*1 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND Southern Division
IN RE: MARRIOTT INTERNTIONAL, *
INC., CUSTOMER DATA SECURITY
BREACH LITIGATION * MDL No. 19-md-2879 CONSUMER ACTIONS *
* * * * * * * * * * * * * *
MEMORANDUM OPINION
This сase involves the consolidated complaint filed by consumers against Marriott and related entities following one of the largest data breaches in history. [1] It is part of the Multidistrict Litigation (“MDL”) pending before me concerning the data breach. The Plaintiffs and Marriott have selected ten “bellwether” claims to test the sufficiency of the pleadings. [2] Plaintiffs argue that Marriott is liable under theories of tort, contract, and statutory duties in various states. Defendants moved to dismiss, arguing that Plaintiffs lack standing and failed to state a claim. Def. Mot., ECF Nos. 450, 451. [3] For the reasons discussed below, Defendants’ motion to dismiss Plaintiffs’ claim for negligence under Illinois law is granted. Defendants motion to dismiss the remaining tort, contract, and statutory claims is denied.
Factual Background
On November 30, 2018, Marriott announced that it was the target of one of the largest data breaches in history. Compl. ¶ 1. The breach took place in its Starwood guest reservation database. Compl. ¶¶ 1, 172–93. Marriott International acquired Starwood Hotels & Resorts in September 2016. Compl. ¶ 98. This acquisition made Marriott the largest hotel chain in the world – accounting for 1 in 15 hotel rooms worldwide – with Marriott, Courtyard, Ritz-Carlton, Sheraton, Westin, W Hotels, and St. Regis properties under its umbrella. Compl. ¶ 98. When guests make a reservation to stay at a Marriott property, they must provide personal information including name, address, email address, phone number, and payment card information. Compl. ¶ 99. In some instances, Marriott also collects passport information, room preferences, travel destinations, and other personal information. Compl. ¶ 99. Both Marriott and Starwood had privacy statements, dated May 18, 2018 and October 5, 2014 respectively, concerning their collection and use of this personal information and touting their ability to protect the security of this sensitive information. Compl. ¶¶ 100–03, 113.
Investigations into the data breach indicated that for over four years, from July 2014 to September 2018, hackers had access to Starwood’s guest information database. Compl. ¶ 2. In other words, the data breach was ongoing before and after Marriott’s acquisition of Starwood. Plaintiffs allege that Marriott failed to conduct appropriate due diligence of Starwood’s cybersecurity risks before and after the merger, despite the fact that Starwood disclosed a data breach affecting more than 50 locations days before Marriott’s announcement of the merger, and after knowing that it and other hotel chains were the targets of security threats in the months and years preceding the data breach. Compl. ¶¶ 120; 139–65. Plaintiffs allege that several *3 cybersecurity assessments that were conducted revealed deficiencies in Starwood’s system. Compl. ¶¶ 124–33.
During the course of the four-year data breach, the hackers allegedly stole names, mailing addresses, phone numbers, email addresses, passport numbers, Starwood Preferred Guest account information, dates of birth, gender, arrival and departure information, reservation dates, communication preferences, payment card numbers, payment card expiration dates, and tools needed to decrypt cardholder data. Compl. ¶ 2. Further, several files that the hackers exfiltrated were deleted, so Marriott does not fully know how much data was stolen. Compl. ¶ 2. In total, Marriott allegedly disclosed that the breach impacted at least 383 million guest records, including nearly 24 million passport numbers and more than 9 million credit and debit cards. Compl. ¶ 3. Plaintiffs allege that Marriott discovered the breach on September 8, 2018 when Accenture (a consulting company providing cybersecurity assistance to defendants, and now a third-party defendant itself) reported an anomaly on Starwood’s database, but that Marriott waited more than two months to notify guests. Compl. ¶¶ 178, 187, 194.
Plaintiffs are consumers who allegedly provided their personal information to Marriott to stay at a Marriott property or use Marriott’s services before the data breach. Compl. ¶¶ 25– 28, 34–39, 42–43, 52–53, 55–56, 70–72, 77. Plaintiffs allege that Marriott is liable for the data breach under theories of tort, contract, and breach of statutory duties. The gravamen of these allegations is that Marriott failed to take reasonable steps to protect Plaintiffs’ personal information against the foreseeable risk of a cyber attack and contrary to their express privacy statements and statutory duties.
Pending is Defendants’ motion to dismiss the bellwether claims under Federal Rules of Civil Procedure 12(b)(1) and 12(b)(6). Defendants argue that most of the Plaintiffs lack standing and that all of the Plaintiffs failed to state claims upon which relief could be granted.
Standard of Review
Federal Rule of Civil Procedure 12(b)(6) provides for the dismissal of a complaint for
“failure to state a claim upon which relief can be granted.” This rule’s purpose “is to test the
sufficiency of a complaint and not to resolve contests surrounding the facts, the merits of a claim,
or the applicability of defenses.”
Presley v. City of Charlottesville
,
Where the allegations in a complaint sound in fraud, the plaintiff also must satisfy the
heightened pleading requirements of Federal Rule of Civil Procedure 9(b) by “stat[ing] with
particularity the circumstances constituting fraud.” This requires that the plaintiff allege “the time,
place, and contents of the false representations, as well as the identity of the person making the
*5
misrepresentation and what he obtained thereby.”
Harrison v. Westinghouse Savannah River
Co.
,
Federal Rule of Civil Procedure 12(b)(1) governs motions to dismiss for lack of subject
matter jurisdiction.
See Khoury v. Meserve
,
In a facial challenge, “the facts alleged in the complaint are taken as true, and the motion
must be denied if the complaint alleges sufficient facts to invoke subject matter
jurisdiction.”
Kerns
,
Discussion
I. Standing
Marriott argues that most of the Bellwether Plaintiffs do not have standing, and therefore
this Court lacks subject matter jurisdiction over their claims. Def. Mot. at 4.
[4]
Each of the elements
of standing “must be supported in the same way as any other matter on which the plaintiff bears
the burden of proof,
i.e.
, with the manner and degree of evidence required at the successive stages
of the litigation.”
Overbey v. Mayor of Baltimore
, 930 F.3d 215, 227 (4th Cir. 2019)
(quoting
Lujan v. Defs. of Wildlife
,
To establish standing, a plaintiff must have (1) “suffered an ‘injury in faсt’ that is (a)
concrete and particularized and (b) actual or imminent, not conjectural or hypothetical,” (2) “fairly
traceable to the challenged action of the defendant,” and (3) “likely . . . [to] be redressed by a
favorable decision.”
Bishop v. Bartlett,
a. Plaintiffs Adequately Alleged Injury-In-Fact Marriott argues that the fifteen Bellwether Plaintiffs that did not allege that their information was misused have not adequately alleged injury-in-fact. Def. Mot. at 4. [5] Plaintiffs argue that these plaintiffs have satisfied the injury-in-fact requirement by alleging (1) an imminent risk of injury of identity theft; (2) time and money expended to protect against identity theft; (3) loss of property value in their personal identifying information; and (4) loss of the benefit of their bargain with Marriott regarding data privacy. I agree and will discuss each in turn.
i. Imminent risk of injury of identity theft Plaintiffs argue that they face an imminent threat of injury of identity theft based on their allegations that they provided personal information to Marriott, hackers targeted and stole this information, and this information has already been misused in some cases. See, e.g. , Compl. ¶¶ 2, 19, 36, 77; Opp. at 4–12. Defendants argue that this threat of injury is speculative and does not suffice to establish Article III standing. Def. Mot. at 4–10. Two recent Fourth Circuit cases are instructive.
In Beck v. McDonald , 848 F.3d 262 (4th Cir. 2017), the Fourth Circuit considered two consolidated appeals – Beck and Watson – brought by veterans who received health care at the William Jennings Bryan Dorn Veterans Affairs Medical Center (“Dorn VAMC”) in Columbia, South Carolina. In the Beck case, a laptop was stolen from Dorn VAMC that contained *8 unencrypted personal information of approximately 7,400 patients, including names, birth dates, the last four digits of social security numbers, and physical descriptors. Id. at 267. In the Watson case, Dorn VMAC discovered that four boxes of pathology reports were missing or stolen, which contained identifying information of over 2,000 patients including names, social security numbers, and medical diagnoses. Id. at 268. Plaintiffs in both cases alleged injury-in-fact based on the increased risk of identity theft. The courts disagreed. In the Beck case, the district court dismissed the claims for lack of standing on a summary judgment record. In the Watson case, the district court dismissed the claims for lack of standing based on the pleadings.
Relying on the Supreme Court’s discussion of standing based on “threatened injuries” in
Clapper v. Amnesty International USA
, 568 U.S. 398 (2013), the Fourth Circuit affirmed the
district court in both cases. The Fourth Circuit found that the harms alleged by the
Watson
and
Beck
plaintiffs were too speculative, because they required an “attenuated chain of possibilities.”
Beck
,
In
Beck
, the Fourth Circuit also reviewed the decisions of its sister circuits. The Sixth,
Seventh, and Ninth Circuits had found that an increased risk of future identity theft was sufficient
to establish injury-in-fact.
Beck
,
In Galaria , Remijas , and Pisciotta , for example, the data thief intentionally targeted the personal information compromised in the data breaches. Galaria , 663 Fed. Appx. at 386 (“[H]ackers broke into Nationwide’s computer network and stole the personal information of Plaintiffs and 1.1 million others.”); Remijas , 794 F.3d at 694 (“Why else would hackers break into a store’s database and steal consumers’ private information?”); Pisciotta ,499 F.3d at 632 (“scope and manner” of intrusion into banking website’s hosting facility was “sophisticated, intentional and malicious”). And, in Remijas and Krottner , at least one named plaintiff alleged misuse or access of that personal information by the thief. Remijas , 794 F.3d at 690 (9,200 of the 350,000 credit cards potentially exposed to malware “were known to have been used fraudulently”); Krottner , 628 F.3d at 1141 (named plaintiff alleged that, two months after theft of laptop containing his social security number, someone attempted to open a new account using his social security number).
Id. But in the case before it, neither the Beck nor Watson plaintiffs made claims regarding the targeting of their personal information for the purpose of identity theft or actual misuse of their information. Therefore, the alleged harm of identity theft was too speculative to establish injury- in-fact. Id. And because the threat of identity theft was too speculative, the cost of mitigative measures including the cost of credit monitoring services and the plaintiffs’ time spent monitoring their financial and credit information was also insufficient to establish injury-in-fact. at 276– 77.
In
Hutton v. Nat'l Bd. of Examiners in Optometry, Inc.
,
But the Fourth Circuit reversed, distinguishing the case from
Beck
. The Fourth Circuit
explained that in
Beck
, it “emphasized that a mere compromise of personal information, without
more, fails to satisfy the injury-in-fact element in the absence of an identity theft.”
Id.
at 621
(citing
Beck
,
Further, the Fourth Circuit held that “[a]t a minimum” these allegations were sufficient to establish standing based on “an imminent threat of injury.” at 622. The court explained that while in Beck “there was no evidence that the thief even stole the laptop with the intent to steal *11 private information . . . the [ Hutton ] Plaintiffs allege that their data has been stolen, accessed, and used in a fraudulent manner.” Id. Finally, the Fourth Circuit held that given the non-speculative nature of these alleged injuries, the plaintiffs’ out-of-pocket costs and time spent to mitigate the harms also constituted injury-in-fact.
Thus in Beck , there was no injury-in-fact when there were not allegations that the personal information was targeted or misused, whereas in Hutton , injury-in-fact was established based on allegations of actual identity theft, the imminent threat of identity theft, and costs spent to mitigate identity theft given the allegations that the personal information was targeted and misused.
Here the complaint contains much more extensive allegations concerning the targeting of personal information for misuse than in Beck or Hutton , and, similar to Hutton , contains allegations of actual misuse by some of the plaintiffs. Unlike in Beck where there were no allegations of targeting, and in Hutton where the NBEO did not even acknowledge that a data breach occurred, here Marriott disclosed that it was the target of one of the largest sustained cyberattacks in history that compromised the personal information of up to 500 million hotel guests. Compl. ¶¶ 1–3. And like the plaintiffs in Hutton , Bellwether Plaintiffs Hevener, Ropp, Cullen, Golin, and O’Brien allege actual misuse of their personal information. See Compl. ¶ 36 (“Subsequent to the Data Breach, Plaintiff Hevener suffered identity theft and fraud in the form of unauthorized credit cards appliеd for in her name”); ¶ 42 (“As a result of the Data Breach, Plaintiff Golin experienced unauthorized charges on [his] payment card”); id. ¶ 70 (“As a result of the Data Breach, Plaintiff Cullen experienced unauthorized charges on [his SPG] payment card, as well as unauthorized purchases made from his personal checking account”); id. ¶ 72 (“ As a result of the Data Breach, Plaintiff O’Brien subsequently experienced unauthorized charges on [her] payment card”); id. ¶ 77 (“As a result of the Data Breach, Plaintiff Ropp suffered identity theft and fraud in the form *12 multiple unauthorized accounts for credit cards, consolidated loans, consumer accounts, and other lines of credit opened using his Personal Information”). These allegations bring the actual and threatened harm out the realm of speculation and into the realm of sufficiently imminent and particularized harm to satisfy the injury-in-fact requirement for Article III standing for all Bellwether Plaintiffs.
Defendants argue that the Bellwether Plaintiffs that did not themselves allege actual misuse
have failed to establish injury-in-fact. While these Plaintiffs have not pled injury-in-fact based on
identity theft that has already occurred, they have adequately pled imminent threat of identity theft.
The question here is whether there are “allegations that suffice[] to push the threatened injury of
future identity theft beyond the speculative to the sufficiently imminent.”
Beck
,
Therefore, Bellwether Plaintiffs Hevener and Ropp have established injury-in-fact based on allegations of actual and threatened harm [6] and the remaining Bellwether Plaintiffs established injury-in-fact based on the non-speculative imminent threat of identity theft.
ii. Time and money spent to mitigate harms from the data breach
Plaintiffs allege that they spent time and money to mitigate harms from the data breach and
argue that this is also establishes injury-in-fact.
See, e.g.
, Compl. ¶ 270(e)–(g), (k). Defendants
argue that Plaintiffs cannot manufacture standing by choosing to make expenditures based on
*13
hypothetical future harm. As described above, in
Beck
the Fourth Circuit found that the cost of
mitigative measures to protect against identity theft did not constitute injury-in-fact when the threat
of identity theft was too speculative to constitute injury-in-fact.
Beck
, 848 F.3d at 276–77
(“Mitigation expenses do not qualify as actual injuries where the harm is not imminent.”) (quoting
Remijas
,
iii. Loss of value of property in their personal identifying information Plaintiffs allege that they provided their personal identifying information (“PII”) to Marriott and that as a result of the cyberattack they lost the value of that information. See, e.g. , Compl. ¶ 270(b). Defendants argue that this type of harm is not cognizable as a matter of law. Def. Mot. at 16.
The Fourth Circuit has not decided whether the loss of property value in personal
identifying information constitutes a cognizable injury in data breach cases. But the growing trend
across courts that have considered this issue is to recognize the lost property value of this
information.
See In re Experian Data Breach Litig.
, No. SACV151592AGDFMX, 2016 WL
*14
7973595, at *5 (C.D. Cal. Dec. 29, 2016) (“[A] growing number of federal courts have now
recognized Loss of Value of PII as a viable damages theory.”) (quoting
In re Anthem, Inc. Data
Breach Litig.
,
Two courts in this district have taken a contrary view. In
Chambliss v. Carefirst, Inc
, the
court found that plaintiffs did not establish injury-in-fact based on the decreased value of their
personal information.
Here plaintiffs have adequately pled that the personal identifying information collected by Marriott has value. Plaintiffs allege that Marriott recognizes the value of this information and collects it to better target customers and increase its profits. Compl. ¶ 104. Marriott also pays a customer analytics company to analyze personal information for this purpose. Id. And Plaintiffs allege that this information is “highly-coveted and valuable on underground or black markets.” Compl. ¶ 264.
The Complaint contains further allegations recognizing the value of personal information. For example, Commissioner Elizabeth Denham of the European Union, Information Commissioner’s Office, which is investigating the Marriott data breach, stated, “Personal data has a real value so organizations have a legal duty to ensure its security, just like they would do with any other asset.” Compl. ¶ 104. Similarly, the Court takes judicial notice of a recent statement by U.S. Attorney General William Barr announcing the indictment of four Chinese officials for the Equifax data breach, linking the attack to the Marriott data breach and recognizing the value of the personal information taken:
For years, we have witnessed China’s voracious appetite for the personal data of Americans, including the theft of personnel records from the U.S. Office of Personnel Management, the intrusion into Marriott hotels , and Anthem health insurance company, and now the wholesale theft of credit and other information from Equifax. This data has economic value , and these thefts can feed China’s development of artificial intelligence tools as well as the creation of intelligence targeting packages.
Attorney General William P. Barr Announces Indictment of Four Members of China’s Military for Hacking into Equifax, February 10, 2020, https://www.justice.gov/opa/speech/attorney-general- william-p-barr-announces-indictment-four-members-china-s-military (emphasis added).
Neither should the Court ignore what common sense compels it to acknowledge – the value that personal identifying information has in our increasingly digital economy. Many companies, like Marriott, collect personal information. Consumers too recognize the value of their personal information and offer it in exchange for goods and services. To take a few examples, many business offer goods and services such as wifi access, special access to products, or discounts in exchange for a customer’s personal information. Consumer choose whether to exchangе their personal information for these goods and services every day. And here, plaintiffs allege that they gave Marriott their personal information as part of their exchange to stay at Marriott hotels. Further, the value of personal identifying information is key to unlocking many parts of the financial sector for consumers. Whether someone can obtain a mortgage, credit card, business loan, tax return, or even apply for a job depends on the integrity of their personal identifying information. Here Plaintiffs allege that they suffered lower credit scores as a result of the data breach and that fraudulent accounts and tax returns were filed in their names. See, e.g. , Compl. ¶¶ 36, 77, 104. Similarly, the businesses that request (or require) consumers to share their personal identifying information as part of a commercial transaction do so with the expectation that its integrity has not been compromised.
For these reasons, I depart from the reasoning of Chambliss and Khan and am more persuaded by the growing number of courts that have recognized the loss of this property value in data breach cases. In Chambliss and Khan , the courts rejected alleged injuries based on the diminished value of personal information because the complaints did not allege that the plaintiffs *17 attempted to sell it themselves or that they were forced to accept a decreased price for their information. But the value of consumer personal information is not derived solely (or even realistically) by its worth in some imagined market place where the consumer actually seeks to sell it to the highest bidder, but rather in the economic benefit the consumer derives from being able to purchase goods and services remotely and without the need to pay in cash or a check. Therefore, the Bellwether Plaintiffs have established injury-in-fact based on the loss of value of their personal information.
iv. Loss of benefit of their bargain regarding data security
Plaintiffs also allege injury-in-fact based on “overpayment” and failure to receive the benefit of their bargain regarding data privacy. Specifically, plaintiffs allege that they “place significant value in data security,” that “[t]he cost of purchasing a hotel room includes tangible and intangible components, including things such as the overall cost of the property and employee costs, as well the cost of providing conveniences like soaps and shampoos,” that “[o]ne component of the cost of a hotel room is the explicit and implicit promises Marriott made to protect its customers’ Personal Information,” and that “had consumers known the truth about Defendants’ data security practices—that they did not adequately protect and store their data—they would not have stayed at a Marriott Property, purchased products or services at a Marriott Property, and/or would have paid less.” Compl. ¶ 273–75. Defendants again argue that this theory of injury fails as a matter of law. Def. Mot. at 16. The Fourth Circuit has not addressed this issue, and both Plaintiffs and Defendants marshal cases to support their position. For the reasons discussed below, I am persuaded that Plaintiffs have adequately alleged injury-in-fact based on failure to receive the benefit of their bargain regarding data security.
Plaintiffs point to
Carlsen v. GameStop, Inc.
,
Here, Carlsen has provided sufficient facts alleging that he is party to a binding contract—the terms of service, which include the Game Informer privacy policy— with GameStop, and GameStop does not dispute this contractual relationship. Carlsen also has alleged that GameStop has violated that policy by “systematically disclos[ing] Game Informer’s users’ PII . . . to third party Facebook and/or allow[ing] Facebook to directly collect that information itself.” This allegation of breach is both concrete and particularized, as the breach allegedly already has occurred, and any consequences of the breach have occurred specifically to Carlsen as a result of the actions of GameStop’s alleged systematic disclosure via the Facebook SDK. The Eighth Circuit also found that these same allegations were sufficient to establish injury
based on an overpayment theory. See id. (“Carlsen alleged that he has suffered damages as a result of GameStop’s breach in the form of devaluation of his Game Informer subscription in an amount equal to the difference between the value of the subscription that he paid for and the value of the subscription that he received, i.e. , a subscription with compromised privacy protection. *19 Accordingly, Carlsen has alleged an ‘actual’ injury.”) Thus, the allegations plausibly established injury from breach of contract and alternatively breach leading to a devaluation of the goods purchased.
Similarly, the court in
In re Yahoo! Inc. Customer Data Sec. Breach Litigation
found that
the plaintiff adequately alleged benefit-of-the-bargain losses.
Defendants argue that Plaintiffs’ allegations fail as a matter of law to establish injury-in- fact, again pointing to Chambliss . There the court found that the plaintiffs made no allegations that “the data breach diminished the value of the health insurance they purchased from CareFirst” or “indicating that the prices they paid for health insurance included a sum to be used for data security, and that both parties understood that the sum would be used for that purpose.” Chambliss v. Carefirst, Inc , 189 F. Supp. 3d 564, 572 (D. Md. 2016). Further, the court stated that the plaintiffs could not quantify their alleged losses.
Defendants also cite cases for the proposition that it is improper to “chop up a contract” for
data security. In
Irwin v. Jimmy John’s Franchise, LLC
, plaintiffs brought a putative class action
for alleged injuries arising from a data breach at Jimmy John’s restaurants.
Irwin paid for food products. She did not pay for a side order of data security and protection; it was merely incident to her food purchase, as is the ability to sit at a table to eat her food, or to use Jimmy John’s restroom. Jimmy John’s would not be enriched by customers who paid full price for their purchases but found all tables occupied, or a restroom temporarily out of order. The court is further persuaded by the fact that merchants are assessed a fee for each debit and credit card transaction, and merchants sometimes offer a discount for cash payment. See, e.g. , Consumer Reports, Don’t be Tricked by Gas Station Cash Discounts, available at http://www.consumerreports.org/cro/news/2013/08/gas-station-cash- discounts/index.htm. Irwin does not allege that she paid more than cash customers did for the same food items, so it cannot be said that Jimmy John’s was unjustly enriched by her purchases.
Irwin v. Jimmy John's Franchise, LLC
,
Defendants also cite
Lewert v. P.F. Chang’s China Bistro, Inc.
,
Likewise, in In re Sci. Applications Int'l Corp. (SAIC) Backup Tape Data Theft Litig. , 45 F. Supp. 3d 14, 30 (D.D.C. 2014), the court rejected an overpayment theory of injury in a data breach case involving theft of personal information and medical records of 4.7 million members of the U.S. military and their families. The court stated:
[A]s to the value of their insurance premiums, Plaintiffs do not plausibly allege any actual loss. They allege that they were paying for “health and dental insurance”—and they do not claim that they were denied coverage or services in any way whatsoever. id. To the extent that Plaintiffs claim that some indeterminate part of their premiums went toward paying for security measures, such a claim is too flimsy to support standing. They do not maintain, moreover, that the money they paid could have or would have bought a better policy with a more bullet-proof information-security regime. Put another way, Plaintiffs have not alleged facts that show that the market value of their insurance coverage (plus security services) was somehow less than what they paid. Nothing in the Complaint makes a plausible case that Plaintiffs were cheated out of their premiums. As a result, no injury lies.
In re Sci. Applications Int'l Corp. (SAIC) Backup Tape Data Theft Litig.
,
Here the pleadings are similar to those in Carlson , In re Yahoo! , and In re Anthem . Like the plaintiffs in those cases, Plaintiffs here allege that there was an explicit or implicit contract for data security based on Marriott and Starwood’s privacy statements, [8] that they placed a significant value in data security, and that had they known the truth about Marriott’s data security practices they would have paid less or not stayed at Marriott. Compl. ¶ 273–75.
In this regard the pleadings differ from those in Chambliss , Irwin , Lewert , and In re SAIC . Whereas in Chambliss the court noted that the plaintiffs failed to make allegations that the data breach diminished the value of their health insurance, here plaintiffs specifically allege that they value data security and Marriott’s misrepresentations in this regard diminished the value of their purchases. And to the extent these courts found that plaintiffs did not pay separately for data security in those transactions, I find it unnecessary at this stage to parse out what portion of the bargain between Plaintiffs and Marriott can be attributed to data security. As the courts in Carlson , In re Yahoo! , and In re Anthem found, it is enough to allege that there was an explicit or implicit contract for data security, that plaintiffs placed value on that data security, and that Defendants failed to meet their representations about data security. Valuation of these alleged damages may be done after discovery. Therefore, plaintiffs have adequately alleged injury based on their benefit- of-the-bargain and overpayment theories.
b. Plaintiffs’ Injuries Are Fairly Traceable to Defendants’ Conduct Defendants argue that two of the Bellwether Plaintiffs that alleged actual misuse – Hevener and Ropp – lack standing because their alleged injuries are not fairly traceable to Defendants’ conduct. Def. Mot. at 17. Plaintiff Hevener alleges that as a result of the data breach, unauthorized credit cards were applied for in her name. Compl. ¶ 36. And Plaintiff Ropp alleges that because of the data breach multiple unauthorized accounts for credit cards, consolidated loans, consumer accounts, and other lines of credit were opened using his personal information. Compl. ¶ 77. Defendants also argue that the alleged injuries of a third bellwether plaintiff, Cullen, stemming “unauthorized purchases made from his personal checking account” are not traceable to the Marriot data breach, but do not challenge Cullen’s standing based on his allegations of payment card misuse. Def. Mot. at 17 n.2.
Defendants argue that these injuries are not fairly traceable to Defendants because these
injuries purportedly require social security numbers or banking information which no plaintiff
alleges to have given to Marriott. Def. Mot. at 17. To support this proposition, Defendants сite to
several cases that discuss the use of social security numbers to open accounts.
See Hutton v. Nat’l
Bd. Of Examiners in Optometry, Inc.
,
In
Hutton
, the plaintiffs alleged that social security numbers were stored by the defendant,
which supported their claim for standing.
Other cases have found that stolen credit card information, even without social security
numbers, was enough to commit identity theft and fraud.
See, e.g.
,
In re Zappos.com, Inc.
, 888
F.3d 1020, 1027 (9th Cir. 2018) (“Although there is no allegation in this case that the stolen
information included social security numbers . . . the information taken in the data breach still gave
hackers the means to commit fraud or identity theft . . . .”);
Lewert v. P.F. Chang’s China Bistro,
Inc.
,
Here plaintiffs Hevener, Ropp, and Cullen allege that they stayed at Marriott properties, that they gave their personal information to Marriott to do so, that Marriott was the target of one *25 of the largest data breaches in history – the scope of which is not yet fully known – and that as a result, fraudulent accounts were opened or applied for in their names. Plaintiffs have adequately alleged their injuries are traceable to Defendants’ conduct. While Defendants may ultimately show, after the opportunity for discovery, that the alleged injuries are not caused by their data breach, it is premature to dismiss Plaintiffs’ claims on grounds of traceability.
Thus, for the reasons stated above, all Bellwether Plaintiffs have standing. I now turn to the bellwether claims selected by the parties.
II. Negligence Claims
Bellwether Plaintiffs allege negligence claims under the laws of three states: Illinois, Florida, and Georgia. Dеfendants move to dismiss each claim. For the reasons discussed below, Defendants’ motion to dismiss the Illinois negligence claim is granted. Defendants’ motion to dismiss the Florida and Georgia claims is denied. I discuss the negligence claims of each state in turn. [9]
a. Illinois Negligence Claims Illinois class representatives Golin and Raab bring claims for negligence under Illinois law. See Compl. ¶¶ 42–43; 296–304; ECF No. 368. Marriott argues that these claims must be dismissed because the “economic loss rule” precludes the Plaintiffs from recovering against it for damages that do not result from personal injuries or physical damage to tangible property, and because Illinois law does not impose a duty on retailers to safeguard personal information from cyberattacks. Def. Mot. at 18–19.
i. Economic Loss Rule
The economic loss rule bars recovery in tort for “economic losses,” and instead requires
personal injury or property damage to support a negligence claim.
See Moorman Mfg. Co. v. Nat'l
Tank Co.
,
To support their position, Plaintiffs cite
Morris v. Harvey Cycle & Camper, Inc.
, 911
N.E.2d 1049 (Ill. App. Ct. 2009). In that case, the plaintiff brought a claim under the Illinois
Consumer Fraud Act following problems with the financing and purchase of a car and alleged
“severe emotional distress, inconvenience and aggravation.”
Id.
at 1052–53. The Illinois
Consumer Fraud Act provides a remedy for purely economic injuries.
Id.
The Court of Appeals
affirmed the Circuit Court’s dismissal of the plaintiff’s Consumer Fraud Act claim, finding that
“she did not allege actual damages in the form of specific economic injuries” and that “[s]he
alleged only emotional damages.” In other words, in the context of stating an Illinois
Consumer Fraud Act claim, emotional distress, inconvenience, and aggravation were all deemed
non-economic injuries. And Plaintiffs point to cases outside of Illinois to support their argument
that the loss of value of personal information and loss of time are non-economic injuries that are
outside the scope of the economic loss rule.
Hameed-Bolden v. Forever 21 Retail, Inc.
, No.
CV1803019SJOJPRX,
In response, Defendants cite
Fox v. Iowa Health System
,
Taken together, Morris suggests that that an Illinois Court would find that Plaintiffs’ claims for aggravation are not economic injuries but Fox and Followell suggest that claims for lost time are economic injuries. And although the court in Fox cites Illinois Bell to support its conclusion that the loss of value of personal information is an economic injury, neither Fox nor Illinois Bell discusses this specific issue. Moreover, the Illinois Supreme Court has yet to address the economic *28 loss rule in the context of data breaches at all. An examination of the rule’s development suggests that its historical roots in products liability are not a close fit with the injuries that arise in the context of data breaches like this one, which casts doubt on how it would be applied by the Illinois Supreme Court. Therefore, I must review the rule’s development more fully.
The economic loss rule is of relatively recent vintage and was most prominently articulated
by Chief Justice Traynor of the Supreme Court of California in
Seely v. White Motor Company
,
We do hold, however, that when a product is sold in a defective condition that is unreasonably dangerous to the user or consumer or to his property, strict liability in tort is applicable to physical injury to plaintiff’s property, as well as to personal injury. . . . This comports with the notion that the essence of a product liability tort case is not that the plaintiff failed to receive the quality of the product he expected, but that the plaintiff has been exposed, through a hazardous product, to an unreasonable risk of injury to his person or property. On the other hand, contract law, which protects expectation interests, provides the proper standard when a qualitative defect is involved, i.e. when a product is unfit for its intended use.
Id. at 448–49.
The court then proceeded to explain the contours of “economic loss” that falls within the scope of the rule:
“Economic loss” has been defined as “damages for inadequate value, costs of repair and replacement of the defective product, or consequent loss of profits – without any claim of personal injury or damage to other property” as well as “the diminution in the value of the product because it is inferior in quality and does not work for the general purposes for which it was manufactured and sold.” These definitions are consistent with the policy of warranty law to protect expectations of suitability and quality.
Id. at 449 (internal citations omitted). The court also held that economic loss includes “all indirect loss, such as loss of profits resulting from inability to make use of the defective product.” at 449. And, it summed up its views of where the line of demarcation between tort and contract law lies as follows:
[T]he line between tort and contract must be drawn by analyzing interrelated factors such as the nature of the defect, the type of risk, and the manner in which the injury arose. These factors bear directly on whether the safety-insurance policy of tort law or the expectation-bargain protection policy of warranty law is most applicable to a particular claim. . . . Our conclusion that qualitative defects are best handled by contract, rather than tort, law applies whether the tort theory involved is strict liability or negligence. Tort theory is appropriately suited for personal injury or property damage from a sudden or dangerous occurrence of the nature described above. The remedy for economic loss, loss relating to a purchaser’s disappointed *30 expectations due to deterioration, internal breakdown or nonaccidental cause, on the other hand, lies in contract.
Id. at 450–51 (internal quotation marks and citation omitted). Thus, while the court grounded its analysis of the economic loss rule in products liability law, it went on to extend it to ordinary negligence actions as well, again citing Chief Justice Traynor:
(A consumer) can, however, be fairly charged with the risk that the product will not match his economic expectations unless the manufacturer agrees that it will. Even in actions for negligence, a manufacturer’s liability is limited to damages for physical injuries and there is no recovery for economic loss alone.
Id.
at 451 (citing
Seely
,
The court further explained why the economic loss rule applies to negligence claims as well as product liability claims as follows:
The policy considerations against allowing recovery for solely economic loss in strict liability cases apply to negligence actions as well. When the defect is of a qualitative nature and the harm relates to the consumer’s expectation that a product is of a particular quality so that it is fit for ordinary use, contract, rather than tort, law provides the appropriate set of rules for recovery. Moreover, as was true with strict liability, if a manufacturer were held liable in negligence for the commercial loss suffered by a particular purchaser, it would be liable for business losses of other purchasers, caused by the failure of its product to meet the specific needs of their businesses, even though the needs were communicated only to the dealer. Thus, a manufacturer could be held liable for damages of unknown and unlimited scope, even though the product is not unreasonably dangerous and even though there is no damage to person and property.
Id. at 451–52 (internal citations omitted). Finally, the Illinois Supreme Court recognized two narrow exceptions to the economic loss rule. “This court has held that eсonomic loss is recoverable where one intentionally makes false representations, and where one who is in the business of supplying information for the guidance of others in their business transactions makes negligent representations.” at 452 (internal citations omitted).
Shortly after
Moorman
was decided, the Illinois Supreme Court again addressed the
economic loss rule in
Redarowicz v. Ohlendorf
,
A duty to use ordinary care and skill is not imposed in the abstract. It results from a conclusion that an interest entitled to protection will be damaged if such care is not exercised. Traditionally, interests which have been deemed entitled to protection in negligence have been related to safety or freedom from physical harm. Thus, where personal injury is threatened, a duty in negligence has been readily found. Property interests also have generally been found to merit protection from physical harm. However, where mere deterioration or loss of bargain is claimed, the concern is with a failure to meet some standard of quality. This standard of quality must be defined by reference to that which the parties have agreed upon. Id. at 882 (emphasis in original).
In Anderson Elec. v. Ledbetter Erection Corp ., 503 N.E. 2d 246 (Ill. 1986), the Illinois Supreme Court extended the Moorman doctrine to a claim where the plaintiff asserted negligent performance of services. In Ledbetter , the plaintiff was an electrical subcontractor that contracted to perform work for Ledbetter, a general contractor, on precipitator units manufactured by Walther. at 247. Anderson’s contract with Ledbetter required it to perform its work in accordance with Walther’s precipitator unit erection manual, which required Walther to inspect the project in stages as it was being performed, to insure compliance with the manual, and immediate correction of any *32 noted defects before the next phase of work commenced. Id. But Anderson had no contractual relationship with Walther. Id. Apparently, Walther did not inspect until Anderson completed all its work, and found defects that required thаt much of the work be redone, at a cost to Anderson of $288,802.44, significantly reducing its profit on the subcontract. Id. Anderson sued Walther for negligent failure to inspect the construction in phases as required by its manual.
Citing
Moorman
, the Illinois Supreme Court affirmed the decision of the Illinois Court of
Appeals upholding the trial court’s dismissal of Anderson’s claim under the economic loss rule,
noting that without concomitant claims of personal injury or damage to property other than the
product that was the subject of the underlying contract (the precipitator unit), tort law afforded no
remedy.
Id.
at 247 (quoting
Moorman
). In reaching its conclusion, the Illinois Supreme Court
cited with approval a decision from the United States Supreme Court,
East River Steamship Corp.
v. Transamerica Delava, Inc.
,
The distinction rests . . . on an understanding of the nature of the responsibility a manufacturer must undertake in distributing his products. When a product injures only itself the reasons for imposing a tort duty are weak and those for leaving the party to its contractual remedies are strong. The tort concern with safety is reduced when an injury is only to the product itself. When a person is injured, the ‘cost of an injury and the loss of time or health may be an overwhelming misfortune’, and one the person is not prepared to meet. In contrast, when a product injures itself, the commercial user stands to lose the value of the product, risks the displeasure of its customers who find that the product does not meet their needs, or, as in this case, experiences increased costs in performing a service. Losses like these can be insured.” at 871 (internal citations and quotation marks omitted).
But in Collins v. Reynard , 607 N.E. 2d 1185 (Ill. 1992), the Illinois Supreme Court recognized that there can be circumstances in which an injured party may sue in both contract and tort, despite the absence of personal injury or physical damage to property. In Collins , the plaintiff sued her attorney for negligence in preparing documents for the sale of a business. The court explained its ruling this way:
Today we rule that a complaint against a lawyer for professional malpractice may be couched in either contract or tort and that recovery may be brought in the alternative . . . . Our ruling is grounded on historical precedent rather than logic. If something has been handled in a certain way for a long period of time and if people are familiar with the practice and accustomed to its use, it is reasonable to continue with that practice until and unless good cause is shown to change the rule. at 1186.
In explaining why it overruled the decision by the Court of Appeals that Moorman precluded suing an attorney for malpractice in tort, the Illinois Supreme Court again ventured into a discussion of the underlying policies that distinguish contract claims from tort claims:
Contract law applies to voluntary obligations freely entered into between parties. Damages recoverable under a breach of contract theory are based upon the mutual expectations of the parties. The basic principle for the measurement of contract damages is that the injured party is entitled to recover an amount that will put him in as good a position as he would have been had the contract been performed as agreed.
Tort law, on the other hand, applies in situations where society recognizes a duty to exist wholly apart from any contractual undertaking . Tort obligations are general obligations that impose liability when a person negligently, carelessly or purposely causes injury to others. These obligations have been recognized by society to protect fellow citizens from unreasonable risks of harm. Whether a duty will be recognized under tort law depends upon the foreseeability of the injury, the likelihood of the injury, the magnitude of the burden of guarding against the injury, and the consequences of placing that burden on the defendant.
Although the common law distinctions between contract and tort have been both modified and confused by different courts in different situations, differences between tort theories and contract theories still have validity. For all of that, a punch in the nose remains, for all practical purposes, a tort and not a breach of *34 contract. In the field of contract, however, some breaches have crossed the line and become cognizable in tort. at 1186–87 (internal citations omitted; emphasis added). But having opened the door that
Moorman created separating contract from tort, the Illinois Supreme Court was quick to insure that only a crack remained open, adding “the ruling we announce today is limited to the specific field of lawyer malpractice as an exception to the so-called Moorman doctrine and to the distinctions separating contract from tort.” Id . at 1187. But it did not take long before that crack was widened.
In Congregation of the Passion, Holy Cross Province v. Touche Ross & Co ., 636 N.E. 2d 503 (Ill. 1994), the Illinois Supreme Court again was thrust into a dispute centering around the scope of the Moorman doctrine. After a Catholic church suffered severe financial losses caused by the failure of their accountant properly to value certain assets held by the church to generate income enabling it to operate its monasteries, retreat houses and schools, it sued its accounting firm and obtained substantial trial verdicts under both its negligence and contract claims. Notwithstanding its proclamation in Collins that it was relaxing the Moorman doctrine only to accommodate tort claims against an attorney for malpractice (for reasons based not on logic, but rather historical tradition), the Illinois Supreme Court extended the Collins exception to suits against accountants as well. To reach this result, it distilled the progression of its cases interpreting the economic loss rule from its adoption in Moorman this way:
The evolution of the economic loss doctrine shows that the doctrine is applicable to the service industry only where the duty of the party performing the service is defined by the contract that he executes with his client. Where a duty arises outside of the contract, the economic loss doctrine does not prohibit recovery in tort for the negligent breach of that duty.
Id. at 514. Importantly, the court held that the “duty to observe reasonable professional competence exists independently of any contract. The economic loss doctrine does not bar recovery in tort for the breach of a duty that exists independently of a contract.” Id. at 515.
Although the Illinois Supreme Court has further addressed the scope of the
Moorman
doctrine in the years since the
Congregation of the Passion
decision, the parties have not cited,
and my own research has not located, any appellate decision by either the Court of Appeals or
Supreme Court of Illinois that evaluated the applicability of the economic loss rule for a negligence
claim in a data security breach, such as the claim involved in the MDL pending before me.
However, several federal courts have applied the rule in data breach cases, including the United
States District Court for the Northern District of Illinois in
In re Michaels Stores Pin Pad
Litigation
,
The underlying facts of the Michaels Pin Pad case are familiar to any consumer in the United States (and likely abroad). When customers checked out at the cash register of a Michaels store, they were required to “swipe” their bank card on a “pin pad” device if they wished to pay for their purchase by a credit or debit card, a process that might require them to input their Personal Information Number (“PIN”). When they did, the pin pad stored their PIN and bank card information (supposedly securely) to allow verification with the bank that issued the bank card. at 521. But “skimmers,” criminals who replace legitimate pin pads with ones modified to *36 enable them to steal the bank card information and PIN, had placed modified pin pads in a number of Michaels stores in Illinois. Once they obtained customer bank card and PIN, they either sold the information to others or used it to create a fake bank card in the name of the unsuspecting consumer victim. Id. at 521–22.
The plaintiffs in Michaels Pin Pad were class representatives of Michaels customers that claimed they had sustained a variety of damages as a result of Michaels’ failure to prevent the theft of their personal financial information. Their claims included negligence and negligence per se tort claims. Michaels sought to dismiss the negligence (and other) claims, contending that the Moorman doctrine precluded the plaintiffs from bringing a negligence claim, and the plaintiffs did not dispute that they sought to recover only economic losses. Id. at 530.
Judge Kocoras began his analysis with a thorough discussion of the decisions of the Illinois
Supreme Court analyzing the economic loss rule, beginning with
Moorman
. Ultimately, he
rejected the Plaintiffs’ argument that the economic loss rule was inapplicable because the duty to
protect their financial information arose independently from any contractual obligation or
warranty, concluding that the “independent duty” exception to the
Moorman
doctrine announced
by the
Congregation of the Passion
case was inapplicable, because the “ultimate result of the
transaction was the sale of the products to Plaintiffs, not the provision of intangible services.”
Id.
at 530. And, citing to the decisions of courts in other jurisdictions that had dismissed data breach
negligence claims on the basis of the economic loss rule, he dismissed the negligence claims. at 531.
[10]
Following
Michaels Pin Pad
, several other federal courts have denied Illinois negligence
*37
claims based on the economic loss rule.
Fox v. Iowa Health Sys.
,
However, I have doubts about whether a sufficiently full consideration has been given to the policies that justified the adoption of the economic loss rule, their continued application to modern digital commercial transactions, and the true nature of the injuries suffered by victims of data security breaches. [11] The progression of cases decided by the Illinois Supreme Court since its adoption of the economic loss rule demonstrates that it has not proved to be easy to maintain the neat lines of division between contract and tort envisioned by Moorman . Experience has shown that certain types of claims do not fit comfortably into an “either or” dichotomy. For some claims, the answer must be “either or both,” as the court recognized in Collins v. Reynard , 607 N.E. 2d 1185 (Ill. 1992). And this is how it should be, because the kinds of injuries recognized by the *38 common law as compensable in tort have been broad, embracing products liability, simple negligence, negligence per se, misrepresentation and deceit, and intentional infliction of emotional injury, to name only a few.
Data security breach cases are unique in many ways. First, they are of recent origin, inasmuch as the transition to a vast digital economy has happened only recently. Second, as this case amply shows, data security breach cases do not fit neatly into the paradigm of the cases that led to the adoption of the economic loss doctrine. When a consumer logs onto the website of a hotel to book a room, the “product” purchased is a hotel room, not the secure storage of the personal and financial information required to complete the transaction. When the hotel induces the consumer to book a room online, and to hold the reservation by providing a bank card and other personal information, but fails to protect that information from hackers, the injury sustained by the consumer has nothing at all to do with the quality or fitness of the “product” purchased— the hotel room. As such, data security breach cases have very little in common with the products liability cases that launched the economic loss rule, and the policies that underlie that rule (protecting manufacturers of defective products from unlimited liability to persons they may have had no direct contact with from tort claims that the product purchased did not meet expectations) do not translate well to the circumstances of a data breach case where it simply cannot be said that the “product”—a hotel room, was in any way defective.
Moreover, what of the consumers who learn, to their dismay, that their personal information has been hacked, or that their identity has been stolen, or their credit used without authority to purchase expensive items by the hackers who stole it? As discussed above, such individuals have suffered an “injury.” Yet, under the Moorman doctrine, however serious that injury may be, it is insufficient because it is not a “physical injury.” Is this limitation justified, *39 given the ubiquity of the electronic marketplace and the magnitude of injuries caused by vast data breaches such as those alleged in this MDL? The Illinois Supreme Court has not had the opportunity to say.
Were the Illinois Supreme Court to consider the issues presented here, they might well agree with the conclusion reached by Judge Kocoras and the other courts that have reached the same result and find the claims barred by the economic loss rule. But the Illinois Supreme Court has shown itself to be both diligent and thoughtful in its examination of when the Moorman doctrinе forecloses suits in tort and decline to extend the doctrine to data breach cases. Ultimately, I do not decide the issue, because, for the reasons discussed below, I find that based on the current state of Illinois law Defendants did not owe a duty to Plaintiffs to protect their personal information, notwithstanding that the Illinois Supreme Court itself has not spoken to the issue.
ii. Duty to Protect Personal Information
Defendants argue that Illinois courts do not recognize a duty to safeguard personal
information, pointing to the Illinois Court of Appeals’ decision in
Cooney v. Chicago Public
Schools
,
The Court of Appeals affirmed the Circuit Court’s dismissal of the negligence claims, finding that the plaintiffs had not established that the Board of Education owed them a duty to *40 safeguard their personal information. First, the Court of Appeals found that neither the federal Health Insurance Portability and Accountability Act (“HIPAA”), 42 U.S.C. 1320d–6(a)(3), nor the Illinois Personal Information Protection Act (“IPIPA”), 815 ILCS 530/1 et seq. , created a legal duty to safeguard the plaintiffs’ information. Id. at 28. For HIPAA, the court found that an exception regarding employee records applied to its general prohibition against disclosing personal health information. Id. And the court held that the plain language if IPIPA only requires data collectors that maintain personal information to “notify the owner or licensee of the information of any breach of the security of the data immediately following discovery.” Id. (citing 815 ILCS 530/10(b)). The court rejected the plaintiffs’ argument that IPIPA must also encompass a duty to protect the information from inadvertent disclosure in the first place. The court explained, “Because the provisions in the Act are clear, we must assume it reflects legislative intent to limit defendants’ duty to providing notice.” Id.
The court also declined to find a common law duty to safeguard the information. Here the court stated:
Plaintiffs next contend that we should recognize a “new common law duty” to safeguard information. They claim a duty is justified by the sensitive nature of personal data such as dates of birth and social security numbers. Plaintiffs do not cite to an Illinois case that supports this argument. While we do not minimize the importance of protecting this information, we dо not believe that the creation of a new legal duty beyond legislative requirements already in place is part of our role on appellate review. As noted, the legislature has specifically addressed the issue and only required the Board to provide notice of the disclosure.
Id. at 28–29. In other words, the court declined to impose a common law duty to safeguard information beyond the notice requirements of IPIPA. Accordingly, the negligence claims were dismissed. at 29.
In
Community Bank of Trenton v. Schnuck Markets, Inc.
,
Plaintiffs argue that they are not asking for a “new duty,” but rather application of the
general duty analysis under Illinois law. Opp. at 18. Under that analysis, Illinois courts consider
“(1) the reasonable foreseeability of the injury, (2) the likelihood of the injury, (3) the magnitude
of the burden of guarding against the injury, and (4) the consequences of placing that burden on
the defendant.”
Bruns v. City of Centralia
,
These allegations do suggest that an Illinois court could find a duty here. However, they do not escape the conclusion that any such finding would establish a “new duty” regarding data security in Illinois that Cooney declined to establish. Without further authority, I cannot conclude that the Illinois Supreme Court would disagree with the analysis in Cooney . For that reason, Plaintiffs’ Illinois negligence claims are dismissed. In a future case, the Illinois Supreme Court may have the opportunity to consider this issue, along with the application of the economic loss rule to data breach cases. [12]
b. Florida Negligence Claims
Florida class representatives Lawrence, Bittner, Frakes, and Hevener allege claims of
negligence under Florida Law.
See
Compl. ¶¶ 34–36; 296–304; ECF No. 368. Defendants do not
dispute that Plaintiffs stated a claim for negligence under Florida law, except that Plaintiffs failed
to adequately allege damages, which is an essential element of a Florida negligence claim. Def.
Mot. at 31.
See Lucarelli Pizza & Deli v. Posen Const., Inc.
,
c. Georgia Negligence Per Se Claims
Georgia class representatives Long, Viggiano, and Miller allege claims of negligence per
se under Georgia law. Compl. ¶¶ 37–39; 305–11; ECF No. 368. “It is well-settled that Georgia
*43
law allows the adoption of a statute or regulation as a standard of conduct so that its violation
becomes negligence per se.”
Pulte Home v. Simerly
,
Under Georgia law, a negligence per se claim must contain an alleged “breach of a legal
duty with some ascertainable standard of conduct.”
Wells Fargo Bank, N.A. v. Jenkins
, 744 S.E.2d
686, 688 (Ga. 2013). To evaluate a negligence per se claim, courts must “examine the purposes
of the legislation and decide (1) whether the injured person falls within the class of persons it was
intended to protect and (2) whether the harm complained of was the harm it was intended to guard
against.”
Potts v. Fid. Fruit & Produce Co.
,
Several federal district courts have found that plaintiffs have adequately pled claims of
Georgia negligence per se based on alleged violations of Section 5 of the FTC act in data breach
cases.
See In re Equifax, Inc., Customer Data Security Breach Litig.
,
For example, in
Home Depot
, which involved the theft of personal аnd financial
information of 56 million Home Depot customers, the court found that “the Consolidated Class
Action Complaint here adequately pleads a violation of Section 5 of the FTC Act, that the Plaintiffs
are within the class of persons intended to be protected by the statute, and that the harm suffered
is the kind the statute meant to protect.”
In re: The Home Depot, Inc., Customer Data Sec. Breach
Litig.
,
Defendants acknowledge these cases but argue that two recent Georgia Supreme Court
cases suggest that the Georgia Supreme Court would find that Section 5 of the FTC Act does not
create an ascertainable standard of conduct. Def. Mot. at 19–20. First, in
Wells Fargo Bank, N.A.
v. Jenkins
, the plaintiff brought a negligence claim against Wachovia and related banks for
allegedly giving her personal information to her husband and allowing her husband to steal her
identity.
It is the policy of the Congress that each financial institution has an affirmative and
continuing obligation to respect the privacy of its customers and to protect the
security and confidentiality of those customers’ nonpublic personal information.
*45
Wells Fargo Bank, N.A. v. Jenkins
,
Certainly, 15 U.S.C. § 6801(a) of the GLBA expresses the goal that financial institutions respect the privacy, security, and confidentiality of customers. While this is a clear Congressional policy statement, it is just that. It does not provide for certain duties or the performance of or refraining from any specific acts on the part of financial institutions, nor does it articulate or imply a standard of conduct or care, ordinary or otherwise. . . . Indeed, subsection (b) of 15 U.S.C. § 6801 confirms that subsection (a) is not intended to provide a standard of conduct or care by financial institutions as it expressly authorizes federal agencies “[i]n furtherance of the policy in subsection (a) [of § 6801]” to: establish appropriate standards for the financial institutions . . . .”
Wells Fargo Bank, N.A. v. Jenkins
,
Second, in
Dep’t of Labor v. McConnell
, the Georgia Supreme Court affirmed the dismissal
of negligence per se claims brought under two Georgia statutes.
The General Assembly finds and declares as follows:
(1) The privacy and financial security of individuals is increasingly at risk due to the ever more widespread collection of personal information by both the private and public sectors;
(2) Credit card transactions, magazine subscriptions, real estate records, automobile registrations, consumer surveys, warranty registrations, credit reports, and Internet *46 websites are all sources of personal information and form the source material for identity thieves;
(3) Identity theft is one of the fastest growing crimes committed in this state. Criminals who steal personal information such as social security numbers use the information to open credit card accounts, write bad checks, buy cars, purchase property, and commit other financial crimes with other people’s identities; (4) Implementation of technology security plans and security software as part of an information security policy may provide protection to consumers and the general public from identity thieves;
(5) Information brokers should clearly define the standards for authorized users of its data so that a breach by an unauthorized user is easily identifiable; (6) Identity theft is costly to the marketplace and to consumers; and (7) Victims of identity theft must act quickly to minimize the damage; therefore, expeditious notification of unauthorized acquisition and possible misuse of a person’s personal information is imperative.
Ga. Code Ann. § 10-1-910. The Georgia Supreme Court held that this statute did not form a basis
for plaintiff’s negligence claim, because it “does not explicitly establish any duty, nor does it
prohibit or require any conduct at all. Rather, the statute recites a series of legislative findings
about the vulnerability of personal information and the risk of identity theft.”
Dep’t of Labor v.
McConnell
,
The other statute cited in McConnell as a basis for a duty, OCGA § 10-1-393.8, states in relevant part:
(a) Except as otherwise provided in this Code section, a person, firm, or corporation shall not:
(1) Publicly post or publicly display in any manner an individual’s social security number. As used in this Code section, “publicly post” or “publicly display” means to intentionally communicate or otherwise make available to the general public; (2) Require an individual to transmit his or her social security number over the Internet, unless the connection is secure or the soсial security number is encrypted; or
(3) Require an individual to use his or her social security number to access an Internet website, unless a password or unique personal identification number or other authentication device is also required to access the Internet website.
Ga. Code Ann. § 10-1-393.8. The Georgia Supreme Court rejected this as a basis for a negligence claim as well, holding that even if this section did create an enforceable duty, the text of the statute only applies to intentional disclosures of information, and the plaintiff only alleged negligent disclosure. [13]
Defendant argues that the reasoning of these cases indicates that the Georgia Supreme Court would decline to find Section 5 of the FTC Act creates an enforceable duty. But unlike the statement of policy in Wells Fargo Bank and the legislative findings in McConnell , Section 5 of the FTC Act is a statute that creates enforceable duties. Moreover, this duty is ascertainable as it relates to data breach cases based on the text of the statute and a body of precedent interpreting the statute and applying it to the data beach context.
For example, in F.T.C. v. Wyndham Worldwide Corp. , the Third Circuit affirmed the FTC’s enforcement of Section 5 of the FTC Act in data breach cases, which it had been doing since 2005. 799 F.3d 236, 240 (3d Cir. 2015) (“The Federal Trade Commission Act prohibits ‘unfair or deceptive acts or practices in or affecting commerce.’ 15 U.S.C. § 45(a). In 2005 the Federal Trade Commission began bringing administrative actions under this provision against companies with *48 allegedly deficient cybersecurity that failed to protect consumer data against hackers.”) In that case, Wyndham Worldwide, a hotel and hospitality company, was the subject of multiple cyberattacks that compromised the personal information of hundreds of thousands of its customers. Id. The FTC brought an administrative action against Wyndham for inadequate cybersecurity practices. Wyndham challenged the authority for the FTC to do so, but the FTC’s enforcement action was affirmed by both a New Jersey District Court and the Third Circuit. Id. at 259.
The Third Circuit first found that the allegations regarding Wyndham’s cybersecurity
practices, including that it had an allegedly misleading privacy policy that overstated its
cybersecurity, fell within the plain meaning of “unfair” practices in the text of Section 5 of the
FTC Act.
Id.
at 246–47. Further, the court held that Wyndham had fair notice that its conduct
could fall within the meaning of the statute based on a “cost-benefit analysis that considers a
number of relevant factors, including the probability and expected size of reasonably unavoidable
harms to consumers given a certain level of cybersecurity and the costs to consumers that would
arise from investment in stronger cybersecurity.”
Id.
at 255 (internal citations omitted).
Considering the alleged deficiency of Wyndham’s cybersecurity practices, the court found that
they had fair notice that their conduct could violate the FTC Act. This conclusion was reinforced
by an FTC guidebook published in 2007 titled,
Protecting Personal Information: A Guide for
Business
, that provides recommendations on cybersecurity practices, and FTC complaints and
consent decrees in administrative cases raising unfairness claims based on inadequate
cybersecurity practices, all of which provided additional notice to Wyndham regarding their duties
and a potential enforcement action. at 255–57.
[14]
S
ee also In re TJX Companies Retail Sec.
*49
Breach Litig.
,
Therefore, based on the Georgia appellate court decisions finding negligence per se based on rules interpreting Section 5 of the FTC Act, and the aforementioned federal district court decisions finding negligence per se based on the Section 5 FTC Act in data breach cases, I am persuaded that Plaintiffs have adequately pled negligence per se under Georgia law. Defendants’ motion to dismiss these claims is denied.
III. Contract Claims
Bellwether Plaintiffs allege breach of express contract under the laws of New York and Maryland, and breach of implied contract based on Oregon law. Defendants move to dismiss each claim. For the reasons discussed below, Defendants’ motion to dismiss the contract claims is denied.
a. New York and Maryland Express Contract Claims New York class representatives Cullen, Fishon, and O’Brien, and Maryland Class Representatives Maldini and Ryans allege breach of express contract claims. Compl. ¶¶ 52– 53, 70–72, 312–28; ECF No. 368. These claims are based on alleged contracts formed by Marriott and Starwood’s privacy statements that were in effect at the time of the breach.
Both Maryland and New York apply the objective standard for the formation of contracts,
which looks to objective manifestations of intent.
See Address v. Millstone
,
Plaintiffs allege that Marriott’s privacy statement dated May 18, 2018 provides that individuals are subject to its terms and conditions when they do the following: “(1) log onto Marriott’s website; (2) use Marriott’s software applications; (3) access Marriott’s social media pages; (4) receive e-mail communications from Marriott that link to the Privacy Statement; and (5) ‘when you visit or stay as a guest at one of [Marriott’s] properties, оr through other offline interactions.’” Compl. ¶ 314. Further, Plaintiffs allege that Marriott’s Privacy Statement provides that: “Collectively, we refer to the Websites, the Apps and our Social Media Pages, as the ‘Online Services’ and, together with offline channels, the ‘Services.’ By using the Services, you agree to the terms and conditions of this Privacy Statement . ” Id. (emphasis in Compl.). Regarding the terms of the Privacy Statement, Plaintiffs allege that the Marriott Privacy Statement provides that Marriott would use “reasonable organizational, technical and administrative measures to protect [its customers’] Personal Data.” at ¶ 317.
Likewise, Plaintiffs allege that Starwood’s privacy statement dated October 14, 2014 provides that individuals are subject to its terms and conditions when they do the following: “(1) make reservations or submit information requests to Starwood; (2) purchase products or services from Starwood; (3) register for Starwood program membership; and (4) respond to communications from Starwood.” Compl. ¶ 319. As to the terms, Plaintiff alleges that the Starwood Privacy Statement provides the following:
Starwood recognizes the importance of information security, and is constantly reviewing and enhancing our technical, physical, and logical security rules and procedures. All Starwood owned web sites and servers have security measures in place to help protect your PII against accidental, loss, misuse, unlawful or unauthorized access, disclosure, or alteration while under our control. . . .
[Starwood] safeguard[s] your information using appropriate administrative, procedural and technical safeguards, including password controls, ‘firewalls’ and the use of up to 256-bit encryption based on a Class 3 Digital Certificate issued by VeriSign, Inc. This allows for the use of Secure Sockets Layer (SSL), an encryption method used to help protect your data from interception and hacking while in transit. . . .
By becoming a member of the SPG Program (an ‘SPG Member’) and receiving and redeeming benefits of the SPG Program including, without limitation, Starpoints®, each SPG Member agrees that he/she has . . . provided consent for Starwood, the SPG Participating Hotels and their authorized third party agents to process data that is personal to him/her, and to disclose such data to third parties, in accordance with Starwood’s Privacy Statement.
Compl. ¶¶ 320–22. All Bellwether Plaintiffs alleged that they provided their personal information to stay at a Marriott property before the data breach, and Plaintiff Cullen alleges that he had an SPG payment card. Compl. ¶¶ 25–28, 34–39, 42–43, 52–53, 55–56, 70–72, 77. Plaintiffs argue that these allegations sufficiently establish the formation of a contract for data security.
Defendants argue that these pleadings fail to allege formation of a contract because Plaintiffs do not specifically allege that they read, saw, or understood the Privacy Statements. To support its position, Defendants point to several cases that found company privacy statements did not give rise to an enforceable contract. For example, in Dyer v. Nw. Airlines Corps. , 334 F. Supp. 2d 1196, 1199–1200 (D.N.D. 2004), the court concluded:
Having carefully reviewed the complaint, the Court finds the Plaintiffs’ breach of contract claim fails as a matter of law. First, broad statements of company policy do not generally give rise to contract claims. See Pratt v. Heartview Foundation , 512 N.W.2d 675, 677 (N.D. 1994); accord Martens v. Minnesota Mining and Manu. Co. ,616 N.W.2d 732 , 740 (Minn. 2000). As such, the alleged violation of the privacy policy at issue does not give rise to a contract claim. Second, nowhere in the complaint are the Plaintiffs alleged to have ever logged onto Northwest Airlines’ website and accessed, read, understood, actually relied upon, or otherwise considered Northwest Airlines’ privacy policy.
See also Gardner v. Health Net, Inc
., 2010 WL 11597979, at *6 (C.D. Cal. Aug. 12, 2010)
(“Plaintiffs have failed to allege that they ever submitted any information over Defendant’s
*52
website, accessed or read the Privacy Policy, or relied on the Privacy Policy. As noted by the court
in
Dyer
, such allegations are insufficient because ‘broad statements of policy do not generally give
rise to contract claims.’
Here we must look to the parties’ objective manifestations of intent. Marriott and Starwood’s Privacy Statements, which by their own terms apply to guests that stay at Marriott and Starwood properties or enroll in the SPG Program, constitute objective offers to protect the personal information that it collects under the terms of the privacy statements. Plaintiffs’ allegations that they assented to these offers by staying at Marriott and Starwood properties, enrolling in the SPG Program, and providing their personal information to Marriott and Starwood constitute objective manifestations of acceptance of Defendants’ offers. Indeed, this is all that the privacy statements themselves require in order to be binding on consumers. Thus plaintiffs have adequately alleged formation of a contract.
Defendants also argue that the Complaint does not include dates for when each plaintiff stayed at a Marriott hotel, or which Marriott entity they stayed with, and therefore the Plaintiffs did not sufficiently plead that they were party to a contract. These are matters for discovery. All plaintiffs have alleged that they stayed at a Marriott property before the data breach, that they gave *53 their personal information as a manifestation of intent to accept the terms of the privacy statements, and that the privacy statements were in effect during this time. That is enough to state a claim.
Finally, Defendants argue that the contract terms are not sufficiently definite to make out a contract for data security. I disagree. The Marriott Privacy Statement provides that it will use “reasonable organizational, technical and administrative measures to protect [its customers’] Personal Data.” Compl. ¶ 317. And the Starwood Privacy Statement says that it will “safeguard your information using appropriate administrative, procedural and technical safeguards,” and provides detailed examples of the methods it will use. Compl. ¶ 320–22. While the parties may dispute the contours of these duties and whether they were breached after discovery, at this stage Plaintiffs have plausibly alleged the terms of the contract regarding data security.
Therefore, for the reasons stated above, Plaintiffs have plausibly stated claims for breach of contract under New York and Maryland law. Defendants’ motion to dismiss these claims is denied.
b. Oregon Implied Contract Claim
Oregon class representative Ropp alleges breach of implied contract. Compl. ¶ 77,
329–36; ECF No. 368. Under Oregon law, in “an implied-in-fact contract, the parties’ agreement
is inferred, in whole or in part, from their conduct.”
Larisa’s Home Care, LLC v. Nichols-Shields
,
404 P.3d 912, 919 n.5 (Or. 2017) (
citing Restatement (Second) of Contracts
§ 4 comment a
(1979)). “[A] contract implied in fact can arise ‘where the natural and just interpretation of the
acts of the parties warrants such conclusion.’” (
quoting Owen v. Bradley
,
When an agreement consists of words, written or spoken, stating in terms the understanding and obligations of the parties, it is called an ‘express contract’; but when it is inferred from the acts or conduct of the parties, instead of their words, it is an ‘implied contract.’ But in either instance it exists as an obligation solely because the contracting party has willed, under circumstances to which the law attaches the sanction of an obligation, that he shall be bound. And the distinction between an express and implied contract lies, not in the nature of the undertaking, but solely in the mode of proof. In either case there must be an offer of terms, or its equivalent, on the one side, and the acceptance of such terms, or its equivalent, on the other. When this intention is expressed, we call the contract an express one. When it is not expressed, it may be inferred, implied, or presumed, from circumstances as really existing, and then the contract, thus ascertained, is called an implied one.
Id.
(quoting
Rose v. Wollenberg
,
For example, in
Otterness v. City of Waldport
, a case cited by Defendants, the Oregon
Court of Appeals rejected an implied contract claim where plaintiffs alleged that they applied and
paid the fee for a building, and that as a consequence the city building department had implied
duties to inspect and certify the building under the laws of Oregon.
The parties do not cite, and I have not found, any Oregon cases analyzing implied contract
claims in a data breach case. Instead, Defendants point to data breach cases in which the courts
have dismissed implied contract claims based on Washington law.
See Krottner v. Starbucks
Corp.
,
Applying the principles of implied contract under Oregon law outlined above, Plaintiff
Ropp has sufficiently alleged breach of implied contract. Ropp makes the same allegations as the
New York and Maryland plaintiffs regarding Marriott and Starwood’s privacy statements. And
Ropp alleges that he “provided his Personal Information to Marriott in order to stay at a Marriott
Property prior to the Data Breach [and] . . . also provided his passport information in order to stay
at a Marriott Property.” Compl. ¶ 77. These alleged actions plausibly state a way for Ropp to
manifest his assent to the privacy statements. After discоvery, the parties may dispute whether
Ropp or other plaintiffs’ alleged contract claims are properly considered express or implied
contracts, but at this stage both have been sufficiently pled.
See Mindful Insights, LLC v.
VerifyValid, LLC
,
IV. Statutory Claims
Bellwether Plaintiffs allege breach of statutory duties under the laws of Maryland, Michigan, California and New York. Defendants move to dismiss each claim. For the reasons discussed below, Defendants’ motion to dismiss the statutory claims is denied.
a. Maryland Personal Information Privacy Act Claims Maryland Class Representatives Maldini and Ryans allege violations of the Maryland Personal Information Privacy Act (“PIPA”), Md. Comm. Code §§ 14-3501, et seq . See Compl. ¶¶ 52–53,355–68; ECF No. 368. [15] In relevant part, PIPA states:
To protect Personal Information from unauthorized access, use, modification, or disclosure, a business that owns or licenses Personal Information of an individual residing in the State shall implement and maintain reasonable security procedures and practices that are appropriate to the nature of Personal Information owned or licensed and the nature and size of the business and its operations.
Md. Comm. Code § 14-3503(a). Thus, the plain language of PIPA requires businesses to implement and maintain “reasonable security practices and procedures” based on the personal information they collect. “Personal Information” is defined to include “[a]n individual’s first name or first initial and last name in combination with any one or more of the following data elements, when the name or the data elements are not encrypted, redacted, or otherwise protected by another *57 method that renders the information unreadable or unusable: . . . a passport number . . . [a]n account number, a credit card number, or a debit card number, in combination with any required security code, access code, or password, that permits access to an individual’s financial account.” Md. Comm. Code § 14-3503(e)(1). Further, PIPA requires a business that has discovered or has been notified of a security breach to conduct a prompt investigation to determine if Personal Information has or will be misused. Md. Comm. Code § 14-3504(b)(1). If so, “the business shall notify the individual of the breach” and that notification “shall be given as soon as reasonably practical after the business discovers or is notified of the breach of a security system.” Md. Comm. Code §§ 14- 3504(b)(2), 14-3504(c)(2).
Here Plaintiffs allege that Marriott did not maintain reasonable security measures appropriate to the nature of their Personal Information as required by PIPA. Compl. ¶ 360. Plaintiffs support this allegation with a detailed summary of the breach and alleged failings to secure personal information. See, e.g. , Compl. ¶ 227 (“A company with proper information security would not have allowed outsiders to have access to such a massive variety of information systems over four years even if they somehow managed to access internal systems for a brief period of time.”) Plaintiffs also allege that Marriott did not provide timely notice of its data breach as required by PIPA. Compl. ¶ 365. In this regard, Plaintiffs allege that Marriott waited more than two months to inform guests after it received notice of the breach. Compl. ¶¶ 178, 187, 194.
Defendants argue that Plaintiffs Maldini and Ryans failed to state a claim under PIPA because the statute covers only unencrypted payment card numbers when they are accompanied *58 by access or security codes, and that Plaintiffs did not allege that any such codes or passwords were implicated in the cyberattack. [16] Def. Mot. 28.
Plaintiffs respond that this does not defeat their claims because they do not allege that any codes were “required” to allow fraudulent use of their personal information. Plaintiffs point to the fraudulent charges of some plaintiffs, which Defendants do not dispute at this stage, as evidence of this. Further, Plaintiffs argue that although Marriott has not publicly disclosed that security codes were compromised, the full scope of the data breach is not yet known. In this regard, Plaintiffs specifically allege that hackers likely had access to “full payment card information with encryption keys,” a possibility that experts could not rule out after Marriott’s investigation. Compl. ¶ 208; see also id. ¶ 2 (“The stolen information includes . . . tools needed to decrypt cardholder data. . . . Marriott has been unable to definitively determine how much data was stolen . . .”) and ¶¶ 189–190, 197, 234. And in at least one initial report, Starwood indicated that security codes were compromised. Compl. ¶ 146 (“In a letter to Starwood customers, Starwood stated that the ‘malware was designed to collect certain payment card information, including cardholder name, payment card number, security code and expiration date’”).
Plaintiffs have sufficiently alleged PIPA violations for two independent reasons. First, Plaintiffs have plausibly alleged that Marriott failed to employ reasonable security measures to protect the Personal Information it collected. Plaintiffs provide numerous allegations to support this claim. Here I do not need to resolve whether security codes must be compromised as a matter *59 of law to state a PIPA claim, because Plaintiffs allege that such codes likely were comрromised in the data breach and I must grant all inferences in favor of Plaintiffs. Therefore Plaintiffs have adequately alleged a PIPA claim.
Second, Plaintiffs have plausibly alleged that Marriott’s failure to disclose the data breach for more than two months was a violation of PIPA’s requirement to provide timely notice to consumers affected by a data breach. Further discovery may establish that Marriott did act reasonably promptly, or that it did not. Either way, Plaintiffs have stated enough facts to allow the claim to go forward.
b. Maryland Consumer Protection Act Claims Maryland class representatives Maldini and Ryans also allege violations of the Maryland Consumer Protection Act (“CPA”), Md. Comm. Code §§ 13-301, et seq . See Compl. ¶¶ 52–53, 369–82; ECF No. 368. The CPA prohibits “unfair or deceptive trade practices” which include:
False, falsely disparaging, or misleading oral or written statement, visual description, or other representation of any kind which has the capacity, tendency, or effect of deceiving or misleading consumers; . . .
Representation that: Consumer goods, consumer realty, or consumer services have a sponsorship, approval, accessory, characteristic, ingredient, use, benefit, or quantity which they do not have; . . .
Failure to state a material fact if the failure deceives or tends to deceive; . . . Advertisement or offer of consumer goods, consumer realty, or consumer services . . . [w]ithout intent to sell, lease, or rent them as advertised or offered; . . . Deception, fraud, false pretense, false premise, misrepresentation, or knowing concealment, suppression, or omission of any material fact with the intent that a consumer rely on the same in connection with: [t]he promotion or sale of any consumer goods . . . or consumer service; . . . [or] [t]he subsequent performance of a merchant with respect to an agreement of sale, lease, or rental; . . .
Md. Comm. Code § 13-301. In addition, a violation of the Maryland PIPA constitutes a violation of the Maryland CPA. Md. Comm. Code § 14-3508 (“A violation of [subtitle 35: Maryland *60 Personal Information Protection Act]: (1) Is an unfair or deceptive trade practice within the meaning of Title 13 of this article; and (2) Is subject to the enforcement and penalty provisions contained in Title 13 of this article.”)
Plaintiffs allege that Marriott engaged in unfair and deceptive trade practices based on its material representations and omissions regarding its data security. Compl. ¶ 376. In addition, Plaintiff’s incorporate their arguments regarding the alleged violation of PIPA as a basis for a violation under the CPA. Id.
Defendants argue that Plaintiffs’ CPA claims fail because they do not allege that they were aware of any representation from Marriott or Starwood about data security. Def. Mot. at 27. In additiоn, Defendants argue that a CPA claim is subject to the heightened pleading requirement of Federal Rule of Civil Procedure 9(b) because it sounds in fraud, and that Plaintiffs have failed to allege their claims with sufficient particularity. Id. Finally, Defendants incorporate their arguments discussed above regarding the PIPA claims. at 28.
Plaintiffs have sufficiently alleged a violation of the Maryland CPA for two independent reasons. First, as discussed above, Plaintiffs have adequately pled a violation of the Maryland PIPA. Because this constitutes an “unfair or deceptive trade practice” for purposes of Title 13 of the Maryland Commercial Law Code, it provides a sufficient basis for Plaintiffs’ CPA claims.
Second, Plaintiffs have met the requirements of Rule 9(b), including with regard to their
allegations of reliance on material omissions by Defendants. Rule 9(b) requires the Plaintiffs to
allege “the time, place, and contents of the false representations, as well as the identity of the
person making the misrepresentation and what he obtained thereby.”
Harrison v. Westinghouse
Savannah River Co.
,
Here the Complaint contains extensive allegations that Marriott knew or should have
known about its allegedly inadequate data security practices and the risk of a data breach.
See,
e.g.
, Compl. ¶¶ 115–28 (reviewing Marriott’s alleged “lack of cybersecurity due diligence”); ¶ 139
(alleging Marriott and Starwood knew they were prime targets for hackers and had been the target
of cyberattacks); ¶¶ 256–60 (alleging failure to follow FTC guidelines to reduce risk of
cyberattack). Plaintiffs also allege that these omissions would have been important to a significant
number of consumers, that Plaintiffs relied on the omissions, and that Plaintiffs “would not have
paid Marriott for goods and services or would have paid less for such goods and services” if it had
known the truth about Marriott’s alleged omissions. Compl. ¶¶ 377, 379, 381. These allegations
establish that “it is substantially likely that the consumer would not have made the choice in
question had the commercial entity disclosed the omitted information.”
Willis v. Bank of Am.
Corp.
,
Thus Plaintiffs have adequately alleged violations of the Maryland CPA. Defendants’ motion to dismiss these claims is denied.
c. Michigan Identity Theft Protection Act Claims Michigan class representatives Wallace and Gononian allege claims under the Michigan Identity Theft Protection Act (“ITPA”), Mich. Comp. Laws §§ 445, et seq. See Compl. ¶¶ 55–56, 778–85; ECF No. 368. The ITPA requires businesses to provide notice of a security breach “without unreasonable delay” to a Michigan resident if that resident’s unencrypted and unredacted “personal information” was accessed by an unauthorized person. Mich. Comp. Laws § 445.72(1). “Personal information” is defined as a person’s “first name or first initial and last name” linked to one or more data elements including a “credit or debit card number, in combination with any required security code, access code, or password that would permit access to any of the resident’s financial accounts.” at § 445.63(r). The ITPA notice provision applies when the business discovers a security breach or receives notice of a security breach, unless the breach is not likely to cause harm. Id. at § 445.72(1).
Plaintiffs claim that Defendants failed to disclose the cyberattack in a timely and accurate fashion. Compl. ¶ 783. As described above, Plaintiffs allege that Defendants waited more than two months after they had notice of the breach to disclose it to guests. Compl. ¶¶ 178, 187, 194. Defendants argue that this claim should be dismissed for the same reason as the Maryland PIPA claim, specifically that the statute only applies to payment card numbers combined with security codes, and that Plaintiffs do not allege security codes were taken. Def. Mot. at 28.
For the reasons discussed above regarding the Maryland PIPA claim, Defendants’ argument is unavailing. Plaintiffs do not allege that any information was required to access their financial accounts, and indeed Defendants do not dispute that some Plaintiffs allege fraudulent charges. Moreover, Plaintiffs have alleged that security codes were likely obtained by hackers and that Marriott does not yet know the full extent of the data breach. These allegations are sufficient to state a claim under the ITPA. The full scope of the data breach is a matter for discovery. Thus, Defendants’ motion to dismiss the Michigan ITPA claims is denied.
d. California Unfair Competition Law Claims California class representatives Guzikowski, Marks, Sempre, and Maisto allege claims under the California Unfair Competition Law (“UCL”), Cal. Bus. & Prof. Code §§ 17200, et seq. Compl. ¶¶ 25–28; 450–59; ECF No. 368. The California UCL prohibits unfair competition including “any unlawful, unfair or fraudulent business act or practice and unfair, deceptive, untrue or misleading advertising.” Cal. Bus. & Prof. Code § 17200.
Plaintiffs allege that Marriott violated the UCL by failing to implement and maintain reasonable security measurеs to protect their personal information, failing to comply with common law and statutory duties regarding data protection including California’s Consumer Records Act, Cal. Civ. Code §§ 1798.81.5 (requiring reasonable data security measures) and 1798.82 (requiring timely breach notification), California’s Consumers Legal Remedies Act, Cal. Civ. Code §§ 1780, et seq. , the FTC Act, 15 U.S.C. § 45, and California common law, misrepresenting that it would comply with these statutory obligations and protect the privacy and confidentiality of Plaintiffs’ personal information, and concealing the material fact that it did not reasonably secure Plaintiffs’ personal information or comply with statutory duties. Compl. ¶ 455.
Defendants move to dismiss these claims, arguing that they have not been pled with particularity as required by Rule 9(b) and that Plaintiffs lack standing under the statutory requirements of the UCL. Defendants’ motion to dismiss these claims is denied.
First, for the same reasons discussed above regarding the Maryland CPA claim, Plaintiffs have met the Rule 9(b) pleading requirements for their California UCL claim. In short, the Complaint contains extensive allegations that Marriott knew or should have known about its allegedly inadequate data security practices and the risk of a data breach and that its alleged failures and omissions were material and relied upon by consumers. See, e.g. , Compl. ¶¶ 115–28, 256–60, 377, 379, 381.
Second, Plaintiffs have sufficiently alleged UCL standing. Standing to state a claim under
the UCL is limited to “any ‘person who has suffered injury in fact and has lost money or property’
as a result of unfair competition.”
Kwikset Corp. v. Superior Court
,
A plaintiff may (1) surrender in a transaction more, or acquire in a transaction less, than he or she otherwise would have; (2) have a present or future property interest diminished; (3) be deprived of money or property to which he or she has a cognizable claim; or (4) be required to enter into a transaction, costing money or property, that would otherwise have been unnecessary.
Kwikset Corp
,
Defendants point to several data breach cases in which courts have dismissed UCL claims.
For example, in
Dugas v. Starwood Hotels & Resorts Worldwide, Inc.
, a case arising out of the
Starwood data breach, the plaintiff alleged that unauthorized charges were made on his credit card,
that he would incur damages to monitor identity theft, and that he spent time responding to
*65
unauthorized charges on his credit card. No. 316CV00014GPCBLM,
But other courts have reached the exact opposite conclusion and denied motions to dismiss
UCL claims in data breach cases. For example, in
In re Anthem, Inc. Data Breach Litigation
,
Judge Koh found that the plaintiffs’ allegations that they lost the benefit of their bargain was
sufficient to satisfy the economic injury requirement for standing under the UCL, explaining that
this type of loss “mirrors the California Supreme Court’s determination in
Kwikset
that a plaintiff
who has ‘surrender[ed] in a transaction more, or acquire[d] in a transaction less, than he or she
otherwise would have’ may bring a UCL claim.” 162 F. Supp. 3d 953, 985 (N.D. Cal. 2016)
(quoting
Kwikset
,
Here, like the plaintiffs in
Anthem, Adobe
, and
LinkedIn
, Plaintiffs have sufficiently alleged
benefit-of-the-bargain losses.
See
Section I.a.iv above. In short, Plaintiffs allege that “had
consumers known the truth about Defendants’ data security practices—that they did not adequately
protect and store their data—they would not have stayed at a Marriott Property, purchased products
or services at a Marriott Property, and/or would have paid less.” Compl. ¶ 275. This is sufficient
to establish standing for the UCL claim.
See Kwikset
, 246 P.3d at 885–86 (economic injury
established where plaintiff “surrender[s] in a transaction more, or acquire[s] in a transaction less,
than he or she otherwise would have”). Moreover, Plaintiffs Guzikowski and Sempre claim they
spent money purchasing credit-monitoring and identity-theft services to mitigate the damages from
the breach. Compl. ¶¶ 25, 27. Unlike in
Dugas
,
Gardner
, and
Ruiz
, the pleadings do not indicate
that these expenses have been reimbursed. Therefore these payments also constitute economic
injury.
See Kwikset
,
Accordingly, Defendants’ motion to dismiss the California UCL claims is denied.
e. New York General Business Law Claims
New York class representatives Cullen, Fishon, and O’Brien allege claims under the New
York General Business Law (“GBL”), N.Y. Gen. Bus. §§ 349,
et seq
. Compl. ¶ 70–72, 934–
42; ECF No. 368. Section 349(a) of the GBL prohibits “[d]eceptive acts or practices in the conduct
of any business, trade or commerce or in the furnishing of any service.” N.Y. Gen. Bus. § 349(a).
To state a § 349 GBL claim, plaintiff must allege (1) that defendant’s “act or practice was
consumer-oriented,” (2) that the act or practice “was misleading in a material way,” and (3) that
plaintiff “suffered injury as a result of the deceptive act.”
Stutman v. Chem. Bank
, 731 N.E.2d
608, 611 (N.Y. 2000). “[T]o qualify as a prohibited act under the statute, the deception of a
consumer must occur in New York.”
Goshen v. Mut. Life Ins. Co. of New York
,
Each of the New York class representatives alleges that he or she “is a resident of New York and provided [his or her] Personal Information to Marriott in order to stay at a Marriott Property prior to the Data Breach.” Compl. ¶¶ 70–72. The New York class representatives and members of the New York Subclass also allege that they “were deceived in New York” and “transacted with Marriott in New York by making hotel reservations from New York and/or staying in Marriott properties based in New York.” Compl. ¶ 936. Plaintiffs allege that Marriott’s deceptive acts or practices include failing to implement and maintain reasonable security and privacy measures, failing to identify and remediate foreseeable privacy risks, failing to comply with statutory duties regarding the security and privacy of Plaintiffs’ personal information, including duties imposed by the FTC Act, 15 U.S.C. § 45, misrepresenting that it would protect the Plaintiffs’ personal information, and concealing its failure to take reasonable measures or comply with statutory and common law duties to do so. Compl. ¶ 935. Plaintiffs claim that these *68 acts affected the public interest and consumers at large, and the New York class representatives and New York class members suffered damages as a result of Marriott’s alleged practices. Compl. ¶ 939–40.
Defendants move to dismiss these claims, arguing that Plaintiffs failed to allege that the deception occurred in New York, failed to plead their claims with sufficiently particularity to meet the requirements of Rule 9(b), and failed to state their GBL claims based on duties under the FTC Act because it does not provide an ascertainable standard of conduct. These arguments fail.
First, Plaintiffs adequately allege that the deception occurred in New York. Plaintiffs allege that they made Marriott reservations in New York and/or stayed at Marriott properties in New York. Compl. ¶ 936. New York can constitute the place of deception in either scenario, because in both situations Defendants would provide personal information to Marriott and I must grant all inferences in favor of the Plaintiffs. Therefore the Plaintiffs have plausibly alleged the deception occurred in New York.
Second, Plaintiffs’ allegations meet the pleading requirements of Rule 9(b). To begin with,
the parties dispute whether Rule 9(b)’s pleading requirements apply to the GBL claims. Several
federal courts have held that Rule 9(b)’s pleading requirements do not apply to GBL claims.
See,
e.g.
,
Pelman ex rel. Pelman v. McDonald’s Corp
,
Finally, as to Plaintiffs’ GBL claims premised on a violation of duties under Section 5 of
the FTC Act., for the reasons discussed above in Section II.c regarding the Georgia negligence per
claims, Section 5 of the FTC Act provides an ascertainable duty regarding data protection.
Moreover, New York courts specifically interpret § 349 “by looking to the definition of deceptive
acts and practices under [S]ection 5 of the Federal Trade Commission Act.”
New York v. Feldman
,
Therefore, Defendants’ motion to dismiss the New York GBL claims is denied. V. Damages
As a final pitch to dismiss all of the Plaintiffs’ claims, Defendants argue that Plaintiffs have failed to plead damages. Defendants argue that actual loss is required to plead the negligence and contract claims, and that actual injury is required to plead the statutory claims. Def. Mot. 30–31. But Plaintiffs have pled damages under each of their causes of action. Compl. ¶ 304 (negligence damages), ¶ 311 (negligence per se damages), ¶ 328 (contract damages), ¶ 366 (Maryland PIPA damages), ¶ 381 (Maryland CPA damages), ¶ 457 (California UCL damages), ¶ 784 (Michigan ITPA damages), ¶ 939 (New York GBL damages); see also Compl. ¶ 270 *70 (summarizing harms and alleging, “[a]s the result of the wide variety of injuries that can be traced to the Data Breach, Plaintiffs and class members have and will continue to suffer economic loss and other actual harm for which they are entitled to damages . . .”). These damages include loss of the benefit-of-the bargain, loss of time and money spent mitigating harms, and loss of value of personal information. Id. In addition, some of the Plaintiffs allege losses from identify theft in the form of unauthorized charges and accounts. See, e.g. , Compl. ¶¶ 36, 77.
Defendants argue that no Plaintiffs attempt to рlace a value on the alleged overpayment, loss of benefit-of-the bargain, or loss of value of personal information. Def. Mot. at 31–32. But as explained above, Plaintiffs do not need to assign a value at this stage to adequately plead damages. Defendants also argue that the time and money spent mitigating harms do not qualify as damages because this harm is speculative. This is simply a rehash of Defendants’ arguments regarding injury-in-fact. Because I find that the harms here are not speculative, the losses incurred to mitigate the harms are adequately pled damages in addition to being an injury-in-fact. Finally, regarding the fraudulent charges alleged by Plaintiffs Cullen, Golin, and O’Brien, Defendants argue that these plaintiffs do not allege that they were not reimbursed. at 32. But that turns the pleading requirement on its head. The pleadings do not indicate that plaintiffs were reimbursed. And at this stage I am required to grant all inferences in favor of Plaintiffs. Therefore, Plaintiffs have adequately alleged actual injury and actual loss to state their contract, negligence, and statutory claims, and Defendants’ motion to dismiss on this basis is denied.
Conclusion
In sum, Marriott’s motion to dismiss is granted in part and denied in part. Plaintiffs have standing to bring their claims. They have adequately alleged injury-in-fact in the form of losses from identity theft, imminent threat of identity theft, costs spent mitigating the harms from the data *71 breach, loss of the benefit-of-their-bargain, and loss of value of their personal information. These injuries are fairly traceable to Defendants’ conduct. Plaintiffs have also adequately alleged their respective tort, contract, and statutory claims under the laws of California, Florida, Georgia, Maryland, Michigan, New York, and Oregon. These claims may proceed. Plaintiffs’ claims for negligence under Illinois law are dismissed. A separate Order follows.
February 21, 2020 /S/ Date Paul W. Grimm
United States District Judge
Notes
[1] Second Amended Consolidated Complaint (“Compl.”), ECF Nos. 413 (sealed), 537 (redacted). The Second Amended Consolidated Complaint is a superseding complaint as to all other complaints in this MDL filed on behalf of consumers. Compl. ¶ 6. Plaintiffs named as defendants Marriott International, Inc., Starwood Hotels & Resorts Worldwide, LLC, and Accenture LLP. Compl. ¶¶ 12–14. Marriott International, Inc. and Starwood Hotels & Resorts Worldwide, LLC will be referred to as “Defendants” or “Marriott” collectively, unless otherwise indicated. The claims against Accenture LLP are addressed in other briefings.
[2] See ECF No. 368 (selection of bellwether claims). Each party selected five claims, consisting of a cause of action and a jurisdiction from the Second Amended Consolidated Complaint, brought by the named plaintiffs from the relevant jurisdiction. Unless otherwise indicated, “Plaintiffs” or “Bellwether Plaintiffs” refers to the plaintiffs selected for the purposes of this briefing.
[3] The motion has been fully briefed. ECF Nos. 450, 473, 486 (redacted); ECF Nos. 451, 487, 494 (sealed). A hearing is not necessary. See Loc. R. 105.6 (D. Md. 2018).
[4] Plaintiffs challenge the standing of all bellwether plaintiffs, except plaintiffs Cullen, Golin, and O’Brien, who allege fraudulent misuse of their personal information. Def. Mot. at 17 n.12.
[5] These plaintiffs are Guzikowski, Marks, Sempre, Maisto, Lawrence, Bittner, Long, Viggiano, Miller, Raab, Maldini, Ryans, Wallace, Gononian, and Fishon. Def. Mot. at 4 n.3.
[6] Defendants do not challenge the standing of plaintiffs Cullen, Golin, and O’Brien. Def. Mot. at 17 n.12.
[7] The court did not appear to consider the benefit that Jimmy John’s derived by accepting debit
and credit cards. Instead, it seems the court was persuaded that because Jimmy John’s pays credit
card fees, it does not benefit from accepting debit and credit cards as a form of payment. But as
the Supreme Court recently explained, while credit card companies like American Express charge
merchants fees, accepting payment cards “benefit[s] merchants by encouraging cardholders to
spend more money.”
Ohio v. Am. Express Co.
,
[8] For further discussion of the express and implied contract claims, see Section III below.
[9] Under
Erie Railroad Co. v. Tompkins
,
[10]
See In re Michaels Stores Pin Pad Litig.
,
[11] For example, in the decision of the First Circuit in
In re TJX Companies Retail Sec. Breach
Litig.
,
[12] I am unable to certify these questions to the Illinois Supreme Court, as Illinois Supreme Court Rule 20 only allows certification of questions from the United States Supreme Court or the Seventh Circuit Court of Appeals.
[13] Defendants also argue that
Cmty. Bank of Trenton v. Schnuck Mkts., Inc.
,
[14] Plaintiffs here also point to the FTC guidebook, Protecting Personal Information: A Guide for Business , as evidence that Marriott failed to comply with regulatory guidance. Compl. ¶¶ 256– 61.
[15] Marriott selected the Maryland Consumer Protection Act claims as a bellwether claim for the purposes of this motion to dismiss. ECF No. 368. Plaintiffs allege that one of the ways that Defendants violated the Maryland Consumer Protection Act claim is by violating the Maryland PIPA. Therefore, although the Maryland PIPA claim was not selected separately as a bellwether claim, I address it here for clarity before turning to the Maryland Consumer Protection Act claim below.
[16] Although passports are also included under PIPA’s definition of Personal Information, Defendants argue that Plaintiffs Maldini and Ryans are not among those Plaintiffs that allege their passport information was stolen. Plaintiffs argue that Maldini and Ryans can nonetheless represent Maryland class members whose passports were stolen. Because I find that Maldini and Ryans have adequately stated a PIPA claim based on the allegations above, I need not resolve this question.
[17] Plaintiffs may also have established standing to state their UCL claims based on the loss of
property value of their personal information. Section I.a.iii
supra
;
Kwikset
,
