Doe v. Sutherland Healthcare Solutions CA2/7

Filed 12/6/21 Doe v. Sutherland Healthcare Solutions CA2/7 NOT TO BE PUBLISHED IN THE OFFICIAL REPORTS California Rules of Court, rule 8.1115(a), prohibits courts and parties from citing or relying on opinions not certified for publication or ordered published, except as specified by rule 8.1115(b ). This opinion has not been certified for publication or ordered published for purposes of rule 8.1115. IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA SECOND APPELLATE DISTRICT DIVISION SEVEN A. DOE et al., B297712 Plaintiffs and Appellants, (Los Angeles County Super. Ct. Nos. v. BC539436, BC539844, BC542556) SUTHERLAND HEALTHCARE SOLUTIONS, INC. et al., Defendants and Respondents. APPEAL from a judgment of the Superior Court of Los Angeles County, Ann I. Jones, Judge. Reversed and remanded with directions. Nelson & Fraenkel, Gretchen M. Nelson, Gabriel S. Barenfeld; Kabateck, Brian Kabateck, Anastasia K. Mazzella; Genie Harrison Law Firm, Genie Harrison; Righetti Glugoski, Matthew Righetti; Law Offices of Kevin T. Barnes and Gregg Lander for Plaintiffs and Appellants. Baker & Hostetler, Teresa C. Chow, Matthew C. Baisley, Paul Karlsgodt and Casie Collignon for Defendant and Respondent Sutherland Healthcare Solutions, Inc. Jones Day, Daniel J. McLoon, David J. Feder; Office of the Los Angeles County Counsel, Brian T. Chu and Brandi M. Moore for Defendant and Respondent County of Los Angeles. __________________________ Following the theft of eight computers from an office of Sutherland Healthcare Solutions, Inc., a company that provides billing and payment processing services to hospitals including those operated by the County of Los Angeles, six affected individuals sued Sutherland and the County for violations of the Confidentiality of Medical Information Act (CMIA) (Civ. Code, § 56 et seq.)1 and negligence in a putative class action lawsuit, alleging their confidential medical and personally identifiable information had been compromised. Their complaint sought statutory damages for the CMIA violation, as provided in sections 56.36, subdivision (b), and 56.101, subdivision (a), and, as actual damages for negligence, the value of the lost information and the cost of credit monitoring services and enhanced security measures undertaken by certain plaintiffs. The trial court granted Sutherland and the County’s motion for summary judgment, ruling as to the CMIA claim that plaintiffs’ circumstantial evidence was insufficient to create a triable issue that the confidential nature of the plaintiffs’ medical information had been breached by an unauthorized individual, as required by the Third District’s decision in Sutter Health v. 1 Statutory references are to this code unless otherwise stated. 2 Superior Court (2014) 227 Cal.App.4th 1546, 1555 (Sutter Health) and this court’s decision in Regents of University of California v. Superior Court (2013) 220 Cal.App.4th 549, 570 (Regents), and as to the negligence cause of action that plaintiffs had not presented evidence they had suffered actual damages or that potentially cognizable damages had been caused by the theft of the computers. The court also ruled that plaintiffs had failed to properly allege the County had violated a mandatory duty imposed by statute and that the County was immune from liability for common law negligence. We reverse the judgment, affirming the order of summary adjudication as to the CMIA cause of action but reversing as to the negligence claim. On remand plaintiffs may renew their motion for leave to amend the complaint, which was denied by the trial court while the summary judgment motion was pending. FACTUAL AND PROCEDURAL BACKGROUND 1. The Theft of Sutherland Computers Containing Confidential Information a. Sutherland’s data handling practice For Sutherland to perform its billing and payment processing services, the County electronically transmitted patient data to Sutherland, which stored the information on a secure shared drive. Sutherland employees who worked with the data emailed documents, including spreadsheets, containing the personal health and personally identifiable information of individuals treated at county facilities. The computers at Sutherland’s Torrance office were configured to save a cache of all emails sent and received by the computer user. As a result, every hard drive had a file containing all emails and attachments sent 3 and received at that computer. Some employees also stored documents on their computers’ hard drive. The network server at Sutherland’s Torrance office was encrypted. Access to individual computers required a username and password, but information stored on those computers was not encrypted. Although the degree of difficulty was debated by the parties’ experts, it was undisputed that it was feasible for someone with the proper skillset to access the data on the password-protected computers. b. The burglary In the evening of February 5, 2014 someone entered Sutherland’s Torrance office and stole eight desktop computers. The stolen computers were among nearly 80 in the office and were spread throughout the 9,000 square foot facility. Six of the stolen computers were used by higher-level employees. Several of the individuals whose computers were taken admitted at deposition that they kept their passwords in a folder on their hard drives and had downloaded patient medical records and personally identifiable information onto their hard drives. The hard drives in the eight stolen desktop computers contained files that included medical information or personally identifiable information for more than 340,000 patients at county health care facilities. Following the theft Sutherland sent notification letters to more than 300,000 patients.2 Law 2 The notice advised the stolen computers “contained personal information including your first and last name, Social Security number, and billing information. In addition, the stolen computers may have included your date of birth, address, diagnoses and other medical information.” “Because of the type of personal information involved,” the notice continued, “we 4 enforcement (the Torrance Police Department, the Los Angeles Police Department, the FBI and the Secret Service) investigated the theft and identified several suspects, but no arrests were made or charges filed. The stolen computers have not been recovered. 2. The Lawsuits The first class action lawsuit arising from the February 5, 2014 burglary was filed against Sutherland in March 2014. On September 25, 2014 three lawsuits were consolidated, and, pursuant to stipulation, on October 31, 2014 a consolidated amended class action complaint was filed by Mario Cazarin, John Galliano, Tanikka Harasim, Oswald Robinson, Tu Kamon and Damon English against Sutherland and the County, asserting causes of action for violation of CMIA, negligence and violations of section 1798.81.5, failure to provide reasonable security procedures and practices with respect to California residents’ personal information, and section 1798.82, failure to provide notice regarding a breach of security regarding California residents’ personal information. Each of the six plaintiffs had received Sutherland’s notice of the computer thefts. Following a partially successful demurrer, plaintiffs on May 11, 2015 filed the operative consolidated second amended class action complaint, alleging causes of action for violation of CMIA and negligence against both Sutherland and the County encourage you to take steps to protect yourself from identity theft. We are offering credit monitoring services [that] will include: 12 months of credit monitoring, a $20,000 insurance reimbursement policy, Healthcare Identity Protection Toolkit™, exclusive educational materials and access to fraud resolution representatives.” 5 and violation of section 1798.82 against Sutherland. Plaintiffs sought actual damages and/or statutory damages for violation of CMIA and actual damages for the failure to protect their medical and personally identifiable information in the other two causes of action. After another pleading challenge, the court sustained the demurrer to the cause of action under section 1798.82 with leave to amend and overruled the demurrer to the CMIA and negligence claims.3 Plaintiffs did not amend further, and the section 1798.82 cause of action is not at issue in this appeal. Sutherland and the County answered the complaint on October 28, 2015. 3. The Motion for Leave To Amend In September 2017, approximately five months after Sutherland and the County moved for summary judgment, plaintiffs sought leave to amend their complaint to add claims against Sutherland for breach of contract (as third party beneficiaries) and for violation of the unfair competition law (UCL) (Bus. & Prof Code, § 17200 et seq.). In support of their request plaintiffs argued the new causes of action related to the same general facts alleged in the operative complaint but added allegations based on evidence obtained from documents recently produced by the County and Sutherland, specifically the contracts between the County and Sutherland and documents “evidencing the County’s promises to Plaintiffs and Class members related to the confidentiality of collected patient 3 The court sustained the demurrer as to all of English’s causes of action against the County based on his failure to file a timely prelawsuit claim under the Government Claims Act. 6 information which, in large part, form the basis for the additional causes of action against Sutherland in the Proposed Third Amended Complaint.” Sutherland and the County opposed the motion, arguing plaintiffs had unreasonably delayed in seeking leave to amend, they would be severely prejudiced if amendment were allowed, and the proposed amendments were futile. The trial court denied the motion in a three-page ruling on October 4, 2017, finding the additional discovery plaintiffs stated had alerted them to the existence of their new claims “was substantially available—either as part of the public record or as part of the documents produced to plaintiffs in 2015—over a year and a half ago.” The court ruled delay without a valid showing of excuse was a significant factor in considering a motion for leave to amend and could be a sufficient reason without more to deny the motion. In addition, the court found amendment at that point in the case would significantly prejudice defendants. The court pointed out that a motion for summary judgment had been filed by defendants and significant discovery had taken place, including “a considerable amount of discovery [by plaintiffs] in order to oppose that motion.” Permitting the amendment would likely lead to another demurrer and then a new motion for summary judgment, preceded by additional discovery. “Such a delay is not only unjustified but would reopen much of the concluded discovery and significantly impair the case management plan that has been structured by this court for over two years. While there is no trial date set, the potentially dispositive motions are set for early next year. Additional causes of action would preclude [that] hearing . . . from going forward in a timely fashion.” 7 Finally, without definitively deciding the issue, the court indicated skepticism about the merits of at least the contract claim in light of express language in the pertinent agreements excluding third party beneficiaries. 4. The Motion for Summary Judgment or, Alternatively, Summary Adjudication In April 2017 Sutherland and the County moved for summary judgment and in January 2018 filed an amended motion. On the CMIA claim, defendants asserted as to four of the six plaintiffs there was no medical information contained in the data that might be accessed from the stolen computers, and as to two of the plaintiffs the stored medical information was not private or confidential because their conditions were publicly observable. Most significantly, contending it was inherently speculative to conclude the motivation for the computer theft was to mine and sell the data the computers may have contained, Sutherland and the County argued plaintiffs could not prove confidential medical information on the stolen computers had been viewed by any unauthorized person, as required by Sutter Health, supra, 227 Cal.App.4th 1546 and Regents, supra, 220 Cal.App.4th 549 to establish a CMIA claim for the negligent release of confidential information. Emphasizing there was no direct evidence that stolen medical information had been accessed, Sutherland and the County argued the circumstantial evidence proffered by plaintiffs (evidence indicating the probable motivation for the burglary was to steal medical information and one of the named plaintiffs and others affected by the burglary had reported attempts at identity theft after the incident), while arguably sufficient to survive a demurrer, as the trial court had held, was insufficient to create a 8 triable issue of fact on summary judgment. In support Sutherland and the County submitted a report from Dr. Marcus K. Rogers, an expert in investigating cybercrimes, stating, as the lower boundary of the true total, an estimated 7 percent of the United States population 16 years or older is a victim of identity theft. Using that estimate, 23,709 of the 338,700 patients whose information was contained on the stolen computers were likely to have been victims of identity theft unrelated to the Sutherland computer theft. Yet, according to Sutherland and the County’s expert, there were only eight reported separate instances of attempted fraud by persons whose data were contained on the stolen Sutherland systems. The Sutherland and County expert also opined that, if someone were to become a victim of financial fraud or identity theft through the use of information taken from the computer systems, it would be completely coincidental that medical information pertaining to a particular individual was viewed, and it would depend on the proximity of one person’s information to another person’s information in a particular file. A second defense expert, Dr. Thomas Holt, opined that, even if cyber criminals had obtained the data stored on the stolen computers, the format of the medical information contained in the local files and the lack of value that cyberhackers attach to medical information made it unlikely that unauthorized persons would have viewed, mined, obtained or sold the medical information. Rather, the personally identifiable information that was also contained in the local files was far more valuable and far less time-consuming to mine than the medical information. As for the negligence claim, Sutherland and the County did not dispute the allegation Sutherland had failed to act reasonably 9 to protect confidential medical information or personally identifiable information stored on the stolen desk top computers, but argued none of the plaintiffs could prove cognizable damages: “Either they claim no concrete losses at all, or they claim losses that the law does not recognize as damages.” Only one of the plaintiffs alleged a specific loss of money (something less than $60 attributed to an unrecognized credit card charge in 2015), and he was unable to provide any information that would tie it to the Sutherland theft. Expenses for credit monitoring services to mitigate a risk of future harm, Sutherland and the County argued, were insufficient to qualify as cognizable injury in a negligence claim; and personal time spent reviewing information related to the theft did not constitute actual harm. In addition, they contended, given the prevalence of identity theft resulting from the many recent large scale data breaches that had occurred throughout the country, plaintiffs could not prove actual causation between the several instances of attempted fraud or identity theft reported by individuals whose information was on the stolen computers (only one of which involved a named plaintiff) and the Sutherland burglary. Finally, the County argued there is no common law governmental tort liability in California. As such, the County asserted, it is immune from liability for common law negligence. 5. Plaintiffs’ Opposition and Defendants’ Reply In their opposition papers plaintiffs argued the stolen data contained confidential medical information as to all six of them. As to the four described by defendants as without medical information in the stolen computers, plaintiffs argued each had “CPT” (current procedural terminology) codes in his or her data, alphanumerics assigned to every task and service a medical 10 practitioner may provide a patient, which are used by insurers to determine reimbursement amounts. A CPT code can be entered into an internet search engine to determine the procedure and/or diagnosis and thus constitutes medical information within the meaning of CMIA, they argued. As to the other two plaintiffs, plaintiffs disputed the extent to which they openly discussed their medical conditions and argued the visibility of a condition alone is insufficient to constitute a waiver of confidentiality of all medical information about the condition. As to Sutherland and the County’s primary argument that plaintiffs could not establish a CMIA violation, plaintiffs insisted it was a reasonable inference from the circumstantial evidence that the stolen data had been improperly viewed or otherwise accessed by unauthorized individuals. First, plaintiffs argued it was a reasonable inference (not mere speculation) the computers had been stolen because of the value on the black market of the data they contained. Plaintiffs provided evidence the estimated value of the individual computers was between $300 and $500. (The Torrance Police Department estimated the total value of the stolen hardware, which included two monitors in addition to the eight computers, at $4,104.) The medical information and personally identifiable information were valued at between $10 and $500 per individual patient on the black market.4 In 4 In a declaration submitted with their opposition papers, plaintiffs’ expert James Van Dyke explained consumers’ personally identifiable information “remains of high value to identity criminals.” Although he stated costs range from under $10 to over $400 depending on quality, citing the Identity Theft Resources Center, he declared, on average, a criminal can purchase personally identifiable information from another criminal on the black market for somewhere between 12 and 11 addition, plaintiffs noted that none of the computer cables or other accessories, except for two monitors, had been taken, nor were the computers taken closest to the door used to enter the facility, suggesting it was not the value of the equipment taken that motivated the thief. They also quoted from the search warrant affidavit of a district attorney’s office investigator that the stolen computers were an “ideal source of PII [personally identifiable information] for the purposes of tax fraud or many other identity theft or fraud schemes.” The investigator also opined the computers had been specifically targeted. Second, plaintiffs provided expert evidence refuting any suggestion it would be difficult to access unencrypted data on the stolen computers. Third, plaintiffs pointed to 10 known incidents of identity fraud or attempted identity theft by individuals affected by the security breach, including use of social security numbers to open fraudulent credit accounts, which they described as “close in time” to the Sutherland breach; and their cybersecurity expert, Christopher Tarbel, opined, to a reasonable degree of certainty, that the stolen data had been viewed and accessed by cybercriminals. As to the negligence claim, plaintiffs argued they were entitled to recover the value of the personal information stolen from them (analogizing to the valuation of stolen access card account information in criminal cases to determine whether the theft is a felony or misdemeanor) and contended expenses incurred for credit monitoring and enhanced home security were also recoverable. Whether those damages were caused by 16 dollars. He continued, “Estimates for health records range from $10 to $50 per individual.” 12 Sutherland and the County’s negligence, they asserted, was a factual issue that was not properly decided on summary judgment. Finally, as to the County, plaintiffs argued their negligence claims were based on the County’s breach of its statutory obligations under CMIA. Concurrently with their opposition papers plaintiffs filed numerous (and detailed) evidentiary objections to Sutherland and the County’s evidence, including to the declarations of Dr. Rogers and Dr. Holt, the two defense experts. In their reply memorandum Sutherland and the County emphasized that only 10 (approximately) of the nearly 400,000 individuals given notice of the theft of the Sutherland computers had alleged any attempted fraud or identity theft and none of those reports involved the misuse of medical information. Plaintiffs’ circumstantial evidence, they argued, was at most speculation about how the information on the stolen computers might have been misused. All plaintiffs actually established was that it was technologically feasible for an unauthorized individual to break into the computers, the medical and personal data were more valuable on the black market than the hardware stolen, and the computers may have been specifically selected by the thief on some basis other than convenience. Quoting this court’s Regents decision, they continued, “[T]he only conclusion supported by the record is that ‘no one (except perhaps the thief) knows what happened . . . ,’ and therefore Plaintiffs cannot prove their ‘medical records were, in fact, viewed by an unauthorized individual.” 13 6. The Court’s Ruling Following oral argument on December 10, 2018, the court on December 19, 2018 issued a 14-page ruling, granting Sutherland and the County’s motion.5 The court first found as to three of the plaintiffs (Galliano, Harasim and English) there were no CPT codes or other medical information pertaining to them in the stolen computers. Accordingly, the court granted the motion for summary adjudication as to the CMIA cause of action as to those three plaintiffs. Although there were CPT codes in the data concerning Kamon, the court agreed with Sutherland and the County that Kamon had presented no evidence her CPT codes disclosed confidential medical information. On that basis the court granted summary adjudication on the CMIA claim against Kamon. Accepting Sutherland and the County’s argument that a visible medical condition precluded a CMIA claim, the court also granted summary adjudication on that cause of action as to Cazarin notwithstanding the presence of confidential medical information concerning him within the data on the stolen computers. In addition, as to Cazarin and the sixth plaintiff, Robinson, the court ruled their contention that anyone had actually viewed their confidential medical information required “layers of speculation.” The court wrote, “At best, Plaintiffs have shown a 5 The court overruled all 123 of plaintiffs’ objections to defendants’ evidence. As to objections 1-59 and 62-90 the court stated, “These are not objections to specific evidence. Rather, these are objections to facts set forth in Defendants’ separate statement.” No other explanation was given for overruling those objections or for any of the other objections. 14 possibility that the password-protected (albeit unencrypted) confidential medical information on the stolen computers was viewed.” But, the court ruled, quoting Sutter Health, supra, 227 Cal.App.4th at page 1558, “that is not the standard.” The court concluded plaintiffs had not presented evidence from which a trier of fact could reasonably infer the computers were targeted for their data. In addition, observing that proof of an actual breach of confidentiality is required, not merely accessibility of the data, the court noted that none of the limited incidents of identity theft (or attempted identity theft) had involved Cazarin or Robinson and thus did not assist in demonstrating a triable issue of fact regarding the “actually viewed” element of their CMIA claim. Accordingly, the court granted the motion for summary adjudication of the CMIA claim as to Cazarin and Robinson. Turning to the negligence claim, the court agreed with Sutherland and the County that plaintiffs had failed to present evidence of actual damages. The court rejected the contention the value of the stolen information is recoverable, pointing out that section 3336, cited by plaintiffs, pertains to the measure of damages for conversion, not negligence. The court then acknowledged that credit monitoring services can constitute actual damages in an action for failure to protect confidential personal information, but ruled plaintiffs had failed to show the required logical and temporal connection between the decision to purchase those services and the alleged breach, noting there had been no showing that any suspicious activity related to plaintiffs involved the type of information contained on the stolen computers. The court also found plaintiffs’ proof of causation insufficient to raise a triable issue, explaining that four of the 15 plaintiffs had not been the victims of any attempted fraudulent activity and the cause of the incidents involving the other two plaintiffs was “purely speculative.” The court granted summary adjudication on the negligence claim on both of those grounds. With regard to the negligence claim against the County, the court ruled, to the extent based on a violation of a mandatory duty imposed by CMIA, it was duplicative of the CMIA claim. No other statute creating a mandatory duty allegedly breached by the County was properly pleaded in the operative complaint. Accordingly, summary adjudication on the negligence claim was granted as to the County for this additional reason. 7. The Motion To Seal Portions of the Ruling On February 14, 2019, nearly two months after the court’s ruling granting the motion for summary judgment, plaintiffs filed an unopposed application to seal portions of the court’s order referring to “Plaintiffs’ confidential and private medical information protected by the Court’s Stipulated Protective Order.” The court granted the motion in part, redacting information regarding Robinson from the public filing, but otherwise denied the motion. In its minute order the court explained, “[W]hile Plaintiffs ‘continue to believe’ that their medical information is private and confidential [fn. omitted], the Court agreed with Defendants’ argument that the medical information of Plaintiffs (except Plaintiff Oswald Robinson) on the stolen computers was not confidential based on facts identified on page 5 of its Order. Those facts are critical to the Court’s ruling, and the right of public access to the basis for the Court’s ruling prevails.” Judgment was entered on March 12, 2019. Plaintiffs filed a timely notice of appeal. 16 DISCUSSION 1. Standard of Review A motion for summary judgment is properly granted only when “all the papers submitted show that there is no triable issue as to any material fact and that the moving party is entitled to a judgment as a matter of law.” (Code Civ. Proc., § 437c, subd. (c).) We review a grant of summary judgment de novo (Samara v. Matar (2018) 5 Cal.5th 322, 338) and, viewing the evidence in the light most favorable to the nonmoving party (Regents of University of California v. Superior Court (2018) 4 Cal.5th 607, 618), decide independently whether the facts not subject to triable dispute warrant judgment for the moving party as a matter of law. (Hampton v. County of San Diego (2015) 62 Cal.4th 340, 347; Schachter v. Citigroup, Inc. (2009) 47 Cal.4th 610, 618.) “Circumstantial evidence is just as good as direct evidence to create a triable issue of fact.” (Hussey-Head v. World Savings & Loan Assn. (2003) 111 Cal.App.4th 773, 780.) 2 Governing Law: CMIA As defined by CMIA, “‘Medical information’ means any individually identifiable information, in electronic or physical form, in possession of or derived from a provider of health care, health care service plan, pharmaceutical company, or contractor regarding a patient’s medical history, mental or physical condition, or treatment.” (§ 56.05, subd. (j).)6 “This definition 6 Section 56.05, subdivision (j), defines “Individually identifiable” for purposes of CMIA as meaning that “the medical information includes or contains any element of personal identifying information sufficient to allow identification of the individual, such as the patient’s name, address, electronic mail address, telephone number, or social security number, or other 17 does not encompass demographic or numeric information that does not reveal medical history, diagnosis, or care. . . . [¶] . . . [T]he mere fact that a person may have been a patient at the hospital at some time is not sufficient.” (Eisenhower Medical Center v. Superior Court (2014) 226 Cal.App.4th 430, 435.) In addition, “[c]onfirmation that a person’s medical record exists somewhere is not medical information as defined under the CMIA.” (Id. at p. 436.) CMIA prohibits health care providers and related entities from disclosing medical information regarding a person without authorization in certain specified instances (§ 56.10) and imposes a duty on health care providers who create, maintain or dispose of medical information to do so in a manner that preserves the confidentiality of that information (§ 56.101, subd. (a)). Any provider who negligently creates, maintains or disposes of medical information is subject to the remedies and penalties “provided under subdivisions (b) and (c) of Section 56.36” (§ 56.101, subd. (a)), which include actual damages suffered by the patient or nominal damages of $1,000 (§ 56.36, subd. (b)(1), (2)). The private cause of action to enforce the duty imposed by section 56.101, subdivision (a), requires “pleading, and ultimately proving, that the confidential nature of the plaintiff’s medical information was breached as a result of the health care provider’s negligence.” (Regents, supra, 220 Cal.App.4th at p. 570; accord, Sutter Health, supra, 227 Cal.App.4th at p. 1555 [“without an actual confidentiality breach, a health care provider has not violated section 56.101 and therefore does not invoke the remedy information that, alone or in combination with other publicly available information, reveals the individual’s identity. ” 18 provided in section 56.36”].) That is, although a patient need not plead and prove the health care provider engaged in some affirmative conduct leading to an unauthorized third party’s access to confidential medical information (Regents, at p. 565 & fn. 12), more than loss of possession of records containing the confidential medical information must be shown. (Sutter Health, at p. 1557 [“[i]t is the medical information, not the physical record (whether in electronic, paper, or other form), that is the focus of [CMIA]”]; Regents, at p. 570 [“more than an allegation of loss of possession by the health care provider is necessary to state a cause of action for negligent maintenance or storage of confidential medical information”].) 3. Plaintiffs Failed To Demonstrate Triable Issues of Fact as to Whether Their Confidential Medical Information Was Improperly Viewed or Otherwise Accessed Acknowledging there is no direct evidence the confidentiality of the stolen medical information had been breached, plaintiffs argue on appeal it is a reasonable inference from the circumstantial evidence they proffered in opposition to the motion for summary judgment—the apparent targeting of the eight computers, the thief’s decision not to steal other types of equipment (other than two monitors), the far greater black market value of the confidential data on the computers than the value of the stolen hardware, the unencrypted nature of those data, the relative ease with which they could be accessed, and at least 10 incidents of identity theft close in time to the incident— that the confidential medical information had been viewed or otherwise accessed by the thief or other unauthorized individuals, creating a triable issue of fact on that essential element of their CMIA cause of action. 19 Sutherland and the County dispute the significance of this inference, arguing it is only one of several possibilities and thus insufficient to defeat summary judgment, quoting Leslie G. v. Perry & Associates (1996) 43 Cal.App.4th 472, 483 (Leslie G.), which held, “Where, as here, the plaintiff seeks to prove an essential element of her case by circumstantial evidence, she cannot recover merely by showing that the inferences she draws from those circumstances are consistent with her theory. Instead, she must show that the inferences favorable to her are more reasonable or probable than those against her.” It may have just been a “smash and grab” burglary, Sutherland and the County argue. Or it may have been a scheme of corporate sabotage intended to persuade the County to move the lucrative contract for patient billing and payment services to one of Sutherland’s competitors based on Sutherland’s demonstrated lack of security. And even if the computers were targeted, the motivation may have been the personally identifiable information they contained, such as social security numbers, rather than medical information. Each of these alternate theories, Sutherland and the County posit, are consistent with certain of the facts known about the burglary. Sutherland and the County’s assertion that it is the role of the trial court on summary judgment—or this court when conducting its de novo review—to determine which of several reasonable but conflicting inferences is more probable directly conflicts with Code of Civil Procedure section 437c, subdivision (c), which provides, “[S]ummary judgment shall not be granted by the court based on inferences reasonably deducible from the evidence if contradicted by other inferences or evidence that raise a triable issue as to any material fact.” Indeed, as 20 Justice Miriam Vogel, the author of Leslie G., explained in rejecting an expansive interpretation of that decision several years later in Hussey-Head v. World Savings & Loan Assn., supra, 111 Cal.App.4th at page 780, citing and quoting Saelzler v. Advanced Group 400 (2001) 25 Cal.4th 763, 767, all that is necessary for a plaintiff opposing summary judgment is to “create a reasonable inference” the defendant violated the statute at issue, since, “to prevail by summary judgment, the moving party must establish that ‘“under no hypothesis is there a material issue of fact that requires the process of trial.”’” (Accord, Savaikie v. Kaiser Foundation Hospitals (2020) 52 Cal.App.5th 223, 229-230 [“‘[g]enerally, when conflicting inferences can be reasonably drawn from the evidence, a triable issue of fact is deemed to exist’”]; Pierson v. Helmerich & Payne Internat. Drilling Co. (2016) 4 Cal.App.5th 608, 627 [same].) The deficiency in plaintiffs’ CMIA proof is not their failure to create triable issues of fact concerning the motivation for the burglary and the likelihood some of the stolen medical information was viewed or otherwise accessed, but their lack of evidence that plaintiffs’ confidential medical information was compromised. The private cause of action for negligent release of confidential medical information created by sections 56.36, subdivision (b), and 56.101, subdivision (a), like the right of privacy itself, “is purely a personal one.” (See Regents, supra, 220 Cal.App.4th at p. 563 & fn. 6.) A patient may sue for statutory damages for a breach of confidentiality only if the compromised information “concern[ed] him or her.” (§ 56.36, subd. (b); see Regents, at p. 563 [“[a]t the very least, the information potentially compromised as a result of the negligent conduct must relate to the individual initiating the action”].) 21 Plaintiffs do not challenge the trial court’s ruling that no confidential medical information concerning Galliano, Kamon or English was stored on the stolen computers. Although they have not made the same express concession regarding Harasim and contest the trial court’s finding that she waived any confidentiality because an aspect of her medical condition was publicly visible—an issue we need not address—they have not argued the trial court erred in its additional finding that there were no CPT codes or other confidential medical information concerning her on the stolen computers. As to these four plaintiffs, then, the court’s order granting summary adjudication of the CMIA cause of action must be affirmed. What about Cazarin and Robinson, the remaining two plaintiffs? As discussed, data on the stolen computers included information (medical information, personally identifiable information or both) for more than 340,000 patients at county health care facilities. According to plaintiffs, after eliminating duplications, there were approximately 460,000 unique documents stored on the eight computers. No single document or discrete set of documents contained all relevant patient information. Even if plaintiffs’ circumstantial evidence supports the reasonable inference that the confidentiality of some of those patients’ medical information was breached following the theft, there is no evidentiary basis—reasonable or otherwise—for inferring that the confidential medical records of Cazarin or Robinson were among them. As the trial court emphasized, none of the approximately 10 incidents of identity theft or attempted identity fraud arguably linked to the Sutherland burglary involved either Cazarin or Robinson. While it is certainly true, as 22 plaintiffs contend, that being a victim of identity fraud is not an element of a CMIA claim—the confidential medical information need only be viewed or accessed, not used—evidence that one type of confidential information had been accessed and used would have supported an inference other aspects of that patient’s stolen data had been viewed, as well. Plaintiffs identified nothing else in the record that would permit a jury to find that records specific to Cazarin or Robinson were among those opened or actually viewed following the theft of the computers, assuming any records were. Ultimately, then, the argument that Cazarin’s and Robinson’s CMIA claims survive summary judgment depends on the contention the circumstantial evidence created a reasonable inference, and thus a triable issue, not only that some of the confidential medical information on the stolen computers was viewed but that all of it was. As to this inference, too, there is no evidentiary basis. To the contrary, defendants’ experts opined that a criminal who intended to mine the stolen information for sale would likely have employed an automated process that targeted specific types of data and would limit any manual review to spot checking to assist that process. The volume of data and variety of attachments, they explained, would have made it infeasible for anyone to manually view all the data even if the contents of the hard drives were accessed.7 Plaintiffs did 7 On appeal plaintiffs contend the trial court’s “blanket” overruling of all 123 of its objections to defendants’ evidence with little or no explanation was an abuse of discretion. Citing primarily Nazir v. United Airlines, Inc. (2009) 178 Cal.App.4th 243, they assert such a ruling affords no meaningful basis for review and could be treated as a failure to rule at all. They may be correct. But if plaintiffs intended that we disregard on appeal 23 not dispute that overall assessment, contesting only the degree of difficulty in viewing unencrypted data on a password protected computer while essentially agreeing a manual review of all data would be unnecessary to effect the data theft. Evidence that suggests data might have been transferred through an automated process from one set of computers to another without some indication all the data were viewed, directly or indirectly, falls short of creating a triable issue whether the confidentiality of medical information personal to Carazin or Robinson was breached.8 the evidence presented by defendants’ experts, it was their burden to renew their objections and present arguments that would support sustaining them. (See Reid v. Google, Inc. (2010) 50 Cal.4th 512, 534 [“presumptively overruled objections can still be raised on appeal, with the burden on the objector to renew the objections in the appellate court”].) Their opening brief entirely fails to do that, and their reply brief is only minimally better. Accordingly, we consider defendants’ expert reports to this limited extent. (See People v. Tully (2012) 54 Cal.4th 952, 1075; Sweetwater Union High School Dist. v. Julian Union Elementary School Dist. (2019) 36 Cal.App.5th 970, 987.) 8 Plaintiffs in their reply brief emphasize that in Regents, supra, 220 Cal.App.4th 549, we referred to “viewed or otherwise accessed,” not simply “viewed” and suggest, without elaboration, the “accessed” standard is somehow broader than “viewed” and that under this more expanded interpretation of CMIA Cazarin’s and Robinson’s claims survive. Plaintiffs misapprehend the import of that language. In Regents we rejected the argument a private cause of action under Civil Code sections 56.36, subdivision (b), and 56.101 requires pleading and proof of an affirmative disclosure by the health care provider. In doing so, we considered regulatory safeguards in the Health and Safety Code, enacted some years after the CMIA provisions at issue in the case, 24 4. Plaintiffs Established Triable Issues of Fact Regarding Actual Damages and Causation for Purposes of Their Negligence Claim To establish a prima facie case of negligence, a plaintiff must prove the defendant owed a duty to the plaintiff, the defendant breached that duty, and the defendant’s breach proximately caused the plaintiff damage. (Lockheed Martin Corp. v. Superior Court (2003) 29 Cal.4th 1096, 1106; Paz v. State of California (2000) 22 Cal.4th 550, 559.) In moving for summary judgment Sutherland and the County did not challenge plaintiffs’ ability to prove duty or breach, arguing only that they lacked evidence of causation and damage. (See Jimenez v. Superior Court (2002) 29 Cal.4th 473, 483 [“‘appreciable, nonspeculative, present injury is an essential element of a tort cause of action’”].) Effectively conflating those arguments, the trial court ruled, although under certain circumstances the costs incurred that expressly addressed “‘unlawful or unauthorized access to’” confidential medical information, as well as its unauthorized “‘use or disclosure.’” (See Regents, at p. 568.) The argument advanced was that “negligently release[ ]” in Civil Code section 56.36, subdivision (b), must mean more than permitting unauthorized “access to” because the Legislature used that term in the new regulatory protections when it meant it. Not so, we held. Nothing in those newer statutes or their legislative history indicated the Legislature in providing additional protections for confidential medical information intended to modify or displace existing private remedies for the negligent storage or disposal of such information, which did not require affirmative disclosures. (Regents, at p. 568) However, because the Legislature had used “access” to refer to the concept we held encompassed by “negligently released,” the statutory term at issue in Regents, we did as well. 25 for credit monitoring services were recoverable as damages in a data breach case (as it had concluded when overruling Sutherland and the County’s demurrer to the negligence cause of action), those costs did not qualify as actual damages here because plaintiffs had failed to present evidence there was a “‘logical and temporal connection between the decision to purchase credit monitoring services and the defendant’s alleged breach.’” We agree credit monitoring costs and other economic losses incurred to combat potential identity theft are recoverable as damages if the remaining elements of a negligence claim arising from the breach of confidentiality of medical or personally identifiable information have been proved.9 The right to recover the cost of periodic monitoring due to an increased risk of future injury created by a defendant’s negligent conduct is well- established in California tort law. In Potter v. Firestone Tire & Rubber Co. (1993) 6 Cal.4th 965, a case involving the illegal dumping of toxic water materials, the Supreme Court held expenditures for prospective medical testing and evaluation that would be unnecessary absent wrongful exposure are “‘detriment proximately caused’” by negligent disposal of toxic substances. (Id. at p. 1005.) Accordingly, the Court held, “[T]he cost of medical monitoring is a compensable item of damages where the proofs demonstrate, through reliable medical expert testimony, that the need for future monitoring is a reasonably certain consequence of a plaintiff’s toxic exposure and that the 9 Although the stolen computers contained only Cazarin’s and Robinson’s confidential medical information, all six plaintiffs’ personally identifiable information was among the data on the computers. 26 recommended monitoring is reasonable.” (Id. at p. 1009;10 see Lockheed, supra, 29 Cal.4th at p. 1105 [“Potter simply specified for the medical monitoring context the traditional requirement that a plaintiff prove causation of damage. Thus, while in Potter we ‘ma[de] it clear that the monitoring must be “additional or different”’ than that previously required [citation], we just as clearly stated that ‘if additional or different tests and examinations are necessitated as a result of the toxic exposure caused by the defendant, then the defendant bears full responsibility for their costs’”].) It is an entirely appropriate application of the principles underlying Potter’s holding that the cost of prospective medical monitoring is cognizable injury in a negligence action to impose responsibility for the cost of credit monitoring services on defendants found liable for a data breach if plaintiffs prove causation. 10 Expanding on its holding the Supreme Court stated, “In determining the reasonableness and necessity of monitoring, the following factors are relevant: (1) the significance and extent of the plaintiff’s exposure to chemicals; (2) the toxicity of the chemicals; (3) the relative increase in the chance of onset of disease in the exposed plaintiff as a result of the exposure, when compared to (a) the plaintiff’s chances of developing the disease had he or she not been exposed, and (b) the chances of the members of the public at large of developing the disease; (4) the seriousness of the disease for which the plaintiff is at risk; and (5) the clinical value of early detection and diagnosis. Under this holding, it is for the trier of fact to decide, on the basis of competent medical testimony, whether and to what extent the particular plaintiff’s exposure to toxic chemicals in a given situation justifies future periodic medical monitoring.” (Potter v. Firestone Tire & Rubber Co., supra, 6 Cal.4th at p. 1009.) 27 As the district court explained in Huynh v. Quora, Inc. (N.D.Cal. 2020) 508 F.Supp.3d 633 in denying a motion for summary judgment in a putative class action asserting claims under California law for negligence and violation of the UCL following a data breach,11 although “California courts have not considered whether time and money lost to credit monitoring from the future threat posed by compromised PII are damages to support a negligence claim” (id. at p. 649), “courts confronting the issue in this Circuit have extended the toxic tort exception to data breach cases in which PII is compromised.” (Id. at p. 650.) The Huyn court cited decisions from the Northern District, Central District and Southern District of California before ruling, “[T]his Court agrees with Plaintiff that the time and money she spent on credit monitoring in response to the Data Breach is cognizable harm to support her negligence claim.” (Ibid.; accord, Schmitt v. SN Servicing Corp. (N.D.Cal., Aug. 9, 2021, No. 21-cv- 3355-WHO) 2021 U.S.Dist. Lexis 149252, *18 [“t]he money and time plaintiffs spent on credit monitoring are both cognizable forms of harm”]; see Lewert v. P.F. Chang’s China Bistro, Inc. (7th Cir. 2016) 819 F.3d 963, 967 [plaintiffs’ alleged injuries— “the increased risk of fraudulent charges and identity theft they face because their data has already been stolen”—“are concrete enough to support a lawsuit”]; Galaria v. Nationwide Mutual Ins. 11 Like Sutherland and the County, the defendant in Huynh v. Quora, Inc., supra, 508 F.Supp.3d 633 moved for summary judgment because “[p]laintiff has not suffered identity theft and asserts that she has voluntarily attempted to repair any hypothetical threat of future harm by temporarily purchasing credit monitoring services and monitoring her accounts.” (Id. at p. 649.) 28 Co. (6th Cir. 2016) 663 Fed.Appx. 384, 388 [“[A]lthough it might not be ‘literally certain’ that Plaintiffs’ data will be misused [citation], there is a sufficiently substantial risk of harm that incurring mitigation costs is reasonable. Where Plaintiffs already know that they have lost control of their data, it would be unreasonable to expect Plaintiffs to wait for actual misuse—a fraudulent charge on a credit card, for example—before taking steps to ensure their own personal and financial security, particularly when Nationwide recommended taking these steps”]; but see Tsao v. Captiva MVP Restaurant Partners, LLC (11th Cir. 2021) 986 F.3d 1332, 1340, 1345 [explaining the Sixth, Seventh, Ninth and D.C. Circuits have all recognized a plaintiff can establish injury-in-fact based on the increased risk of identity theft following a data theft, while the Second, Third, Fourth and Eighth Circuits have declined to find standing on that theory, and concluding in the case before it the plaintiffs’ mitigation costs did not constitute actual injury: “Tsao cannot conjure standing here by inflicting injuries on himself to avoid an insubstantial, non-imminent risk of identity theft”].) As for causation, a question of fact that generally cannot be decided on summary judgment (see State Dept. of State Hospitals v. Superior Court (2015) 61 Cal.4th 339, 353; Shih v. Starbucks Corp. (2020) 53 Cal.App.5th 1063, 1071), plaintiffs presented expert testimony concerning the increased risk of identity theft resulting from data theft and the steps breach victims should take to avoid identity theft as a result of data theft, including purchasing fraud protection programs and monitoring credit bureaus. They also submitted evidence they had incurred costs and suffered other forms of economic loss as a result of the data theft, including credit monitoring expenses. Moreover, following 29 the theft of the computers, “because of the type of personal information involved,” Sutherland “encourage[d]” all of the County health care patients affected by the incident, including plaintiffs, “to take steps to protect yourself from identity theft” by, among other things, subscribing for a one-year credit monitoring program it was providing, along with a $20,000 insurance reimbursement policy. This evidence was more than sufficient to create a triable issue of fact concerning causation— the temporal and logical relationship between Sutherland and the County’s negligence and the actual damages allegedly suffered by plaintiffs.12 5. The County Is Not Immune from a Negligence Claim Predicated on Its Breach of Duty To Preserve the Confidentiality of Medical Information There is no common law tort liability for public entities in California. “Under the Government Claims Act [citation], governmental tort liability must be based on statute.” (B.H. v. County of San Bernardino (2015) 62 Cal.4th 168, 179 (B.H.); see Gov. Code, § 815, subd. (a) [“[e]xcept as otherwise provided by statute: [¶] . . . [a] public entity is not liable for an injury, whether such injury arises out of an act or omission of the public entity or a public employee or any other person”].) Government Code section 815.6 provides one of the statutory exceptions to this 12 It will be the trial court’s responsibility to instruct the jury concerning plaintiffs’ burden to prove the necessity for, and reasonableness of, the mitigation measures for which they seek recovery, translating into this context the five factors the Supreme Court identified in Potter v. Firestone Tire & Rubber Co., supra, 6 Cal.4th at page 1009 as relevant to the determination whether future periodic medical monitoring was justified. (See fn. 10.) 30 general rule of public entity immunity: “Where a public entity is under a mandatory duty imposed by an enactment that is designed to protect against the risk of a particular kind of injury, the public entity is liable for an injury of that kind proximately caused by its failure to discharge the duty unless the public entity establishes that it exercised reasonable diligence to discharge the duty.” (See Haggis v. City of Los Angeles (2000) 22 Cal.4th 490, 499-500 [“section 815.6 provides that the public entity ‘is liable’ for an injury proximately caused by its negligent failure to discharge the duty”].) “Government Code section 815.6 has three elements that must be satisfied to impose public entity liability: (1) a mandatory duty was imposed on the public entity by an enactment; (2) the enactment was designed to protect against the particular kind of injury allegedly suffered; and (3) the breach of the mandatory statutory duty proximately caused the injury. Even when a duty exists, California has enacted specific immunity statutes that, if applicable, prevail over liability provisions.” (B.H., supra, 62 Cal.4th at p. 179.) In the factual background portion of the operative pleading, plaintiffs alleged under CMIA and the Health Insurance Portability and Accountability Act of 1966 (HIPAA) the County had a nondelegable and mandatory duty to take appropriate measures to protect the confidentiality of the medical records of patients treated at County facilities, which it violated in several specific ways. In the second cause of action for negligence plaintiffs incorporated those background allegations by reference and expressly alleged the County (and Sutherland) breached their duty of care to plaintiffs and members of the putative class 31 by failing to properly protect the medical records of the County’s health care patients. The trial court ruled those seemingly adequate allegations of liability were insufficient to overcome the County’s immunity because, to the extent based on CMIA, the negligence cause of action was duplicative of the CMIA claim and, to the extent based on Government Code section 815.6, plaintiffs had failed to allege that statute in the operative pleading. Neither rationale supports the court’s finding the County is immune. As to the first ground, the two causes of action are not identical. As discussed, to prove a violation of CMIA, plaintiffs needed to establish not only that the County was negligent in its creation, maintenance or storage of medical information, but also that the confidentiality of that information had been breached. In contrast, no proof of unauthorized access to the confidential information is required for the cause of action based on the County’s negligent breach of its mandatory duty to safeguard the medical information of the patients it served. Conversely, no actual damages need be proved in the CMIA cause of action; statutory damages would be available if any of the plaintiffs could prove a CMIA violation. Actual damages are an essential element of the negligence claim.13 13 In supplemental responses to the County’s interrogatories served more than two years before the trial court heard the summary judgment motion, plaintiffs stated, subject to various objections, that they and the class members were seeking statutory damages available under CMIA without also identifying actual damages they may have suffered. In its reply memorandum in support of summary judgment, but not its moving papers, the County argued plaintiffs had forfeited their claim to credit monitoring services as damages. In granting 32 The trial court’s second ground for finding immunity was based on a misapplication of the general principle that, to assert liability under Government Code section 815.6 for breach of a mandatory duty, the plaintiff “‘“must specifically allege the applicable statute or regulation.”’” (Washington v. County of Contra Costa (1995) 38 Cal.App.4th 890, 896, quoting Brenneman v. State of California (1989) 208 Cal.App.3d 812, 817.) Although it is somewhat unclear from the opinion in Cerna v. City of Oakland (2008) 161 Cal.App.4th 1340, 1349-1350, the case the trial court cited to support its ruling, the requirement is that the plaintiff specifically identify the statute that created the mandatory duty—here CMIA and HIPAA, which plaintiffs expressly alleged—not that the pleading cite section 815.6. (See, e.g., In re Groundwater Cases (2007) 154 Cal.App.4th 659, 689 [“[a] plaintiff seeking to hold a public entity liable under Government Code section 815.6 must specifically identify the statute or regulation alleged to create a mandatory duty”]; Searcy v. Hemet Unified School Dist. (1986) 177 Cal.App.3d 792, 802 [“[s]ince the duty of a governmental agency can only be created by statute or ‘enactment,’ the statute or ‘enactment’ claimed to establish the duty must at the very least be identified”].) Government Code section 815.6 is certainly “[t]he gateway to recovery.” (Washington, at p. 896.) But it is not the statute that creates the mandatory duty upon which plaintiffs seek recovery summary adjudication in favor of Sutherland and the County on the negligence cause of action, however, the trial court did not adopt that argument, ruling those expenses were too speculative to be recoverable as damages. We, likewise, do not consider this claim for actual damages forfeited. 33 and need not be identified in the complaint in order to be discussed when opposing a motion for summary judgment. 14 In its brief in this court the County adds a third argument, contending, even if the CMIA and negligence causes of action are not duplicative and plaintiffs adequately pleaded CMIA as the statutory basis for the mandatory duty it breached, they are still asserting a common law tort claim (albeit one effectively for negligence per se), barred by governmental immunity, not a statutory claim authorized by Government Code section 815.6. Yet as the County recognizes elsewhere in its brief, this court upheld just such a cause of action for negligence against a public entity based on the doctrine of negligence per se in Alejo v. City of Alhambra (1999) 75 Cal.App.4th 1180, 1184, disapproved on another ground in B.H., supra, 62 Cal.4th at page 188, footnote 6. (See Lehto v. City of Oxnard (1985) 171 Cal.App.3d 285, 292 [“Government Code section 815.6 applies to public entities the familiar rule of tort law that violation of a legislatively prescribed standard of care creates a rebuttable presumption of negligence”].) In sum, the trial court erred in granting the County’s motion for summary adjudication as to plaintiffs’ negligence cause of action based on governmental immunity. 14 The court in Cochran v. Herzog Engraving Co. (1984) 155 Cal.App.3d 405, which the County cites in support of its contention the absence of a citation to Government Code section 815.6 in the operative pleading dooms plaintiffs’ claim, noted that, “[t]o state a cause of action against a public entity, every fact material to the existence of its statutory liability must be pleaded with particularity.” (Cochran, at p. 414, fn. 2.) Plaintiffs have done just that—pleading all facts material to their negligence claim. 34 6. On Remand Plaintiffs Should Have the Opportunity To Renew Their Motion for Leave To Amend We review the denial of a motion for leave to amend a complaint for abuse of discretion. (Branick v. Downey Savings & Loan Assn. (2006) 39 Cal.4th 235, 242 [leave to amend a complaint is entrusted to the sound discretion of the trial court]; Foroudi v. The Aerospace Corp. (2020) 57 Cal.App.5th 992, 1000; Bettencourt v. Hennessy Industries, Inc. (2012) 205 Cal.App.4th 1103, 1111.) Although “[a] trial court has wide discretion to allow the amendment of pleadings, and generally courts will liberally allow amendments at any stage of the proceeding” (Falcon v. Long Beach Genetics, Inc. (2014) 224 Cal.App.4th 1263, 1280), unreasonable delay alone can justify denial of a motion for leave to amend. (Huff v. Wilkins (2006) 138 Cal.App.4th 732, 765 [“‘“even if a good amendment is proposed in proper form, unwarranted delay in presenting it may—of itself—be a valid reason for denial”’”]; see P&D Consultants, Inc. v. City of Carlsbad (2010) 190 Cal.App.4th 1332, 1345; Record v. Reason (1999) 73 Cal.App.4th 472, 486-487; see also Green v. Rancho Santa Margarita Mortgage Co. (1994) 28 Cal.App.4th 686, 692 [“[t]here is a platoon of authority to the effect that a long unexcused delay is sufficient to uphold a trial judge’s decision to deny the opportunity to amend pleadings, particularly where the new amendment would interject a new issue which requires further discovery”].) Here, the trial court denied plaintiffs’ motion based on both delay, finding that the newly discovered information should have been known much earlier notwithstanding plaintiffs’ argument to the contrary, and prejudice, due to the pendency of Sutherland and the County’s summary judgment motion and the impact of 35 an amendment on the timing for that motion, as well as the court’s case management plan. It would be difficult to conclude that ruling was an abuse of discretion: “[W]hen a plaintiff seeks leave to amend his or her complaint only after the defendant has mounted a summary judgment motion directed at the allegations of the unamended complaint, even though the plaintiff has been aware of the facts upon which the amendment is based, ‘[i]t would be patently unfair to allow plaintiffs to defeat [the] summary judgment motion by allowing them to present a “moving target” unbounded by the pleadings.’” (Falcon v. Long Beach Genetics, Inc., supra, 224 Cal.App.4th at p. 1280; accord, Melican v. Regents of University of California (2007) 151 Cal.App.4th 168, 176.) The circumstances on remand will be far different from those existing when the court considered plaintiffs’ motion: The summary judgment motion has been resolved; the CMIA cause of action dismissed; and the nature of the damages at issue in the remaining negligence claim defined and limited. Whatever remained from the court’s original case management plan will need to be revised. Accordingly, to the extent plaintiffs continue to believe they have viable claims for breach of contract or violation of the UCL, they should be permitted to renew their motion for leave to amend. The trial court, of course, retains its discretion to grant or deny any such motion in light of the current procedural posture of the case. 7. The Order Denying in Part the Motion To Seal Portions of the Trial Court’s December 19, 2018 Ruling Must Be Revised We agree with the trial court’s general observation that the considerations under California Rules of Court, rule 2.550(d) in 36 deciding whether to seal papers filed by the parties are not identical to those involved in determining whether to redact previously sealed material when referred to in a court order. Nonetheless, “medical records are constitutionally private and statutorily confidential.” (Oiye v. Fox (2012) 211 Cal.App.4th 1036, 1070.) A person’s medical history “‘falls within the zone of informational privacy protected’ by the state and federal Constitutions.” (Id. at p. 1068.) Accordingly, great care should be taken before disclosing in a court ruling previously sealed medical information concerning identifiable parties. With respect to Galliano, English and Kamon, the trial court ruled there was no confidential medical information concerning them on the stolen computers. Accordingly, there was no reason to describe their medical conditions in the ruling. As to Harasim, although the court also found no confidential medical information pertaining to her was contained on the stolen computers, it additionally ruled Harasim had publicly disclosed enough information about her medical condition to preclude a CMIA claim. Making the minimal redactions (less than a dozen words) requested on page 6 of the ruling would not interfere with a reader’s ability to understand the court’s analysis of this point as to Harasim. Similarly, the explanation that Carazin’s medical condition was visible to others and, therefore, not confidential, need not include a description of that condition. As for the court’s concern it ought not redact information it had found was not confidential, pending a decision in this court affirming the trial court’s ruling, Harasim and Carazin were entitled to have the information treated as confidential. And since we do not find it necessary to decide the issue, they remain entitled to that degree of privacy protection. 37 We agree with the trial court that the information plaintiffs requested be redacted on pages other than five and six of the ruling do not relate to medical information and properly remain part of the publicly filed ruling. DISPOSITION The judgment is reversed. On remand the trial court is to enter a new order granting the motion for summary adjudication as to the CMIA cause of action and denying the motion as to the negligence cause of action. The trial court is further ordered to seal the portions of its December 19, 2018 ruling that contain specific medical or health-related information concerning any of the plaintiffs. The parties are to bear their own costs on appeal. PERLUSS, P. J. We concur: SEGAL, J. FEUER, J. 38