JENNIFER CLEMENS, Appellant v. EXECUPHARM INC.; PAREXEL INT‘L CORP.
No. 21-1506
United States Court of Appeals for the Third Circuit
September 2, 2022
On Appeal from the United States District Court for the Eastern District of Pennsylvania (Civil No. 2-20-cv-03383). District Judge: Honorable Gerald J. Pappert. Argued December 14, 2021.
Opinions of the United States Court of Appeals for the Third Circuit
9-2-2022
Jennifer Clemens v. Execupharm Inc
Follow this and additional works at: https://digitalcommons.law.villanova.edu/thirdcircuit_2022
Recommended Citation
“Jennifer Clemens v. Execupharm Inc” (2022). 2022 Decisions. 681. https://digitalcommons.law.villanova.edu/thirdcircuit_2022/681
This September is brought to you for free and open access by the Opinions of the United States Court of Appeals for the Third Circuit at Villanova University Charles Widger School of Law Digital Repository. It has been accepted for inclusion in 2022 Decisions by an authorized administrator of Villanova University Charles Widger School of Law Digital Repository.
Before: GREENAWAY, JR., KRAUSE, and PHIPPS, Circuit Judges.
(Filed: September 2, 2022)
Goldman Scarlato & Penny
161 Washington Street
8 Tower Bridge, Suite 1025
Conshohocken, PA 19428
J. Austin Moore [ARGUED]
Norman E. Siegel
Barrett J. Vahle
Caleb J. Wagner
Stueve Siegel Hanson
460 Nichols Road
Suite 200
Kansas City, MO 64112
Counsel for Appellant
Shifali Baliga
Kristine M. Brown
Donald M. Houser [ARGUED]
Alston & Bird
1201 West Peachtree Street
One Atlantic Center, Suite 4900
Atlanta, GA 30309
Mathieu Shapiro
Obermayer Rebmann Maxwell & Hippel
1500 Market Street
Centre Square West, 34th Floor
Philadelphia, PA 19102
Counsel for Appellees
OPINION OF THE COURT
GREENAWAY, JR., Circuit Judge.
In this appeal, Jennifer Clemens asks us to reverse the District Court‘s dismissal of her complaint seeking equitable and monetary relief in connection with a data breach that resulted in the publication of her sensitive personal information on the Dark Web. Clemens argues that her injury was sufficiently imminent to constitute an injury-in-fact for purposes of standing. We agree. Accordingly, we will vacate the judgment of the District Court and remand for consideration of the merits.
I. Background1
Clemens is a former employee of ExecuPharm, Inc. (“ExecuPharm” or “the Company“), a subsidiary of the global biopharmaceutical company Parexel International Corp. (“Parexel“). As a condition of her employment, Clemens was required to provide ExecuPharm with sensitive personal and financial information, including her address, social security
After Clemens had left ExecuPharm, a hacking group known as CLOP accessed ExecuPharm‘s servers through a phishing attack in March 2020, stealing sensitive information pertaining to current and former employees, including Clemens. Specifically, the stolen information contained social security numbers, dates of birth, full names, home addresses, taxpayer identification numbers, banking information, credit card numbers, driver‘s license numbers, sensitive tax forms, and passport numbers. In addition to exfiltrating the data, CLOP installed malware to encrypt the data stored on ExecuPharm‘s servers. Then, CLOP held the decryption tools for ransom, threatening to release the information if ExecuPharm did not pay the ransom. Either because ExecuPharm refused to pay or for nefarious reasons unknown, the hackers made good on their threat and posted the data on underground websites located on the Dark Web, which is “a portion of the Internet that is intentionally hidden from search engines and requires the use of an anonymizing browser to be accessed. It is most widely used as an underground black market where individuals sell illegal products like . . . sensitive stolen data that can be used to commit identity theft or fraud.” J.A. 25 ¶ 15. Screenshots by an Israel-based intelligence firm confirm that CLOP made available for download at least one archive containing nearly 123,000 files and 162 gigabytes of
Throughout March and April of 2020, ExecuPharm provided periodic updates to current and former employees to inform them of the breach and encourage them to take precautionary measures. ExecuPharm appreciated the risks, cautioning current and former employees that “[u]nauthorized access to [the compromised] information may potentially lead to the misuse of [their] personal data to impersonate [them] and/or to commit, or allow third parties to commit, fraudulent acts such as securing credit in [their] name.” J.A. 30 ¶ 28.
To mitigate potential harm, Clemens took immediate action. She conducted a review of her financial records and credit reports for unauthorized activity; placed fraud alerts on her credit reports; transferred her account to a new bank; enrolled in ExecuPharm‘s complimentary one-year credit monitoring services; and purchased three-bureau credit monitoring services for herself and her family for $39.99 per month for additional protection. As a result of the breach, Clemens alleges that she has sustained a variety of injuries—primarily the risk of identity theft and fraud—in addition to the investment of time and money to mitigate potential harm.
Seeking redress, Clemens brought suit against ExecuPharm and Parexel in the United States District Court for the Eastern District of Pennsylvania. She sought to represent herself and a class of all others whose personal information was compromised, as well as a subclass of current and former ExecuPharm employees whose employment agreements promised that the Company would take appropriate measures to protect their personal data. She invoked the subject matter
She asserted claims for negligence (Count I), negligence per se (Count II), and breach of implied contract (Count III) against both Defendants. She also asserted claims for breach of contract (Count IV), breach of fiduciary duty (Count V), and breach of confidence (Count VI) against ExecuPharm. Lastly, she sought a declaratory judgment that Defendants’ existing data security measures fail to comply with their fiduciary duties of care and that instructs them to implement and maintain industry-standard measures.
ExecuPharm and Parexel filed a motion to dismiss the complaint under
II. Applicable Law2
A. Article III Standing Requirements
Article III standing requires a plaintiff to demonstrate: “(1) that he or she suffered an injury in fact that is concrete, particularized, and actual or imminent, (2) that the injury was caused by the defendant, and (3) that the injury would likely be redressed by the requested judicial relief.”3 Thole v. U.S. Bank N.A., 140 S. Ct. 1615, 1618 (2020) (citing Lujan v. Defs. of Wildlife, 504 U.S. 555, 560-61 (1992)). Only the first two prongs are disputed on appeal.
a. Injury-in-fact: Imminent
Indeed, allegations of future injury “suffice if the threatened injury is ‘certainly impending’ or there is a
In Reilly, we considered whether an alleged risk of future identity theft or fraud stemming from a data breach in which an unknown hacker potentially accessed sensitive personal and financial information from a company‘s network was sufficiently imminent for purposes of standing. 664 F.3d 38 (3d Cir. 2011). We held that it was not. We observed that the injury alleged was a future injury as opposed to a present injury. Id. at 42. Consistent with Susan B. Anthony List, that an injury will occur in the future is not fatal to standing. 573 U.S. at 158. But where the future injury is also hypothetical, there can be no imminence and therefore no injury-in-fact.
Because the plaintiffs in Reilly alleged a future, hypothetical risk of identity theft or fraud, we concluded that they had not suffered an injury-in-fact. Specifically, the risk was “dependent on entirely speculative, future actions of an unknown third-party.” 664 F.3d at 42. Further, we could not “describe how the [Appellants] will be injured . . . without beginning our explanation with the word ‘if‘: if the hacker read, copied, and understood the hacked information, and if the
In holding that the Reilly plaintiffs lacked standing, we did not create a bright line rule precluding standing based on the alleged risk of identity theft or fraud. Such a rule would require plaintiffs to wait until they had sustained an actual injury to bring suit. This would directly contravene the Supreme Court‘s holding in Susan B. Anthony List, which authorizes suits based on a “‘substantial risk’ that the harm will occur.” 573 U.S. at 158 Instead, Reilly requires consideration of whether an injury is present versus future, and imminent versus hypothetical.
Courts rely on a number of factors in determining whether an injury is imminent—meaning it poses a substantial risk of harm—versus hypothetical in the data breach context. These non-exhaustive factors can serve as useful guideposts, with no single factor being dispositive to our inquiry. Among them is whether the data breach was intentional. See, e.g., McMorris v. Carlos Lopez & Assocs., 995 F.3d 295, 301-03 (2d Cir. 2021) (holding that the intentional nature of an attack renders standing more likely); Pisciotta v. Old Nat‘l Bancorp, 499 F.3d 629, 632 (7th Cir. 2007) (finding standing where a breach was “sophisticated, intentional and malicious“); In re U.S. Off. of Pers. Mgmt. Data Sec. Breach Litig., 928 F.3d 42, 58-59 (D.C. Cir. 2019) (noting that “hackers targeted—and extracted data“); In re Zappos.com, Inc., 888 F.3d 1020, 1029 n.13 (9th Cir. 2018) (emphasizing that hackers “specifically targeted” the data to distinguish from a case in which there was no substantial risk of identity theft).
Of note, misuse is not necessarily required. The Seventh Circuit has found standing despite no allegations of misuse, holding that it was sufficient that a data breach “increas[ed] the risk of future harm that the plaintiff would have otherwise faced, absent the defendant‘s actions.” Pisciotta, 499 F.3d at 634.
Further, courts consider whether the nature of the information accessed through the data breach could subject a plaintiff to a risk of identity theft. See, e.g., McMorris, 995 F.3d at 302. For instance, disclosure of social security
b. Injury-in-fact: Concrete
The injury-in-fact prong of the standing analysis also requires that the alleged injury be “concrete,” meaning “real, and not abstract.” Spokeo, Inc. v. Robins, 578 U.S. 330, 340 (2016) (internal quotation marks omitted); see Lujan, 504 U.S. at 560
The Supreme Court recently clarified in TransUnion LLC v. Ramirez that “[c]entral to assessing concreteness is whether the asserted harm has a ‘close relationship’ to a harm traditionally recognized as providing a basis for a lawsuit in American courts—such as physical harm, monetary harm, or various intangible harms.” 141 S. Ct. at 2200 (citing Spokeo, 578 U.S. at 340-41). The fact that an injury is intangible—that is, it does not represent a purely physical or monetary harm to the plaintiff—does not prevent it from nonetheless being concrete, as various intangible harms have been “traditionally recognized as providing a basis for lawsuits in American courts.” Id. at 2204 (citing Spokeo, 578 U.S. at 340-41). For example, certain privacy harms, like the disclosure of private information and intrusion upon seclusion, though intangible, have long given rise to tort claims. Id.
the fact that the plaintiff had spent a certain amount of personal funds in his campaign, 554 U.S. 724, 733 (2008), as a case in which the asserted intangible harm was concrete because it was closely related to the “disclosure of private information.” TransUnion LLC, 141 S. Ct. at 2204. Likewise, we are content for now that the exposure of the type of information that was alleged here—information employees would normally choose to keep to themselves and would reasonably not want to make publicly available—and the resulting substantial risk of identity theft or fraud is a harm that bears at least a “close relationship” to harms traditionally recognized in privacy torts. Id. at 2208 (citing Spokeo, 578 U.S. at 341). Accordingly, the asserted injury supports Article III standing—and whether a plaintiff has successfully made out claims under a particular cause of action is a separate question.
Following TransUnion‘s guidance, we hold that in the data breach context, where the asserted theory of injury is a substantial risk of identity theft or fraud, a plaintiff suing for damages can satisfy concreteness as long as he alleges that the exposure to that substantial risk caused additional, currently felt concrete harms. For example, if the plaintiff‘s knowledge of the substantial risk of identity theft causes him to presently experience emotional distress or spend money on mitigation measures like credit monitoring services, the plaintiff has alleged a concrete injury.
III. Analysis
We exercise de novo review over the District Court‘s dismissal of a complaint for lack of subject matter jurisdiction. Horizon Healthcare, 846 F.3d at 632.
Clemens‘s complaint asserts contract, tort, and secondary contract claims—each based on the same underlying facts. “[A] plaintiff must demonstrate standing for each claim he seeks to press.” DaimlerChrysler Corp. v. Cuno, 547 U.S. 332, 352 (2006). Accepting the well-pleaded factual allegations in Clemens‘s complaint as true, we hold that Clemens has standing to assert her contract, tort, and secondary
A. Contract Claims
The District Court erred in dismissing Clemens‘s contract claims, which are raised in Counts III (breach of implied contract) and IV (breach of contract). These claims arise from her employment agreement with ExecuPharm. When Clemens provided ExecuPharm with her sensitive personal information upon hire, ExecuPharm expressly contracted to “take appropriate measures to protect the confidentiality and security” of this information in Clemens‘s employment agreement. J.A. 40-41 ¶¶ 57-58. Clemens alleged that ExecuPharm breached this express provision when it failed to adequately protect her information, allowing CLOP to steal sensitive employee information, hold it for ransom, and publish it on the Dark Web. Moreover, Clemens has alleged an injury stemming from the breach—the risk of identity theft or fraud—that is sufficiently imminent and concrete.6
As employment agreements have become routine, information security provisions like the one in the instant case have assumed a new prominence. Likewise, the failure to uphold these provisions—particularly in the digital age—can yield uniquely drastic consequences. Namely, victims of a data breach must live with the perpetual, well-founded fear and risk
In Reilly, we had occasion to discuss the contours of the injury-in-fact requirement in the data breach context. This time, the alleged injury-in-fact is far more imminent. Whereas Reilly involved an unknown hacker who potentially gained access to sensitive information, id. at 42-43; here, a known hacker group named CLOP accessed Clemens‘s sensitive information. CLOP is a sophisticated ransomware group that is notorious for encrypting companies’ internal data and placing in every digital folder a text file called “ClopReadMe.txt” that contains a message demanding ransom. J.A. 24-25 ¶ 14. These attacks are particularly threatening given that, according to a data specialist, there are “no known decryption tools for CLOP ransomware.” J.A. 35 ¶ 40.
In this instance, CLOP launched its signature attack against ExecuPharm: it encrypted ExecuPharm‘s information and held it for ransom. Further, while the injury to the plaintiffs in Reilly depended upon a string of hypotheticals being borne out, 664 F.3d at 43, CLOP has already published Clemens‘s data on the Dark Web, a platform that facilitates criminal activity worldwide. Clemens has alleged that the Dark Web is “most widely used as an underground black market where individuals sell illegal products like drugs, weapons, counterfeit money, and sensitive stolen data that can be used to commit identity theft or fraud.” J.A. 25 ¶ 15.
Adopting and applying the factors that our Sister Circuits consider in determining imminence in the data breach context confirms this point. CLOP intentionally gained access to and misused the data: it launched a sophisticated phishing attack to install malware, encrypted the data, held it for ransom, and published it. See McMorris, 995 F.3d at 301-03; Remijas, 794 F.2d at 693-94; Attias, 865 F.3d at 628-29. The data was also the type of data that could be used to perpetrate identity theft or fraud. Not only did it contain financial information—which, on its own, could subject the breach victims to credit card fraud—but it also contained social security numbers, dates of birth, full names, home addresses, taxpayer identification numbers, banking information, credit card numbers, driver‘s license numbers, sensitive tax forms, and passport numbers. This combination of financial and personal information is particularly concerning as it could be used to perpetrate both identity theft and fraud. See McMorris, 995 F.3d at 302; cf. In re SuperValu, Inc., 870 F.3d at 770-71 (noting that financial information, without accompanying personally identifying information, is unlikely to give rise to identity theft).
Together, these factors show that Clemens has alleged a “‘substantial risk’ that the harm will occur” sufficient to establish an “imminent” injury. Anthony List, 573 U.S. at 158
In addition to proving injury-in-fact, standing also requires Clemens to prove traceability and “that the injury would likely be redressed by the requested judicial relief.” Thole, 140 S. Ct. at 1618. Traceability means that the injury was caused by the challenged action of the defendant as opposed to an independent action of a third party. Lujan, 504 U.S. at 560. We have yet to articulate a single standard for establishing this “causal relationship.” See Khodara Env‘t, Inc. v. Blakely, 376 F.3d 187, 195 (3d Cir. 2004). Instead, we have held that but-for causation is sufficient to satisfy traceability. See, e.g., Edmonson v. Lincoln Nat‘l Life Ins. Co., 725 F.3d 406, 418 (3d Cir. 2013). So, too, is concurrent
Here, Clemens has alleged facts that establish traceability, at least at the pleading stage. Specifically, she has identified her injuries as “a direct and proximate result of Defendants’ breach” of contract: ExecuPharm‘s failure to safeguard her information enabled CLOP to publish it on the Dark Web as part of the stolen dataset of ExecuPharm and Parexel employee information. J.A. 65 ¶ 141, J.A. 66 ¶ 146. Likewise, Clemens satisfied redressability. As we observed in Reilly, the injuries caused by a data breach are “easily and precisely compensable with a monetary award,” 664 F.3d at 45-46, and Clemens is seeking those damages to compensate for her losses here. This traceability and redressability analysis applies with equal force to the tort and secondary contract claims as well.
We will vacate the District Court‘s dismissal regarding these claims and remand for a consideration of the merits of these claims.
B. Tort Claims
In addition, the District Court erred in dismissing Clemens‘s tort claims, which are raised in Counts I (negligence) and II (negligence per se). The tort claims have the same factual genesis as the contract claims: namely, that ExecuPharm breached its duty to adequately safeguard sensitive employee information, which allowed CLOP to steal and misuse the data, and subjected Clemens to a substantial risk of identity theft or fraud.
Failure to satisfy this duty could leave employer networks vulnerable to data breach, subjecting data breach victims to a unique kind of harm: the perpetual risk of identity theft or fraud, necessitating the investment of time and money to hopefully mitigate that risk. With rare exception, where multiple pieces of personally identifying information about a given consumer are stolen and then publicized, one can draw a reasonable inference that the victims of the data breach face an imminent risk of identity theft or fraud. When that information is made available for download on the Dark Web—a platform that exists primarily to facilitate illegal activity—the risk that a criminal will access it and use it for a nefarious purpose is particularly acute.
As discussed supra in Section III Part A, Clemens‘s alleged risk of identity theft or fraud is sufficiently imminent. Compared to Reilly, the risk is not hypothetical: a known hacking group intentionally stole the information, misused it, ultimately published it on the Dark Web, and the sensitive information is the type that could be used to perpetrate identity theft or fraud. Consistent with Anthony List, Clemens cannot be required to wait until she has experienced actual identity theft or fraud before she can sue; the “substantial risk” that she has established is enough. 573 U.S. at 158. Her asserted injury
Because Clemens has sufficiently asserted her standing to bring her tort claims, we will vacate the District Court‘s dismissal and remand for a consideration of the merits of those claims.
C. Secondary Contract Claims
Finally, the District Court erred in dismissing Clemens‘s secondary contract claims which are raised in Counts V (breach of fiduciary duty) and VI (breach of confidence). The breach of the duties underlying these claims and the resulting harm are based on the same facts as the contract and tort claims. As with the prior claims, the District Court identified the failure to allege an imminent injury as fatal to standing.
Because we have rejected the contention that a risk of identity theft or fraud cannot qualify as sufficiently imminent, and hold that Clemens has alleged an injury-in-fact, we likewise will vacate the District Court‘s decision and remand for a determination of the merits of these claims.
IV. Conclusion
Clemens has standing to assert her contract, tort, and secondary contract claims. For all claims, she has alleged a future injury—the risk of identity theft or fraud—that is sufficiently imminent. The breach was conducted by a known hacking group CLOP, which intentionally stole the information, held it for ransom, and published it to the Dark
Clemens v. ExecuPharm Inc.
No. 21-1506
PHIPPS, Circuit Judge, concurring in the judgment
When a suit is made of “the stuff of the traditional actions at common law tried by the courts at Westminster in 1789” and is brought within the bounds of federal jurisdiction, the responsibility for deciding that suit rests with Article III judges in Article III courts.
The modern test builds on that principle by using traditionally recognized causes of action as a foundation for its comparative analysis. The premise of the test is that litigants
only when the question is of a public nature that the interested bystander is likely to attempt suit.“).
abundance of precedent on Article III standing, the Majority Opinion identifies no Supreme Court case applying the modern test to a traditionally recognized cause of action.
