Chаntal ATTIAS, et al., Plaintiffs, v. CAREFIRST, INC., et al., Defendants.
Case No. 15-cv-00882 (CRC)
United States District Court, District of Columbia.
Signed August 10, 2016
193 F. Supp. 3d 193
Matthew O. Gatewood, Sutherland Asbill & Brennan LLP, Washington, DC, Robert D. Owen, Sutherland Asbil & Brennan, LLP, New York, NY, for Defendants.
MEMORANDUM OPINION
CHRISTOPHER R. COOPER, United States District Judge
Theft of electronic data has become commonplace in our digital economy, victimizing millions of Americans each year.
In June 2014, the health insurer CareFirst suffered a data breach that compromised the personal information of sоme 1.1 million policyholders, including the seven named Plaintiffs here. The purloined information included the policyholders’ names, birth dates, email addresses, and subscriber identification numbers. Compl. ¶ 32; see also Defs.’ Reply Ex. 1 (Decl. Clayton Moore House) ¶ 10. According to CareFirst, more-sensitive data, such as social security and credit card numbers, was not stolen.1 After CareFirst publicly acknowledged the breach in May 2015, Plaintiffs sued the company and various of its affiliates on behalf of themselves and other policyholders, alleging that CareFirst violated a host of state laws and legal duties by failing to safeguard their personal information.2 Another set of plaintiffs filed a similar federal class action in Maryland.
CareFirst has moved to dismiss Plaintiffs’ complaint. It argues that because Plaintiffs have not alleged that their personal information has actually been misused, or explained how the stolen information could readily be used to assume their identities, they lack standing to sue in federal court. Plaintiffs mainly respond that the increased likelihood of identity theft that resulted from the breach, and the costs they have incurred to mitigate it, are sufficient injuries to establish standing. In resolving this dispute, the Court will fоllow the standard set by the majority of courts that have confronted similar cases, including the related Maryland class action: Absent facts demonstrating a substantial risk that stolen data has been or will be misused in a harmful manner, merely having one‘s personal information stolen in a data breach is insufficient to establish standing to sue the entity from whom the information was taken. Because Plaintiffs have not mаde the required showing, the Court lacks subject matter jurisdiction over the case and will grant CareFirst‘s motion to dismiss.
I. Legal Standard
Defendants move to dismiss the Complaint for lack of subject matter jurisdiction pursuant to
At the same time, because a “court has an ‘affirmative obligation to ensure that it is acting within the scope of its jurisdictional authority,‘” id. at 23 (quoting Grand Lodge of Fraternal Order of Police v. Ashcroft, 185 F.Supp.2d 9, 13 (D.D.C.2001)), a plaintiff‘s factual allegations in the complaint “will bear closer scrutiny in resolving a 12(b)(1) motion than in resolving a 12(b)(6) motion for failure to state a claim,” id. (quoting Grand Lodge, 185 F.Supp.2d at 13-14) (internal quotation mark omitted). “Additionally, unlike with a motion to dismiss under Rule 12(b)(6), the Court ‘may consider materials outside the pleadings in deciding whether to grant a motion to dismiss for lack of jurisdiction.‘” 3 Id. (quoting Jerome Stevens Pharm. v. FDA, 402 F.3d 1249, 1253 (D.C.Cir.2005)).
II. Analysis
The question at issue here is whеther the named Plaintiffs have demonstrated an “injury in fact” that is concrete, particularized, and actual or imminent, Lujan, 504 U.S. at 560 (quoting Allen v. Wright, 468 U.S. 737, 756 (1984)) (internal
A. Increased Risk of Identity Theft
Judge Boasberg of this Court recently applied Clapper‘s “certainly impending” standard to a claim of injury rеsulting from filched electronic data. SAIC, 45 F.Supp.3d at 24. In that case, back-up tapes containing the personal information and medical records of military service members were among various items stolen from the car of an employee of the information technology company SAIC. See id. at 19-20. The data tapes originated with a federal agency that provides health insurance tо military families, and SAIC was in possession of the tapes through an IT security contract with the agency. See id. Service members whose data was contained on the tapes sued, alleging in part that they had been harmed by the increased likelihood that they would suffer identity fraud as a result of the theft. See id.
The Court found the plaintiffs’ claims of increased risk of identity theft to be insufficient to establish injury in faсt. Judge Boasberg reasoned that too many assumptions were required to find the alleged harm certainly impending. The thief would still need to “recognize the tapes for what they were“; “find a tape reader and attach it to her computer“; “acquire software to upload the data“; decipher any encrypted portions of the data; “acquire familiarity with the [health insurancе company‘s] database format, which might require another round of special software“; and finally, “either misuse a particular Plaintiff‘s [information] or sell that Plaintiff‘s data to a willing buyer who would then abuse it.” Id. at 25. Because the plaintiffs had not alleged that any of those things had occurred, and because those “events [were] entirely dependent on the actions of an unknown third party,” they failed to demonstrate standing under Clapper. Id.
Plaintiffs attempt to distinguish SAIC by pointing out that, unlike the thieves there—who stole various physical objects from a car, some of which happened to contain data—those here breached CareFirst‘s server protections for the very purpose of accessing that data, thus demonstrating their intent to misuse it. See Pls.’ Opp‘n 10-11. Plaintiffs point to the Seventh Circuit‘s recent decision in Remijas v. Neiman Marcus Group, 794 F.3d 688 (7th Cir.2015), as more-analogous precedent. Remijas involved а data breach of Neiman Marcus‘s computer systems, which compromised customers’ credit card information, social security numbers, and birth dates. See id. at 690. Of the 350,000 credit cards whose information was potentially exposed, 9,200 “were known to have been used fraudulently.” Id. In other words, the hackers had clearly demonstrated that they had the means and the will either to abuse the information they accessed or to sell it to others who did so. Unlike in SAIC, where only two plaintiffs out of the 4.7 million service members whose information was stolen plausibly alleged an injury traceable to the theft, SAIC, 45 F.Supp.3d at 31-33, in Remijas, even the plaintiffs who had not yet experienced fraud had demonstrated that they faced a “substantial risk” of fraud sufficient to confer standing because so many other plaintiffs had experienced cognizable harm traceable to the breach, Remijas, 794 F.3d at 693.
The Court views SAIC to be more similar to this case than Remijas and other data breach cases cited by Plaintiffs. See Pls.’ Opp‘n 6-10. While the series of assumptions required to find concrete harm to Plaintiffs may be somewhat shorter here than that in SAIC, their theory of injury is still too speculative to satisfy Clapper. The Court would have to assume, at a minimum, that the hackers have the ability to read and understand Plaintiffs’ personal information, the intent to “commit future criminal acts by misusing the information,” and the ability to “use such information to the detriment of [Plaintiffs] by making unauthorized transactions in [Plaintiffs‘] names.” Chambliss v. CareFirst, Inc., No. RDB-15-2288, 189 F.Supp.3d 564, 570, 2016 WL 3055299, at *4 (D.Md. May 27, 2016) (alterations in original) (quoting In re SuperValu, Inc., Customer Data Sec. Breach Litig., No. 14-MD-2586, 2016 WL 81792, at *5 (D.Minn. Jan. 7, 2016)) (internal quotation mark omitted). And, even more speculative than in SAIC—where social security numbers were among the stolen data—is the question whether the hackers here would be willing or able to use the existing data to
The court in the related Maryland class action reached same conclusion, granting the defendants’ motion to dismiss for lack of subject matter jurisdiction on standing grounds. It rejected the plaintiffs’ argument that the breach increased their risk of future harm because “most courts to consider the issue ‘have agreed that the mere loss of data—without any evidencе that it has been either viewed or misused—does not constitute an injury sufficient to confer standing.‘” Chambliss, 189 F.Supp.3d at 570, 2016 WL 3055299, at *4 (quoting SAIC, 45 F.Supp.3d at 19) (citing In re Zappos.com, Inc., 108 F.Supp.3d 949, 958-59 (D.Nev.2015); Green v. eBay, Inc., No. 14-1688, 2015 WL 2066531, at *5 (E.D.La. May 4, 2015); In re Horizon Healthcare Servs., Inc. Data Breach Litig., No. 13-7418, 2015 WL 1472483, at *6 (D.N.J. Mar. 31, 2015); Key v. DSW, Inc., 454 F.Supp.2d 684, 689 (S.D.Ohio 2006)). The court added that “since Clapper[,] courts have been even more emphatic in rejecting ‘increased risk’ as a theory of standing in data-breach cases.” Id. (quoting SAIC, 45 F.Supp.3d at 28) (citing In re SuperValu, 2016 WL 81792, at *4; Strautins v. Trustwave Holdings, Inc., 27 F.Supp.3d 871, 876 (N.D.Ill.2014)) (internal quotation marks omitted). This Court likewise concludes that Plaintiffs have not demonstrated a sufficiently substantial risk of future harm stemming from the breach to establish standing.
B. Actual Identity Theft
As notеd above, two of the named Plaintiffs—Kirk and Connie Tringler—allege that they have already suffered an injury from the data breach. They claim that they have experienced tax-refund fraud in that they have still not received an expected tax refund. See Compl. ¶ 157. While suffering this type of fraud may constitute a concrete and particularized injury, in order to demonstrate standing, Plaintiffs must also plausibly assert that their alleged injury is “fairly traceable to the challenged action.” Clapper, 133 S.Ct. at 1147. And again, while the Plaintiffs’ opposition asserts that the stolen information included social security numbers, the Complaint does not support that allegation. See supra note 1; Pls.’ Opp‘n 17; Compl. ¶ 157. As Defendants point out, and Plaintiffs do not contest, “[i]t is not plausible that tax refund fraud could have been conducted without the Tringlers’ Social Security Numbers.” Defs. Reply 5; see also Furlow v. United States, 55 F.Supp.2d 360, 362-63 (D.Md.1999) (“[T]o receive an income tax exemption ..., the taxpayer must include the social security number or taxpayer identification number of the claimed individual on his returns.“). Therefore, the Tringlers have not plausibly alleged that any tax-return fraud they have experienced is fairly traceable to the data breach.
C. Other Claimed Harms
In addition to arguing thаt the increased risk of future harm confers standing upon Plaintiffs other than the Tringlers and that the Tringlers have already experienced cognizable injury, all Plaintiffs contend that they have experienced four other types of harm: (1) economic harm through having to purchase credit-monitoring services to prevent identity theft and fraud; (2) economic harm through overpayment for their insurance coverage, the cost of which they maintain should have covered prophylactic measures against hacking; (3) loss of the intrinsic value of their personal information; and (4) violation of their statutory rights under consumer protection acts. None of the arguments in support of these contentions is availing.
First, because the increased risk of future identity theft or fraud is too speculative to confer standing, Plaintiffs cannot opt in to standing-conferring economic injury by purchasing protection from that future harm. Where “future harm ... is not certainly impending,” plaintiffs “cannot manufacture standing by choosing to make expenditures based on” that “hypothetical” harm. Clapper, 133 S.Ct. at 1143. In other words, Plaintiffs “cannot create standing by ‘inflicting harm on themselves‘” in the form of purchasing credit-monitoring services in order “to ward off an otherwise speculative injury.” SAIC, 45 F.Supp.3d at 26 (quoting Clapper, 133 S.Ct. at 1151).
Second, a claim that “some indeterminate part of their premiums went toward paying for security measures ... is too flimsy to support standing.” Id. at 30. Like the plaintiffs in SAIC, Plaintiffs here “do not maintain that the money they paid could have or would have bought a better policy with a more bullet-proof information-security regime.” Id. Nor have they “alleged facts that show that thе market value of their insurance coverage (plus security services) was somehow less than what they paid.” Id.
Third, also like the plaintiffs in SAIC, “Plaintiffs do not contend that they intended to sell [their personal] information on the cyber black market in the first place, so it is uncertain how they were injured” by the alleged loss of the intrinsic value of that information. Id. In addition, “it is unclear whether or how the data has been devalued by thе breach.” Id. Without factual allegations to support this contention, Plaintiffs do not plausibly assert harm from the loss of their personal information‘s intrinsic value.
Fourth, Plaintiffs contend that this Court must conclude that they have standing because the D.C. Court of Appeals, they assert, has held that a violation of the D.C. Consumer Protection Procedures Act can confer standing on its own. See Pls.’ Opp‘n 13 (citing Grayson v. AT&T Corp., 15 A.3d 219, 247 (D.C.2011)). Setting aside the fact that only the Plaintiffs who are residents of the District of Columbia assert violations of this D.C. Act, statutory rights cannot confer Article III standing on a plaintiff who does not have it otherwise. See Spokeo, Inc. v. Robins, --- U.S. ---, 136 S.Ct. 1540, 1547-48 (2016) (“Injury in fact is a constitutional requirement, and ‘[i]t is settled that Congress cannot erase Article III‘s standing requirements by statutorily granting the right to sue to a plaintiff who would not otherwise have standing.‘” (alteration in originаl) (quoting Raines v. Byrd, 521 U.S. 811, 820 n. 3 (1997))). This is so because an injury in fact must be “both ‘concrete and particularized.‘” Id. at 1545 (quoting Friends of the Earth, Inc. v. Laidlaw Envtl. Servs. (TOC), Inc., 528 U.S. 167, 180-81 (2000)).
III. Conclusion
For the foregoing reasons, Dеfendants’ motion to dismiss will be granted and the Second Amended Complaint dismissed without prejudice, and Plaintiffs’ motion to strike will be denied. An order accompanies this memorandum opinion.
CHRISTOPHER R. COOPER
United States District Judge
