MEMORANDUM OPINION
Plаintiff Fardoes Kahn has filed a putative class action against Children’s National Health System (“CNHS”), asserting various statutory and common law causes of action related to a data breach at a
BACKGROUND
I. Data Breach
Khan receives treatment at Children’s Hospital in Washington, D.C., a hospital operated by CNHS. Khan provided CNHS with personally identifiable information such as her date of birth, Social Security number, address, and telephone number. CNHS also maintains records containing Khan’s private health care information such as diagnoses, treatment records, and health insurance information.
On or about July 26, 2014, hackers gained access to the email accounts of certain CNHS employees when those employees responded to “phishing” emails. The hackers’ infiltration was not detected until December 26, 2014. During the five intervening months, thе “email accounts had been potentially exposed in a way that may have allowed hackers to access information contained in those email accounts.” Compl. ¶ 13. The email accounts contained certain patient information, such as names, addresses, dates of birth, Social Security numbers, and telephone numbers, as well as private health care information. On February 26, 2015, CNHS sent a letter to approximately 18,000 patients, including Khan, notifying them that their personal data may have been contained in these email accounts.
Khan alleges that her sensitive personal information was “compromised, viewed, and/or stolen” because CNHS did not take sufficient steps to protect it through encryption, passwords, or other measures. Compl. ¶¶ 20-21; 109. Upon learning of the breach, she placed passwords on her bank and credit’ card accounts. She remains concerned that her personal information will be misused, but she does not claim that she or anyone else affected by the data breach has learned of any misuse to date.
II. Procedural History
Khan filed suit in the Circuit Court for Montgomery County, Maryland on June 1, 2015, alleging violations of the Maryland Consumer Protection Act, Md. Code Ann., Com. Law §§ 13—301 to 13-501 (2013), and the District of Columbiа Consumer Protection Procedures Act, D.C. Code Ann., §§ 28-3901 to 28-3913 (2013), as well as negligence, breach of implied contract, and unjust 'enrichment. On July 21, 2015, CNHS removed the case to this Court under the Class Action Fairness Act, 28 U.S.C. § 1332(d) (2012). On September 8, 2015, CNHS filed a Motion to Dismiss. On October 16, 2015, Khan submitted an Opposition to the Motion. On November 16, 2015, CNHS filed a Reply. On December 29, 2015, Khan submitted a Motion for Leave to File a Surreply. Because the proposed surreply brief does not address “matters presented to the court' for the first time in the oppоsing party’s reply,” Khoury v. Meserve,
DISCUSSION
CNHS argues that the Complaint should be disniissed for lack of subject matter jurisdiction under Federal Rule of Civil Procedure 12(b)(1) because Khan lacks standing, or, in the alternative, for failure to state a claim under Rule 12(b)(6). Because the Court finds, for the reasons stated below, that Khan lacks standing and that the Court thus lacks subject matter jurisdiction, it does not address the merits of Khan’s claims. See Steel Co. v. Citizens for a Better Env’t,
I. Legal Standards
A. Rule 12(b)(1)
It is the plaintiffs burden to show that subject matter jurisdiction exists. Evans v. B.F. Perkins Co., Div. of Standex Int’l Corp.,
B. Article III Standing
Article III of the Constitution limits the judicial power of the federal courts to actual “Cases” and “Controversies.” U.S. Const, art. Ill, § 2, cl. 1. To invoke this power, a litigant must have standing. Hollingsworth v. Perry, — U.S. —,
CNHS limits its attack on Khan’s standing to the first element: injury in fact. An injury in fact requires “an invasion of a legally protected interest which is (a) concrete and particularized, and (b) actual or imminent, not conjectural or hypothetical.” Lujan,
II. Injury in Fact
Khan alleges several injuries that she contends establish Article III, standing. She alleges that (1) she faces an imminent threat of identity theft; (2) she expended time and incurred out-of-pocket expenses to monitor her credit and otherwise protect against identity theft; (3) she has suffered a loss of privacy; (4) she has been deprived of the value of her personally identifiable information; (5) thе data breach has diminished the value of the services she receives from CNHS; (6) CNHS provided an inaccurate- and delayed notification of the data breach; and (7) CNHS has violated various statutes and the common law: "
A. Increased Risk of Identity Theft
Khan’s most promising argument that she has an injury in fact to support Article III standing is that the data breach has placed her at an increased risk of identity theft. Neither the United States Court of Appeals for the Fourth Circuit nor any district court within the Fourth Circuit has addressed the standing of data breach victims. The issue, however, has been frequently litigated in federal courts in recent years, with different results. Two circuits; the United States Courts of Appeals for the Seventh and Ninth Circuits, have found standing for victims of data breaches based on the increased risk of identity theft. In Krottner v. Starbucks Corp.,
Following Clapper, the Seventh Circuit found standing stemming from hackers’ use of malware to collect credit card data from up to 350,000 credit card customers of Neiman Marcus, a luxury department store. Remijas v. Neiman Marcus Group, LLC,
By contrast, the United States Court of Appeals for the Third Circuit, in Reilly v. Ceridian Corp.,
Although Reilly predated Clapper, ■ the Third Circuit applied the same standard later endorsed in Clapper, thаt the “threatened injury must be ‘certainly impending1 ” in order to support standing. Id. at 42 (quoting Whitmore v. Arkansas,
Although these courts reached conflicting results, the difference appears to arise not from the application of a different legal standard, but rather from crucial distinctions in the underlying facts. In Krottner and Remijas, the allegatiоns included either actual examples of the use of the fruits of the data breach for identity theft, even if involving victims other than the named plaintiffs, or a clear indication that the data breach was for the purpose of using the plaintiffs’ personal data to engage in identity, fraud. In Krottner, one .of the plaintiffs credit card numbers had been fraudulently used.
The majority of district courts faced with challenges to the standing of data breach victims follow this pattern. In the absence of specific incidents of the use of stolen data for identity fraud purposes, district courts have generally found that the increased risk of identity theft does not confer standing. See, e,g., In re Zappos.com, Inc.,
By contrast, several district courts have joined Reilly in dismissing suits where the plaintiffs, even where they alleged that their personal data had been stolen or accessed,
The Court therefore concludes that in the data breach context, plaintiffs have properly alleged an injury in fact arising from increased risk of identity theft if they put forth facts that provide either (1) actual examples of the use of the fruits of the data breach for identity theft, even if involving other victims; or (2) a clear indication that the data breach was for the purpose of using the plaintiffs’ personal.data to engage in identity fraud. Under this framework, Khan’s allegations fall short. Unlike in Krottner or Remijas, Khan alleges no facts indicating that the hackers have attempted to engage in any misuse of CNHS patients’ personal information since the breach was discovered. She alleges no suspicious activity: no unauthorized bank accounts or credit cards, no medical fraud or identity theft, and no targeted solicitations for health care products or services.
Nor do the circumstances of the data breach clearly indicate that the hackers’ purpose was to use patients’ personal data to engage in identity fraud. Unlike in Re-mijas, where malware was deployed on Neiman Marcus’s computer system in an attempt to collect credit card data,
Khan’s more general allegations—that data breach victims are 9.5 times more likely to suffer identity theft and that 19 percent of data breach victims become victims of identity theft—do not alter this conclusion. These specific statistics, which are cited in numerous other cases, do not by themselves establish that there is “certainly impending” harm under the' specific facts of а given case. See, e.g., SAIC,
B. Additional Grounds for Standing
Khan’s additional claims of injury in fact are unpersuasive. First, she asserts that the expense of guarding against identity theft constitutes injury in fact. However, incurring costs as a reaction to a risk of harm does not еstablish standing if the harm sought to be avoided is not itself “certainly impending.” Clapper,
Second, Khan argues that the data breach has caused a loss of privacy that constitutes an injury in fact. However, she has not identified any potential damages arising from such a loss and' thus fails to allege a “concrete and particularized injury.” See In re Zappos.com, Inc.,
Third, Khan claims injury based on the theory that she contracted with CNHS tо secure her personal information, and that its failure to do so deprived her of the full value of the services for which she paid. Khan, however,- acknowledges that she purchased “surgery and treatment” from CNHS. Compl. ¶ 9. She does not allege any facts showing that she overpaid for those services or that she would have sought those services, from another provider had she been aware of the hospital’s allegedly lax data security. See SAIC,
Fourth, Khan alleges that the value of her personally identifiable information has been diminished by the data breach. She does not, however, explain how the hackers’ possession of that information has diminished its value, nor does she assert that she would ever actually sell her own personal information. See id. at 30 (rejecting this theory in part because plaintiffs did not claim that they intended to sell their own personal information on the cyber black market). Her analogy to the theft of a family heirloom is unconvinc
Fifth, Khan claims that CNHS’s notification letter “was misleading in that it provided vague descriptions of what was stolen and falsely implied that there was no risk from the data breach.” Compl. ¶ 66. The letter, however, expressly encouraged victims, to take stеps to mitigate risks from the breach. Even if Khan was misled, she points to no concrete injury caused by the letter. She acknowledges that she took preventive action after receiving the letter and has not suffered from any actual misuse of her personal data. Similarly, Khan’s claim that CNHS impermissibly delayed notifying her of the breach does not establish any injury,, since Khan does not claim that the period during which she was unaware of the need to monitor for identity fraud resulted in any harm. See SAIC, 46 F.Supp.3d at.30-31.
Finally, Khan contends that thе violations of state statutes and common law alleged in the Complaint establish standing. Khan conflates the question whether she has a cause of action under state law with the question whether she has Article III standing to pursue that cause of action in federal court. See Steel Co.,
Because Khan has not alleged an injury in fact as required to establish Article III standing, the Court concludes that it lacks subject matter jurisdiction. In the absence of jurisdiction, the Court does not consider the remaining arguments in the Motion.
III. Remand
“If at any .time before final judgment it appears that the district court lacks subject matter jurisdiction, the case shall be remanded.” 28 U.S.C. §, 1447(c) (2012). “The plain language of § 1447(c) gives ‘no discretion to dismiss rather than remand an action’ removed from state court over which the court lacks subject-matter jurisdiction.” Roach v. W. Va. Reg’l
CONCLUSION
For the foregoing reasons, CNHS’s Motion to Dismiss is GRANTED IN PART and DENIED IN PART. The Court finds that Khan lacks standing, but it does not dismiss her claims. Instead, the case is REMANDED to state court. A separatе Order shall issue,
Notes
. CNHS attached the notification letter to its Motion, and the Court considers the letter because it is integral to the Complaint and of undisputed authenticity. See Philips v. Pitt Cty. Mem’l Hosp., 572 F.3d 176, 180 (4th Cir.2009).
. Some pre-Clapper decisions held that data breach victims had standing even without allegations of misuse or other indications of an intent to use the data for fraudulent purposes. Ruiz v. Gap, Inc.,
. When Khan's Complaint is viewed in its entirety,-including Khan’s allegation that the data was "compromised, viewed, and/or stolen,” Compl. ¶ 109 (emphasis added), it is evident that it is not known whether the plaintiffs’ personal data was actually removed by the hackers.
