ROBIN STEVEN et al.,
18-CV-6500 (JMF)
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK
November 22, 2019
JESSE M. FURMAN, United States District Judge
MEMORANDUM OPINION AND ORDER
JESSE M. FURMAN, United States District Judge:
In June 2018, an employee of Defendant Carlos Lopez & Associates, LLC (“CLA“), a provider of mental and behavioral health services to veterans and others, accidentally
Although unopposed, Plaintiffs’ motion is denied. It is axiomatic that “federal courts are courts of limited jurisdiction and, as such, lack the power to disregard such limits as have been imposed by the Constitution оr Congress.” Purdue Pharma L.P. v. Kentucky, 704 F.3d 208, 213 (2d Cir. 2013) (internal quotation marks omitted). One critical limit set forth in Article III of the United States Constitution is that all suits filed in federal court must be “cases and controversies of the sort traditionally amenable to, and resolved by, the judicial process.” Steel Co. v. Citizens for a Better Env‘t, 523 U.S. 83, 102 (1998). And “[the] case-or-controversy requirement is satisfied only where a plaintiff has standing” to bring suit. Sprint Commc‘ns Co., L.P. v. APCC Servs., Inc., 554 U.S. 269, 273 (2008) (emphasis added). Thus, a federal court has “an obligation to assure [itself] of litigants’ standing under Article III.” Frank v. Gaos, 139 S. Ct. 1041, 1046 (2019) (internal quotation marks omitted). Most relevant here, as the Supreme Court emphasized only this year, “[t]hat obligation extends to court approval of proposed class action settlements” because “the ‘claims, issues, or defenses of а certified class — or a class proposed to be certified for purposes of settlement — may be settled, voluntarily dismissed, or compromised only with the court‘s approval.’ A court is powerless to approve a proposed class settlement if it lacks jurisdiction over thе dispute, and federal courts lack jurisdiction if no named plaintiff has standing.” Id. (quoting
The Court concludes that they do not. To establish Article III standing, a plaintiff must allege, among other things, “injury in fact.” Susan B. Anthony List v. Driehaus, 134 S. Ct. 2334, 2341 (2014). An injury-in-fact
Applying these principles, many courts have held that plaintiffs alleging the theft of personal identifying information in a “data breach” have standing to bring claims against the entity that had held their data based on an increased risk of future identity theft. See, e.g., In re U.S. Office of Pers. Mgmt. Data Sec. Breach Litig., 928 F.3d 42, 55-61 (D.C. Cir. 2019) (“OPM“); Attias v. Carefirst, Inc., 865 F.3d 620, 628-29 (D.C. Cir. 2017); Galaria v. Nationwide Mut. Ins. Co., 663 F. App‘x 384, 387-89 (6th Cir. Sept. 12, 2016) (unpublished); Lewert v. P.F. Chang‘s China Bistro, Inc., 819 F.3d 963, 967-68 (7th Cir. 2016); Remijas v. Neiman Marcus Grp., LLC, 794 F.3d 688, 692, 694-95 (7th Cir. 2015); Fero v. Excellus Health Plan, Inc., 304 F. Supp. 3d 333, 338-40 (W.D.N.Y. 2018); Sackin v. TransPerfect Glob., Inc., 278 F. Supp. 3d 739, 746 (S.D.N.Y. 2017). The Second Circuit has not yet ruled on the issue, but it did cite some of these cases, arguably with approval, in a summary order. See Whalen v. Michaels Stores, Inc., 689 F. App‘x 89, 91 & n.1 (2d Cir. 2017) (summary order). On that basis, some district courts within the Circuit have predicted — as Plaintiffs do here — that the Second Circuit would adopt the same approach. See, e.g., Fero, 304 F. Supp. 3d at 339 (”Whalen‘s favorable citations to Galaria, Remijas, and Lewert suggest that thе Second Circuit would follow the approach to the standing issue adopted by the Sixth and Seventh Circuits, which have both found standing based on increased risk of identity theft.“); accord Sackin, 278 F. Supp. 3d at 746; see also Pls.’ Standing Mem. at 1-2.
That may be so, but it would be of no help to Plaintiffs in this case. Indeed, if anything, the cases cited above demonstrate why their “increased risk” theory — upon which their claim of standing depends — is too speculative to survive scrutiny. In several of these cases, at least one named plaintiff alleged actual misuse of his or her personal information by the suspected data thief. See, e.g., OPM, 928 F.3d at 56 (noting that “several” plaintiffs “allege that unauthorized сharges have appeared on their existing credit card and bank account statements since the breaches“); Lewert, 819 F.3d at 967 (noting that one plaintiff “asserts that he already has experienced fraudulent charges“); Remijas, 794 F.3d at 690 (noting that 9,200 of the 350,000 credit cards potentially exposed
Thus, “these cases have a common denominator. In each of them, the plaintiffs’ data actually had been [targeted and taken] by one or more unauthorized third parties.” Katz v. Pershing, LLC, 672 F.3d 64, 80 (1st Cir. 2012). That intentional act of theft gave rise, in turn, to a plausible inference that the stolen data would be misused. As the Seventh Circuit put it in Remijas, where data is intentionally stolen by a hacker “it is plausible to infer that the plaintiffs have shown a substantial risk of harm from the . . . data breach. Why else would hackers break into a store‘s database and steal consumers’ private information? Prеsumably, the purpose of the hack is, sooner or later, to make fraudulent charges or assume those consumers’ identities.” 794 F.3d at 693; see, e.g., Attias, 865 F.3d at 628-29 (holding that where an “unauthorized party” has accessed personally identifying data “it is plausible . . . to infer that this party has both the intent and the ability to use that data for ill. . . . No long sequence of uncertain contingencies involving multiple independent actors has to occur before the plaintiffs in this case will suffer any harm; a substantial risk of harm exists already, simply by virtue of the hack and the nature of the data that the plaintiffs allege was taken.“); Lewert, 819 F.3d at 967 (“It is plausible to infer a substantial risk of harm from the data breach, because a primary incentive for hackers is sooner or later to make fraudulent charges or assume those consumers’ identities.” (internal quotation marks omitted)); Galaria, 663 F. App‘x at 388 (“There is no need for speculation where Plaintiffs allege that their data has already been stolen and is now in the hands of ill-intentioned criminals. . . . Where a data breach targets personal information, a reasonable inference can be drawn that the hackers will use the victims’ data for . . . fraudulent purposes . . . .“).
By contrast, in the absence of an allegation or evidence that an unauthorized third party intentionally stole the data at issue, courts have concluded that the risk of identity theft is too speculative to support Article III standing. See, e.g., Beck v. McDonald, 848 F.3d 262 (4th Cir. 2017); Katz, 672 F.3d at 79-80; Randolph v. ING Life Ins. & Annuity Co., 486 F. Supp. 2d 1, 7-8 (D.D.C. 2007); see also Reilly v. Ceridian Corp., 664 F.3d 38, 40, 44 (3d Cir. 2011) (holding that employees lacked standing to bring claims where an unknown hacker had penetrated their company‘s payroll system firewall because it was “not known whether the hacker read, copied, or understood” the system‘s information and no evidence suggested past or future misuse of employee data or that the “intrusion was intentional or malicious“).2 Beck is instructive. There, the plaintiffs brought claims based on two inсidents: the theft of
The present case falls comfortably on the Beck side of the line. Plaintiffs make no allegation that their dаta was actually viewed, downloaded, copied, or shared, let alone misused. In fact, they affirmatively concede that there is no evidence that “any class member‘s identity” was “stolen as a result of the breach.” ECF No. 52, at 19. And, of course, they do not allege that their data was comрromised as a result of a hack or some other criminal act. Instead, they allege only that their data was compromised by an errant email sent within CLA (a company, for what it is worth, whose employees obviously deal with sensitive information of all kinds).3 If anything, the case for standing in this case is considerably weaker than it was in Beck. In Beck, the data was (or might have been) compromised as the result of a criminal act, yet the court still found the risk of future injury too speculative because there was no indication that the thief had intentionally targeted the data itself. Here, by contrast, there is no allegаtion of any criminal act whatsoever; instead, Plaintiffs speculate that one of the CLA employees who received the email in error — all of whom owed duties and responsibilities to CLA and presumably knew that they could be fired if they did anything untoward with the email — could misuse their data or provide it tо a third party who could, in turn, misuse it. As in Beck, “[t]hese allegations are insufficient to establish a ‘substantial risk’ of harm.” Beck, 848 F.3d at 275. Put differently, “the risk of harm that [Plaintiffs] envision[] is unanchored to any actual incident of data breach. This omission is fatal” to their claim of substantial risk: “because [they] do[] not identify any incident in which [their] data has ever been accessed by an unauthorized person, [they] cannot satisfy Article III‘s requirement of actual or impending injury.” Katz, 672 F.3d at 80.4
In short, the Court is “powerless to approve” the parties’ proposed class settlement because “no named plaintiff has standing.” Frank, 139 S. Ct. at 1046. It follows that Plaintiffs’ motion for approval of the settlement must be and is DENIED and that this case must be DISMISSED. See
The Clerk of Court is directed to terminate ECF Nos. 48 and 51 and to close this case.
SO ORDERED.
Dated: November 22, 2019
New York, New York
JESSE M. FURMAN
United States District Judge
