Mr Fisher to Mrs Gerber. He asked her about the
liquidation
of the R400 000 investment of her portfolio. She indicated that
she knew nothing about it and referred Mr Fisher
to her husband.
[40]
In the meantime, telephonic contact
had been made with the plaintiff and he had confirmed that
he too
knew nothing of the requested transaction.
[41]
It finally dawned on all
concerned that they had been duped.
[42]
A subsequent investigation conducted
by the plaintiff some months later revealed that the plaintiff’s
Microsoft Outlook email account had been hacked. The emails to and
from PSG were diverted by the hacker to a separate file on the
account and thus did not feature in the inbox and outbox files. In
this way the selected correspondence remained hidden until it
was too
late.
[43]
Against this background I now turn to
examine the claim and the defences raised thereto.
[44]
The defendant seeks to import a tacit
term into the contract which it contends excludes its
liability. It
also denies, in any event, that it breached the express terms of the
contracts.
[45]
The defendant pleads an
alternative claim of estoppel. I will deal with the contractual
defences and the estoppel defence in turn.
The
claim and defences raised in contract
[46]
The claim is based on the alleged
breach of written contracts in terms of which the defendant
undertook
to manage the plaintiff’s share portfolio and provide financial
advice. The contractual relationship between the
parties comprises
two written agreements, an ‘Advice Agreement’ and a
‘Product Agreement’.
[47]
It is not in dispute that under the
express terms of these agreements the plaintiff had the
duty to
protect the plaintiff against gross negligence and fraud.
[48]
It is also not in dispute that under
the General Code of Conduct for Financial Service
Providers and
Representatives ("the Code’) which was expressly imported
into the contractual relationship and specifically
Section 11 of the
Code, the defendant was obliged to ‘at all times have and
effectively employ the resources, procedures
and appropriate
technological systems that can reasonably be expected to eliminate as
far as reasonably possible, the risk that
clients, product suppliers
and other providers or representatives will suffer financial loss
through theft, fraud, other dishonest
acts, poor administration,
negligence, professional misconduct or culpable omissions.’
[49]
The plaintiff thus pleads generally
that the defendant was obliged to exercise the necessary
skill, care
and diligence to ensure that the monies held by it in trust did not
fall prey to fraud, that it breached this obligation
and that such
breach led to his loss.
[50]
It was furthermore a term of the
agreements that the plaintiff was obliged to provide all instructions
to the defendant in writing via email or fax. The reference to a fax
would appear to be an anachronism as they are no longer in
common
usage having been supplanted by the email.
[51]
The defendant accepts that it had the
duty to protect the plaintiff’s money against fraud
but pleads
a tacit term to the effect that the plaintiff would not be liable for
loss under circumstances where the plaintiff’s
computer system
was hacked due to the plaintiff’s negligence. It alleges that
the plaintiff was negligent in that he did
not take all reasonable
steps to protect his computer system against hacking.
[52]
In essence, the
defendant admits liability to protect against fraud, save fraud
perpetrated by means of cybercrime where the plaintiff
failed to take
reasonable steps to protect his computer system from being hacked.
[53]
The defendant
must prove the tacit term. If it fails, it is left with a case in
contract that it took reasonable steps to prevent
the fraud.
[54]
I now deal with
the tacit term.
The
tacit term
[55]
The obligation of the defendant to
protect against fraud is express. As I have said, the background
and
context to such obligation must be seen to include the prevalence of
cybercrime in the financial service industry. In the face
of this
express term, the plaintiff seeks to imply a tacit term to the effect
that the client had a duty to prevent hacking of
his system.
[56]
A tacit
term is an unexpressed provision of the contract which derives from
the common intention of the parties as inferred by the
court from the
express terms of the contract and the surrounding circumstances.
[2]
[57]
A tacit
term cannot be imported into a contract on any question to which the
parties have applied their minds and for which they
have made express
provision in the contract.
[3]
[58]
Thus, the defendant would have to show
that the express duty of the defendant to protect its
client against
fraud is conditional on the client taking certain steps. These steps
are not specifically pleaded.
[59]
The defendant, on the other hand, was
obliged to have and effectively employ the resources,
procedures and
appropriate technological systems that can reasonably be expected to
eliminate the risk that its clients will suffer
financial loss
through fraud.
[60]
Clearly, that there was a risk
of hacking taking place is contemplated by this term.
[61]
It makes sense that hackers will focus
their efforts on infiltrating areas of commercial
enterprise that involve large money transfers. Professions such as
attorneys and financial services have started warning clients
that
bank account numbers will never change without specific human
interventions from the firm. These warnings are often a standard
message on all correspondence.
[62]
In
Hawarden
v ENS
[4]
,
claim in contract on the basis of an implicit term
in favour of the client, it was found by this court that
precautions
which the defendant attorney was obliged to take would have prevented
the fraud regardless of how or why the plaintiff’s
email was
hacked. In my view, the same position holds sway on the facts of this
case.
[63]
A test
commonly applied by our courts
[5]
to determine the basis of which a tacit term can be imported into a
contract is known as the ‘officious bystander test.’
It emerges
from the following famous
dictum
of
Scrutton LJ in
Reigate
v Union Manufacturing Co (Ramsbottom) Ltd and Elton Cap Dyeing Co
Ltd
[6]
'A
term can only be implied if . . . it is such a term that it can
confidently be said that if at the time the contract was being
negotiated someone had said to the parties, ''What will happen in
such a case'' they would both have replied, ''Of course so and
so I will happen; we did not trouble to say that; it is too
clear.'' Unless the Court comes to some such conclusion as
that, it
ought not to imply a term which the parties have not expressed.'
[64]
In applying the officious bystander
test to determine the existence of tacit term, the express
provisions
of the agreement, the circumstances surrounding the conclusion of the
agreement and the conduct of the parties subsequent
thereto must be
considered.
[65]
The defendant, in effect, seeks to
import a proviso into the fraud protection. It would have
the term
read that the defendant must protect the funds and not pay them to an
illegitimate source provided that, if the client
does not take
reasonable steps to make his computer system inviolable to hacking,
the protection will not apply.
[66]
To my mind, to import such a proviso
into these protections would be counter-intuitive. The
protection
against technological fraud would be meaningless if the client had to
assume an obligation to prevent hacking of its
system. After all, the
defendant is paid handsomely for the services provided, which include
the providing of fraud protection.
[67]
An important gloss of the bystander
test is that the tacit term contended for must be capable
of precise
formulation.
[68]
Trollip JA
in
Desai
and Others v Greyridge Investments (Pty) Ltd
[7]
in
dealing with a proposed tacit term said the following:
'I do not think that it
is either clear or obvious which of those forms of the term should
prevail, and hence that none can be implied. The
reason is that the implication of a term depends upon the inferred or
imputed intention of the parties to the contract . . . and
once there
is difficulty and doubt as to what the term should be or how far it
should be taken it is obviously difficult to say
that the parties
clearly intended anything at all to be implied.'
[69]
On this score, it is difficult, in the
absence of an expert understanding of the technicalities
of hacking,
to determine precisely what needs to be done to protect the system.
This difficulty is exacerbated by the fact that
it is notorious that
cyber-criminals develop their technologies and tactics to meet
preventative measures as they evolve.
[70]
I thus find that the defendant has not
established the tacit term contended for. It is thus
not necessary to
consider whether a breach of such clause has been established by the
defendant and whether such breach was causative
of the loss.
[71]
In any event, there is no
evidence that the plaintiff did anything or failed to do anything
to
protect his system from hacking. He testified that his system was
password protected and that he had an effective virus protection
software installed. This was not challenged.
[72]
The defendant contends that the
plaintiff must show that he did all he could to protect his
email.
This is not so. Defendant relies on the tacit term and the breach
thereof. It is thus for the defendant to formulate the
term, to show
what steps should have been taken in compliance with the term and
that these steps were not taken.
[73]
Counsel for the defendant points out
that there was some contradiction in the evidence of the
plaintiff
and his wife as to whether the passwords were physically accessible.
He says this is relevant to the plaintiff’s
failure to comply
with his obligations to keep his system safe. In this regard Mrs
Gerber testified that the password was kept
in a file in the
plaintiff’s study while the plaintiff testified that it was
kept in a safe. This discrepancy is not material;
it is not in the
contemplation of either side that the email was physically sourced
from study or safe. It is not in dispute that
this was a virtual
hacking. This evidence is thus irrelevant.
[74]
Furthermore, and merely as an aside,
it is not beyond the realm of possibility or even probability
that
the plaintiff’s email was sourced from a hacking of the
defendant’s system and that the process started there.
As was
testified to by Mr Fisher, his colleague alerted him to similar
fraudulent activity in relation to one of his client’s
portfolios.
[75]
The upshot
of these speculations may be that without firm evidence that either
one or the other of the parties allowed the infiltration
of one or
the other of their systems, hacking must be regarded as an inevitable
and intractable scourge. It is also not irrelevant
that the contracts
dictated that the manner in which the instructions had to be given
was via email. Arguably, the defendant thus
assumed the risk of
employing this system of communication
[8]
.
[76]
Having
failed in establishing the tacit term, the defendant is thus left
with the defence in contract that it complied with
the express terms
of the agreement.
[77]
Clearly, on the
facts, it did not. The deficiencies in the checking process were
clear. The defendant ignored its own protocols.
The checking
machinery yielded the result that the account was not verified as
being legitimate. The defendant however took the
decision to override
this information. This was notwithstanding that PSG client services
pertinently pointed out that it had identified
a risk that the
account was not that of the plaintiff and that it would not bear this
risk. I am informed from the Bar that there
is no insurance for the
fraud in issue and that loss resulting therefrom will be borne by the
defendant if it does not succeed
in its defences.
[78]
At very least, one would expect that
the information relating to the bank account which was
conveyed by
client services would have triggered a further and more careful
scrutiny of the letter provided as verification of
the account. This
is more so the case as Mr Fisher’s own request for a bank
statement was not complied with. A bank statement
would have afforded
greater detail as to the veracity of the account. The fact that it
was not provided should have raised a concern
in the first place.
[79]
Responsible and careful attention to
the purported letter as against the bank account check
would have
revealed that the account was less than three months old whereas the
letter states that the account in question was
opened in 2002 –
i.e. that it had been held by the plaintiff for more than fifteen
years. This is a glaring anomaly.
[80]
The fact that the account was newly
opened would, to my mind, be an indicator that it may have
been
opened for a nefarious purpose. The bank account verification process
was specifically directed at whether the account was
less than three
months old. The fact that the discrepancy was not picked up shows
that there was a lack of attention to the purported
proof of the new
account as being that of the plaintiff. The letter was simply taken
at face value. This, to my mind, does not
amount to the taking of
steps to protect the investment against fraud. In fact, on the
contrary.
The
estoppel
[81]
When a
person (the representor) has by words or conduct made a
representation to another person (the representee) and the latter,
believing the representation to be true, acted thereon and would
suffer prejudice if the representor were permitted to deny the
truth
of the representation made by him, the representor may be precluded
(estopped) from denying the truth of the representation.
[9]
[82]
The estoppel in this case is raised on
two bases: first, that the plaintiff’s system was
hacked and
thus the plaintiff through his negligence allowed the
misrepresentations to be made; second, that the defendant when
telephoned by Ms van Stavel failed to question the statement that
monies were to be paid into his account thus creating the impression
that he had sought such payment.
[83]
I deal with each basis in turn.
The
plaintiff’s negligence facilitated the fraud.
[84]
This basis
entails reliance on what is known in our law as the facilitation
theory. This theory absent proof of calculated deception
on the part
of the defendant has long been discredited in our law
[10]
.
[85]
This was
succinctly declared by Corbett J in
O
K Bazaars
at 287H-288B as follows:
“
As
in the present instance, cases of estoppel by negligence often
involve the fraudulent conduct of a third party and the complaint
against the person sought to be estopped is that his negligence
permitted or facilitated the fraud. In this situation our Courts
have
rejected, as being too broadly stated, the so-called “facilitation
theory”, viz. that where-ever one of two innocent
parties must
suffer by the acts of a third, he who has enabled such third person
to occasion the loss must sustain it (see
Grosvenor
Motors’
case,
supra
at
p.425; see also
Connock’s
(S.A.) Motor Co. Ltd v Sentraal Westelike Ko-operatiewe Maatskappy
Bpk.,
1964
(2) S.A. 47
(T)
at p.48). It has, on the contrary, been held that such cases must be
adjudged by the ordinary general principles relating to
estoppel by
negligence; and, of course, the fraudulent intervention of a third
party is an important factor in determining whether
the conduct of
the person sought to be estopped proximately caused the other’s
mistaken belief and resultant loss; and whether
this result was
reasonably foreseeable.”
[86]
The
defendant relies on
Mosselbaai
Boeredienste
(Pty) Ltd v OKB Motors
CC
[11]
, a judgement of
the Full Bench of the Free State Division. That case involved a sale
transaction between two dealers in motor
vehicles. Payment was made
by the respondent into a fraudulent bank account, the payment details
having emanated from a fraudulent
invoice sent from the appellant’s
computer system. The appellant argued that the respondent was
negligent in paying the purchase
price into a bank account without
verifying that such account was that of the appellant and that, in
these circumstances, the defendant
should bear the consequences of
its negligence. The respondent, argued that the security in respect
of the appellant's computer
system was compromised through the
negligence of the appellant, enabling the false invoice to be sent to
the respondent. The respondent
thus raised an estoppel which
succeeded in the trial court and was upheld on appeal by the Full
Court.
[87]
It is argued on this authority that as
the indications are that the fraud emanated from the
hacking of the
plaintiff’s system and not that of the defendant, the plaintiff
should bear the loss.
[88]
Apart from the fact that
Mosselbaai
cannot be construed as being authority for the
general proposition that if the fraud emanates from one party’s
system, that
party must bear the loss, the facts of that case are
distinguishable. In
Mosselbaai
there was direct evidence
that the fraud had been perpetrated
internally
on the
appellant’s system in that the password and user-names were not
changed for years and were widely known by current
and ex-staff
members. There was no outside or remote accessing of the system.
There was also no contractual protection accorded
to either party.
[89]
On general principles, the case for
estoppel by facilitation must fail on two bases. First,
the defendant
has not established that anything the plaintiff did or failed to do
resulted in the hacking and it is just as probable
that the details
of the email addresses of clients were obtained from the defendant’s
system. Second, the plaintiff had no
duty to protect his email
system. On the contrary, the plaintiff was protected by a contract
which put the duty to prevent fraud
of this nature on the defendant.
[90]
Even if it had been shown by the
defendant that the plaintiff was negligent, this does not absolve
the
defendant of his admitted contractual obligations. The proximate
cause of the loss was not the hacking, it was the failure
to employ
the necessary and contractually prescribed vigilance when monies held
in trust were sought to be paid into a different
account.
[91]
In the circumstances the defendant
cannot succeed on the estoppel defence on the first basis.
The
telephone call
[92]
Mr Fisher attempted to suggest that
his systems and protocols went further than merely the bank
account
checks. He indicated that it was part of the defendant’s
protocol that the client be spoken to personally when payment
was to
be made so that it could be confirmed that payment was being made
into the correct account. He testified that the plaintiff
misrepresented the position in the face of this protocol.
[93]
Ms van Stavel however
characterised the call she made as a ‘courtesy call’.
On
any basis the call cannot be construed as seeking confirmation that
monies were to be transferred from the investment account
of the
plaintiff into a different bank account from the one on record with
the defendant. The information given by Ms van Stavel
was that
payment would be made
into
the plaintiff’s account. The
plaintiff was not alarmed by this as he probably would have been had
he been told that payment
was to be made out of his investment
account into a FNB account. This stands to reason. To the extent that
the telephone call was
meant to confirm that the account was a valid
account such inquiry would have been express. The defendant explains
that he believed
the reference to be to internal transactions in his
investment account. He concedes that such a call was never made
previously
but he explains that this did not concern him. He had no
knowledge of the internal processes of the defendant and no reason to
question the call.
[94]
The plaintiff’s confirmation on
a query from his financial service provider that money
could be paid
into his account cannot, to my mind, be construed as a
representation.
[95]
The
situation would be different if the telephone communication was
directed at confirming the plaintiff’s new bank
account
details. Had this been done and the plaintiff, for some reason,
confirmed the account to be his, it would arguably be the
case that
the defendant must be found to have taken all reasonable steps to
verify the account and that it was thus not in breach
of its
contract. The case would thus not be decided on the question of the
plaintiff’s negligent misrepresentation but in
contract.
[12]
[96]
In any
event, on the estoppel, it was the defendant’s onus to show
that the representation was clear and unequivocal and that
Ms van
Stavel reasonably understood the representation to mean that payment
of the plaintiff’s monies held by the defendant
could be made
into a new bank account.
[13]
The test for representation by conduct is whether the representor
should reasonably have expected that the representee may be misled
and whether the representee acted reasonably in construing the
representation.
[14]
The
defendant failed to establish these aspects on the facts.
[97]
As I have said, on Ms van Stavel’s
evidence, the call made by her was merely a courtesy
call. It was not
directed at confirming the bank account details or the instruction to
pay. It is common cause that there was no
indication given that
information was being sought from the plaintiff. He was simply
informed that payment would be made to him
by his financial service
provider. He had no reason to question this information. Dividend
payments were made to his account in
the normal course of the share
brokerage that took place in terms of the agreements. The purpose of
his investment was that it
grows in, inter alia, this manner.
[98]
Thus, the defendant has not made out a
case for estoppel on the second basis either.
Conclusion
[99]
The contractual obligation of the
defendant to its clients was to have and effectively employ
the
resources, procedures and appropriate technological systems that can
reasonably be expected to eliminate as far as reasonably
possible,
the risk that the clients will suffer financial loss through theft or
fraud.
[100]
The assumption of these contractual obligations
must be construed in the context that cybercrime is universally
recognised as a scourge. There is no scope to import a proviso into
the term to the effect that the plaintiff has the duty to prevent
hacking. This would be counter-intuitive. A major and arguably the
main reason for the protection under the agreement is cybercrime.
Why
would the plaintiff then assume responsibility for cybercrime?
[101]
The defendant has not established that it complied with
its contractual obligations to protect the plaintiff
against
cybercrime.
[102]
The defendant has furthermore not established the
estoppel defences raised.
[103]
In relation to the quantum, the plaintiff's claim
initially consisted of a claim relation to the loss of dividends
as a result of the fact that shares were sold to obtain the liquid
funds. However, during the proceedings the plaintiff conceded
that it
would seek only the loss as at date of the breaches contended for
which is the total paid by the defendant into the FNB
account - being
R 800 000 and with commission and fees charged by the defendant
in the amount of R11 488.98 and interest
on such amounts at the
prescribed rate.
Order
In
the circumstances I make the following order:
4.
The defendant is to pay the plaintiff the amount of R811 488.98;
5.
The defendant is liable for interest on such amount at the
statutorily prescribe rate on the amount of R250
000.00 from 8
October 2019 (being the date of the first payment) and on the amount
of R561 488.98 (which comprises the second payment
of R550 000.00 and
the commission and fees of R11 488.96 charged by the defendant) from
18 October 2019 (being the date of the
second payment);
6.
The defendant is to pay the costs of suit.
D
FISHER
JUDGE
OF THE HIGH COURT
APPEARANCES
For
the Plaintiff:
Adv.
R. Bekker
Instructed
by
:
Cox Yeats
Attorneys
For
the 1
st
Respondent:
Adv. P Van der
Berg SC
Instructed
by
:
Thyne Jacobs Incorporated
[1]
See for example
Harwarden
v ENS
handed down in this court by Mudau J on 16 January 2023 under case
number 13849/2020 ,
Jurgens
and Another v Volschenk
(4067/18) [2019] ZAECPEHC 41 (27 June 2019);
Fourie
v Van der Spuy and De jongh Inc. and others
[2019] JOL 45848 (GP).
[2]
Alfred
McAlpine & Son (Pty) Ltd Transvaal Provincial Administration
1977(4)
SA 310 T 327.
[3]
See
Airways
Inc v SA Fire and Accident Insurance Co Ltd
1965(3) SA 150 (A) 175 C
[4]
Op cit, n 1
[5]
See for e.g. :
South
African Mutual Aid Society v Cape Town Chamber of Commerce
1962
(1) SA 598
(A)
at
606
;
Alfred
McAlpine & Son (Pty) Ltd v Transvaal Provincial
Administration
1974
(3) SA 506
(A)
op
533A - B ;
Wilkins
NO v Voges
[1994] ZASCA 53
;
1994
(3) SA 130
(A)
at
137A – D;
Techni-Pak
Sales (Pty) Ltd v Hall
1968
(3) SA 231
(W) at 236H - 237
[6]
1918] 1 KB 592
(CA)
(118 LT 479
at 483)
[7]
Desai
and Others v Greyridge Investments (Pty) Ltd
[7]
1974
(1) SA 509
(A)
at
522H - 523A
[8]
See
Maartens
v Pope
1992 (4) SA 883 (N)
[9]
Oakland
Nominees (Pty) Ltd v Gelria Mining 8 Investment Co (Pty) Ltd
1976
(1) SA 441
(A) 452A-H
[10]
cf,
for e.g,
Union
Government v National Bank of South Africa Ltd
1921
AD 121
131
138; and
Grosvenor
Motors (Potchefstroom) Ltd v Douglas
1956
(3) SA 420
(A)
425F-H).
O
K Bazaars (1929) Ltd v Universal Stores Ltd
1973
(2) SA 281
(C)
(Ok Bazaars):
[11]
Mosselbaai
Boredienste (Pty) Ltd v OKB Motors cc 2021 3DR 3059 (FB).
[12]
See
Lillicrap,
Wassenaar and Partners v Pilkington Brothers (SA) (Pty) Ltd
1985
(1) SA 475 (A).
[13]
Southern
Life Association ltd v Beyleveld
NO 1989(1) SA 496 (A).
[14]
Concor
Holdings (Pty)Ltd t/a Concor Technicrete v Potgieter
2004(6) SA 491 (SCA)
sino noindex
make_database footer start
Similar Cases
Gerber v Boyle and Another (2022/034505) [2024] ZAGPJHC 946 (20 September 2024)
[2024] ZAGPJHC 946High Court of South Africa (Gauteng Division, Johannesburg)100% similar
Gerber N.O and Others v Maluleka and Others (2023/078290) [2024] ZAGPJHC 1063 (21 October 2024)
[2024] ZAGPJHC 1063High Court of South Africa (Gauteng Division, Johannesburg)100% similar
Gerber and Others v Maluleke and Others (2023/078290) [2025] ZAGPJHC 9 (15 January 2025)
[2025] ZAGPJHC 9High Court of South Africa (Gauteng Division, Johannesburg)100% similar
Gerber v Da Silva and Another (2025-185201) [2025] ZAGPJHC 1206 (18 November 2025)
[2025] ZAGPJHC 1206High Court of South Africa (Gauteng Division, Johannesburg)100% similar
SS Geranuim Mansions v City of Johannesburg and Another (2024/056921) [2025] ZAGPJHC 110 (10 February 2025)
[2025] ZAGPJHC 110High Court of South Africa (Gauteng Division, Johannesburg)99% similar