IN THE SUPERIOR COURT OF THE STATE OF DELAWARE
TRUSTWAVE HOLDINGS, INC. )
Plaintiff, )
)
v. )
)
BEAZLEY INSURANCE COMPANY, INC., )
and LEXINGTON INSURANCE COMPANY )
Defendants. )
_____________________________________ )
) C.A. No. N18C-06-162 PRW
BEAZLEY INSURANCE COMPANY, INC., ) CCLD
and LEXINGTON INSURANCE COMPANY )
Counter-Plaintiffs/ )
Third-Party Plaintiffs, )
)
v. )
)
TRUSTWAVE HOLDINGS, INC., )
TRUSTWAVE CORPORATION, and )
AMBIRONTRUSTWAVE, LTD. )
Counter-Defendants/ )
Third-Party Defendants. )
Submitted: December 15, 2023
Decided: March 14, 2024
Upon Plaintiff/Counter-Defendant Trustwave Holdings and Third-Party Defendant
Trustwave Corporation’s Motion for Summary Judgment,
DENIED.
Upon Defendants/Counter and Third-Party Plaintiffs Beazley Insurance Company
and Lexington Insurance Company’s Motion for Partial Summary Judgment,
DENIED.
Upon Third-Party Defendant AmbironTrustWave, Ltd.’s
Motion for Partial Summary Judgment,
GRANTED.
MEMORANDUM OPINION AND ORDER
Jody Barillare, Esquire (argued), Beth Herrington, Esquire (pro hac vice), Zachary
Ryan Lazar, Esquire (pro hac vice), Morgan, Lewis & Bockius, LLP, Wilmington,
Delaware, Attorneys for Plaintiff.
Michael C. Heyden, Esquire (argued), Scott Schmookler (pro hac vice), Gordon
Rees Scully Mansukhani, LLP, Wilmington, Delaware, Attorneys for Defendants.
WALLACE, J.
Before the Court are three motions for summary judgment. The largest is by
Trustwave Corporation and Trustwave Holdings, Inc. (together, “Trustwave
Entities” or “Trustwave”) and seeks resolution of all remaining issues in this case.
Next, Beazley Insurance Company and Lexington Insurance Company (together,
“Insurers”) seek summary judgment on one of their two theories, but the practical
result of granting it would be a complete win for Insurers. Finally,
AmbironTrustwave, Ltd. seeks to be released from this action, claiming it has no
connection to the underlying events.
Those underlying events culminated in the historically large breach of
non-party Heartland Payment Systems’ credit card data. As will be detailed below,
Trustwave Entities had contracted with Heartland to provide data security services.
During the period of Trustwave’s performance, a hacker was able to infiltrate
Heartland’s network and steal millions of credit card numbers. This resulted in
liability for Heartland. Insurers paid a combined $30 million for Heartland’s losses
and now seek to recover that amount from Trustwave Entities as subrogees.
Each party suggests its entitlement to a favorable judgment is undisputed.
With the exception of AmbironTrustwave, Ltd., none is correct. Indeed, despite the
cross-motions, this matter is rife with unresolved with genuine issues of material
fact.
The first such dispute relates to whether a certain contract, upon which
-1-
Insurers’ motion relies, even applies. Application of that contract would require
finding Heartland exercised an option therein, which is in doubt. Too, the interplay
of a relevant limitation of liability and indemnity provision is ambiguous, deterring
summary judgment. Next, there are genuine disputes as to whether Heartland
breached an applicable contract and whether such breach was material. If so, at least
part of Trustwave Entities’ relevant performance would have been excused. Lastly,
there is the central inquiry of whether Trustwave Entities breached warranties made
to Heartland and whether that caused the losses within the meaning of the relevant
indemnity provision. As might be expected, those fact-sensitive questions are not
ripe for summary judgment.
The lone issue that does seem ready for resolution is AmbironTrustwave,
Ltd.’s motion. It claims it is a United Kingdom corporation, located in the United
Kingdom, which has never done business in the United States, and which had no
role in any of the conduct at issue here. Though they oppose the motion, Insurers
offer no true response to any of those contentions. What’s more, although
overlooked by the parties, each claim against AmbironTrustwave, Ltd. was
dismissed by this Court’s opinion on Trustwave Entities’ Motion to Dismiss. So, it
seems clear there are no genuine issues of material fact left to be decided with regard
to AmbironTrustwave, Ltd.
-2-
II. FACTUAL AND PROCEDURAL BACKGROUND
A. THE PARTIES
Beazley Insurance Company is a Connecticut corporation with its principal
place of business in Connecticut.1 Its parent company is a Delaware corporation.2
Beazley is admitted to do business in Delaware and writes insurance policies that
cover risks located in Delaware.3 Lexington Insurance Company is a Delaware
corporation with its principal place of business in Massachusetts.4
Insurers insured non-party Heartland Payment Systems, a company that
facilitated credit card purchases by connecting merchants and banks.5 After
Heartland incurred a loss by having sensitive cardholder data stolen, Lexington
provided $20 million and Beazley provided $10 million to reimburse Heartland.6
Now, subrogated to Heartland’s claims, Insurers seek recovery from Trustwave
Entities.7
Trustwave Holdings, Inc. is a Delaware corporation with its principal place of
1
Insurers’ Answer to the Complaint [hereinafter “Answer to Compl.”] ¶ 3 (D.I. 42).
2
Answer to Compl. ¶ 3.
3
Id. ¶ 3.
4
Id. ¶ 4.
5
Insurers’ Counterclaim and Third-Party Complaint [hereinafter “Countercl.”] ¶ 52 (D.I. 42);
Insurers’ Motion for Summary Judgment Opening Brief [hereinafter “Insurers’ Mot.”] at 1 (D.I.
147); Insurers’ Mot., Ex. 4 [hereinafter “Humphrey Expert Report”] ¶ 9.
6
Countercl. ¶¶ 53-54; Insurers’ Mot., Ex. 7 [hereinafter “Cybertrust Report”] at 4.
7
Countercl. ¶ 55.
-3-
business in Illinois.8 Trustwave Holdings, Inc. was formed in 2005 to effectuate the
merger of Trustwave Corporation and Ambiron, LLC.9 Trustwave Holdings Ltd., a
subsidiary of Trustwave Holdings, Inc., is a United Kingdom corporation with its
principal place of business in the United Kingdom.10 Trustwave Holdings Ltd. was
formerly known as AmbironTrustwave, Ltd.11
Trustwave Entities provided data security services to Heartland during the
period when Heartland suffered its data breach.12 Following Insurers’
reimbursement of Heartland, they demanded indemnification from Trustwave
Entities.13 Thereafter, Trustwave Holdings, Inc., filed its complaint seeking a
declaratory judgment that it is not liable to Insurers.14
B. HEARTLAND’S CONTRACTS WITH TRUSTWAVE ENTITIES
Heartland had three contracts with Trustwave Entities that are relevant to this
litigation. The first is an agreement Ambiron LLC and Heartland entered into in
8
Trustwave Entities’ Answer to the Counterclaim [hereinafter “Answer to Countercl.”] ¶ 3 (D.I.
60).
9
Answer to Countercl. ¶ 4.
10
Id. ¶¶ 5-6.
11
Id. ¶5.
12
Id. ¶11.
13
Id. ¶15.
14
See generally Complaint [hereinafter “Compl.”] (D.I. 1).
-4-
October 2004 (the “2004 Agreement”).15 The purpose of that agreement was for
Ambiron—which later became part of Trustwave Holdings, Inc.—“to validate
[Heartland’s] compliance with the data security regulations of the credit card
associations.”16 A central fixture of the 2004 Agreement was Ambiron’s obligation
to provide monthly “vulnerability scans” of Heartland’s systems.17 Those scans used
proprietary technology to detect potential vulnerabilities in Heartland’s network and
thereby ensure compliance with the data security regulations imposed by Visa,
MasterCard, and Discover.18 Importantly, Ambiron did not agree to indemnify
Heartland under this agreement.19 The 2004 Agreement had an initial term of three
years and provided for automatic renewal.20
The next relevant contract is one between Trustwave Corporation and
Heartland that was entered into in February 2005 (the “2005 Agreement”).21 This is
the agreement upon which Insurers base their summary judgment motion and is the
subject of much dispute.22 The 2005 Agreement—self-titled the “Trustwave
15
Trustwave Entities’ Brief in Opposition to Insurers’ Motion for Summary Judgment
[hereinafter “Trustwave Opp’n Br.”], Ex. 4 [hereinafter “2004 Agreement”] (D.I. 171).
16
2004 Agreement at 3.
17
Id. at 7, 9.
18
Id. at 4, 6-7.
19
See id. at 15-16.
20
Id. at 15.
21
Trustwave Opp’n Brief, Ex. 6 [hereinafter “2005 Agreement] (D.I. 171).
22
See Insurer’s Mot. at 2.
-5-
Preferred Sales Agent Agreement”—is primarily an agreement for Heartland to refer
clients to Trustwave in exchange for a commission.23 But some language in it
suggests Heartland itself would become a Trustwave client by virtue of the
agreement.24 Still other language suggests Heartland merely retained the option to
engage Trustwave’s services25—leading to the parties’ dispute.
The 2005 Agreement does describe Trustwave’s services, but in considerably
less detail than the 2004 Agreement.26 Trustwave warranted it would perform its
services “using reasonable care and skill.”27 Of note, and unlike the 2004
Agreement, the 2005 Agreement provides that Trustwave would indemnify
Heartland for losses “arising out of or connected with any third party claim relating
to” “TrustWave’s breach of any representation or warranty.”28 This agreement had
an initial term of one year and provided for automatic renewal.29
Lastly, there is the contract Trustwave Holdings, Inc., and Heartland entered
23
See 2005 Agreement at 1-4 (all capitals in original).
24
Id. at 3 (“during the Term TrustWave will provide to [Heartland] the services (the ‘TrustWave
Services’)”).
25
Id. (“Should [Heartland] elect to utilize any of the TrustWave Services for its own internal use
. . . .”).
26
Compare 2005 Agreement at 1-2 with 2004 Agreement at 6-13.
27
2005 Agreement at 3, 4.
28
Id. at 8-9.
29
Id. at 6.
-6-
into in December 2007 (the “2007 Agreement”).30 This agreement was presented
by Trustwave to Heartland in October 2007, which corresponds to the end of the
2004 Agreement’s initial term.31 Similarly to the 2004 Agreement, the 2007
Agreement focuses on Trustwave providing its “Compliance Validation Service” to
Heartland.32 That service included conducting monthly vulnerability scans,
providing a “Compliance Validation Report” to document non-compliance with the
applicable standards and suggest remedies, and issuing a “Report on Compliance”
(“ROC”) once Heartland achieved full compliance.33 This description of
Trustwave’s services was again much more detailed than what is contained in the
2005 Agreement.34
The 2007 Agreement also contained an indemnification provision for any
costs “arising out of or relating to” “claims or suits attributable to breaches of the
other party’s express representations and warranties.”35 Trustwave warranted that it
would perform its services “in a professional and workmanlike manner.”36 This
contract also contained a limitation of liability, stating Trustwave would only be
30
Trustwave Opp’n Brief, Ex. 7 [hereinafter “2007 Agreement] (D.I. 171).
31
2007 Agreement cover page; 2004 Agreement at 15.
32
Id. at 3-8.
33
Id. at 3-5, 7.
34
Compare 2007 Agreement at 3-8 with 2005 Agreement at 1-2.
35
2007 Agreement at 9-10.
36
Id. at 9.
-7-
liable for its gross negligence, would only be liable up to the amount of fees paid by
Heartland, and would “in no event . . . be liable for any special, indirect, exemplary,
incidental or consequential losses or damages.”37 This agreement had an initial term
of three years and provided for automatic renewal.38
C. DATA BREACH AND INSURERS’ PAYMENTS
To maintain the security of the payment card data it processed, Heartland’s
computer network was bifurcated.39 One part of the system was unsecured and only
used for standard business tasks, such as email.40 The other side was secured and
only used for processing the sensitive data.41 As described in the relevant industry
standards—the Payment Card Industry Data Security Standard (“PCI DSS”)—
segregating the portions of a company’s network that contain sensitive data is critical
because “seemingly insignificant paths to and from the Internet can provide
unprotected pathways into key systems.”42 Indeed, installing and maintaining a
“firewall” to separate publicly accessible servers from the secured network was the
37
Id. at 9 (all capitals in original).
38
Id. at 10.
39
Trustwave Holdings, Inc., and Trustwave Corporation’s Motion for Summary Judgment
Opening Brief [hereinafter Trustwave’s Mot.] (D.I. 149), Ex. 3 [hereinafter “Sims Dep.”] at 108
(D.I. 160).
40
Sims Dep. at 108.
41
Id.
42
Trustwave’s Mot., Ex. 22 [hereinafter “PCI DSS 1.1”] at 3 (D.I. 164).
-8-
first requirement of the PCI DSS.43 It was a failure of this network segregation that
led to the eventual data theft.44
The digital heist began in late 2007.45 In July of that year, an application
called Payroll Manager, which was housed in the unsecured side of Heartland’s
network, became vulnerable to attack.46 Specifically, Payroll Manager became
susceptible to an “SQL Injection”—an attack that imparts malware by taking
advantage of weaknesses in “public facing information input fields on a web
application such as the ‘First Name’ field.”47 In late December 2007, a hacker
injected malware through Payroll Manager and Heartland detected the malicious
activity in less than two days.48 Although Heartland acted “quickly and aggressively
to scope and contain the incident,” its efforts fell short.49 Remnants of the SQL
attack’s malware “remained unnoticed during the entire time-frame between
December 2007 through January 2009.”50
The SQL injection affecting the corporate side of Heartland’s network wasn’t
43
PCI DSS 1.1 at 3-4.
44
Cybertrust Report at 15.
45
Id. at 17.
46
Id.
47
Id.
48
Id. at 18.
49
Id. at 19, 21.
50
Id. at 21.
-9-
able to steal the payment card data on its own, though. Instead, the hackers needed
access to the payment card network. That access was provided by at least three
digital bridges between the two networks: (1) a “dual VPN connection between the
[Heartland] corporate and [Heartland] processing environments” set up by
Heartland’s Chief Technology Officer, Alan Sims; (2) a “server sitting on the
corporate [Heartland] network whose function is to connect to merchant POS
devices in the field for the purpose of passing install software and firmware updates”;
and, (3) another corporate-network server meant to support “service and help desk
requests and functionality” that “maintained the ability to connect to the production
payment environment.”51 The eventual investigation into the data breach revealed
those connections “could have acted as conduits” to steal the card data from the
secured environment.52 The “earliest known date” of the network’s payment
processing side being infiltrated via one of those connections is May 14, 2008.53
In summary, a hacker injected malware onto the corporate side of Heartland’s
network through Payroll Manager. That malware then migrated to the payment
processing side of the network through connections between the ostensibly separate
networks. Once it infected the payment processing side, the malware enabled the
51
Id. at 22.
52
Id. at 22.
53
Id. at 21.
-10-
hacker to capture and exfiltrate cardholder data.
On October 27, 2008, Visa contacted Heartland about reported fraud that
suggested a data breach.54 The breach was “effectively closed” two days later.55 In
December 2008, Verizon Business was retained to conduct a forensic examination,
leading to the Cybertrust Report.56 By January 2009, Heartland confirmed the data
breach and notified the card companies and law enforcement.57 In all, more than 88
million card numbers were stolen before the breach was contained.58 Naturally,
litigation ensued.
The details of Heartland’s array of extensive liabilities aren’t particularly
relevant to this matter. Suffice it to say, Heartland’s losses far exceeded Insurers’
combined limit of $30 million. So, Lexington and Beazley each paid up to their
limits—$20 million and $10 million, respectively.59 That is the sum Insurers seek
now that they are subrogated to Heartland’s claims.60
D. TRUSTWAVE ENTITIES’ SERVICES TO HEARTLAND
Though the parties dispute which contract applied when, there is no dispute
54
Id. at 4.
55
Id. at 5.
56
Id. at 4.
57
Id. at 4.
58
Insurers’ Mot., Ex. 10 [hereinafter “Visa Qualification Summary”] at 9 (D.I. 147).
59
Compl. ¶ 26; Countercl. ¶¶ 53-54.
60
Countercl. ¶¶ 93-95, 105-07, 192-94.
-11-
that Trustwave Entities were responsible for Heartland’s data security compliance
during the period when its systems were infiltrated. In that role, Trustwave had two
primary responsibilities relevant to this litigation: (1) performing “vulnerability
scans” of Heartland’s systems at least quarterly; and (2) annually ensuring
Heartland’s compliance with the PCI DSS requirements.61 These are the services
Trustwave Entities failed to perform adequately thus triggering indemnification,
Insurers say.62
1. Vulnerability Scans
One requirement of the PCI DSS is vulnerability scans performed by an
approved scan vendor (“ASV”) at least once per quarter.63 Simply put, these scans
consist of the ASV using its automated “scanning tool,” which must first be
approved by the PCI Security Standards Council (“PCI SCC”), to look for potential
weaknesses in a secure system.64 Insurers specifically challenge the scans performed
in August and September 2007 because those scans occurred while Payroll Manager
was vulnerable to attack but before the vulnerability had been exploited.65 Insurers
61
See Trustwave’s Mot., Ex. 30 [hereinafter “2007 ROC”], Ex. 32 [hereinafter “2008 ROC”]
(D.I. 164).
62
Insurers’ Brief in Opposition to Trustwave Holdings, Inc. and Trustwave Corporation’s
Motion for Summary Judgment [hereinafter “Insurer’s Opp’n to Trustwave”] at 1-2. (D.I. 170).
63
Trustwave’s Mot., Ex. 23 [hereinafter “PCI Security Audit Procedures 1.1”] at 39-40 (D.I.
164).
64
See Trustwave’s Mot., Ex. 1 [hereinafter “Leach Report”] ¶ 95 (D.I. 150).
65
Insurers’ Mot. at 10.
-12-
argue these scans were performed under the 2005 Agreement,66 but Trustwave
Entities contend they were performed under the 2004 Agreement.67
An initial step in the scanning procedure—and one key to this dispute—is
setting the scope of the scan.68 In short, only the parts of the network that are
connected to the payment processing activities need to be part of the scan.69 Because
Payroll Manager and the rest of the corporate network was supposed to be
completely separate from the payment processing environment, it was not included
in the vulnerability scans.70 The failure to scan Payroll Manager and catch the SQL
vulnerability therein is the primary basis of Insurers’ summary judgment motion.
Regarding the obligation to correctly set the scope of the scan the PCI Security
Scanning Procedures state:
Merchants and service providers have the ultimate
responsibility for defining the scope of their PCI Security
Scan, though they may seek expertise from ASVs for help.
If an account data compromise occurs via an IP address or
component not included in the scan, the merchant or
service provider is responsible.71
Nonetheless, Insurers’ expert, Andrew Valentine, opined that “[c]ompliance with
66
Id. at 7-8.
67
Trustwave Opp’n Br. at 2-3.
68
Trustwave Opp’n Br., Ex. 2 [hereinafter “PCI Security Scanning Procedures”] at 1-2 (D.I.
171).
69
PCI Security Scanning Procedures at 1-2; see also Leach Report ¶ 98.
70
Insurers’ Mot., Ex. 2-A [hereinafter “Valentine Report”] ¶ 78 (D.I. 147).
71
PCI Security Scanning Procedures at 2.
-13-
PCI DSS standards required Trustwave to properly scope Heartland’s network,
identify the connection between the corporate environment and pay[ment]
processing environment, and scan in[-]scope systems.”72
Separately from the scope of the scans, the parties are also at odds on the effect
that including Payroll Manager in the scans would have had. Specifically,
Mr. Valentine opined that including Payroll Manager in the scans “would have
enabled Heartland to uncover the vulnerability in the Payroll [M]anager in August
or September 2007—prior to the exploitation of the vulnerability in December
2007.”73 Trustwave Entities, meanwhile, argue a scan of Payroll Manager still might
not have caught the vulnerability.74 They point to deposition testimony by a
Trustwave employee, Thomas Leavey, who said a vulnerability scan “may or may
not catch” an “SQL injection issue.”75 Further, according to a disclaimer in the
August 2007 scan report: “it is usually only possible to fully validate [SQL]
vulnerabilities in a test or QA environment.”76
72
Valentine Report ¶ 78.
73
Id. ¶ 79.
74
Trustwave Opp’n Br. at 15-16.
75
Trustwave Opp’n Br., Ex. 16 [hereinafter “Leavey Dep.”] at 109-11 (D.I. 171). His testimony
explained that certain SQL vulnerabilities are the result of application-specific coding errors that
the automated scanning tool is not designed to detect.
76
Trustwave Opp’n Br., Ex. 18 [hereinafter “Aug. 2007 Scan Report”] at 9 (D.I. 171).
-14-
2. 2008 Report on PCI DSS Compliance
The second Trustwave service Insurers challenge is the ROC issued in April
2008.77 In a rare instance of consensus between the parties, they both acknowledge
this work was done pursuant to the 2007 Agreement.78 The purpose of the ROC is
simple: document Heartland’s compliance with the twelve sets of PCI DSS
requirements.79 To do so, Trustwave conducted remote and on-site investigations
into Heartland’s systems, starting in January 2008.80 In the process, Trustwave
interviewed eighteen Heartland employees and reviewed seventeen Heartland
documents, such as Heartland’s applicable policies and procedures.81
An ROC is limited in terms of its goals. As explained by Insurers’ expert,
Mr. Valentine, the ROC is only meant to determine whether a company is complying
with the specific PCI DSS requirements.82 It is not meant to ensure that the
company’s network is actually secure.83 According to Mr. Valentine, “security is
not a thing you can validate.”84 This subtle but important distinction is reflected in
77
Insurers’ Mot. at 2.
78
Id. at 7-8; Trustwave’s Mot. at 19.
79
Trustwave’s Mot., Ex. 32 [hereinafter “2008 ROC”] at 1-2 (D.I. 164).
80
2008 ROC at 7.
81
Id. at 14-15.
82
Trustwave’s Mot. Ex. 13 [hereinafter “Valentine Dep.”] at 66-68 (D.I. 164).
83
Valentine Dep. at 66-68.
84
Id. at 68.
-15-
industry documents. For example, each page of Visa’s “List of Compliant Service
Providers” comes with the disclaimer: “PCI DSS assessments represent only a
‘snapshot’ of security in place at the time of the review, and do not guarantee that
those security controls remain in place after the review is complete.”85 Relatedly,
the 2007 Agreement notes, “use of Trustwave’s services does not guarantee PCI
compliance or that [Heartland]’s systems are secure from unauthorized access.”86
Even the 2008 ROC itself states, “[Heartland] acknowledges that completion of the
PCI assessment and a finding of compliant will not prevent a compromise of
cardholder data on any of [Heartland]’s systems.”87
The ROC was initially completed in March 2008 but was updated the next
month.88 Notably, its preparation took place in the months between Heartland’s
discovery of the SQL injection and the malware’s first appearance on the network’s
payment processing side. Despite Heartland’s knowledge of malware having been
injected through Payroll Manager in December 2007, that event wasn’t fully
disclosed to Trustwave. Rather, according to an internal Trustwave email, Heartland
recounted the incident as Heartland having simply discovered a vulnerability—as
85
Trustwave’s Mot, Ex. 25 (D.I. 164).
86
2007 Agreement at 10.
87
2008 ROC at 2.
88
Id. at cover page, 3
-16-
opposed to an exploitation thereof—on its own.89 This is relevant because Heartland
was contractually obligated to notify Trustwave of “any suspected breach of [its]
systems.”90 The parties dispute whether the unreported malware injection
constituted a “suspected breach.” According to both Mr. Valentine and a Trustwave
employee, evidence of a breach would have been treated with much more diligence
than evidence of a mere vulnerability.91
Additionally, there is the issue of the ROC’s purported recognition of a
connection between the corporate and payment processing realms of Heartland’s
network. In an appendix to the 2008 ROC, there are “Compensating Control”
worksheets.92 As described in the PCI DSS, a compensating control is an alternative
risk-mitigation strategy used “when an entity cannot meet a technical specification
of a [PCI DSS] requirement.”93 Three of the compensating control descriptions
reference access to the payment processing network using a VPN that required two-
factor authentication.94 Insurers rely on statements from their own expert,
Mr. Valentine, and Trustwave’s expert, Troy Leach, to establish that the referenced
89
Trustwave’s Mot., Ex. 33.
90
2007 Agreement at 10.
91
Trustwave’s Mot., Ex. 34 [hereinafter “Skipper Dep.”] at 305 (D.I. 164); Valentine Dep. at
254-59.
92
2008 ROC at 120-24.
93
PCI DSS 1.1 at 16.
94
2008 ROC at 121-23
-17-
VPN connection brought Heartland’s malware-infected corporate network into the
scope of the ROC assessment.95 Mr. Valentine opined that Trustwave’s failure to
account for the VPN connection’s effect on the adequacy of Heartland’s network
segmentation meant the 2008 ROC fell below the standard warranted in the 2007
Agreement.96
A quasi-judicial decision by Visa assessing Heartland’s liability under
corporate regulations determined non-compliance with the PCI DSS requirements
led to the data theft.97 That conclusion was based upon the findings of the Cybertrust
Report that was prepared following Verizon Business’s investigation.98 Most
relevant to this litigation, Visa found Payroll Manager’s vulnerability to SQL
injections and the VPN connections between the corporate and payment processing
portions of Heartland’s network violated the PCI DSS.99 Visa rejected Heartland’s
contention that the 2008 ROC proved compliance, noting the Cybertrust Report
consisted of a more thorough investigation than the 2008 ROC.100 Mr. Valentine,
who was involved in the Cybertrust investigation, explained that a forensic
95
Valentine Report ¶¶ 43-44; Insurers’ Opp’n to Trustwave, Ex. 2 [hereinafter “Leach Dep.”] at
140-57 (D.I. 147).
96
Valentine Report ¶ 44.
97
Insurers’ Opp’n to Trustwave, Ex. 12 [hereinafter “Visa’s Appeal Response”] at 17-28 (D.I.
172).
98
Visa’s Appeal Response at 17.
99
Id. at 18.
100
Id. at 19.
-18-
investigation is a “[c]ompletely different analysis” than an ROC assessment and
“[u]ses different tools to answer a different question.”101
Also of note, the workpapers used in the preparation of the 2008 ROC were
not preserved for use in this litigation.102 Trustwave kept the documents during the
predicate litigation against Heartland,103 but that resolved in March 2015.104 By the
time Insurers sent their demand letter in February 2018,105 Trustwave had discarded
the workpapers.106 Consequently, Insurers now seek a spoliation inference in their
favor.107
E. PROCEDURAL HISTORY
After receiving a letter from Insurers demanding indemnification, Trustwave
Holdings, Inc. filed its complaint seeking a declaratory judgment.108 It sought
declarations that: (1) the 2007 Agreement is the agreement applicable to this dispute;
(2) the statute of limitation bars counterclaims by Insurers; and, (3) it is not liable
101
Valentine Dep. at 286, 296.
102
Trustwave’s Mot. at 22.
103
Trustwave Holdings, Inc., and Trustwave Corporation’s Reply Brief in Support of their Motion
for Summary Judgment [hereinafter “Trustwave’s Reply Br.”] at 24-25 (D.I. 180).
104
Answer to Compl. ¶ 15; Trustwave’s Reply Br. at 24.
105
Answer to Compl. ¶ 15.
106
Trustwave’s Mot. at 22.
107
Insurers’ Opp’n to Trustwave at 30-32.
108
Compl. ¶¶ 5, 19-34.
-19-
for a breach of the 2007 Agreement.109
Insurers initially moved to dismiss the Complaint but withdrew that motion
and instead filed an Answer.110 Accompanying Insurers’ Answer were
counterclaims against Trustwave Holdings, Inc., and third-party claims against
Trustwave Corporation and AmbironTrustwave, Ltd.111 In all, Insurers level 18
counts against Trustwave Entities.112 Insurers’ claims were based on: (1) breach of
contract; (2) breach of express warranty; (3) breach of contractual indemnification;
(4) negligent misrepresentation; and (5) gross negligence.113 In an earlier opinion
the Court dismissed all of Insurers’ non-indemnification claims as barred by the
statute of limitations.114 Accordingly, the only remaining issue is whether Trustwave
Entities are liable for indemnification under either the 2005 or 2007 Agreement.115
Now, each party has moved for at least partial summary judgment. Trustwave
Holdings, Inc., and Trustwave Corporation moved for summary judgment on all
remaining counts.116 AmbironTrustwave Ltd. incorporated that larger motion by
109
Id. ¶¶ 19-34.
110
Insurers’ Notice of Withdrawal at 1 (D.I. 41); Answer to Compl. ¶¶ 1-34.
111
Countercl. ¶¶ 1-234.
112
Id. ¶¶ 60-234.
113
Id. ¶¶ 60-234.
114
Trustwave Hldgs., Inc. v. Beazley Ins. Co., 2019 WL 4785866 (Del. Super. Ct. Sept. 30, 2019).
115
Insurers did not seek indemnity under the 2004 Agreement, presumably because Ambiron did
not agree to indemnify Heartland under that contract.
116
Trustwave’s Mot. at 1.
-20-
reference and separately moved for partial summary judgment as to any claims
against it.117 Insurers moved for summary judgment on its indemnity claim under
the 2005 Agreement but not the 2007 Agreement.118
III. APPLICABLE LEGAL STANDARDS
Summary judgment is warranted “if the pleadings, depositions, answers to
interrogatories, and admission on file, together with the affidavits” show “there is
no genuine issue as to any material fact and that the moving party is entitled to
judgment as a matter of law.”119 The movant bears the initial burden of proving its
motion is supported by undisputed facts.120 If the movant meets its burden, the non-
movant must show there is a “genuine issue for trial.”121 To determine whether a
genuine issue exists, the Court construes the facts in the light most favorable to the
non-movant.122
117
AmbironTrustwave, Ltd.’s Motion for Summary Judgment Opening Brief [hereinafter
“AmbironTrustwave’s Mot.”] at 1 (D.I. 141). Though not mentioned in its brief, it is explained
below that all claims against AmbironTrustwave, Ltd., appear to have already been dismissed.
The indemnification claim in Insurers’ Third-Party Complaint does not reference
AmbironTrustwave, Ltd., and all the non-indemnification claims were dismissed. See Countercl.
¶¶ 185-94; Trustwave Hldgs, 2019 WL 4785866, at *11.
118
Insurers’ Mot. at 1.
119
Del. Super. Ct. Civ. R. 56(c); see also Options Clearing Corp. v. U.S. Specialty Ins. Co., 2021
WL 5577251, at *7 (Del. Super. Ct. Nov. 30, 2021).
120
Options Clearing Corp., 2021 WL 5577251, at *7 (citing Moore v. Sizemore, 405 A.2d 679,
680 (Del. 1979)).
121
Del. Super. Ct. Civ. R. 56(e); see also Brzoska v. Olson, 668 A.2d 1355, 1364 (Del. 1995) (“If
the facts permit reasonable persons to draw but one inference, the question is ripe for summary
judgment.”).
122
Judah v. Del. Tr. Co., 378 A.2d 624, 632 (Del. 1977).
-21-
The “Court may not be able to grant summary judgment ‘if the factual record
has not been developed thoroughly enough to allow the Court to apply the law to the
factual record.’”123 Similarly, summary judgment will not be granted “where it
seems prudent to make a more thorough inquiry into the facts.”124 But “[i]f the Court
finds that no genuine issues of material fact exist, and the moving party has
demonstrated [its] entitlement to judgment as a matter of law, then summary
judgment is appropriate.”125
“These well-established standards and rules apply in full when the parties
have filed cross-motions for summary judgment.”126 If such cross-motions have
been filed “and neither party argues the existence of a genuine issue of material fact,
‘the Court shall deem the motions to be the equivalent of a stipulation for decision
on the merits based on the record submitted with the motions.’”127 But if genuine
123
Radulski v. Liberty Mut. Fire Ins. Co., 2020 WL 8676027, at *4 (Del. Super. Ct. Oct. 28, 2020)
(quoting CNH Indus. Am. LLC v. Am. Cas. Co. of Reading, 2015 WL 3863225, at *1 (Del. Super.
Ct. June 8, 2015)).
124
Zenith Energy Terminals Joliet Hldgs. LLC v. CenterPoint Props. Tr., 2023 WL 615997, at *8
(Del. Super. Ct. Jan. 23, 2023) (first citing Ebersole v. Lowengrub, 180 A.2d 467, 470-72 (Del.
1962); and then citing Pathmark Stores, Inc. v. 3821 Assocs., L.P., 663 A.2d 1189, 1191 (Del. Ch.
1995)).
125
Brooke v. Elihu-Evans, 1996 WL 659491, at *2 (Del. Aug. 23, 1996) (citing Oliver B. Cannon
& Sons, Inc. v. Dorr-Oliver, Inc., 312 A.2d 322 (Del. Super. Ct. 1973)); see also Jeffries v. Kent
Cty. Vocational Tech. Sch. Dist. Bd. of Educ., 743 A.2d 675, 677 (Del. Super. Ct. 1999) (“[A]
matter should be disposed of by summary judgment whenever an issue of law is involved and a
trial is unnecessary.” (citing State ex. rel. Mitchell v. Wolcott, 83 A.2d 759, 761 (Del. 1951))).
126
Radulski, 2020 WL 8676027, at *4 (collecting cases); see also Zenith Energy, 2023 WL
615997, at *8.
127
Zenith Energy, 2023 WL 615997, at *8 (quoting Del. Super. Ct. Civ. R. 56(h)).
-22-
issues of material fact persist despite the cross-motions, “summary judgment is not
appropriate.”128 “To determine whether there is a genuine issue of material fact, the
Court evaluates each motion independently.”129
IV. PARTIES’ CONTENTIONS
Trustwave Entities wage a multi-fronted attack in their quest for summary
judgment. As an opening volley, they claim the 2007 vulnerability scans were
performed under the 2004 Agreement—which had no indemnity provision—and so
the 2005 Agreement is inapplicable to this litigation.130 As for the 2007 Agreement,
under which the 2008 ROC was performed, they make four main arguments: first,
that there is no contractual basis for indemnification because the 2007 Agreement
disclaimed any guarantee of security and limited liability for indirect damages;
second, there is no evidence that they breached a representation or warranty; third,
Heartland’s failure to remediate its vulnerabilities after learning of the SQL injection
in December 2007 broke the causal chain between Trustwave’s allegedly deficient
performance and Heartland’s losses; and fourth, Heartland materially breached the
2007 Agreement by withholding the details of the SQL injection, so Trustwave’s
128
Id. (collecting cases).
129
Id. (citing Motors Liquidation Co. DIP Lenders Tr. V. Allianz Ins. Co., 2017 WL 2495417,
at *5 (Del. Super. Ct. June 19, 2017), aff’d sub nom., Motors Liquidation Co. DIP Lenders Tr. v.
Allstate Ins. Co., 191 A.3d 1109 (Del. 2019)).
130
Trustwave’s Mot. at 13-14, 17-18.
-23-
further performance was excused.131
In countering, Insurers basically take the opposite position on all of
Trustwave’s arguments. They say the 2007 Agreement’s limitation of liability is
belied by that contract’s indemnity provision and, alternatively, is unenforceable.132
They claim there is a triable question of fact as to the “professional and workmanlike
manner” of Trustwave’s preparation of the 2008 ROC and that any such deficiency
was a cause of the data theft because the ROC was completed prior to any data
exfiltration.133 They also maintain Heartland was not obligated to report the malware
injection because it did not qualify as a “suspected breach,” and even if Heartland
was obligated to do so, that contractual breach was immaterial.134 But above all,
they argue the 2007 scans occurred under the 2005 Agreement—whose limitation of
liability carved out indemnity obligations—and were deficient, entitling them to
indemnification under that contract and obviating all of Trustwave Entities’ other
arguments.135
Insurers moved for summary judgment on the two counts from their
counterclaims and third-party complaint related to the 2005 Agreement.136
131
Id. at 3-4.
132
Insurers’ Opp’n to Trustwave at 3.
133
Id. at 26-28
134
Id. at 33-40.
135
Id. at 2-3.
136
Insurers’ Mot. at 1.
-24-
Unsurprisingly, their argument in support thereof is essentially the same as their
most vociferous argument in opposition to Trustwave Entities’ motion.137
Specifically, they claim Trustwave cannot demonstrate a material dispute of fact as
to the reasonableness of the 2007 vulnerability scans because Trustwave doesn’t
have expert testimony on that point.138 Their argument centers on the allegedly
improper scope of the scans—i.e., not scanning Payroll Manager.139 Insurers also
say that the 2005 Agreement doesn’t have a limitation of liability and that the 2007
Agreement’s limitation does not apply to the vulnerability scans.140
Trustwave Entities respond to Insurers’ motion in four ways. First, they
reiterate their argument that the vulnerability scans occurred under the 2004
Agreement, not the 2005 Agreement.141 Next, they cite the PCI DSS Security
Scanning Procedures to refute Insurers’ expert’s claim that Trustwave was
responsible for ensuring the proper scope of the scans.142 They also say there is no
evidence Payroll Manager needed to be within the scope of the scans at the time the
scans were performed.143 And lastly, they insist there is no causation between the
137
Id. at 2-4.
138
Id. at 3-4.
139
Id. at 11-12.
140
Id. at 22-24
141
Trustwave’s Opp’n at 2-3.
142
Id. at 3.
143
Id. at 4.
-25-
allegedly deficient scans and the data theft because scanning Payroll Manager might
not have caught the vulnerability and, in any event, Heartland independently learned
of the vulnerability but still failed to fix the problem.144
Finally, there is AmbironTrustwave, Ltd.’s comparatively simple motion.
According to AmbironTrustwave, Ltd., it was named as a third-party defendant in
error “based on a case of mistaken identity.”145 That entity says it is a United
Kingdom corporation that works exclusively in Europe.146 It believes Insurers
confused it with a d/b/a registered to Trustwave Holdings, Inc.147 That registered
d/b/a is AmbironTrustWave—without “Ltd.”148 AmbironTrustwave, Ltd.,
maintains it has “never done business in the United States,” let alone with
Heartland.149
Undeterred, Insurers oppose AmbironTrustwave, Ltd.’s motion. But Insurers
do little—indeed, nothing—to counter AmbironTrustwave, Ltd.’s argument.
Insurers’ brief doesn’t reference the United Kingdom, doesn’t mention the “d/b/a”
issue, and wholly ignores any notion of a mistaken identity. Instead, Insurers point
to the repeated use of “AmbironTrustWave”—never with the distinguishing
144
Id. at 4-5.
145
AmbironTrustwave’s Mot. at 1.
146
Id. at 2.
147
Id. at 3.
148
Id.
149
Id.
-26-
“Ltd.”—and claim that as proof of AmbironTrustwave, Ltd.’s involvement with the
Heartland services.150
V. DISCUSSION
A. THERE REMAINS A GENUINE DISPUTE OF MATERIAL FACT AS TO WHETHER
THE 2005 AGREEMENT IS APPLICABLE.
A threshold issue in this litigation is determining whether the 2005 Agreement
governed the vulnerability scans done in August and September 2007. If it did,
Insurers’ central argument might be viable. If it didn’t, the 2007 vulnerability scans
become irrelevant because they would have been performed under the 2004
Agreement, which did not provide for indemnification. The parties differ as to
whether Heartland exercised an option it had under the 2005 Agreement to have
Trustwave perform its services under that contract. Insurers’ evidence is light on this
point, but it is not so insubstantial that summary judgment is appropriate.
1. The 2005 Agreement Provided Heartland With an Option to Engage
Trustwave’s Services.
There are two requirements for an option: an underlying offer and a promise
to hold that offer open.151 Unless otherwise provided for in the agreement,
“acceptance [of an option] ‘may be made in words or by other symbols of assent, or
150
Insurers’ Brief in Opposition to AmbironTrustwave, Ltd.’s Motion for Summary Judgment
[hereinafter “Insurer’s Opp’n to AmbironTrustwave”] at 1-3 (D.I. 169).
151
Walsh v. White House Post Prods., LLC, 2020 WL 1492543, at *5 (Del. Ch. Mar. 25, 2020)
(citing 1 Williston on Contracts § 5:15 (4th ed. 1993)).
-27-
it may be implied from conduct.’”152 In this instance, both requirements for an
option are contained in the 2005 Agreement, but evidence of subsequent acceptance
is missing.
The underlying offer contemplated in the 2005 Agreement is the provision of
the “TrustWave Services,” as defined in the Recitals, which includes “vulnerability
scans.”153 This offer and the promise to hold it open is evident in three provisions
of the 2005 Agreement. First, one of the “whereas” clauses in the Recitals states,
“TrustWave desires to provide, and [Heartland] may desire to receive for its own
internal use, the TrustWave Services.”154 Next, and most notably, Section 1(c) of
the 2005 Agreement provides, “[s]hould [Heartland] elect to utilize any of the
TrustWave Services for its own internal use as determined at [Heartland]’s sole
discretion, [Heartland] will pay the applicable fees and expenses set for in Exhibit
B.”155 In addition, with regard to the promise to hold the offer open, Section 1(a) of
the agreement states, “[s]ubject to the terms and conditions of this Agreement,
during the Term TrustWave will provide to [Heartland] the services (the ‘TrustWave
Services’).”156
152
Walsh, 2020 WL 1492543, at *6 (quoting Restatement (Second) of Contracts § 50 cmt. c.).
153
2005 Agreement at 1-2.
154
Id. at 2 (emphasis added).
155
Id. at 3.
156
Id. (emphasis added).
-28-
In arguing that the 2005 Agreement governs the 2007 vulnerability scans,
Insurers emphasize the “will provide . . . the services” language.157 But reading that
provision to automatically require the rendering of Trustwave’s services to
Heartland ignores the language about Heartland “elect[ing] to utilize any of the
TrustWave Services . . . at [its] sole discretion.” Of course, contractual provisions
should neither be read in isolation nor be read to render other contractual language
meaningless.158 The only way to give meaning to the election language of Section
1(c) is to deem the offer of services an option.
Additionally, Insurers cite the 2005 Agreement’s integration clause to suggest
that the 2004 Agreement was repudiated—meaning, in their view, the scans could
only have been performed under the 2005 Agreement.159 But that argument is belied
by the relevant chronology. The 2004 Agreement was entered into with Ambiron,
LLC before it merged with Trustwave Corporation.160 The 2005 Agreement was
entered into with Trustwave Corporation in February 2005—approximately one
157
Insurers’ Mot. at 8.
158
Sunline Com. Carriers, Inc. v. CITGO Petrol. Corp., 206 A.3d 836, 846 (Del. 2019) (“The
contract must . . . be read as a whole, giving meaning to each term and avoiding an interpretation
that would render any term ‘mere surplusage.’” (quoting Osborn ex rel. Osborn v. Kemp, 991 A.2d
1153, 1159-60 (Del 2010)).
159
Insurers’ Mot. at 19 n.58.
160
2004 Agreement passim.
-29-
month before Ambiron and Trustwave merged.161 So, as of the 2005 Agreement’s
effective date, Ambiron wasn’t a party thereto, and so the 2004 Agreement wasn’t
covered by the integration clause.
As for Trustwave Entities’ argument that the 2005 Agreement does not apply,
they focus on the overall gist of the contract and its failure to define payment terms
applicable to a “Level 1” service provider such as Heartland.162 Trustwave Entities
are correct that the 2005 Agreement is clearly more concerned with a
referrals-for-commissions arrangement than the provision of compliance validation
services. Nevertheless, Heartland’s ability to elect to receive the services for itself
under that contract cannot be ignored.163 Also, the fact that the fee schedule in
Exhibit B does not appear to cover entities like Heartland must yield to Section 1(c)’s
specific direction that “[Heartland] will pay the applicable fees and expenses set
forth in Exhibit B in consideration for TrustWave’s performance of such TrustWave
Services to [Heartland].”164 Perhaps recognizing the shortcomings of their principal
arguments, Trustwave Entities retreat to saying, “[a]t most, the language referenced
161
2005 Agreement at 1, 14; AmbironTrustwave’s Mot., Ex. A [hereinafter “Hannagan Aff.”] ¶
3 (D.I. 142).
162
Trustwave’s Mot. at 18.
163
See Sunline Com. Carriers, 206 A.3d at 846.
164
2005 Agreement at 3; see also id. at 12 (“The terms of this Agreement will control in the event
of any inconsistency with the terms of any Exhibit hereto.”). Any ambiguity about how
Heartland’s potential payments would be calculated under the referenced fee schedule is not
determinative of whether Heartland could elect to receive the services in the first place.
-30-
by Insurers creates an option contract” and then argue there is no creditable evidence
Heartland exercised that option.165
2. There Remains a Material Dispute as to Whether Heartland Exercised
Its Option.
At this point, Trustwave’s fallback position that Heartland did not exercise its
option under the 2005 Agreement is the central inquiry. What remains is to evaluate
the evidence that Heartland did. The contract doesn’t specify any required method
for Heartland’s election, so general principles of express or implied assent apply.166
To demonstrate Heartland’s use of Trustwave’s services under the 2005
Agreement, Insurers rely on the branding of the proprietary software used to conduct
the 2007 vulnerability scans.167 Specifically, the 2004 Agreement called for the use
of Ambiron’s “Vital Signs” software.168 The 2005 Agreement, in contrast, referred
to Trustwave’s “TrustKeeper” technology.169 The cover pages of the August and
September 2007 vulnerability scans indicate TrustKeeper was used.170 On its face,
that suggests Heartland exercised its option under the 2005 Agreement. While
Ambiron and Trustwave had merged well before those scans were run. And it is
165
Trustwave’s Opp’n Br. at 23.
166
Walsh, 2020 WL 1492543, at *6 (quoting Restatement (Second) of Contracts § 50 cmt. c.).
167
Insurers’ Reply Br. at 14-16.
168
2004 Agreement at 6.
169
2005 Agreement at 1-2.
170
Insurers’ Mot., Exs. 5, 6.
-31-
possible the combined entity simply unified its branding while leaving its contractual
relationship with Heartland unchanged. That possibility cannot be resolved as fact
here.
It may be in the end that Trustwave Entities’ competing evidence is more
persuasive. First, as a matter of simple timing, the 2004 Agreement was presented
on October 11, 2004, and had a three-year term.171 Correspondingly, the 2007
Agreement was presented on October 10, 2007.172 Though not definitive, that seems
to suggest the 2004 Agreement remained in effect until it was replaced by the 2007
Agreement. Also, Trustwave Entities cite to the testimony of former Trustwave
employees, Allen Hannagan and Phillip Smith.173 Both testified that, to their
knowledge, Trustwave did not provide compliance validation services under the
2005 Agreement.174 Although that evidence may have a bit more heft than the
Insurers’, summary judgment is not typically the proper place for weighing such
competing evidence.175
171
2004 Agreement at 1, 10
172
2007 Agreement at 1.
173
Trustwave’s Opp’n Br. at 22.
174
Trustwave’s Opp’n Br., Ex. 5 at 251-54, Ex. 6 ¶ 9 (D.I. 171). Insurers argue Mr. Smith’s
affidavit should be disregarded because he was not previously disclosed as a witness; but the case
they cite is inapposite and Rule 56(e) and (f) evince a preference for entertaining all relevant
affidavits at this stage in the interest of justice. See Insurers’ Reply Br. at 17.
175
Bobcat N. Am., LLC v. Inland Waste Hldgs., LLC, 2020 WL 5587683, at *7 n.64 (Del. Super.
Ct. Sept. 18, 2020) (“‘If a trial court must weigh the evidence to a greater degree than to determine
that it is hopelessly inadequate ultimately to sustain the substantive burden, summary judgment is
-32-
No doubt, an opponent “cannot defeat a motion for summary judgment by
asking the Court to draw inferences ‘based on surmise, speculation, conjecture, or
guess, or on imagination or supposition.’”176 And certainly, “[n]ot all disputes of fact
will defeat a motion for summary judgment.”177 But at this point, whether the use of
TrustKeeper is attributable to intra-entity conformity or to Heartland’s election to
receive services under the 2005 Agreement remains an issue of material dispute.
3. The Parties’ Alternative Arguments With Regard to the 2005
Agreement Do Not Change the Analysis.
Insurers, for the first time in their reply brief,178 suggest that even if the 2007
scans weren’t performed under the 2005 Agreement, that contract’s warranties and
indemnity provision would still apply to those scans. This argument—though
laudably creative—fails.
Insurers first rely on the warranty in the 2005 Agreement that Trustwave “will
perform the TrustWave Services . . . using reasonable care and skill.”179 They then
inappropriate.’”) (quoting Cerebus Int’l, Ltd. v. Apollo Mgmt., L.P., 794 A.2d 1141, 1150 (Del.
2002)).
176
Ogus v. SportTechie, Inc., 2023 WL 2746333, at *9 (Del. Ch. Apr. 3, 2023) (quoting In re
Asbestos Litig., 2017 WL 510463, at *1 n.2 (Del. 2017)).
177
In re Asbestos Litig., 2012 WL 1413673, at *2 (Del. Super. Ct. Feb. 2, 2012).
178
See Ethica Corp. Fin. S.r.L v. Dana Inc., 2018 WL 3954205, at *3 (Del. Super. Ct. Aug. 16,
2018) (“Courts may disregard or deem waived any arguments made in a reply brief which w[ere]
not raised in the opening brief.” (citing In re Asbestos Litig., 2014 WL 7150472, at *1 n.5 (Del.
Super. Ct. Dec. 5, 2014))).
179
Insurers’ Reply Br. at 17; 2005 Agreement § 5(e).
-33-
point out that the “TrustWave Services” include “vulnerability scans.”180
Connecting those clauses, they suggest that any and all vulnerability scans
performed by Trustwave under any contract would be covered by the 2005
Agreement’s warranty and, thus, its indemnity clause. While textually plausible,
such an expansive interpretation would be antithetical to well-settled principles of
contract interpretation.
“Delaware adheres to the ‘objective’ theory of contracts, i.e., a contract’s
construction should be that which would be understood by an objective, reasonable
third party.”181 “An unreasonable interpretation produces an absurd result or one
that no reasonable person would have accepted when entering the contract.”182
Insurers’ suggested interpretation would be just that. Moreover, such a sweeping
interpretation would function as a judicial rewriting of the 2004 Agreement to
include an unnegotiated-for indemnity provision. That’s not the Court’s role.183
Accordingly, “TrustWave Services” as used in the 2005 Agreement should be
interpreted to only encompass services provided by Trustwave with some connection
180
Id. at 17.
181
Osborn, 991 A.2d at 1159 (quoting NBC Universal v. Paxson Commc’ns, 2005 WL 1038997,
at *5 (Del. Ch. Apr. 29, 2005)).
182
Id. (collecting cases).
183
Intermec IP Corp. v. TransCore, LP, 2023 WL 5661585, at *9 n.94 (Del. Super. Ct. Aug. 23,
2023) (“Delaware courts will ‘not rewrite [a] contract to appease a party who later wishes to rewrite
a contract he now believes to have been a bad deal.’” (alteration in original) quoting Nemec v.
Shrader, 991 A.2d 1120, 1126 (Del. 2010)).
-34-
to that contract.
Not to be outdone, Trustwave Entities put forth an alternative argument of
their own. They argue in a footnote of their Opposition Brief that even if the 2007
scans were performed under the 2005 Agreement, that contract’s indemnity
provision would still be inapplicable in light of its “prompt notice” requirement.184
Possibly due to its unassuming placement, Insurers do not respond to this argument.
Under the 2005 Agreement’s indemnity procedure clause, a lack of notice only
forecloses indemnification if the putative indemnitor “has been materially damaged
or prejudiced as a result of such delay.”185 Trustwave Entities raise their failure to
“obtain and preserve additional relevant evidence close-in-time to the underlying
events” as their material prejudice.186
Though this argument invites a laches-like inquiry into prejudicial delay, that
is largely unnecessary here. The indemnitee’s prompt-notice requirement only
pertains to “the existence of a Third Party Claim.”187 Unquestionably, Trustwave
became aware of then-extant claims against Heartland years ago when this
historically large data breach became public information. So, in practical effect, the
violation of the indemnity procedures was not an actual lack of notice but the lack
184
Trustwave’s Opp’n Br. at 24 n.8; 2005 Agreement § 13(c)(i).
185
2005 Agreement § 13(c)(i).
186
Trustwave’s Opp’n Br. at 24 n.8.
187
2005 Agreement § 13(c)(i).
-35-
of a written document separately providing that notice. Accordingly, Trustwave
Entities are hard pressed to argue they would have kept additional evidence if they
had known third parties had claims against Heartland.
To sum up, although Insurers’ position on the applicability of the 2005
Agreement is tenuous, it meets the threshold to withstand summary judgment. The
software-name discrepancy adduced by Insurers appears to carry their evidentiary
burden, even if just barely. Because of that, Insurers should be able to pursue the
issue of Heartland’s exercise of the 2005 Agreement’s option at trial. Since there is
a genuine dispute as to that material fact, both parties’ summary judgment motions
on the claims under the 2005 Agreement must be denied.
B. THE 2007188 AGREEMENT’S LIMITATION OF LIABILITY’S EFFECT ON THE
INDEMNITY PROVISION IS AMBIGUOUS.
Another central issue, made even more important by the dubious applicability
of the 2005 Agreement, is the application of the 2007 Agreement’s limitation of
liability. The issue is complicated by that provision’s facial inconsistency with the
2007 Agreement’s indemnity provision. Expectedly, Insurers say the indemnity
188
The 2005 Agreement has an analogous limitation of liability that purports to broadly limit
consequential damages and does not carve out indemnity obligations. 2005 Agreement § 14(b).
Insurers nevertheless state that clause doesn’t exist. Insurers’ Mot. at 4. Even Trustwave Entities,
in their roughly 130 pages of briefing—which include alternate defenses should the Court find the
2005 Agreement applies—never once mention it. Accordingly, to the extent that provision may
have benefitted Trustwave, they have waived the argument. See Wescott v. Moon, 2022 WL
10788238, at *1 (Del. Super. Ct. Oct. 18, 2022) (“[I]ssues not briefed are deemed waived.”
(quoting Emerald Partners v. Berlin, 726 A.2d 1215, 1224 (Del. 1999))).
-36-
provision controls, while Trustwave Entities argue for application of the limitation.
For the reasons that follow, the all-encompassing language used by the two contrary
terms creates a seemingly irreconcilable conflict. Resolution of the question, then,
will depend on a fact-sensitive consideration of the parties’ intent, which is a task
ill-suited for summary judgment. In addition to that primary issue, Insurers raise the
question of whether the limitation is enforceable under Delaware law; but neither of
their two arguments on that point are persuasive.
The applicable terms as they appear in the contract provide:
LIMITATION OF LIABILITY AND DISCLAIMER
OF WARRANTY.
a. TRUSTWAVE SHALL NOT BE LIABLE TO
[HEARTLAND] FOR (1) ANY ACTS OR
OMMISSIONS WHICH ARE NOT THE RESULT OF
TRUSTWAVE’S GROSS NEGLIGENCE,
RECKLESSNESS OR WILLFUL MISCONDUCT, (2)
ANY AMOUNTS IN EXCESS OF ANY FEES PAID TO
TRUSTWAVE BY [HEARTLAND] HEREUNDER, (3)
ANY OUTAGES OR SLOW DOWNS OF
[HEARTLAND]’S COMPUTER SYSTEMS
RESULTING FROM THE PERFORMANCE OF ANY
SERVICES, UNLESS SUCH OUTAGES OR SLOW
DOWNS ARE THE RESULT OF TRUSTWAVE’S
GROSS NEGLIGENCE, RECKLESSNESS OR
WILLFUL MISCONDUCT, OR (4) ANY LOSSES,
COSTS, DAMAGES OR EXPENSES INCURRED BY
[HEARTLAND] RESULTING FROM THE
PERFORMANCE OF ANY TEST, UNLESS SUCH ARE
THE RESULT OF TRUSTWAVE’S GROSS
NEGLIGENCE OR WILLFUL MISCONDUCT.
b. THIS AGREEMENT IS A SERVICE AGREEMENT,
-37-
AND EXCEPT AS EXPRESSLY PROVIDED IN THIS
AGREEMENT, TRUSTWAVE DISCLAIMS ALL
OTHER REPRESENTATIONS OR WARRANTIES,
EXPRESS OR IMPLIED, INCLUDING WITHOUT
LIMITATION, ANY WARRANTIES REGARDING
QUALITY, SUITABILITY, MERCHANTABILITY, OR
FITNESS FOR A PARTICULAR PURPOSE
(IRRESPECTIVE OF ANY COURSE OF DEALING,
CUSTOM OR USAGE OF TRADE) OF ANY
SERVICES OR ANY GOODS OR SERVICES
PROVIDED INCIDENTAL TO THE SERVICES
PROVIDED UNDER THIS AGREEMENT.
c. IN NO EVENT SHALL EITHER PARTY BE LIABLE
FOR ANY SPECIAL, INDIRECT, EXEMPLARY,
INCIDENTAL OR CONSEQUENTIAL LOSSES OR
DAMAGES, INCLUDING LOST PROFITS WHETHER
FORESEEABLE OR NOT, WHETHER OCCASIONED
BY ANY FAILURE TO PERFORM OR THE BREACH
OF ANY REPRESENTATION, WARRANTY,
COVENANT OR OTHER OBLIGATION FOR ANY
CAUSE WHATSOEVER.
Indemnification. Each party shall indemnify and hold
harmless the other party and its Affiliates and their
respective officers, directors, employees, partners, agents,
successors and assigns from, and shall defend the other
against, any costs, liabilities, damages or expenses
(including reasonable attorneys’ fees) arising out of or
relating to (i) any third party claim that the services,
software, or any work performed by either party, or their
agents, consultants or contractors under this Agreement
infringes the proprietary rights of any third party; (ii) an
act or omission by either party and/or their employees and
agents relating to any laws or regulations for a protected
class or category of persons, and sexual discrimination or
harassment; (iii) claims for personal injuries, death or
damage to tangible personal or real property to the extent
caused by acts or omissions as a result of gross negligence,
recklessness or willful misconduct of the party or its
-38-
Affiliates, contractors or agents; and (iv) claims or suits
attributable to breaches of the other party’s express
representations and warranties contained in the
Agreement.189
1. The Conflict Between the Indemnity and Limitation of Liability
Provisions Renders Them Ambiguous.
As can be readily gleaned from the above language, there is discord between
those portions of the contract. Both clauses use broad language to describe
functionally opposite rights and obligations. Faced with that tension, the Court must
endeavor to find “an interpretation that harmonizes the provisions,” if possible.190
But, “where a contract contains two conflicting provisions, the document is rendered
ambiguous.”191 “In that case, extrinsic evidence is an appropriate resource for the
court to use in determining the parties’ reasonable intentions at the time of the
contract.”192 “Sources of such evidence include ‘overt statements and acts of the
parties, the business context [of the contract], prior dealings between the parties,
business custom, and usage in the industry.’”193 That need to weigh evidence
189
2007 Agreement at 9-10.
190
Coronado Coal II, LLC v. Blackhawk Land and Res. LLC, 2022 WL 1772246, at *4 (Del.
Super. Ct. May 31, 2022) (quoting GRT Inc. v. Marathon GTF Tech., Ltd., 2012 WL 2356489, at
*4 (Del. Ch. June 12, 2012)).
191
Erving v. ABG Intermediate Hldgs. 2, LLC, 2022 WL 17246320, at *2 (Del. Ch. Nov. 28,
2022) (quoting Duff v. Innovative Discovery LLC, 2012 WL 6096586, at *12 (Del. Ch. Dec. 7,
2012)).
192
Dittrick v. Chalfant, 948 A.2d 400, 406 (Del. Ch. 2007) (citing The Liquor Exch., Inc. v.
Tsaganos, 2004 WL 2694912, at *2 (Del Ch. Nov. 16, 2004)).
193
Id. (alteration in original) (quoting The Liquor Exch., 2004 WL 2694912, at *2).
-39-
militates against granting summary judgment.194
The parties conflicting interpretations are unsurprising. Insurers cite the
phrase “any cost, liabilities, damages or expenses” within the indemnity provision
to suggest that recovery under that clause is “without any limitation whatsoever.”195
Trustwave Entities retort that the “limitation of liability doesn’t carve out
indemnification” and counter with the phrases “any amounts in excess of any fees
paid” and “any special, indirect, exemplary, incidental, or consequential losses or
damages” within the limitation of liability.196 They conclude, “Insurers’ argument
regarding the prominence of the indemnification provision [based on the use of the
word “any”] is applicable with equal weight to the limitation of liability.”197 That
being so, neither parties’ baseline interpretation is significantly more or less
reasonable than the others’.
Recognizing this conflict, Insurers scry for accord. They do so by claiming,
“Delaware courts have generally held that indemnification provisions apply to third-
party claims, whereas the limitation of liability applies to direct first-party loss.”198
That predicate, Insurers say, means the Court can harmonize the provisions by
194
GMG Cap. Invs., LLC v. Athenian Venture Partners I, L.P., 36 A.3d 776, 783-84 (Del. 2012).
195
Insurers’ Mot. at 25.
196
Trustwave’s Opp’n Br. at 38-39.
197
Id. at 39.
198
Insurers’ Mot. at 28 (citing Column Form Tech., Inc. Caraustar Indus., Inc., 2014 WL
2895507, at *5-8 (Del. Super. Ct. June 10, 2014)).
-40-
applying the limitation only to Heartland’s first-party losses and leaving recovery of
third-party liability unchecked. Though one plausible interpretation, it doesn’t settle
the issue.
Insurers’ assertion that indemnification provisions typically only apply to
third-party claims is well-taken. Often, applying an indemnity provision to first-
party losses could lead to the absurd result of a party being obligated to defend
against itself.199 Insurers’ second postulate—that limitations on liability are
generally unique to first-party costs—is less convincing. Without question, in the
case Insurers cite for this point, Column Form Technology, Inc. v. Caraustar
Industries, Inc., the limit on liability did not apply to the indemnity provision.200 But
that is because the limitation of liability clause in that case began: “except for the
parties, [sic] indemnification obligations hereunder.”201 A similar exception can be
found in the 2005 Agreement’s limitation of liability, but not so in the 2007
Agreement.202
Without further support, the notion that indemnity is typically limitless
founders. Be they caps, baskets, temporal or conduct-based restrictions, limitations
199
See Column Form Tech., 2014 WL 2895507, at *8; CIGNEX Datamatics, Inc. v. Lam Rsch.
Corp., 2020 WL 2063924, at *14 n.14 (D. Del. Apr. 29, 2020).
200
2014 WL 2895507, at *3.
201
Column Form Tech., 2014 WL 2895507, at *3 (alteration in original) (all capitals in original).
202
2005 Agreement §14(a); 2007 Agreement at 9.
-41-
on indemnity come in many of forms.203 Though unartfully drafted, it is entirely
conceivable that the limitation of liability in this case was intended to cap
Trustwave’s indemnity obligations to the sum certain of fees received. Moreover,
interpretively adding “except for a third-party claim” seems too great an alteration
to “in no event”204 for this to be considered a truly harmonious reading. It follows
that there is no solitary reasonable interpretation of the interaction between the
indemnity and limitation of liability provisions, and so the contract is ambiguous.
And resolving that ambiguity requires evaluating evidence to a greater extent than
summary judgment typically allows.205
2. To the Extent It Applies, The Limitation of Liability is Enforceable.
Insurers separately argue the limitation of liability is unenforceable as applied
to indemnity claims. They suggest the amount of damages was readily ascertainable
at the time of contracting based on a formula Visa uses to calculate certain damages
following a data breach.206 They also claim the fees-paid limitation is grossly
inadequate.207 Neither of those contentions is persuasive.
203
See, e.g., Aveanna Healthcare, LLC v. Epic/Freedom, LLC, 2021 WL 3235739, at *1 (Del.
Super. Ct. July 29, 2021); EMSI Acquisition, Inc. v. Contrarian Funds, LLC, 2017 WL 1732369,
at *4-5 (Del. Ch. May 3, 2017); ABRY Pr’s V, L.P. v. F&W Acq. LLC, 891 A.2d 1032, 1035 (Del.
Ch. 2006).
204
2007 Agreement at 9.
205
GMG Cap. Invs., 36 A.3d at 783-84 (Del. 2012).
206
Insurers’ Mot. at 31-35.
207
Insurers’ Mot. at 35-37
-42-
Regarding the effect of the Visa’s Account Data Compromise Recovery
program (“ADCR”) damages formula, it does not provide the certainty Insurers
suggest. Putting aside the variability of the necessary inputs to that formula, the
formula only pertains to a specific set of damages owed to a single third party. The
litigation against Heartland continued after a settlement with Visa and included
claims brought by government agencies, non-Visa card brands, financial institutions,
and consumers.208 Also, the ADCR calculation was not an inviolable determination
of damages even with regard to Visa. Instead of strictly complying with Visa’s
ADCR calculation—which, together with a separate “Operating Expense
Recovery,” totaled $138 million—Heartland settled with Visa for $60 million.209 It
follows that the ADCR formula set neither a ceiling nor floor to Heartland’s
exposure. It does little, then, to demonstrate Heartland’s third-party liability was
“easily ascertainable” at the time of contracting.210
Insurers’ contention as to the gross inadequacy of the fees-paid limitation is
also unavailing. To be sure, the fees paid by Heartland—Insurers estimate them at
$80,000—were far less than Heartland’s eventual liability. But the question of a
limitation’s reasonableness is not strictly about the percentage of liability the
208
See Trustwave Hldgs, Inc., 2019 WL 4785866, at *2.
209
Insurers’ Mot. at 15-16.
210
See D’Aguiar v. Heisler, 2011 WL 6951847, at *12 (Del. Com. Pl. Dec. 15, 2011).
-43-
limitation covers. Instead, the inquiry looks at the rationality of the limitation in the
greater context of the contractual relationship. In the analogous arena of home
inspection and fire monitoring contracts, Delaware courts have upheld limitations of
liability in the hundreds of dollars despite damages in the hundreds of thousands of
dollars.211 The reasoning in those cases is applicable here. An entity that provides
security services—be it building integrity, fire safety, or as here, digital security—
does not necessarily become a de facto insurer for its clients. Were it otherwise,
such service providers would be forced to dramatically increase their prices lest they
go bankrupt after a single mistake.
The lone case Insurers cite as an example of an invalid damages provision
does little to undermine that rationale. In Unifirst Corporation v. Borris, the Court
of Common Pleas invalidated a liquidated damages clause as punitive.212 There, a
garment laundering contract called for weekly charges of roughly thirty dollars.213
The contract had a five-year term and a liquidated damages provision valued at 50%
of the remaining charges.214 Based on that clause, despite the modest weekly charges
211
See, e.g., D’Aguiar, 2011 WL 6951847, at *13; Iavarone v. Eagle Eye Home Inspections, LLC,
2019 WL 5692265, at *1-2 (Del. Super. Ct. Nov. 4, 2019); Donegal Mut. Ins. Co. v. Tri-Plex Sec.
Alarm Sys., 622 A.2d 1086, 1087, 1090 (Del. Super. Ct. 1992); White v. Mood, 2020 WL 996736,
at *5 (Del. Super. Ct. Mar. 2. 2020).
212
1999 WL 1847348, at *5 (Del. Com. Pl. May 11, 1999).
213
Unifirst, 1999 WL 1847348, at *1.
214
Id.
-44-
and the lack of upfront expenditures by the launderer, the launderer sought over
$3,000 following a breach by the client.215 That was held to be an invalid penalty,
and damages were instead fixed at lost profits plus interest.216 To the extent that
decision has any bearing on this case, it serves as another example of courts looking
to the fairness of a damages provision in light of the parties’ actual relationship.
Here, Insurers seek to convert the 2007 Agreement into an implied insurance
policy. That does not appear to be the benefit Heartland bargained for. Heartland’s
contractual acknowledgment that “use of Trustwave’s services do not guarantee PCI
compliance or that its systems are secure from unauthorized access” supports the
limited nature of Trustwave’s assurances and related responsibility.217 Though the
fees-paid limitation falls well short of the eventual liability, it is not detached from
reason as Insurers suggest. Instead, it served as a mechanism that motivated
Trustwave Entities’ reasonable efforts by putting their profits on the line without
requiring Trustwave to charge fees commensurate with an insurance provider. So,
assuming the 2007 Agreements limitation of liability applies to the indemnity
provision, it is enforceable.
215
Id.
216
Id. at *5.
217
Trustwave attempts to use this clause as an absolute disclaimer of liability for the damages at
issue here. That argument is unpersuasive. Trustwave may not be strictly liable for imperfections
in their service, but the interpretation Trustwave suggests ignores its express warranty regarding
performing in a “professional and workmanlike manner.”
-45-
C. WHETHER HEARTLAND BREACHED THE 2007 AGREEMENT BY FAILING TO
REPORT THE SQL INJECTION DEPENDS ON RESOLUTION OF AN AMBIGUITY,
AND THE MATERIALITY OF ANY SUCH BREACH IS A DISPUTED FACT.
Trustwave Entities seek to excuse any alleged breach of the 2007 Agreement
by charging Heartland had itself materially breached the contract. There are two
questions implicated by this argument--neither of which is well-suited to summary
judgment. The first issue is whether Heartland’s failure to inform Trustwave of the
December 2007 SQL injection breached its requirement to notify Trustwave of “any
suspected breach of [its] systems.”218 The second is: if that was a breach, was it
sufficiently material to excuse Trustwave’s continued performance.
The issue of whether Heartland breached the contract is not ripe for summary
judgment because it rests on an ambiguity. Specifically, the definition of “suspected
breach” as used in the 2007 Agreement is susceptible to two reasonable but different
meanings, according to the parties. Trustwave contends that a “breach” means the
unauthorized infiltration of Heartland’s network—a definition that would
encompass the SQL injection. Insurers counter that a “breach” does not occur until
data is exfiltrated from the network—a definition that does not include the injection.
Each side cites discovery evidence supporting their desired interpretation. As
explained above, the resolution of contractual ambiguities generally requires
weighing evidence in a way that is incompatible with summary judgment.
218
2007 Agreement at 10.
-46-
Additionally, assuming Heartland’s failure to disclose the SQL injection
breached its notice requirement, whether that was a material failure sufficient to
excuse Trustwave’s performance is a question better left for trial. “Materiality is
predominantly a question of fact.”219 “Whether a breach is material . . . cannot be
readily resolved under the summary judgment standard. The central issues—which
party breached the [contract] and whether said breach is material—are best suited
for [a factfinder’s] determination”220 on a full trial record. As indicated, weighing
the five Restatement factors adopted by this Court to determine materiality221 is not
a task suited for this stage. Thus, resolution of this question should await trial.
As a final note, Insurers suggest Trustwave waived this argument by not
raising “prior material breach” as an affirmative defense. Not so.
Trustwave Entities’ sixth affirmative defense in their answer to Insurers’
counter/third-party complaint is titled “Breach of Contract” and states, “Insured and
Insurer are not entitled to indemnification because Insured breached the applicable
contract or contracts.”222 Insurers cite no authority to suggest that “prior” or
“material” are indispensable words that must be included to validly state this
219
Grottenthaler v. SVN Med, LLC, 2022 WL 17249642, at *5 (Del. Super. Ct. Nov. 28, 2022)
(collecting cases).
220
Grottenthaler, 2022 WL 17249642, at *5 n.55.
221
See Foraker v. Voshell, 2022 WL 2452396, at *8 (Del. Super. Ct. July 1, 2022).
222
Trustwave’s Answer at 37.
-47-
defense. Accordingly, there is no reason to hold Trustwave waived this defense.
D. THE ADEQUACY OF TRUSTWAVE’S PERFORMANCE UNDER THE CONTRACTS
IS A MATERIAL FACT IN DISPUTE. *
Though there are numerous ancillary issues, the heart of this litigation is
whether Trustwave Entities breached their warranties by not performing their duties
with the requisite care and skill. Simply put, this is a quintessential material fact that
is very much in dispute. Regarding both categories of challenged performance—the
2007 vulnerability scans and the 2008 ROC—the applicable standard of care and
Trustwave’s adherence to it remain contested. For that reason, summary judgment
on this issue is not warranted.
1. The 2007 Vulnerability Scans
As explained earlier, this performance issue will only be relevant if Insurers
can demonstrate the 2007 scans were done under the 2005 Agreement. If not, the
2004 Agreement, which did not provide for indemnity, would apply. Assuming the
2005 Agreement applies, there is still a material dispute of fact regarding
Trustwave’s performance. Specifically, it must be determined whether Trustwave
or Heartland was responsible for setting the scope of the scans and, if Trustwave
bore that burden, whether not including Payroll Manager in that scope fell below
“reasonable care and skill.”223
223
2005 Agreement § 5(e).
-48-
Insurers seek summary judgment on this issue insisting their expert’s opinion
is uncontroverted. They say that because Mr. Valentine opined Trustwave was
obligated to set the scope of the scans, Trustwave needed to offer a competing expert
to refute that point. They argue Trustwave’s purportedly belated submission of
Mr. Leach’s expertise on this point is tantamount to a sham affidavit. Even putting
aside the extent to which the pursuit of truth should yield to procedural concerns,
Mr. Valentine’s opinion is not as unimpeachable as Insurers suggest.
Relying on Mr. Valentine’s opinion, Insurers claim Trustwave was obligated
to “properly identify the Payroll Manager as an in-scope system.”224 Trustwave’s
failure to do so is the primary basis of Insurers’ motion. Mr. Valentine’s opinion,
though, is in direct contrast to the actual PCI “Security Scanning Procedures” that
governed the vulnerability scans. Those procedures explicitly state:
Merchants and service providers [here, Heartland] have
the ultimate responsibility for defining the scope of their
PCI Security Scan, though they may seek expertise from
ASVs [here, Trustwave] for help. If an account data
compromise occurs via an IP address or component not
included in the scan, the merchant or service provider is
responsible.225
Insurers suggest the Court should disregard that plain language as an
224
Insurers’ Mot. at 20.
225
PCI Security Scanning Procedures at 2 (emphasis added).
-49-
“unverified reference[] to secondary sources.”226 Understanding that language
requires “unique educational requirements and a professional certification,” Insurers
say.227 But, in refuting Trustwave’s argument that Mr. Valentine’s qualifications do
not extend to the scanning procedures, Insurers recite, “[t]he usual concerns of the
Daubert rule—keeping unreliable expert testimony from the jury—do not apply . . .
when the matter is before the Court on a motion for summary judgment, because the
Court acts as fact-finder.”228 Insurers can’t have it both ways. If the Court is
qualified to examine expert opinions without first considering the expert’s
credentials, surely it can compare an opinion to unequivocal language in controlling
industry documents. At the very least, the Court can determine there is a dispute
worthy of further exploration at trial. Insurers’ comparison of the discrete PCI DSS
Security Scanning Procedures to broad EPA standards on air quality in the context
of a landlord’s obligation to mitigate mold is unpersuasive.229
Furthermore, another dispute relating to Mr. Valentine’s opinion is whether
Payroll Manager needed to be included in the scans, regardless of which entity was
required to set the scope. Basically, there is no direct evidence that Payroll Manager
226
Insurers’ Reply at 6.
227
Id. at 7.
228
Id. at 8 (omission in original) (quoting In re Zurn Pex Plumbing Prods. Liab. Litig., 644 F.3d
604, 613 (8th Cir. 2011)).
229
See id. at 7 (discussing Brandt v. Rokeby Realty Co., 2004 WL 2050519, at *5 (Del. Super. Ct.
Sept. 8, 2004)).
-50-
was connected to the payment processing environment at the time of the 2007
vulnerability scans, so there is no direct evidence it was “in-scope” at that time.
Mr. Valentine explained the reasons he believed that it was connected to the payment
environment in his deposition but confirmed he had no direct evidence of it.
Trustwave Entities cite that lack of certainty as a reason to doubt Mr. Valentine’s
opinion that they violated their warranty of reasonable care by not scanning Payroll
Manager. This, too, seems to be a factual determination better left to trial. So,
summary judgment is yet again uncalled for.
2. The 2008 Report on Compliance
As for the 2008 ROC, Trustwave Entities insist there is no dispute that the
ROC was performed in a “professional and workmanlike manner.”230 They
primarily rely on the limited nature of an ROC—validating compliance with
standards, not actual security—to claim they had no obligation to catch the ongoing
infiltration of Heartland’s systems. Insurers do not attempt to argue the opposite
conclusion is undisputed; instead, they claim resolution of this issue depends on a
battle of the experts. Similarly to the vulnerability scans issue, Insurers point to the
purportedly recognized connection between the payment processing and corporate
components of Heartland’s network, and Trustwave’s failure to properly address
that, as their basis for claiming substandard performance. Insurers also claim
230
2007 Agreement at 9.
-51-
Trustwave’s failure to maintain the relevant workpapers generated during the ROC
assessment is a basis for a spoliation inference. Though the spoliation inference
seems unwarranted, there are material facts in dispute precluding summary
judgment.
As with the vulnerability scans, known junctures between the two sides of
Heartland’s network should have expanded the scope of the ROC to include all
systems connected to the sensitive data. The compensating control worksheets
affixed to the 2008 ROC suggest Trustwave was—or at least should have been—
aware of such connections. In arguing for summary judgment, Trustwave relies
heavily on the fact that “workmanlike” does not contemplate perfection. Insurers
adduce the assignment of Todd Skipper, an inexperienced and they say unqualified
assessor, to this project as evidence of Trustwave’s unprofessionalism. Despite
Trustwave’s protestations, it is clear that there is a genuine dispute as to whether
Trustwave’s performance met the standard they warranted in the 2007 Agreement.
But in resolving that dispute, Insurers isn’t entitled to a spoliation inference
in their favor. Insurers cite Trustwave’s acknowledgement of anticipated litigation
in 2011 and the subsequent failure to preserve the relevant workpapers as the basis
for spoliation. Plausible as that argument seems, it ignores a critical fact. Trustwave
was not preserving the documents because they anticipated this litigation; instead, it
was preserving the papers for potential use in the underlying Heartland litigation.
-52-
The litigation against Heartland concluded in 2015 and Insurers didn’t send their
demand to Trustwave until almost three years later. For context, in the absence of
litigation, Trustwave would have only been required to maintain the work papers for
three years.
Even assuming the conclusion of the Heartland litigation restarted the clock
on Trustwave’s duty to preserve the workpapers—meaning Insurers’ demand
arrived with one month remaining in Trustwave’s obligatory maintenance period—
the sanction of an adverse inference is discretionary.231 It doesn’t appear Trustwave
engaged in anything approaching bad faith by not keeping the papers after the
conclusion of the Heartland litigation, so a spoliation inference here would result in
a windfall to Insurers with no corresponding deterrent effect. So, any evaluation of
Trustwave’s performance starts from a level playing field.
E. CONTRACTUAL LANGUAGE GOVERNS THE APPLICABLE STANDARD OF
CAUSATION, AND CAUSATION REMAINS A MATERIAL FACT IN DISPUTE.
Trustwave Entities contend there can be no dispute that any alleged
misconduct by them was not a proximate cause of Heartland’s losses, entitling them
to summary judgment. Not so. First of all, the 2005 Agreement’s indemnity
provision is triggered by an agreed-upon standard of causation that is less than
231
See Charter Commc’ns Operating, LLC v. Optymyze, LLC, 2021 WL 1811627 (Del. Ch. Jan.
4, 2021) (“Whether and to what extent to impose sanctions is a matter entrusted to the discretion
of the trial court.”)
-53-
proximate cause. Second, even if the 2007 Agreement’s “attributable to” standard
is considered to be coextensive with proximate cause, evaluating causation under
that standard isn’t ripe for summary judgment.
1. The 2005 Agreement’s Indemnity Provision Doesn’t Require
Proximate Cause.
When Trustwave entered the 2005 Agreement—an agreement they seemingly
drafted—it agreed to indemnify Heartland for losses “arising out of or connected
with any third party claim relating to” its breach of an express warranty.232 Now
Trustwave Entities argue that the breach of warranty must be the proximate cause of
the loss for indemnity to apply. But that’s not the protection they bargained for.
In Charney v. American Apparel, Inc., the Court of Chancery interpreted the
analogous phrase “related to the fact” as “equivalent to the meaning of ‘by reason of
the fact.’”233 Our Supreme Court has interpreted “by reason of the fact” to mean
“there is a nexus or causal connection.”234 That “nexus” requirement is not as broad
as but-for causation,235 but implicitly, it must be less than a “causal connection” to
avoid rendering it redundant. So, it follows that “relating to” is not as demanding as
proximate cause. Even if it were, Trustwave is not entitled to summary judgment
232
2005 Agreement § 13(a).
233
2015 WL 5313769, at *14 (Del. Ch. Sept. 15, 2015).
234
Homestore, Inc. v. Tafeen, 888 A.2d 204 (Del. 2005).
235
Charney, 2015 WL 5313769, at *13.
-54-
on the issue of proximate causation.
2. Even Under a Proximate Cause Standard, Trustwave Entities Aren’t
Entitled to Summary Judgment on Causation.
It seems no Delaware court has had to interpret the term “attributable to”—
which is used in the 2007 Agreement’s indemnity provision—in an analogous
context. Without delving into a detailed interpretation of that term, it does at least
facially appear to be closer to proximate causation than “relating to.” Even assuming
it is equivalent to proximate cause, though, Trustwave’s argument is unconvincing.
Notably, “proximate cause is ‘almost always’ a jury issue. Indeed, proximate
cause is ‘fact driven’ and so ‘is to be determined, on the facts, upon mixed
considerations of logic, common sense, justice, policy and precedent.’”236 For that
reason, it can preclude summary judgment where in doubt.237 Here, it is in doubt.
Basically, Trustwave Entities make a contributory-fault argument and say
Heartland knew or should have known of the malware on their systems and failed to
respond appropriately. According to Trustwave, that failure to effectively remediate
the situation absolved Trustwave of any fault in not alerting Heartland. But that
argument is flawed and certainly does not render the issue undisputed.
First, Trustwave underplays its role by suggesting it would have been
236
Torrent Pharma, Inc. v. Priority Healthcare Distrib., Inc., 2022 WL 3272421, at *18 (Del.
Super. Ct. Aug. 11, 2022) (first quoting Mazda Motor Corp. v. Lindahl, 706 A.2d 526, 533 (Del.
1998); and then quoting Duphily v. Del. Elec. Coop., Inc., 662 A.2d 821, 830 (Del. 1995)).
237
Torrent Pharma, 2022 WL 3272421, at *18.
-55-
powerless to make Heartland engage in more comprehensive remediation.
Heartland was required to have approvals issued by Trustwave or another approved
compliance validation service to stay in business. The notion that Heartland would
have ignored Trustwave’s guidance on how to bring its systems into compliance is,
therefore, untenable.
Moreover, one of the components of Trustwave’s services was to assist in
necessary remediation. As stated in the 2007 Agreement regarding vulnerability
scans: “The reports will . . . provide detailed results and remediation action for
technicians. Remediation instructions include CVE-linked vulnerability checks and
best practices defined by Trustwave consultants.”238 As for the ROC aspect of
Trustwave’s services, the 2007 Agreement reads, “any areas of non-compliance will
be identified, documented and reported to [Heartland] for appropriate action,” and
continues, “the ROC will include . . . recommendations for addressing areas of
non-compliance.”239 Similar assurances are provided in 2005 Agreement.240
Perhaps, if Heartland had been given those recommendations, its response would not
have been as woefully inadequate as Trustwave now describes.
Because Trustwave was in a position to compel more conscientiousness from
238
2007 Agreement at 3.
239
Id. at 3, 5.
240
2005 Agreement at 1-2.
-56-
Heartland than Heartland may have volunteered, and because Trustwave was
contractually obligated to assist Heartland in its remediation efforts, Trustwave
cannot claim that Heartland’s deficient remediation spares it from liability. At the
very least, the extent to which the blame lies with Trustwave is a material question
of fact in dispute.
F. THERE IS NO EVIDENCE AMBIRONTRUSTWAVE, LTD. TOOK PART IN THE
RELEVANT CONDUCT, SO ITS MOTION MUST BE GRANTED.
Finally, there is AmbironTrustwave, Ltd.’s narrow motion seeking summary
judgment only as to itself. Insurers present no evidence that AmbironTrustwave,
Ltd.—as opposed to Trustwave Holdings using the d/b/a AmbironTrustWave—took
any part in the disputed conduct. Instead, Insurers simply ignore that issue and
proceed in their opposition brief as if the two “AmbironTrustwave” entities are one
and the same. But, in a footnote of their Reply Brief, Insurers admit that
AmbironTrustWave as used in the vulnerability scans “is a d/b/a of Trustwave.” As
a result, Insurers have not created a genuine dispute as to whether
AmbironTrustwave, Ltd. rendered services to Heartland. Additionally, Insurers’
only counts that survived this Court’s September 2019 decision are against
Trustwave Holdings and Trustwave Corporation.
This motion centers on testimony from a Trustwave representative, Allen
Hannagan, explaining AmbironTrustwave, Ltd., didn’t perform work in the United
-57-
States, didn’t contract with Heartland, and performed no work for Heartland.241
When asked why the name “AmbironTrustWave” appeared on documents related to
Heartland, Mr. Hannagan explained, “that was a d/b/a of Trustwave Holdings.”242
That moniker for Trustwave Holdings is fitting, considering Trustwave Holdings is
the combination of Ambiron, LLC and Trustwave Corporation.243 Mr. Hannagan’s
affidavit expresses the same information and adds that AmbironTrustwave, Ltd.—a
subsidiary of Trustwave Holdings—is based in the United Kingdom and “exists for
the purpose of conducting business in the European Union.”244
Insurers don’t address any of that information. Seemingly unconcerned with
the “Ltd.” versus “d/b/a” distinction, Insurers expressly omit the “Ltd.” when
referring to AmbironTrustwave, Ltd. throughout their papers.245 Insurers then
proceed to point out the several places where the name “AmbironTrustWave”
appears on documents related to Heartland.246 Conspicuously missing from those
references is the distinguishing “Ltd.” Insurers’ lone contention that is responsive
to AmbironTrustWave, Ltd.’s argument is that Mr. Hannagan’s testimony is “self-
241
AmbironTrustwave’s Mot., Ex. D [hereinafter “Hannagan Dep.”] at 5, 245-46 (D.I. 144).
242
Hannagan Dep. at 245-46.
243
Id. at 245.
244
Hannagan Aff. ¶ 5.
245
Insurers’ Opp’n to AmbironTrustwave at 1.
246
Id. at 2, 6-8, 11.
-58-
serving” and thus insufficient to support summary judgment.247
Insurers rely on three cases to argue self-serving affidavits alone cannot
support summary judgment: Wilson v. Metzger,248 Abacus Sports Installations, Ltd.
v. Casale Const., LLC,249 and Fomby v. Frank E. Basil, Inc.250 In Wilson, this Court
stated in a succinct order, “[a]bsent further supporting evidence, a self-serving,
conclusory affidavit alone is insufficient to justify summary judgment.”251 That
comment was made in the context of denying a plaintiff-inmate’s motion for
summary judgment after he submitted a “conclusory” affidavit that “merely mirrored
[the allegations] in the complaint.”252 This Court made similar statements in Abacus
Sports Installations en route to denying a defendant’s pre-discovery motion for
summary judgment based on “self-serving” affidavits that were “little more than
vague recollections.”253 Lastly, in Fomby, this Court rejected a defendant-doctor’s
motion for summary judgment based on the doctor’s own affidavit saying the
treatment be rendered was “appropriate” and “proper.”254
247
Id. at 11-12.
248
2021 WL 2355230, at *1 (Del. Super. Ct. June 9, 2021).
249
2011 WL 5288866, at *2 (Del. Super. Ct. July 21, 2011).
250
1986 WL 9021, at *1-2 (Del. Super. Ct. Aug. 18, 1986).
251
2021 WL 2355230, at *1 (citing Abacus Sports Installations, 2011 WL 5288866, at *2).
252
Wilson, 2021 WL 2355230, at *1.
253
2011 WL 5288866, at * 2.
254
1986 WL 9021, at *1-2.
-59-
There are meaningful differences between those cases and
AmbironTrustwave, Ltd.’s motion here. Most critical is the level to which the
affidavits in the other cases are “conclusory” and the Insurers’ evidence is absent.
In Wilson and Fomby, the affidavits were simply renewed contentions bereft of
specific factual support.255 In Abacus Sports Installations, not only were the
affidavits limited to “vague recollections,” but they were also submitted before any
discovery had taken place.256 By contrast, in this instance, expansive discovery has
already occurred, and Mr. Hannagan’s testimony provides a well-reasoned and
uncontroverted explanation as to AmbironTrustwave, Ltd.’s conclusion that it was
not involved in the disputed conduct. In fact, the most conclusory allegation in this
portion of the briefing is Insurers’ implied claim that Mr. Hannagan is lying. As
Insurers recognize, “[t]he mere suggestion that [a witness’s] credibility may be in
question does not suffice to create an[] issue of fact.”257
Further, and even more importantly, apparently losing track of their web of
contentions, Insurers actually admit in their reply brief that AmbironTrustwave as
used in the vulnerability scan documents “is a d/b/a of Trustwave.”258 Conveniently,
255
Wilson, 2021 WL 2355230, at *1; Fomby, 1986 WL 9021, at *1-2.
256
2011 WL 5288866, at * 2.
257
Insurers’ Reply Brief in Support of their Motion for Summary Judgment [hereinafter “Insurers’
Reply Br.”] at 8 (second alteration in original) (quoting Khan v. Del. State Univ., 2016 WL
3575524, at *12 (Del. Super. Ct. June 24, 2016)).
258
Insurers’ Reply Br. at 14 n.29.
-60-
they even provide the notarized form registering “AmbironTrustwave” as a trade
name for Trustwave Holdings.259 Not only does that admission quell their argument
that the trade name’s usage implicates the European entity, but the provided form
means Mr. Hannagan’s testimony is not the sole support for AmbironTrustwave,
Ltd.’s motion. For those reasons, there is no genuine dispute as to
AmbironTrustwave, Ltd.’s involvement in providing services to Heartland and its
prayer for summary judgment is granted.260
VI. CONCLUSION
For the foregoing reasons, Trustwave Entities’ Motion for Summary
Judgment be DENIED; Insurers’ Motion for Partial Summary Judgment is
DENIED; and AmbironTrustwave, Ltd.’s Motion for Partial Summary Judgment is
GRANTED.
IT IS SO ORDERED.
259
Insurers’ Reply Br., Ex. 5 (D.I. 179).
260
What’s more, though undiscussed by the parties, a simple fact renders this analysis
superfluous: there are presently no claims against AmbironTrustwave, Ltd. Its motion seeks
summary judgment on Insurers’ Counterclaim Counts IV and V, as well as Count III of Insurers’
third-party complaint. AmbironTrustwave’s Mot. at 1. But Counterclaim Counts IV and V are
“against Trustwave Holdings.” Countercl. at 47, 50. And Count III of the Insurers’ third-party
complaint is “against Trustwave Corporation.” Countercl. at 67. Only two Counts were ever
brought against AmbironTrustwave, Ltd.—Counts IV and VI of the third-party complaint.
Countercl. at 69, 72. Those Counts pleaded negligent misrepresentation and gross negligence.
Countercl. at 67, 71. As such, they were dismissed by this Court’s earlier ruling on Trustwave
Entities’ Motion to Dismiss. Trustwave Hldgs, Inc., 2019 WL 4785866, at *11 (dismissing
“Insurers’ Counterclaims and Third-Party Claims for . . . (iii) negligent misrepresentation, and
(iv) gross negligence”). With no claims against AmbironTrustwave, Ltd. left to be decided, no
factual dispute could be material with regard to that entity, so for that reason too it is due summary
judgment.
-61-