July 17, 2018

Emerging Legal Issues in Data Breach Class Actions

Joseph F. Yenouskas, Levi W. Swank

INTRODUCTION

Businesses face more than reputational risk when the personally identifiable information (“PII”) of their customers is stolen during a data breach. Many data breaches have spawned multi-plaintiff or class action lawsuits by customers whose PII was accessed by unauthorized third parties as a result of the breach. But, until recently, businesses faced modest litigation risk in these cases because most courts held that litigants lacked standing to sue in federal court, reasoning that plaintiffs had yet to suffer an injury absent allegations that the exposure of their PII resulted in identity theft or unauthorized and unreimbursed charges to their financial accounts. This survey discusses new developments in the law of standing in data breach cases, as well as decisions about the viability of legal claims. Currently, the law is sharply divided, and it is likely to remain so for the foreseeable future.

ARTICLE III STANDING FOR DATA BREACH CASES

BACKGROUND

The recent evolution in case law concerning the standing of plaintiffs in data breach litigation is the outgrowth of two U.S. Supreme Court decisions that established the framework for analyzing Article III’s “injury-in-fact” requirement. In Clapper v. Amnesty International USA,1 the Supreme Court held that the plaintiffs’ fear that their private communications might be intercepted by government surveillance programs was not an injury in fact because any “threatened injury must be certainly impending to constitute injury in fact,” and “allegations of pos-sible future injury are not sufficient.”2 The plaintiffs’ injury was “too speculative” because its occurrence “relie[d] on a highly attenuated chain of possibilities” that “the Government [would] imminently target communications to which [they were] parties.”3 Nor were “measures that they have undertaken to avoid . . . surveillance” an injury; “otherwise, an enterprising plaintiff would be able to secure a lower standard for Article III standing simply by making an expenditure based on a nonparanoid fear.”4 Yet, the Clapper Court cautioned that its cases have “not uniformly require[d] plaintiffs to demonstrate that it is literally certain that the harms they identify will come about,” provided there is “a ‘substantial risk’ that the harm will occur, which may prompt plaintiffs to reasonably incur costs to mitigate or avoid that harm.”5

In Spokeo, Inc. v. Robins,6 the Court reiterated that the injury-in-fact requirement “does not mean [] that the risk of real harm cannot satisfy that requirement.”7 The Spokeo Court held that an alleged Fair Credit Reporting Act (“FCRA”) violation did not, ipso facto, confer standing because “a bare procedural violation, divorced from any concrete harm,” does not “satisfy the injury-in-fact requirement of Article III.”8 It explained that “[i]n determining whether an intangible harm constitutes injury in fact,” two considerations were important: “whether an alleged intangible harm has a close relationship to a harm that has traditionally been regarded as providing a basis for a lawsuit in English or American courts”; and “because Congress is well positioned to identify intangible harms that meet minimum Article III requirements, its judgment is also instructive and important.”9The Spokeo Court re-manded the case to the Ninth Circuit to determine “whether the particular procedural violations alleged in this case entail a degree of risk sufficient to meet the concreteness requirement.”10

RECENT DEVELOPMENTS

In most data breach cases, the alleged injury resulting from the unauthorized access of PII is the increased risk of identity theft and concomitant expenses associated with mitigating that risk. The courts have reached differing conclusions depending on whether actual identity theft has occurred and whether such an occurrence is found to be a prerequisite for standing.

In Lewert v. P.F. Chang’s China Bistro, Inc.,11 for example, the Seventh Circuit held that theft of debit and credit card information conferred standing to sue. One plaintiff incurred four fraudulent transactions on his debit card, and there-after purchased credit monitoring services, and while the other plaintiff “did not spot any fraudulent charges on his card, nor did he cancel his card and suffer the associated inconvenient or costs,” he alleged that he “spent time and effort monitoring his card statements and his credit report.”12 The court held that the injuries alleged were sufficient. First, “the increased risk of fraudulent charges and identity theft” was “concrete enough to support a lawsuit” “because [plaintiffs’] data has already been stolen.”13 Second, the plaintiffs alleged “time and effort” resolving fraudulent charges and other “measures to mitigate [their] risk.”14 P.F. Chang’s argued that the data breach “posed a risk only of fraudulent charges to affected cards, not of identity theft,” but the court refused to dismiss the case for lack of standing based on “a factual assumption that has yet to be tested.”15

In contrast, a Colorado federal court dismissed a case for this very reason in Engl v. National Grocers by Vitamin Cottage, Inc.16 Because the “card issuer identified the fraudulent activity on his account and unilaterally exonerated [plaintiff] of responsibility for the fraudulent charges” and then “closed the account associated with the stolen card number,” the Engl court concluded that he “brought [his] exposure to any future harm from the [] data breach to an end.”17

In Welborn v. Internal Revenue Service,18 a District of Columbia district court held that the plaintiffs alleged an injury in fact arising from a data breach of an online tool used by the Internal Revenue Service (“IRS”) to provide prior-year tax returns to taxpayers because two plaintiffs “allege[d] that they have suffered actual identity theft when someone filed false tax returns (and claimed fraudulent refunds) in their names,” and the third plaintiff “has been the victim of at least two occasions of fraudulent activity in her financial accounts, one of which resulted in the removal of funds from a personal financial account, which occurred after the IRS data breach.”19 But the plaintiffs’ allegation “that they suffer an increased threat of future identity theft and fraud” was “entirely speculative and depends on the decisions and actions of one or more independent, and unidentified, actor(s), and the risk of such harm occurring was not “imminent harm that is ‘certainly impending.’”20 Other injuries the court found too speculative were “general anxiety,” the “diminished value of their PII,” and “time and money spent monitoring and assessing the potential risk of future harm.”21

While each plaintiff in Wellborn alleged an injury, the court observed that the second element of standing, causation, required plaintiffs to “put forward facts showing that their injuries can be traced to the specific data incident of which they complain and not to any previous theft or data loss incident.”22 One plaintiff did not allege that his injury was “fairly traceable” to the IRS’s conduct because he “simply allege[d] that the alleged financial fraud happened after the [] breach.”23 The court found that the other two plaintiffs alleged a sufficient causal connection to their injuries because they “alleged sufficient facts that, if proved, would tend to show that the information used in the fraudulent tax re-turn was of the same type that was stolen.”24

The Third Circuit held in In re Horizon Services Inc. Data Breach Litigation25 that the plaintiffs, whose PII was contained on stolen laptops, sufficiently alleged an injury in fact even though “none of them had [ ] alleged that the information was actually used to their detriment.”26 The plaintiffs alleged injury based on both an “increased risk of harm from identity theft, identity fraud, and medical fraud” and “the violation of their statutory rights under FCRA.”27 Rather than decide whether the plaintiffs had alleged a non-speculative risk of future injury as required by Clapper, the court “conclude[d] that they have standing due to Horizon’s alleged violation of FCRA.”28 The Horizon Services court reasoned that, while the court’s “pronouncements in this area have not been entirely con-sistent,” “in some circumstances, [ ] the breach of a statute is enough to cause a cognizable injury—even without economic or other tangible harm.”29 It held that “[i]n light of the congressional decision to create a remedy for the unauthorized transfer of personal information, a violation of FCRA gives rise to an injury sufficient for Article III standing purposes. Even without evidence that the Plaintiffs’ information was in fact used improperly, the alleged disclosure of their personal information created a de facto injury.”30 While, under Spokeo, “there are some circumstances where the mere technical violation of a procedural requirement of a statute cannot, in and of itself, constitute an injury in fact,” the Third Circuit found that “[p]laintiffs here do not allege a mere technical or procedural violation of FCRA. They allege instead the unauthorized dissemination of their own private information—the very injury that FCRA is intended to prevent.”31

In Beck v. McDonald,32 the Fourth Circuit affirmed the dismissal of the Privacy Act and Administrative Procedure Act claims arising from the theft of laptops containing patient records from a Veterans Affairs hospital.33 The plaintiffs alleged two injuries: “(i) the increased risk of future identity theft, and (ii) the costs of protecting against the same.”34 The Beck court noted that its “sister cir-cuits are divided on whether a plaintiff may establish an Article III injury-in-fact based on an increased risk of future identity theft,”35 but that where courts rec-ognized such injuries, the plaintiffs’ allegations “sufficed to push the threatened injury of future identity theft beyond the speculative to the sufficiently imminent” because in those cases “the data thief intentionally targeted the personal information compromised in the data breaches.”36 The Beck plaintiffs, however, “have uncovered no evidence that the information contained on the stolen laptop has been accessed or misused or that they have suffered identity theft, nor, for that matter, that the thief stole the laptop with the intent to steal their private information.”37 The court also rejected the plaintiffs’ contention that there was a “substantial risk” of harm occurring, even accepting as true plaintiffs’ allegation that “33% of health-related data breaches result in identity theft.”38 Because the risk was speculative, the cost of protecting against future identity theft also did not confer standing as the harm resulting from such efforts was “self-imposed.”39 Notably, the Beck court distinguished Horizon Services, where the Third Circuit found standing even though there was no allegation that plaintiffs’ PII had been accessed, because their injury was “the very injury that FCRA is intended to prevent”;40 whereas in Beck, “[p]laintiffs do not allege that [defendant’s] violations of the Privacy Act alone constitute an Article III injury-in-fact.”41

In Galaria v. Nationwide Mutual Insurance Co.,42 the Sixth Circuit held that the plaintiffs had standing to sue even though none of them pled unauthorized charges or identity theft. The plaintiffs’ allegations amounted to a “substantial risk of harm” because, “[w]here a data breach targets personal information, a reasonable inference can be drawn that the hackers will use the victims’ data for [] fraudulent purposes.”43 This inference was confirmed by the defendant’s actions: “Nationwide seems to recognize the severity of the risk, given its offer to provide credit-monitoring and identity-theft protection for a full year.”44 The Galaria court’s finding that the plaintiffs faced “a substantial risk of harm” meant that they “expend[ed] time and money to monitor their credit, check their bank statements, and modify their financial accounts,” which constituted an injury because “it would be unreasonable to expect Plaintiffs to wait for actual misuse—a fraudulent charge on a credit card, for example—before taking steps to ensure their own personal and financial security, particularly when Nationwide recommended taking these steps.”45

The Galaria court also addressed whether the plaintiffs satisfied Article III’s causation requirement. The majority of the court held that the plaintiffs’ allegations met the “fairly traceable” requirement for standing because plaintiffs alleged that “the hackers were able to access Plaintiffs’ data only because Nationwide allegedly failed to secure the sensitive personal information entrusted to its custody.”46

In Whalen v. Michaels Stores, Inc.,47 the Second Circuit affirmed dismissal of claims for breach of implied contract and under the New York General Business Law based on a data breach at Michaels. The plaintiff alleged that at some point after the data breach, her credit card “was physically presented for payment” on two occasions by an unauthorized third party.48 Just like the plaintiff in Engl, however, the Whalen plaintiff did not allege that she incurred any fraudulent charges that she was liable to pay, because her credit card company removed the charges and deactivated her account.49 The Whalen court concluded that the plaintiff’s alleged injury failed the Clapper test because “she never was either asked to pay, nor did pay, any fraudulent charge.”50 Because her credit card was canceled “and no other personally identifying information—such as her birth date or Social Security number—is alleged to have been stolen,” the court reasoned that the plaintiff “does not allege how she can plausibly face a threat of future fraud.”51 It rejected the plaintiff’s mitigation allegations as conclusory because she “pleaded no specifics about any time or effort that she herself has spent monitoring her credit.”52

While the nature of the breach in Whalen distinguished the case from Galaria, where a broader array of PII was accessed, Whalen is more difficult to reconcile with the Seventh Circuit’s Lewert decision, where the only information obtained by hackers was the plaintiffs’ debit card numbers, and yet the court still held that plaintiffs faced a substantial risk of future injury.

VIABILITY OF DATA BREACH CLAIMS ON THE MERITS

Even if the plaintiffs survive standing challenges in data breach litigation, no federal statute provides a remedy to victims of a data breach, and plaintiffs have been mostly unsuccessful in mooring their claims to other federal statutes, such as the FCRA. Courts have been more receptive to claims under state statutes and the common law, although the outcomes at the pleadings stage vary widely. For instance, in In re Experian Data Breach Litigation,53 a California federal district court granted in part and denied in part Experian’s motion to dismiss claims arising from the theft of PII stored on Experian’s servers. The court dismissed the plaintiffs’ FCRA claims because Experian did not “furnish” a “consumer report” in violation of the FCRA.54 Plaintiffs’ New York, Illinois, Ohio, and California negligence claims survived, however, even as to the one plaintiff who was reim-bursed for unauthorized credit card charges. The court held that “[e]ven if, as Defendants argue, a risk of future identity theft isn’t a properly pleaded damage, the complaint also alleges that Plaintiffs have suffered damages by taking measures to both ‘deter’ and ‘detect’ identity theft.”55These damages included both unreimbursed credit monitoring expenses and hours spent “addressing issues arising from the Data Breach.”56 The court concluded that “[t]he time that Plaintiffs have allegedly spent addressing issues caused by the data breach” stated a claim for damages.”57

Some claims against Experian under state consumer protection statutes also survived. The plaintiffs successfully alleged a violation of New York’s deceptive trade practices act on the basis that “Experian . . . misrepresented that it would comply with the requirements of relevant federal and state laws pertaining to the privacy and security of” the plaintiffs’ data.58 The court also held that the plaintiffs stated claims under the “unfair” or “unlawful” prongs of California’s Consumers Legal Remedies Act and Unfair Competition Law.59

In In re Premera Blue Cross Customers Data Security Breach Litigation,60 an Oregon district court held that plaintiffs whose PII was exposed by a data breach of Premera’s computer network could proceed to the merits on their fraud- and contract-based claims. The plaintiffs’ fraud claims under the common law and Oregon consumer protection statutes were based on statements in Premera’s policy booklets, a privacy notice provided to Premera’s members, and the company’s code of conduct posted on its website.61 The Premera court held that guarantees contained in these documents, such as “[w]e protect your privacy by making sure your information stays confidential,” and aspirational statements concerning “prevent[ing] unauthorized access” had “the capacity to deceive if, as Plaintiffs allege, Premera did not provide adequate data security.”62 Because “[a] reasonable person, reading these statements, would believe that Premera provides reasonable and adequate data security,” the court held that plaintiffs alleged an affirmative misrepresentation claim.63

While the Premera court held that the plaintiffs failed to allege any active misrepresentation, their amended pleadings adequately alleged fraud by omission because “Premera should have disclosed that it did not implement industry standard access controls, did not fix known vulnerabilities in its electronic security protocols, failed to protect against reasonably anticipated threats, and otherwise did not comport with its assurances regarding protecting information.”64

The Premera court also held that the plaintiffs’ express contract claims survived, except as to claims based on statements in Premera’s code of conduct, which “are not guarantees but are expressions of corporate optimism” rather than “enforceable promises.”65 The plaintiffs further alleged that these documents contained “implied terms requiring Premera to implement data security adequate to safeguard and protect the confidentiality of their [] [i]nformation.”66 The court held that such a claim was viable under Oregon law, but that Washington law required a finding of “legal necessity” before a term would be implied into a contract, and the court “decline[d] to imply a term into the parties’ contracts that would require adequate data security measures be taken.”67

Finally, as to plaintiffs who were not policyholders of Premera but “whose [PII] came into Premera’s possession without any relationship between the parties,” the court rejected the plaintiffs’ alternative argument, that Premera breached an “implied-in-fact contract[] for the provision of data security.”68 The complaint failed to “allege facts that plausibly suggest that Plaintiffs other than the Policy-holder Plaintiffs gave information to Premera,” nor were there sufficient allegations of the elements of a contract with plaintiffs who were Premera policyholders.69 In an earlier opinion dismissing certain allegations, the court held that the plaintiffs adequately alleged unjust enrichment based on payments they made to Premera.70

In Fero v. Excellus Health Plan, Inc.,71 classes of California, Florida, Indiana, North Carolina, New Jersey, New York, and Pennsylvania customers, federal employee enrollees, and medical providers alleged ten causes of action, including common law negligence and contract claims, and violations of state privacy and consumer protection statutes, arising from a data breach that exposed their PII. The plaintiffs alleged that false tax returns were filed in their names, that they were the victims of identity theft, had fraudulent credit or debit card charges, that they spent money to remediate the breach, and that they spent time mitigating their losses or protecting against future identity theft and were at risk of identity theft in the future.72 The Fero court held that plaintiffs who “alleged increased risk of harm, unaccompanied by any concrete misuses of their stolen information,” lacked standing because “none allege any facts indicat-ing that the hackers have misused their personal information since the data breach occurred, or that any other suspicious activity has occurred in the three years since.”73 Rather, “the alleged injuries rely on a chain of possibilities about the actions of independent actors.”74 The court also held that causes of action under state statutes did not confer standing because, under Spokeo, “Article III standing requires a concrete injury even in the context of a statutory violation.”75

The Fero court held that the plaintiffs whose PII had been misused both had standing and stated a claim under certain state common law causes of action and statutes. Plaintiffs’ contract-based claims were premised on Excellus’s privacy policy, which was incorporated by reference into their contracts.76 The court denied Excellus’s motion to dismiss those claims, noting that “the statements from the privacy policies identified by Plaintiffs plausibly could be read to reflect a definite promise by Excellus to maintain the security of the personal information that it collected and stored on its networks.”77 But the court dismissed the federal employee plaintiffs’ third-party beneficiary claim, noting that nothing in the contracts evidenced an intent to confer enforcement rights on the insured plaintiffs.78 The court also dismissed the plaintiffs’ negligent misrepresentation claims, both because the plaintiffs failed to allege reliance, since “Plaintiffs have failed to allege with any particularity that they actually read or saw the notices concerning privacy policies and practices,” and because no facts “suggest that Plaintiffs have a relationship with [Excellus] that is unique or differs from that of a reasonable consumer.”79

Many state statutory claims also survived in Fero. Under the New York prohi-bition of deceptive acts or practices, the court reasoned that “it is at least plausible that the [defendants’] representations in their privacy policies and on their web-sites concerning data security (catalogued above) would lead a reasonable consumer to believe that the [defendants] were providing more adequate data security than they purportedly were,” and that “the [defendants] failure to disclose the purportedly inadequate data security measures would mislead a reasonable consumer.”80 The court dismissed the plaintiffs’ California Customer Records Act claims because that law does not apply to a “health care service plan.”81 Finally, the New Jersey Insurance Information Practices Act and the North Carolina Consumer and Customer Information Privacy Act prohibit the “disclosure” of certain PII. But the court distinguished “disclosure” from “theft,” finding that “the struc-ture of both [statutes] support[s] the conclusion that disclosure does not encom-pass a theft” and, therefore, dismissed these claims.82

In USAA Federal Savings Bank v. PLS Financial Services, Inc.,83 an Illinois district court dismissed state negligence and consumer fraud claims brought by USAA after millions of dollars in counterfeit checks were drawn on the bank’s accounts following a data breach at a check cashing and payday lending company. USAA claimed that PLS breached its duty to USAA “of safeguarding allegedly confidential financial information” of customers.84 The court explained, however, that because “Illinois does not recognize a common law duty to safeguard personal information, USAA cannot establish its claim for negligence against PLS.”85 The court also dismissed USAA’s claim under the Illinois Consumer Fraud Act, refus-ing to “infer from the allegations of the first amended complaint that the allegedly unfair conduct occurred in Illinois . . . where no allegations suggest that the breach occurred in Illinois or affected Illinois residents.”86

CONCLUSION

The law in data breach cases is unsettled, and over the next year, courts will be forced to grapple with two emerging questions. First, as data breaches become larger and more frequent,87 and plaintiffs’ PII is stolen through multiple, sepa-rate data breaches, how plaintiffs have suffered an injury, and whether that injury is fairly traceable to the actions of any specific defendant, is less apparent. Second, existing case law is largely based on the assumption that hackers steal PII for financial gain, even though hackers are increasingly motivated by non-commercial ends, such as activism, blackmail, or espionage.88 Courts may be forced to reevaluate their framework for analyzing standing where identity theft is not the plausible goal of the data breach.

_____________

* Joseph F. Yenouskas is a partner and Levi W. Swank is an associate in the Washington, D.C. office of Goodwin Procter LLP. The statements and views expressed in this survey are solely those of the authors, not those of their firm or its clients; accordingly, none of the views or statements should be attributed to their firm or any of its clients, or construed as a comment on non-public as-pects of cases that are discussed herein.

1. 568 U.S. 398 (2013).

2Id. at 409 (quotation marks and alterations omitted).

3Id. at 401, 411.

4Id. at 415–16.

5Id. at 414 n.5.

6. 136 S. Ct. 1540 (2016).

7Id. at 1543.

8Id. at 1549; see also Anna-Katrina S. Christakis, Jeffrey D. Pilgrim & Jennifer L. Majewski, Post-Spokeo: The Impact of Article III Standing on Consumer Finance Litigation, 73 BUS. LAW. 565 (2018) (in this Annual Survey); Matthew O. Stromquist, Anna-Katrina S. Christakis & Jeffrey D. Pilgrim, The High Court Speaks on Standing, Mootness, Arbitration, and Representative Evidence, 72 BUS. LAW. 567, 567–69 (2017) (in the 2017 Annual Survey).

9Spokeo, 136 S. Ct. at 1549.

10Id. at 1550. On remand, the Ninth Circuit found that the “alleged injuries were sufficiently concrete for the purposes of Article III.” Robins v. Spokeo, Inc., 867 F.3d 1108, 1118 (9th Cir. 2017). A cert petition is pending in the Supreme Court. Petition for a Writ of Certiorari, Spokeo, Inc. v. Robbins, No. 17-806 (U.S. Dec. 6, 2017).

11. 819 F.3d 963 (7th Cir. 2016).

12Id. at 965.

13Id. at 967.

14Id.

15Id. While plaintiffs also alleged that the “cost of their meals” was an injury because “they would not have dined at P.F. Chang’s had they known of its poor data security,” and that “they have a prop-erty right to their personally identifiable data,” the court was skeptical that “any of these would be sufficient injury for Article III standing.” Id. at 968.

16. No. 15-cv-02129-MSK-NYW, 2016 WL 8578252 (D. Colo. Sept. 21, 2016).

17Id. at *6.

18. 218 F. Supp. 3d 64 (D.D.C. 2016), app. dismissed, No. 16-5365, 2017 WL 2373044 (D.C. Cir. Apr. 18, 2017).

19Id. at 76–77.

20Id.

21Id. at 78.

22Id. at 79.

23Id.

24Id. As to these two plaintiffs, the court nonetheless dismissed their claims on the grounds of statutory standing, preemption, and failure to state a claim. Id. at 85.

25. 846 F.3d 625, 629 (3d Cir. 2017).

26Id. at 629.

27Id. at 634.

28Id. at 635.

29Id.

30Id. at 629.

31Id. at 638, 640.

32. 848 F.3d 262 (4th Cir. 2017).

33Id. at 266–67.

34Id. at 273.

35Id.

36Id. at 274.

37Id.

38Id. at 275–76.

39Id. at 276–77.

40In re Horizon Healthcare Servs. Inc. Data Breach Litig., 846 F.3d 625, 640–41 (3d Cir. 2017). 41. 848 F.3d at 271 n.4.

42. 663 F. App’x 384 (6th Cir. 2016).

43Id. at 388.

44Id. The court explained that “[a]lthough Nationwide offered to provide some of these services for a limited time, Plaintiffs allege that the risk is continuing, and that they have also incurred costs to obtain protections—namely, credit freezes—that Nationwide recommended but did not cover.” Id. at 388–89.

45Id. at 388.

46Id. at 390 (citing Parsons v. U.S. Dep’t of Justice, 801 F.3d 701, 714 (6th Cir. 2015)).

47. 689 F. App’x 89 (2d Cir. 2017).

48Id. at 90.

49Id.

50Id. at 90–91 (citing Galaria, 663 F. App’x at 386).

51Id.

52Id.

53. No. SACV 15-1592 AG, 2016 WL 7973595 (C.D. Cal. Dec. 29, 2016).

54Id. at *1 (citing 15 U.S.C. § 1681b). While the term “furnish” is not defined in the statute, the court noted that “courts generally use the term to describe the active transmission of information to a third-party rather than a failure to safeguard the data.” Id. (internal quotation marks omitted).

55Id. at *3.

56Id. at *3, *5.

57Id. at *5. The court declined to dismiss negligence per se claims based on the Gramm-Leach-Bliley Act and the Interagency Guidelines Establishing Information Security Standards, except as to California plaintiffs because “there is no negligence per se claim in California.” Id. at *8.

58Id. at *5 (citing N.Y. GEN. BUS. LAW § 349).

59Id. at *9.

60. No. 3:15-md-2633-SI, 2017 WL 539578 (D. Or. Feb. 9, 2017).

61Id. at *3.

62Id. at *6.

63Id. at *6–7. The court dismissed the fraud-based claims as to one specific policy because that policy only “contains a promise to have a company confidentiality policy and to have employees sign that policy.” Id. at *6.

64Id. at *8.

65Id. at *13.

66Id.

67Id. at *14.

68Id. at *16.

69Id.

70In re Premera Blue Cross Customer Data Sec. Breach Litig., 198 F. Supp. 3d 1183, 1201 (D. Or. 2016).

71. 236 F. Supp. 3d 735 (W.D.N.Y. 2017).

72Id. at 744.

73Id. at 753.

74Id. The court also held that “mitigation efforts following a data breach do not confer standing where the alleged harm is not imminent.” Id. at 754. Nor was it sufficient to allege that plaintiffs over-paid for their health insurance in light of Excellus’s allegedly lax data security. Id. And, as every other court to consider the question has held, the court rejected the argument that “the diminution in value of personal information can support standing.” Id. at 755.

75Id.

76Id. at 759–60.

77Id. at 761. The court dismissed plaintiffs’ implied covenant claim “as duplicative of their breach of contract claim because both claims arise from the same facts and seek the same damages for each alleged breach,” id. at 763, but permitted plaintiffs’ unjust enrichment claim to proceed because there was a dispute as to whether “the parties have an enforceable contract with definite and material terms regarding the provision of data security,” which would bar such a remedy. Id. at 770.

78Id. at 763–64, 769–70.

79Id. at 773.

80Id. at 776 (citing N.Y. GEN. BUS. LAW § 349).

81Id. at 782.

82Id. at 784; see also Hapka v. Carecentrix, Inc., No. 16-2372, 2016 WL 7336407, at *5 (D. Kan. Dec. 19, 2016) (plaintiffs adequately pleaded a negligence claim despite failing to identify a statutory duty because “[g]iven plaintiff’s allegations that the harm was foreseeable, defendant had the duty to exercise reasonable care to prevent that harm”).

83. No. 16-cv-7911, 2017 WL 2345537 (N.D. Ill. May 30, 2017).

84Id. at *2.

85Id. at *3.

86Id. at *4.

87See, e.g., AnnaMaria Andriotis & Ezequial Minaya, Equifax Reports Data Breach Possibly Affecting 143 Million U.S. Consumers, WALL ST. J. (Sept. 8, 2017), https://www.wsj.com/articles/equifax-reports-data-breach-possibly-impacting-143-million-u-s-consumers-1504819765.

88See, e.g., Michael S. Schmidt & Steven Lee Myers, Panama Law Firm’s Leaked Files Detail Offshore Accounts Tied to World Leaders, N.Y. TIMES (Apr. 3, 2016) (data breach of Panamanian law firm Mossack Fonseca), https://www.nytimes.com/2016/04/04/us/politics/leaked-documents-offshore-accounts-putin.html; Byron Tau & Damian Paletta, DNC Says Computers Breached by Russian Government-Linked Hackers, WALL ST. J. (June 14, 2016), https://www.wsj.com/articles/democratic-national-committee-computers-breached-by-hackers-linked-to-russian-government-1465920304 (data breach of Democratic National Committee’s computer systems).

Joseph F. Yenouskas

Partner, Goodwin Procter

Joe Yenouskas, a partner in Goodwin’s Financial Industry and Consumer Financial Services Litigation practices, focuses on general civil litigation in federal and state trial and appellate courts, with a particular emphasis on defending financial institutions and mortgage lenders in complex consumer class action lawsuits.

Levi W. Swank

Associate, Goodwin Procter

Levi Swank is an associate in the firm’s Financial Industry and Consumer Financial Services Litigation practices. Mr. Swank focuses on complex civil litigation and appellate matters, and has litigation experience in a wide range of areas, including mortgage servicing, origination, and insurance; the False Claims Act; and the First Amendment. He has drafted and contributed to briefs in courts around the country, including the United States Supreme Court, several federal district courts, and the Massachusetts Supreme Judicial Court.