UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
CHANTAL ATTIAS, et al.,
Plaintiffs,
v. Case No. 15-cv-00882 (CRC)
CAREFIRST, INC., et al.,
Defendants.
MEMORANDUM OPINION
Theft of electronic data has become commonplace in our digital economy, victimizing
millions of Americans each year. But while the resulting harm to consumers can be catastrophic,
not all data breaches result in legally actionable injuries. As a result, when consumers whose
data has been compromised seek redress in the courts, it must be determined whether their
alleged injuries are sufficiently specific and concrete to give them standing to sue. That is the
task presently before the Court in this case.
In June 2014, the health insurer CareFirst suffered a data breach that compromised the
personal information of some 1.1 million policyholders, including the seven named Plaintiffs
here. The purloined information included the policyholders’ names, birth dates, email addresses,
and subscriber identification numbers. Compl. ¶ 32; see also Defs.’ Reply Ex. 1 (Decl. Clayton
Moore House) ¶ 10. According to CareFirst, more-sensitive data, such as social security and
credit card numbers, was not stolen. 1 After CareFirst publicly acknowledged the breach in May
1
Although Plaintiffs assert in their opposition to the motion to dismiss that their social
security numbers were stolen in the data breach, the Complaint neither makes that allegation
explicitly nor contains any factual contentions that would support that conclusion. See Pls.’
Opp’n 17 (citing Compl. ¶ 57).
1
2015, Plaintiffs sued the company and various of its affiliates on behalf of themselves and other
policyholders, alleging that CareFirst violated a host of state laws and legal duties by failing to
safeguard their personal information. 2 Another set of plaintiffs filed a similar federal class
action in Maryland.
CareFirst has moved to dismiss Plaintiffs’ complaint. It argues that because Plaintiffs
have not alleged that their personal information has actually been misused, or explained how the
stolen information could readily be used to assume their identities, they lack standing to sue in
federal court. Plaintiffs mainly respond that the increased likelihood of identity theft that
resulted from the breach, and the costs they have incurred to mitigate it, are sufficient injuries to
establish standing. In resolving this dispute, the Court will follow the standard set by the
majority of courts that have confronted similar cases, including the related Maryland class
action: Absent facts demonstrating a substantial risk that stolen data has been or will be misused
in a harmful manner, merely having one’s personal information stolen in a data breach is
insufficient to establish standing to sue the entity from whom the information was taken.
Because Plaintiffs have not made the required showing, the Court lacks subject matter
jurisdiction over the case and will grant CareFirst’s motion to dismiss.
I. Legal Standard
Defendants move to dismiss the Complaint for lack of subject matter jurisdiction
pursuant to Federal Rule of Civil Procedure 12(b)(1) and for failure to state a claim upon which
2
Plaintiffs allege that the Court has jurisdiction over the case pursuant to 28 U.S.C.
§ 1332(d)(2) because the class’s aggregate claims exceed $5,000,000 and “there are numerous
class members who are citizens of states other than the Defendants.” Compl. ¶ 10. The Court
will not assess this assertion because, as discussed below, it will dismiss the case for lack of
subject matter jurisdiction on standing grounds.
2
relief can be granted pursuant to Rule 12(b)(6). “The distinctions between 12(b)(1) and 12(b)(6)
are important and well understood. Rule 12(b)(1) presents a threshold challenge to the court’s
jurisdiction, whereas 12(b)(6) presents a ruling on the merits with res judicata effect.” Al-
Owhali v. Ashcroft, 279 F. Supp. 2d 13, 20 (D.D.C. 2003) (quoting Haase v. Sessions, 835 F.2d
902, 906 (D.C.Cir.1987)) (internal quotation marks omitted). Because “a court must begin with
questions of jurisdiction” “[b]efore examining the merits of any claim,” In re Sci. Applications
Int’l Corp. (“SAIC”), 45 F. Supp. 3d 14, 23 (D.D.C. 2014), and because the Court will conclude
that it lacks subject matter jurisdiction, this Opinion will address only Defendants’ jurisdictional
arguments. Thus, “Federal Rule of Civil Procedure 12(b)(1) provides the relevant legal
standard.” Id. at 22. Under this standard, the Court must “treat the [C]omplaint’s factual
allegations as true . . . and must grant [Plaintiffs] the benefit of all inferences that can be derived
from the facts alleged.” Id. (omission in original) (quoting Sparrow v. United Air Lines, Inc.,
216 F.3d 1111, 1113 (D.C. Cir. 2000)) (internal quotation marks omitted).
At the same time, because a “court has an ‘affirmative obligation to ensure that it is
acting within the scope of its jurisdictional authority,’” id. at 23 (quoting Grand Lodge of
Fraternal Order of Police v. Ashcroft, 185 F. Supp. 2d 9, 13 (D.D.C. 2001)), a plaintiff’s factual
allegations in the complaint “will bear closer scrutiny in resolving a 12(b)(1) motion than in
resolving a 12(b)(6) motion for failure to state a claim,” id. (quoting Grand Lodge, 185 F. Supp.
2d at 13–14) (internal quotation mark omitted). “Additionally, unlike with a motion to dismiss
under Rule 12(b)(6), the Court ‘may consider materials outside the pleadings in deciding whether
3
to grant a motion to dismiss for lack of jurisdiction.’” 3 Id. (quoting Jerome Stevens Pharm. v.
FDA, 402 F.3d 1249, 1253 (D.C. Cir. 2005)).
II. Analysis
Article III of the U.S. Constitution limits the reach of federal jurisdiction to the resolution
of cases and controversies. See U.S. Const. art. III, § 2. “Because ‘standing is an essential and
unchanging part of the case-or-controversy requirement of Article III,’” SAIC, 45 F. Supp. 3d at
23 (quoting Lujan v. Defenders of Wildlife, 504 U.S. 555, 560 (1992)), “standing is a necessary
‘predicate to any exercise of [the Court’s] jurisdiction,’” id. (alteration in original) (quoting Fla.
Audubon Soc’y v. Bentsen, 94 F.3d 658, 663 (D.C. Cir. 1996)). Consequently, every federal
court plaintiff “bears the burden of establishing the three elements that make up the irreducible
constitutional minimum of Article III standing: injury-in-fact, causation, and redressability.” Id.
(quoting Dominguez v. UAL Corp., 666 F.3d 1359, 1362 (D.C. Cir. 2012)) (internal quotation
marks omitted). “Even in the class-action context, all named Plaintiffs must allege and show that
they personally have been injured.” Id. (quoting Warth v. Seldin, 422 U.S. 490, 502 (1975))
(internal quotation mark omitted). And plaintiffs must plead or prove, “with the requisite
‘degree of evidence required at the successive stages of the litigation,’” each element of standing.
Id. (quoting Lujan, 504 U.S. at 561). Thus, “at the motion-to-dismiss stage, Plaintiffs must plead
facts that, taken as true, make the existence of standing plausible.” Id.
The question at issue here is whether the named Plaintiffs have demonstrated an “injury
in fact” that is concrete, particularized, and actual or imminent, Lujan, 504 U.S. at 560 (quoting
Allen v. Wright, 468 U.S. 737, 756 (1984)) (internal quotation marks omitted), and, if so,
3
For this reason, the Court will consider, and deny, Plaintiffs’ motion to strike the
affidavit of CareFirst IT security official Clayton Moore House, which details the parameters of
the data breach.
4
whether that injury is “fairly traceable” to the CareFirst data breach, id. at 590 (alteration
omitted) (quoting Simon v. E. Ky. Welfare Rights Org., 426 U.S. 26, 41 (1976)) (internal
quotation mark omitted). With the exception of two of the Plaintiffs—Kirk and Connie Tringler,
who will be discussed below—none allege that they have suffered actual identity theft. 4 They
contend instead that they have been harmed because the data breach has increased the likelihood
that they will be the victims of identity theft in the future. In assessing such prospective harms,
the Supreme Court held in Clapper v. Amnesty International USA that “[a]llegations of possible
future injury” do not satisfy constitutional standing requirements. 133 S. Ct. 1138, 1147 (2013)
(quoting Whitmore v. Arkansas, 495 U.S. 149, 158 (1990)) (internal quotation marks omitted).
Rather, the “threatened injury must be certainly impending to constitute injury in fact.” Id.
(quoting Whitmore, 495 U.S. at 158) (internal quotation marks omitted). That does not mean
that Plaintiffs are required to show that it is “literally certain that the harms they identify will
come about.” Id. at 1150 n.5. But they must at least demonstrate a “‘substantial risk’ that the
4
Although the Plaintiffs’ opposition to the Defendants’ motion to dismiss asserts that
“many Plaintiffs have already suffered identity theft, credit card fraud, and had their tax returns
stolen,” Pls.’ Opp’n 5 (emphasis added) (citing Compl. ¶¶ 47–57), and that victims of the data
breach other than the Tringlers have suffered “actual identity theft and fraud,” id. at 3 (citing
Compl. ¶ 57), the Complaint contains no factual allegations to support those assertions. The
paragraphs of the Complaint Plaintiffs cite contain only conjecture regarding Plaintiffs other than
the Tringlers. See Compl. ¶ 49 (“Identity thieves can use identifying data . . . to open new
financial accounts and incur charges in another person’s name . . . .” (emphasis added)); id. ¶ 50
(“Identity thieves can use personal information . . . to perpetrate a variety of crimes that do not
cause financial loss, but nonetheless harm the victims. For instance, . . . .” (emphasis added)); id.
¶ 51 (“[I]dentity thieves may get medical services using the Plaintiff’s PII [Personally
Identifiable Information] and PHI [Personal Health Information] or commit any number of other
frauds . . . .” (emphasis added)); id. ¶ 55 (“Identity thieves can use [stolen] information” to enroll
unwilling beneficiaries into certain health plans. (emphasis added)). Because a “complaint may
not be amended by the briefs in opposition to a motion to dismiss,” BEG Invs., LLC v. Alberti,
85 F. Supp. 3d 13, 26 (D.D.C. 2015) (quoting Coleman v. Pension Benefit Guar. Corp., 94 F.
Supp. 2d 18, 24 n.8 (D.D.C. 2000)) (internal quotation marks omitted), Plaintiffs’ assertion of
harm in their opposition does not constitute an allegation mounted in the Complaint.
5
harm will occur.” Id. (quoting Monsanto Co. v. Geertson Seed Farms, 130 S. Ct. 2743, 2754–55
(2010)). Plaintiffs whose claim of injury depends on an “attenuated chain of inferences
necessary to find harm” will “fall short” of the mark. Id. The Court turns to each of Plaintiffs’
claimed injuries below.
A. Increased Risk of Identity Theft
Judge Boasberg of this Court recently applied Clapper’s “certainly impending” standard
to a claim of injury resulting from filched electronic data. SAIC, 45 F. Supp. 3d at 24. In that
case, back-up tapes containing the personal information and medical records of military service
members were among various items stolen from the car of an employee of the information
technology company SAIC. See id. at 19–20. The data tapes originated with a federal agency
that provides health insurance to military families, and SAIC was in possession of the tapes
through an IT security contract with the agency. See id. Service members whose data was
contained on the tapes sued, alleging in part that they had been harmed by the increased
likelihood that they would suffer identity fraud as a result of the theft. See id.
The Court found the plaintiffs’ claims of increased risk of identity theft to be insufficient
to establish injury in fact. Judge Boasberg reasoned that too many assumptions were required to
find the alleged harm certainly impending. The thief would still need to “recognize the tapes for
what they were”; “find a tape reader and attach it to her computer”; “acquire software to upload
the data”; decipher any encrypted portions of the data; “acquire familiarity with the [health
insurance company’s] database format, which might require another round of special software”;
and finally, “either misuse a particular Plaintiff’s [information] or sell that Plaintiff’s data to a
willing buyer who would then abuse it.” Id. at 25. Because the plaintiffs had not alleged that
6
any of those things had occurred, and because those “events [were] entirely dependent on the
actions of an unknown third party,” they failed to demonstrate standing under Clapper. Id.
Plaintiffs attempt to distinguish SAIC by pointing out that, unlike the thieves there—who
stole various physical objects from a car, some of which happened to contain data—those here
breached CareFirst’s server protections for the very purpose of accessing that data, thus
demonstrating their intent to misuse it. See Pls.’ Opp’n 10–11. Plaintiffs point to the Seventh
Circuit’s recent decision in Remijas v. Neiman Marcus Group, 794 F.3d 688 (7th Cir. 2015), as
more-analogous precedent. Remijas involved a data breach of Neiman Marcus’s computer
systems, which compromised customers’ credit card information, social security numbers, and
birth dates. See id. at 690. Of the 350,000 credit cards whose information was potentially
exposed, 9,200 “were known to have been used fraudulently.” Id. In other words, the hackers
had clearly demonstrated that they had the means and the will either to abuse the information
they accessed or to sell it to others who did so. Unlike in SAIC, where only two plaintiffs out of
the 4.7 million service members whose information was stolen plausibly alleged an injury
traceable to the theft, SAIC, 45 F. Supp. 3d at 31–33, in Remijas, even the plaintiffs who had not
yet experienced fraud had demonstrated that they faced a “substantial risk” of fraud sufficient to
confer standing because so many other plaintiffs had experienced cognizable harm traceable to
the breach, Remijas, 794 F.3d at 693.
The Court views SAIC to be more similar to this case than Remijas and other data breach
cases cited by Plaintiffs. See Pls.’ Opp’n 6–10. While the series of assumptions required to find
concrete harm to Plaintiffs may be somewhat shorter here than that in SAIC, their theory of
injury is still too speculative to satisfy Clapper. The Court would have to assume, at a minimum,
that the hackers have the ability to read and understand Plaintiffs’ personal information, the
7
intent to “commit future criminal acts by misusing the information,” and the ability to “use such
information to the detriment of [Plaintiffs] by making unauthorized transactions in [Plaintiffs’]
names.” Chambliss v. CareFirst, Inc., No. RDB-15-2288, 2016 WL 3055299, at *4 (D. Md. May
27, 2016) (alterations in original) (quoting In re SuperValu, Inc., Customer Data Sec. Breach
Litig., No. 14-MD-2586, 2016 WL 81792, at *5 (D. Minn. Jan. 7, 2016)) (internal quotation
mark omitted). And, even more speculative than in SAIC—where social security numbers were
among the stolen data—is the question whether the hackers here would be willing or able to use
the existing data to acquire additional data. Plaintiffs have not suggested, let alone
demonstrated, how the CareFirst hackers could steal their identities without access to their social
security or credit card numbers. See, e.g., Antman v. Uber Techs., Inc., No. 3:15-cv-01175,
2015 WL 6123054, at *11 (N.D. Cal. Oct. 19, 2015) (“[T]he court holds that Mr. Antman’s
allegations are not sufficient because his complaint alleges only the theft of names and driver’s
licenses. Without a hack of information such as social security numbers, account numbers, or
credit card numbers, there is no obvious, credible risk of identity theft that risks real, immediate
injury.”). The absence of such a showing distinguishes this case from Remijas, where the
demonstrated existence of thousands of unauthorized charges shortly following the data breach
clearly established a connection between the breach and the thieves’ ability and willingness to
commit fraud.
The court in the related Maryland class action reached same conclusion, granting the
defendants’ motion to dismiss for lack of subject matter jurisdiction on standing grounds. It
rejected the plaintiffs’ argument that the breach increased their risk of future harm because “most
courts to consider the issue ‘have agreed that the mere loss of data—without any evidence that it
has been either viewed or misused—does not constitute an injury sufficient to confer standing.’”
8
Chambliss, 2016 WL 3055299, at *4 (quoting SAIC, 45 F. Supp. 3d at 19) (citing In re
Zappos.com, Inc., 108 F.Supp.3d 949, 958–59 (D. Nev. 2015); Green v. eBay, Inc., No. 14-1688,
2015 WL 2066531, at *5 (E.D. La. May 4, 2015); In re Horizon Healthcare Servs., Inc. Data
Breach Litig., No. 13-7418, 2015 WL 1472483, at *6 (D.N.J. Mar. 31, 2015); Key v. DSW, Inc.,
454 F.Supp.2d 684, 689 (S.D. Ohio 2006)). The court added that “since Clapper[,] . . . courts
have been even more emphatic in rejecting ‘increased risk’ as a theory of standing in data-breach
cases.” Id. (quoting SAIC, 45 F.Supp.3d at 28) (citing In re SuperValu, 2016 WL 81792, at *4);
Strautins v. Trustwave Holdings, Inc., 27 F.Supp.3d 871, 876 (N.D. Ill. 2014)) (internal
quotation marks omitted). This Court likewise concludes that Plaintiffs have not demonstrated a
sufficiently substantial risk of future harm stemming from the breach to establish standing.
B. Actual Identity Theft
As noted above, two of the named Plaintiffs—Kirk and Connie Tringler—allege that they
have already suffered an injury from the data breach. They claim that they have experienced tax-
refund fraud in that they have still not received an expected tax refund. See Compl. ¶ 57. While
suffering this type of fraud may constitute a concrete and particularized injury, in order to
demonstrate standing, Plaintiffs must also plausibly assert that their alleged injury is “fairly
traceable to the challenged action.” Clapper, 133 S. Ct. at 1147. And again, while the Plaintiffs’
opposition asserts that the stolen information included social security numbers, the Complaint
does not support that allegation. See supra note 1; Pls.’ Opp’n 17; Compl. ¶ 57. As Defendants
point out, and Plaintiffs do not contest, “[i]t is not plausible that tax refund fraud could have been
conducted without the Tringlers’ Social Security Numbers.” Defs. Reply 5; see also Furlow v.
United States, 55 F. Supp. 2d 360, 362–63 (D. Md. 1999) (“[T]o receive an income tax
exemption . . . , the taxpayer must include the social security number or taxpayer identification
9
number of the claimed individual on his returns.”). Therefore, the Tringlers have not plausibly
alleged that any tax-return fraud they have experienced is fairly traceable to the data breach.
C. Other Claimed Harms
In addition to arguing that the increased risk of future harm confers standing upon
Plaintiffs other than the Tringlers and that the Tringlers have already experienced cognizable
injury, all Plaintiffs contend that they have experienced four other types of harm: (1) economic
harm through having to purchase credit-monitoring services to prevent identity theft and fraud;
(2) economic harm through overpayment for their insurance coverage, the cost of which they
maintain should have covered prophylactic measures against hacking; (3) loss of the intrinsic
value of their personal information; and (4) violation of their statutory rights under consumer
protection acts. None of the arguments in support of these contentions is availing.
First, because the increased risk of future identity theft or fraud is too speculative to
confer standing, Plaintiffs cannot opt in to standing-conferring economic injury by purchasing
protection from that future harm. Where “future harm . . . is not certainly impending,” plaintiffs
“cannot manufacture standing by choosing to make expenditures based on” that “hypothetical”
harm. Clapper, 133 S. Ct. at 1143. In other words, Plaintiffs “cannot create standing by
‘inflicting harm on themselves’” in the form of purchasing credit-monitoring services in order
“to ward off an otherwise speculative injury.” SAIC, 45 F. Supp. 3d at 26 (quoting Clapper, 133
S. Ct. at 1151).
Second, a claim that “some indeterminate part of their premiums went toward paying for
security measures . . . is too flimsy to support standing.” Id. at 30. Like the plaintiffs in SAIC,
Plaintiffs here “do not maintain that the money they paid could have or would have bought a
better policy with a more bullet-proof information-security regime.” Id. Nor have they “alleged
10
facts that show that the market value of their insurance coverage (plus security services) was
somehow less than what they paid.” Id.
Third, also like the plaintiffs in SAIC, “Plaintiffs do not contend that they intended to sell
[their personal] information on the cyber black market in the first place, so it is uncertain how
they were injured” by the alleged loss of the intrinsic value of that information. Id. In addition,
“it is unclear whether or how the data has been devalued by the breach.” Id. Without factual
allegations to support this contention, Plaintiffs do not plausibly assert harm from the loss of
their personal information’s intrinsic value.
Fourth, Plaintiffs contend that this Court must conclude that they have standing because
the D.C. Court of Appeals, they assert, has held that a violation of the D.C. Consumer Protection
Procedures Act can confer standing on its own. See Pls.’ Opp’n 13 (citing Grayson v. AT&T
Corp., 15 A.3d 219, 247 (D.C. 2011)). Setting aside the fact that only the Plaintiffs who are
residents of the District of Columbia assert violations of this D.C. Act, statutory rights cannot
confer Article III standing on a plaintiff who does not have it otherwise. See Spokeo, Inc. v.
Robins, 136 S. Ct. 1540, 1547–48 (2016) (“Injury in fact is a constitutional requirement, and ‘[i]t
is settled that Congress cannot erase Article III’s standing requirements by statutorily granting
the right to sue to a plaintiff who would not otherwise have standing.’” (alteration in original)
(quoting Raines v. Byrd, 521 U.S. 811, 820 n.3 (1997))). This is so because an injury in fact
must be “both ‘concrete and particularized.’” Id. at 1545 (quoting Friends of the Earth, Inc. v.
Laidlaw Envtl. Servs. (TOC), Inc., 528 U.S. 167, 180–81 (2000)). While violation of a
plaintiff’s statutory rights is not irrelevant to standing, it is also not sufficient because it
“concern[s] particularization, not concreteness,” id. at 1548: “Article III standing requires a
concrete injury even in the context of a statutory violation,” id. at 1549. And a “‘concrete’ injury
11
must be ‘de facto’; that is, it must actually exist.” Id. at 1548. Where a violation of a statute
“may result in no harm,” that mere violation is insufficient to confer standing. Id. at 1550. Even
if Plaintiffs’ rights under applicable consumer protection acts have been violated, because they
do not plausibly allege concrete harm, they have not demonstrated that they have standing to
press their claims. 5
III. Conclusion
For the foregoing reasons, Defendants’ motion to dismiss will be granted and the Second
Amended Complaint dismissed without prejudice, and Plaintiffs’ motion to strike will be denied.
An order accompanies this memorandum opinion.
CHRISTOPHER R. COOPER
United States District Judge
Date: August 10, 2016
5
Plaintiffs have filed a notice of supplemental authority flagging for the Court a recently
decided D.C. Circuit case concerning an alleged violation of D.C. laws protecting consumers
from the disclosure of contact information in the course of credit card transactions. See Hancock
v. Urban Outfitters, Inc., No. 14-7047, 2016 WL 3996710 (D.C. Cir. July 26, 2016). The court
held that the plaintiffs failed to establish standing because, although they alleged statutory
violations, they did not allege any concrete injury in fact as a result of those violations. See id. at
*6–7. In dicta, the court noted that “increased risk of fraud or identity theft . . . may satisfy
Article III’s requirement of concrete injury.” Id. at *7. It is this statement that Plaintiffs
emphasize in their notice. However, the D.C. Circuit’s reasoning, and the principal that
increased risk of harm may satisfy the constitutional requirement of concrete injury are entirely
consistent with the Court’s analysis here.
12