text
stringlengths
0
118
Thus, the typical story with data security enforcement involves
regulators collecting some money that is dumped into government
treasuries, with barely anything going to consumers.
PRIVATE LITIGATION
In the years following the ChoicePoint breach, another body of law bubbled
up out of nearly nowhere—waves of private litigation after nearly every
major data breach. Over the past 15 years, there has been an extensive
amount of data breach litigation.
The Rise of Data Breach Lawsuits
Lawsuits usually follow quickly after breaches. For example, in the
aftermath of its breach, Target faced 140 lawsuits. One lawsuit was even
filed the day after the breach was announced to the public. Target
eventually settled the consolidated consumer lawsuits for $10 million.
One study of about 230 lawsuits for data security breaches from 2004–
2014 found more than “86 different causes of actions brought by plaintiffs
for essentially the same kind of event.”53 Causes of action involved tort,
contract, state statutes, and federal statutes.
Problems with Private Litigation
In theory, the way that data breach litigation is supposed to work is to
empower consumers to seek redress for harms from data breaches and to
supplement regulatory enforcement with private enforcement in the courts.
Thus far, however, private litigation has failed to make a meaningful
difference in improving data security. Litigation has increased the costs of
data breaches but has accomplished little else.
CASES IMPROPERLY DISMISSED FOR LACK OF HARM
The key issue in data breach cases is harm. Most causes of action that
plaintiffs can sue under require what is known as a “legally cognizable
harm.” Even if a defendant acted wrongly, the law often requires a plaintiff
to prove that the defendant’s actions caused harm. Courts have often
struggled to understand the harm from data breaches, so data breach cases
have often been dismissed.54
In federal court, plaintiffs must make an additional preliminary showing
of harm to proceed with their case. Plaintiffs must establish “standing” to be
able to sue in federal court.55 For standing, plaintiffs must demonstrate an
“injury in fact” that is “concrete and particularized” and “actual or
imminent, not conjectural or hypothetical.”56
Data breach plaintiffs argued that the exposure of their data has caused
them emotional distress. Many courts, however, are reluctant to recognize
harm that consists purely of emotional distress.57 In the words of one court,
“Emotional distress in the wake of a security breach is insufficient to
establish standing.”58 Courts seem so quick to dismiss claims of anxiety
over a data breach that they ignore many other areas of law where anxiety
alone is recognized as a cognizable harm.59
Plaintiffs have also alleged that the exposure of their data has subjected
them to an increased risk of harm from identity theft, fraud, or other injury.
Many courts, however, require harms to be “vested”—already materialized
in the here and now.60
Additionally, plaintiffs argue that the exposure of their data has resulted
in their having to expend time and money to prevent future fraud, such as
signing up for credit monitoring, contacting credit reporting agencies and
placing fraud alerts on their accounts, and so on. Courts have been skeptical
of these claims too.
A classic example is Reilly v. Ceridian Corp. Reilly was an employee of
a law firm that was a customer of Ceridian, a payroll processing firm. After
an attacker compromised its servers, Ceridian notified its customers that
their personal information was affected. Reilly and other victims argued
that they suffered injuries resulting from an increased risk of identity theft.
The court rejected their argument, holding that the harm was too distant
because the plaintiffs’ “conjectures” about being victimized by identity
theft hadn’t yet “come true.”61 The plaintiffs’ fears were based “on entirely
speculative, future actions of an unknown third-party.”62 The court further
stated: “Here, no evidence suggests that the data has been—or will ever be
—misused. The present test is actuality, not hypothetical speculations
concerning the possibility of future injury.”63
A 2013 Supreme Court case, Clapper v. Amnesty International USA, has
had an enormous influence on data breach cases even though the case had
nothing to do with data breaches. A group of attorneys, journalists, and
others contended that government surveillance violated their constitutional
rights. They could not establish that they were definitely under surveillance,
but they had a legitimate reason to suspect that they were under surveillance
because they represented or spoke to individuals who the government
viewed as suspicious.
The U.S. Supreme Court held that plaintiffs lacked standing because
they could not demonstrate that “future surveillance is certainly
impending.” The Court found that the plaintiffs could only “speculate” as to
future surveillance.
The plaintiffs also contended that they were injured because they had to
take measures to avoid the risk that they were under surveillance. For
example, instead of talking to clients on the phone, they had traveled to
meet them in person. The Court, however, held that plaintiffs “cannot
manufacture standing by incurring costs in anticipation of non-imminent
harm.”64
After Clapper, several courts have used Clapper’s reasoning to deny
standing to plaintiffs in data breach cases when plaintiffs claim injury due
to an increased risk of future harm or expenditures to reduce the risk of
future harm.
For example, in one case, thieves stole backup tapes with the medical
data of more than 4 million service members. The tapes also included
Social Security Numbers, addresses, birth dates, and phone numbers, along
with extensive health information. An employee of a company had put the
tapes in his car—an all-too-common blunder.65
A group of 33 plaintiffs sued. One of the plaintiffs alleged that loans
were fraudulently taken out in his name by using his Social Security
Number, birth date, address, and other data from the tapes. Two plaintiffs
claimed that marketers contacted them by phone and email about their
medical conditions. Other plaintiffs alleged other harms. Many plaintiffs
argued the exposure of their medical information to an unknown third party
was an injury in itself. Several plaintiffs argued that they spent time and
money monitoring their credit and bank accounts after the incident.
The court took issue with several plaintiffs who argued a risk of future