MEMORANDUM
There are only two types of companies left in the United States, according to data security experts: “those that have been hacked and those that don’t know they’ve been hacked.”
Pending before the Court are two putative class actions concerning a security breach of Defendant Paytime, Inc.’s (“Pay-time”) computer systems, in which an unknown third party allegedly accessed Plaintiffs’ confidential personal and financial information. These cases have been consolidated. Prior to consolidation, Pay-time filed in each case a Motion to Dismiss Pursuant to Federal Rules of Civil Procedure 12(b)(1) and 12(b)(6), contending that Plaintiffs lack standing, or in the alternative, that they have failed to. state claims as a matter of law. Paytime also filed a Motion to Strike Class Allegations Pursuant to Federal Rule of Civil Procedure 12(f) in each case. For the reasons that follow, we will dismiss the consolidated case for lack of standing, and accordingly, not address Paytime’s other motions.
1. PROCEDURAL HISTORY
On February 18, 2015, Storm, et al. v. Paytime, Inc. and Holt, et al. v. Paytime, Inc. were consolidated into one case for the remainder of the proceedings between the parties. (Storm, Doc. 46). However, due to the fact that these cases were filed separately and have had filings and motions pending in separate dockets, we wiil discuss their procedural histories separately.
In Storm, on June 13, 2014, Plaintiffs filed a Complaint against Paytime, alleging claims of negligence and breach of contract. (Id., Doc. 1). The Complaint also included class action allegations under Federal Rule of Civil Procedure 23. Plaintiffs allege that as many as 233,000 individuals could be members of the class, as that is approximately how many individuals who had their personal and financial information allegedly compromised.
By agreement of the parties, Paytime’s response to the Complaint was due August 1, 2014. (Id., Doc. 7). On that date, Pay-time filed a motion to dismiss for failure to state a claim upon which relief may be granted and for lack of standing. (Id., Doc. 12). In response to this motion, Plaintiffs filed an Amended Complaint on August 8, 2014. (Id., Doc. 17). Again by agreement of the parties, Paytime’s response to the Amended Complaint was due August 27, 2014. (Id., Doc. 18).
On August 27, 2014, Paytime filed the instant Motion to Dismiss for failure to state a claim and for lack of jurisdiction. (Id., Doc. 28). On the same date, Paytime filed its brief in support of the Motion. (Id., Doc. 29). After being granted an extension of time to file its response, Plain-' tiffs filed their brief in opposition to the Motion on September 24, 2014. (Id., Doc. 37). Paytime filed a reply brief on October 7, 2014. (Id., Doc. 41). Thus, having been fully briefed, this Motion is now ripe for our review.
By court order, on September 26, 2014, Holt was transferred to the Middle District of Pennsylvania. (Id., Doc. 21). The matter was filed in this Court on October 10, 2014. (Id., Doc. 22).
Because the Motion to Dismiss pending in Holt has been fully briefed, this matter is also ripe for our review, as part of the consolidated case.
11. STANDARD OF REVIEW
Because we need only address Paytime’s jurisdictional arguments, Federal Rule of Civil Procedure 12(b)(1) provides the relevant legal standard.
A court must grant a motion to dismiss if it determines it lacks subject matter jurisdiction to hear a case. See Fed.R.Civ.P. 12(h)(3). A motion to dismiss based on a lack of standing is a jurisdictional matter and thus “properly brought pursuant to Rule 12(b)(1).” Ballentine v. United States,
Here, Paytime asserts a facial challenge to this Court’s subject matter jurisdiction to hear the instant case.
In accordance with the standard of review applicable to a Rule 12(b)(1) Motion to Dismiss, the following facts are derived from the complaints underlying the consolidated case and are viewed in the light most favorable to the Plaintiffs.
As the parties are aware, we issued an order consolidating these matters. In large part, the factual underpinnings are identical; however, where there are distinctions, we will identify those distinctions.
Paytime is a national payroll service company that offers a variety of services to its clients, including human resource management services, time and attendance systems, and web-based payroll submission. (Storm, Doc. 17, ¶ 6). Plaintiffs and putative class members are current or former employees of companies that used Paytime as their payroll processing service. (Id., ¶¶ 8-11).
In order to facilitate payroll processing, Plaintiffs and the proposed class members were required to provide to their employers confidential personal and financial information, including their full legal names, addresses, bank account data, Social Security numbers, and dates of birth. (Id., ¶ 14). This sensitive information was then provided to Paytime. (Id., ¶ 15).
On April 7, 2014, unknown third parties gained unauthorized access to Paytime’s computer systems. Paytime did not discover this security breach until April 30, 2014. (Id., ¶ 17). Plaintiffs further allege that Paytime waited until May 12, 2014 to begin to notify affected parties that there had been a security breach. (Id., ¶ 18). On May 20, 2014, Paytime disclosed- that forensic experts had conducted an investigation into the breach, and were able to confirm that the data breach had in fact occurred, and that the confidential personal information of employees of their clients had been accessed by these unknown third parties. (Id., ¶ 19). Plaintiffs allege that nationally, over 233,000 individuals had their personal and financial information “misappropriated” as a result of the breach of Paytime’s computer network. (Id., ¶ 20).
Plaintiffs allege that as a result of this data breach, they and the proposed class members have spent, or will need to spend, time and money to protect themselves from identity theft. (Id., ¶28). Plaintiffs assert they have suffered actual damages, as well. As an “example” of these damages, Plaintiffs point to Plaintiff Wilkinson, who is an employee of a government contractor and must have security clearances in order to perform his job. After Paytime’s data breach, Wilkinson reported the incident to this employer, who then suspended his security clearances while the employer investigated the situation. (Id., ¶ 29). During the investigation, Wilkinson was required to work at a different job site, resulting in a four hour increase in his daily commute. This increased commute caused Wilkinson to incur travel expenses in addition to lost time. (Id.).
Plaintiffs in Holt allege similar injuries and actual damages, such as costs of monitoring their financial accounts, the opportunity cost of the time spent monitoring their accounts for identity theft, and costs of obtaining replacement checks and/or credit and debit cards. (Holt, Doc. 1, ¶ 40). They also allege as injuries “the significant possibility of monetary losses arising from unauthorized bank account withdrawals, fraudulent payments, and/or related bank fees charged to their accounts.” (Id., ¶ 36). As in Storm, they also allege as an injury the increased risk of identity theft. (Id., ¶ 39).
IV. DISCUSSION
First, we will consider whether Plaintiffs have standing to bring this case, based on the factual allegations of their Complaints. If none have standing, of course, we must dismiss the matter sub judice. If any Plaintiffs do have standing, we will then consider whether they have stated a claim for which relief can be granted.
Article III courts are courts of limited jurisdiction. As a constitutional matter, federal courts only have jurisdiction over actual “cases or controversies.” U.S. CONST, art. Ill, § 2. One element of this limitation is that plaintiffs have the burden of establishing they have standing to sue. Lujan v. Defenders of Wildlife,
The personal injury element of standing requires an “injury in fact” — one that is “concrete in both a qualitative and temporal sense,” as opposed to merely “abstract.” Id. The injury must also be actual or “imminent,” not “conjectural” or “hypothetical.” Id. (internal citations omitted). The imminency requirement has caused some consternation among the courts, leading the United States Supreme Court to expound on what an “imminent” injury entails in order to clarify this somewhat abstract concept. “Allegations of possible future injury do not satisfy the requirements of Art. III. A threatened injury must be ‘certainly impending’ to constitute injury in fact.” Id. at 158,
The Third Circuit has provided guidance on standing and its imminency requirement for future injuries, specifically in the context of data breaches, as these have unfortunately become common occurrences in the modern world. The Third Circuit has held that in the event of a data breach, a plaintiff does not suffer a harm, and thus does not have standing to sue, unless plaintiff alleges actual “misuse” of the information, or that such misuse is imminent. Reilly v. Ceridian Corp.,
The Third Circuit affirmed the district court’s dismissal of the case, on the ground that the plaintiffs lacked Article III standing. Id. at 41. The circuit court reasoned that plaintiffs’ alleged future harm resulting from the security breach was not sufficiently imminent to meet the threshold for standing — the risk of future injury was significantly attenuated, considering that it was “dependent on entirely speculative, future actions of an unknown third party.” Id. at 42. The court pointedly elaborated:
“We cannot now describe how Appellants will be injured in this case without beginning our explanation with the word ‘if: if the hacker read, copied, and understood the hacked information,, and if the hacker attempts to use the information, and if he does so successfully, only then will Appellants have suffered an injury.” Id. at 43 (emphasis in original).
Thus, the Third Circuit requires its district courts to dismiss data breach cases for lack of standing unless plaintiffs allege actual misuse of the hacked data or specifically allege how such misuse is certainly impending. Allegations of increased risk of identity theft are insufficient to allege a harm. Id. at 43.
Turning again to the matter sub judice, we will review Plaintiffs’ factual allegations from the Amended Complaint in the consolidated case, and any distinctive allegations from the Complaint in Holt, to decide whether they allege an injury that is either actual or imminent. Here, the factual allegations are remarkably similar to those of Reilly. Plaintiffs allege that their personal and financial data were “obtained” “by unknown third parties.” (Storm, Doc. 17, ¶ 2). They allege that this information was “accessed without their authorization” and “misappropriated.” (Id., ¶¶ 16, 20). Plaintiffs allege that as a result of the data breach, they and the proposed class members “are at an increased and imminent risk of becoming victims of identity theft crimes, fraud and abuse.” (Id., ¶ 27). Additionally, they have spent, or foresee spending, time and money to protect themselves from identity theft. (Id., ¶ 28). They also allege that some Plaintiffs and proposed
Reviewing these allegations, the Court finds no factual allegation of misuse or that such misuse is certainly impending. Plaintiffs do not allege that they have actually suffered any form of identity theft as a result of the data breach — to wit, they have not alleged that their bank accounts have been accessed, that credit cards have been opened in their names, or that unknown third parties have used their Social Security numbers to impersonate them and gain access to their accounts. See Reilly,
Plaintiffs argue that the different verbs used in their allegations, such as “stolen” and “misappropriated,” distinguish their case from Reilly in such a way as to create a cognizable harm, but this is a strained argument, which would require the Court to ignore the substance of the allegations. In the complaint at issue in Reilly, plaintiffs alleged that an “outside hacker” was able to “infiltrate” the defendant’s security system and “gain access” to confidential and personal information of the plaintiffs. Complaint at ¶ 11, Reilly v. Ceridien Corp.,
Further, Plaintiffs’ alleged harm — that they are now at an increased risk of identity theft — does not suffice to allege an imminent injury. Reilly,
Plaintiffs cite Reilly’s discussion of the facts of Pisciotta v. Old National Bancorp.,
Based on the failure to allege facts showing a misuse of data or that such misuse is imminent, Clapper and Reilly direct us to dismiss Plaintiffs for lack of standing without too much hesitation. This disposition is in line with the vast majority of courts who have reviewed data breach cases where no misuse was alleged post-Clapper. See, e.g., In re SAIC,
However, Plaintiffs point to one of themselves, Kyle Wilkinson, as someone who has suffered actual damages, or actual injury, due to the data breach, ostensibly to create a foothold in our jurisdiction. His supposed damages, in the form of increased commute time and related expenses, although surely unfortunate, are merely a form of prophylactic costs the Supreme Court has warned cannot be used to “manufacture” standing, even if those costs are reasonable. Clapper,
Although this stringent standard for standing does leave Wilkinson and the other Plaintiffs to foot the bill for their pre
Plaintiffs also contend that they have alleged actual injury based on harm to their privacy interest, in having their confidential personal information accessed by an unauthorized third party. “For a person’s privacy to be invaded, their personal information must, at a minimum, be disclosed to a third party ... if no one has viewed your private information (or is about to view it imminently), then your privacy has not been violated.” In re SAIC Litig.,
Because we conclude that Plaintiffs lack standing and thus must dismiss the case, we need not address Paytime’s other arguments for dismissal made in their Motion.
y. CONCLUSION
In conclusion, Plaintiffs have failed to plead specific facts demonstrating they have standing to bring this suit under Article III. Consistent with our above discussion, we will grant Paytime’s motion to dismiss, as set forth more fully herein-
A separate Order consistent with this Memorandum shall follow.
ORDER
In' accordance with the Memorandum issued on today’s date, it is hereby ORDERED that:
1. Defendant’s Motions to Dismiss the Amended Complaint (Doc. 28) in Storm and the Complaint in Holt are GRANTED.
2. The First Amended Class Action Complaint (Doc. 17) in Storm and the Complaint in Holt (Doc. 1) are DISMISSED WITHOUT PREJUDICE, in their entirety.
3. The Clerk of Court is directed to CLOSE the consolidated case.
Notes
. Nicole Perlroth, The Year in Hacking, by the Numbers, N.Y. Times, Apr. 22, 2013, http://bits. blogs.nytimes.com/2013/04/22/the-year-in-hacking-by-the-numbers/?_r=0.
. Elizabeth Weise, 43% of Companies Had a Data Breach in the Past Year, USA TODAY, Sept. 24, 2014, http://www.usatoday.com/ story/tech/2014/09/24/data-breach-companies-60/16106197/.
. In addition to the Motions to Dismiss, Pay-time also filed Motions for Leave to File a
. Plaintiffs correctly point out that the Supreme Court in Clapper included a footnote in their opinion which states that "in some instances,” a "substantial risk” that the harm will occur would be sufficient to confer standing on a plaintiff. Id. at 1150 n. 5. This ' teasing footnote does indeed invite confusion in standing jurisprudence. However, in the case before us, we choose to rely on the standard the Court relied on for its holding in Clapper, rather than a footnote. Furthermore, Reilly, discussed infra, provides us with precedential guidance on standing specifically in the context of data breach cases. And as point of fact, if we were to apply the "substantial risk” standard, Plaintiffs. have not met that bar, either. They allege that an identity fraud research study found that "nearly 1 in 4 data breach letter recipients became a victim of identity fraud....” (Storm, Doc. 17, ¶ 23). A 25 % chance of Plaintiffs becoming identity fraud victims is not a substantial risk. By Plaintiffs' own calculations, injury is not impending for 75% of victims of the Paytime breach. See In re Sci. Applications Int'l Corp. (SAIC) Backup Tape Data Theft Litig.,
. "Appellants' allegations of an increased risk of identity theft resulting from a security breach are therefore insufficient to secure standing.” Reilly,
. The logic of this paragraph also applies to the allegation in Holt that one of Plaintiffs' injuries in fact or actual damages is “the significant possibility of monetary losses arising from unauthorized bank account withdrawals, fraudulent payments, and/or related bank fees charged to their accounts.” {Holt, Doc. 1, ¶ 36). This is effectively just a more detailed form of alleging that Plaintiffs are at an increased risk of identity theft. Further, a "possibility” of monetary losses resulting from a data breach does not state a harm.
. However, Paytime has arranged to provide free credit monitoring for 12 months for all persons affected by the data breach, so Plaintiffs will not in fact have to pay for many of their reasonable preventive costs. (Doc. 37, Ex. B).
. Hayley Tsukayama, Target says customers signing up for free credit monitoring after data breach, Wash. Post, Jan. 13, 2014, http://www. washingtonpost.com/business/technology/ target-says-customers-signing-up-for-ffee-credit-monitoring-after-data-breach/2014/01/ 13/99fcce60-7c83-lle3-95c6-0a7aa80874bc_ story.html; Tara Siegel Bernard, What Anthem Customers Should Do Next After the Data Breach, N.Y.Times, Feb. 6, 2015, http://www. nytimes.com/2015/02/07/your-money/what-anthem-customers-should-do-next-after-data-breach.html.
