ALLIANCE FOR RETIRED AMERICANS et al v. BESSENT et al
Filing
42
MEMORANDUM OPINION accompanying 41 Order. Signed by Judge Colleen Kollar-Kotelly on 03/07/2025. (lcckk1)
UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
ALLIANCE FOR RETIRED
AMERICANS, et al.,
Plaintiffs,
v.
Civil Action No. 25-0313 (CKK)
SCOTT BESSENT, in his official capacity
as Secretary of the Treasury, et al.,
Defendants.
MEMORANDUM OPINION
(March 7, 2025)
For a time, parts of Silicon Valley embraced an unofficial credo of disruption: “Move Fast
and Break Things.”1 Plaintiffs, three large membership organizations, suggest that parts of the
Executive Branch are now doing the same. Specifically, Plaintiffs argue that officials in the
Department of the Treasury are moving so fast that preliminary injunctive relief is necessary to
protect their members from irreparable harm. And they contend that, absent that relief, Treasury
will break two laws—the Privacy Act of 1974 and the Internal Revenue Code—by disclosing their
members’ personal and financial information to individuals who lack authority to access it.
Plaintiffs’ concerns are understandable and no doubt widely shared. However, on the
present record, Plaintiffs have not cleared the “high standard” of showing a likelihood of an
irreparable injury that is “beyond remediation,” which is a prerequisite to the issuance of a
preliminary injunction in this Circuit. See Chaplaincy of Full Gospel Churches v. England, 454
F.3d 290, 297 (D.C. Cir. 2006). Therefore, upon consideration of the parties’ submissions, the
Hemant Taneja, The Era of “Move Fast and Break Things” Is Over, Harv. Bus. Rev. (Jan. 22, 2019),
https://hbr.org/2019/01/the-era-of-move-fast-and-break-things-is-over [https://perma.cc/MU46-Q3ZZ].
1
1
arguments and representations during the Motion Hearing on February 24, 2025, the relevant law,
and the entire record,2 the Court shall DENY Plaintiffs’ [8] Motion for a Preliminary Injunction.
I. BACKGROUND
A. Statutory Framework
1. The Privacy Act
The Privacy Act of 1974, 5 U.S.C. § 552a, “was designed to provide individuals with more
control over the gathering, dissemination, and accuracy of agency information about themselves.”
Greentree v. U.S. Customs Serv., 674 F.2d 74, 76 (D.C. Cir. 1982). The Act was Congress’s
response to “a growing awareness that governmental agencies were accumulating an everexpanding stockpile of information about private individuals that was readily susceptible to both
misuse and the perpetuation of inaccuracies that the citizen would never know of, let alone have
an opportunity to rebut or correct.” Londrigan v. FBI, 670 F.2d 1164, 1169 (D.C. Cir. 1981).
Congress enacted the Privacy Act “in conjunction with 1974 legislation amending the
Freedom of Information Act (FOIA).” Londrigan, 670 F.2d at 1169. As a result, the two statutes
are structurally similar, codified together in Title 5, and often read in tandem. “Both FOIA and
the Privacy Act evidence Congressional concern with open government.” Greentree, 670 F.2d at
76. And “[e]ach seeks in different ways to respond to the potential excesses of government.” Id.
2
The Court’s consideration has focused on the following documents, including the attachments and exhibits thereto:
• Plaintiffs’ Complaint (“Compl.”), ECF No.1;
• Plaintiffs’ Motion for a Preliminary Injunction (“Pls.’ Mot.”), ECF No. 8;
• Defendants’ Notice of Correction (“Not. of Correction”), ECF No. 15;
• Plaintiffs’ Supplement to the Record (“Pls.’ Suppl.”), ECF Nos. 16-1 to 16-8;
• Defendants’ Memorandum in Opposition (“Defs.’ Opp’n”), ECF No. 24;
• Defendants’ Supplement to the Record (“Defs.’ Suppl.”), ECF No. 26-1;
• Plaintiffs’ Reply in Support of the Motion for a Preliminary Injunction (“Pls.’ Reply”), ECF No. 28;
• Defendants’ Supplemental Memorandum (“Defs.’ Mem.”), ECF No. 29;
• Plaintiffs’ Supplemental Memorandum (“Pls.’ Mem.”), ECF No. 31;
• Plaintiffs’ First Notice of Supplemental Authority (“Pls.’ First Not. of Suppl. Auth.”), ECF No. 33; and
• Plaintiffs’ Second Notice of Supplemental Authority (“Pls.’ Second Not. of Suppl. Auth.”), ECF No. 34.
2
FOIA deters government abuses by “open[ing] agency action to the light of public
scrutiny.” Dep’t of Air Force v. Rose, 425 U.S. 352, 372 (1976). The Privacy Act takes a different,
more direct tack. It creates procedures “to give the individual some control over the ways in which
Federal executive agencies handle[] . . . personal information at every stage of the information
process.” Comm’n on Fed. Paperwork, Privacy and Confidentiality: Issues in Information Sharing
21 (1977). As such, the Act imposes burdens on federal agencies and creates rights for individuals
when agencies collect, maintain, use, and disseminate “records.” The Act defines “record”
expansively to include “any item, collection, or grouping of information about an individual that
is maintained by an agency.” 5 U.S.C. § 552a(a)(4).
At the collection stage, the Privacy Act requires that agencies collect information directly
from individuals to the greatest extent possible and inform individuals of the purpose and authority
for that collection. 5 U.S.C. § 552a(e)(2)–(3). If an agency maintains the records it collects such
that information can be retrieved “by the name of [an] individual or by some identifying number,
symbol, or other identifying particular”—a “system of records”—additional responsibilities
obtain. Id. § 552a(a)(5).
Agencies must continuously ensure that records in their systems of records are accurate
and complete to the degree “necessary to assure fairness to the individual[s]” whose information
has been recorded. 5 U.S.C. § 552a(e)(5). To enforce that requirement, the Act dictates that any
individual can access and review all records “pertaining to” the individual in an agency’s system.
Id. § 552a(d)(1). If the individual identifies an error in the record, the Act grants the right to
request an amendment. Id. § 552a(d)(2). If that request is denied, or if the agency refuses to allow
the individual to review the relevant records, the affected individual may bring suit in federal
district court and obtain an injunction ordering the agency to comply.
3
Id. §§ 552a(d)(3),
(g)(1)(A)–(B), (g)(2)–(3). And if that process fails, and the agency makes a determination adverse
to an individual because of an inaccuracy in its records, the Act provides a backstop: a suit for
damages. Id. §§ 552a(g)(1)(C), (g)(2)(4).
Most importantly for purposes of this case, the Act also prohibits federal agencies from
sharing records about individuals, except under certain limited circumstances:
No agency shall disclose any record which is contained in a system of records by
any means of communication to any person, or to another agency, except pursuant
to a written request by, or with the prior written consent of, the individual to whom
the record pertains, unless [an enumerated exception applies].
5 U.S.C. § 552a(b). The Act’s enumerated exceptions allow disclosure of a record “to those
officers and employees of the agency which maintains the record who have a need for the record
in the performance of their duties.” Id. § 552a(b)(1). They also allow disclosure for “a routine
use.” Id. § 552a(b)(3). A “routine use” is a use of a record “for a purpose which is compatible
with the purpose for which it was collected.” Id. § 552a(a)(7). Each time an agency “establish[es]
or revis[es]” a system of records, it must publish a notice in the Federal Register detailing, among
other things, “each routine use of the records contained in the system, including the categories of
users and the purpose of such use.” Id. § 552a(e)(4).
The Act does not specifically provide a remedy for violations of its prohibition on
disclosure. Instead, that prohibition is made enforceable through a catch-all remedial provision
applicable when the agency “fails to comply with any other provision of this section”—that is, any
provision other than those relating to accessing and correcting records. Id. § 552a(g)(1)(D). If the
agency’s failure has “an adverse effect on an individual,” the affected person may bring a civil suit
in federal district court. Id. And if that failure “was intentional or willful,” the plaintiff may obtain
attorney’s fees and the greater of the plaintiff’s actual damages or $1,000. Id. § 552a(g)(4).
4
The Act also provides criminal penalties for willful violations of its requirements. See 5
U.S.C. § 552a(i). It is a federal crime for any agency officer or employee willfully to disclose a
protected record “in any manner to any person or agency not entitled to receive it,” id. § 552a(i)(1),
or to maintain a system of records “without meeting the notice requirements” provided in the Act,
id. § 552a(i)(2). It is also a federal crime for any person to “request[] or obtain[] any record
concerning an individual from an agency under false pretenses.” Id. § 552a(i)(3).
2. The Internal Revenue Code
The Internal Revenue Code requires less introduction. Along with its obvious functions,
the Code also restricts agencies’ access to and use of certain financial information. Section 6103
of the Code provides that tax “[r]eturns and return information shall be confidential,” and that:
[E]xcept as authorized by [the Code] . . . no officer or employee of the United
States, . . . [and] no other person . . . who has or had access to returns or return
information under [various Code provisions providing for that access], shall
disclose any return or return information obtained by him in any manner in
connection with his service as such an officer or an employee or otherwise or under
the provisions of this section.
26 U.S.C. § 6103(a). As used in this provision, the term “officer or employee” includes a former
officer or employee. Id.
The Code permits taxpayers to seek damages from the United States for any knowing or
negligent inspection or disclosure of tax returns or return information. 26 U.S.C. § 7431(a). But
the United States is not liable for any inspection or disclosure that the taxpayer requests or that
results from “a good faith, but erroneous, interpretation” of the Code’s confidentiality
requirements. Id. § 7431(b). Willful violations of the rule against disclosure are also punishable
as felonies, and any federal officer or employee convicted of such a violation “shall, in addition to
any other punishment, be dismissed from office or discharged from employment.”
§ 7213(a)(1).
5
Id.
3. The Administrative Procedure Act
The Administrative Procedure Act (“APA”) provides a cause of action against an “agency”
or “an officer or employee thereof” to any “person . . . adversely affected or aggrieved by agency
action within the meaning of a relevant statute.” 5 U.S.C. § 702. The APA waives the sovereign
immunity of the United States for “relief other than money damages” in such an action. Id.; Med.
Imaging & Tech. All. v. Libr. of Cong., 103 F.4th 830, 836 (D.C. Cir. 2024). Judicial review is
available under the APA only for “final agency action for which there is no other adequate remedy
in a court.” 5 U.S.C. § 704.
B. Factual Background
1. The Bureau of the Fiscal Service
The Bureau of the Fiscal Service (“BFS”) is part of the Department of the Treasury. It is
the successor to two former agencies within Treasury, the Fiscal Management Service and the
Bureau of the Public Debt, which Treasury Secretary Timothy Geithner consolidated in October
2012.
See Treasury Order 136-01 (Oct. 7, 2012), https://home.treasury.gov/about/general-
information/orders-and-directives/treasury-order-136-01 [https://perma.cc/D36S-HQC6].
BFS
handles 87.8% of the payments made by the federal government, totaling $5.46 trillion each year.
Decl. of Vona S. Robinson (“Robinson Decl.”), ECF No. 24-4, ¶ 2.
To carry out this important mission, BFS maintains multiple systems that hold sensitive
information about federal payments and the recipients of those payments. These systems include
the Payment Automation Manager (“PAM”), which is Treasury’s “primary application” used “to
process payment for disbursement,” and the Secure Payment System (“SPS”), which agencies use
to “create, certify, and submit payment files” to Treasury for payment. Robinson Decl. ¶ 4. The
SPS is also “typically used for one-time large dollar amount transactions.” Id.
6
BFS’s payment systems contain records with extensive details about individual recipients
of federal payments. For any given payee, these details may include:
name, Social Security number, employer identification number, or other agency
identification or account number; date and location of birth, physical and/or
electronic mailing address; telephone numbers; payment amount; date of issuance;
trace number or other payment identification number, such as Treasury check
number and symbol; financial institution information, including the routing number
of his or her financial institution and the payee’s account number at the financial
institution; and vendor contract and/or purchase order number.
Bureau of the Fiscal Service Notice of Systems of Records, 85 Fed. Reg. 11776, 11779 (Feb. 27,
2020).
2. The U.S. DOGE Service
On January 20, 2025, President Donald J. Trump signed an Executive Order purporting to
establish a “Department of Government Efficiency,” a new initiative with the stated goal of
“modernizing Federal technology and software to maximize governmental efficiency and
productivity.” Exec. Order No. 14,158, 90 Fed. Reg. 8441 (Jan. 20, 2025) § 1. The President’s
Executive Order renamed the existing United States Digital Service as the “United States DOGE
Service” (“USDS” or “DOGE”) and provided that its leader, the “USDS Administrator,” would
report directly to the White House Chief of Staff. Id. § 3(a)–(b). The Executive Order also
established the “U.S. DOGE Service Temporary Organization.” Id. § 3(b). Defendants’ counsel
has represented that, for present purposes, USDS and the “U.S. DOGE Service Temporary
Organization” are “one and the same.” Transcript of Feb. 24, 2025 Preliminary Injunction Hearing
(“Feb. 24 Tr.”), ECF No. 36, at 60:9–14.
The Executive Order further directed the heads of each federal agency to “establish within
their respective agencies a DOGE Team of at least four employees” within 30 days. Exec. Order
No. 14,158 § 3(c). These employees may include “Special Government Employees.” Id. A
7
Special Government Employee may be, as relevant here, a temporary “officer or employee” who
is “retained, designated, appointed, or employed to perform, with or without compensation . . .
temporary duties either on a full-time or intermittent basis” for up to 130 days in any consecutive
365-day period. 18 U.S.C. § 202(a). Special Government Employees are exempt from some of
the ethics rules that apply to most federal employees. See 18 U.S.C. §§ 203, 205, 207–209.
Finally, the Executive Order directed the heads of federal agencies to “take all necessary
steps, in coordination with the USDS Administrator and to the maximum extent consistent with
law, to ensure USDS has full and prompt access to all unclassified agency records, software
systems, and IT systems.” Exec. Order No. 14,158, 90 Fed. Reg. 8441 (Jan. 20, 2025) § 4(b).
3. The Treasury DOGE Team
In the early days of the new Administration, two people received assignments to work at
Treasury in connection with “the President’s DOGE efforts.” See Feb. 8 Decl. of Thomas H.
Krause, Jr. (“Krause Decl. I”), ECF No. 15-1, ¶¶ 1, 11; Feb. 12 Decl. of Thomas H. Krause, Jr.
(“Krause Decl. II”), ECF No. 24-1, ¶ 11; Decl. of Michael J. Wenzler (“Wenzler Decl.”), ECF No.
24-3, ¶¶ 3, 9.
The first person assigned, Marko Elez, was named a “Special Advisor for Information
Technology and Modernization” on January 21, 2025. Wenzler Decl. ¶ 9. Elez was appointed as
a “temporary transitional Schedule C” employee under 5 C.F.R. § 213.3302, which allows certain
temporary appointments “during the 1-year period immediately following a change in presidential
administration.” Wenzler Decl. ¶ 9. In this role, Elez was responsible for conducting “special and
confidential studies on a variety of strategies and issues related to Treasury’s information
technology,” analyzing Treasury systems, and “making recommendations to strengthen Treasury’s
8
hardware and software.” Id. ¶ 10. Because Elez was not designated a Special Government
Employee, he was bound by the same ethics rules as most federal employees. Id. ¶ 11.
Elez resigned from Treasury on February 6, 2025. Wenzler Decl. ¶ 12. After BFS received
notice of Elez’s resignation, it “revoked or removed all physical and logical access and recovered
all Treasury equipment,” including laptops, a cell phone, and access cards. Gioeli Decl. ¶ 22.
There is no indication in the record that Elez retains access to any BFS payment data, source code,
or systems. See id.; Krause Decl. I ¶ 11.
The second person assigned to Treasury in connection with “the President’s DOGE
efforts,” Thomas H. Krause, Jr., started work on January 23, 2025, as a “Senior Advisor for
Technology and Modernization.” Krause Decl. II ¶¶ 1, 11. Krause serves as Treasury’s “DOGE
Team lead” and still works at Treasury. Id. ¶ 2, see Wenzler Decl. ¶ 3.; Feb. 13 Decl. of Thomas
H. Krause, Jr. (“Krause Decl. III”), ECF No. 25-1, ¶ 1.
When Krause signed his Treasury appointment paperwork, and took an oath of office on
January 23, he was “onboarded” as a “consultant” under the authority of 5 U.S.C. § 3109. Wenzler
Decl. ¶ 4; Krause Decl. III ¶ 3. But the appointing official at Treasury did not execute Krause’s
appointment paperwork until February 3. Wenzler Decl. ¶ 5. When executed, this paperwork
identified Krause’s start date as February 9—more than two weeks after he began working at
Treasury.
Id.
On February 10, the appointing official “executed revised appointment
documentation” for Krause, backdating his appointment to January 23. Id.
On February 5, Treasury Secretary Scott Bessent delegated the duties of the Fiscal
Assistant Secretary to Krause. Krause Decl. II ¶ 5. But because Krause had been appointed to
Treasury as a “consultant” under 5 U.S.C. § 3109, he was not authorized to “perform managerial
or supervisory work” except as “team leader or director of the specific project for which he . . .
9
[was] hired.” See 5 C.F.R. § 304.103(b)(3); Krause Decl. III ¶ 3. Krause therefore did not assume
the duties of the Fiscal Assistant Secretary until February 13, when he was sworn into an
appointment as a “temporary transitional Schedule C” employee. See Krause Decl. III ¶ 4.
At all times, unlike Elez, Krause has been designated as a Special Government Employee,
meaning he is exempt from certain ethics rules that apply to most federal employees. Id. ¶ 4.
Krause also serves as the Chief Executive Officer of Cloud Software Group, Inc., a private
company in the enterprise software industry. Krause Decl. II ¶ 1. He has kept this role while in
government service and works without pay at Treasury. Id.
Treasury officials initially authorized Krause to have “‘over the shoulder’ access to view
BFS payment data, payment systems, and copied source code that was being accessed by other
Treasury employees with appropriate access to the data or systems.” Krause Decl. I, ¶ 9. However,
Krause has never had “direct or personal access to BFS payment data, code, or systems.” Id. And
as of February 8, in compliance with a temporary restraining order entered in the U.S. District
Court for the Southern District of New York, Krause no longer has “over the shoulder” access to
BFS systems. Krause Decl. I at ¶ 9; see also New York v. Trump, No. 25-cv-1144-JAV, ECF No.
76 at 63–64 (S.D.N.Y. Feb. 21, 2025) (granting preliminary injunction).
Since this case began, Treasury has made plans to onboard three more people to serve as
part of the Treasury DOGE Team. See Decl. of John York (“York Decl.”), ECF No. 30-1, ¶ 3.
One of these individuals, Ryan Wunderly, is slated to fill the position previously held by Marko
Elez. Id. Like Elez, Wunderly will be appointed through a temporary transitional Schedule C
appointment, and his “position description and job duties will be substantially the same as those
of Mr. Elez.” Id. ¶ 4. Wunderly will also be “subject to the same risk mitigation measures
Treasury previously applied to Mr. Elez.” Id. ¶ 6. The two other members of the Treasury DOGE
10
Team will “be working principally at the Internal Revenue Service” and will not have access to
BFS payment systems. Id. ¶¶ 3, 6.
4. The BFS Payment Process Engagement Plan
On January 26, 2025, BFS “initiated” a “payment process engagement plan” with the
Treasury DOGE Team. Krause Decl. II ¶ 13. This plan provided that BFS would “support the
Treasury DOGE Team”—at the time, Krause and Elez—for a period of four to six weeks. Krause
Decl. II ¶ 13; Robinson Decl. ¶ 6. Treasury Secretary Bessent “approved the engagement in the
early days of the new Administration.” Krause Decl. II ¶ 15.
The objective of the payment process engagement is “to gain insight into the full, end-toend payment process across multiple BFS systems” and “identify gaps that, if resolved, would
make the system . . . work more efficiently and securely.” Krause Decl. II ¶ 13. The engagement’s
purposes also include “understand[ing] BFS payment processes and identify[ing] opportunities to
advance payment integrity and fraud reduction goals.” Robinson Decl. ¶ 6.
Toward those ends, one of the engagement’s early goals was to ensure that all payments
made through BFS systems are tagged with symbols and codes identifying the type of the payment
and the type of account receiving the payment. Krause Decl. II ¶ 14. These symbols and codes
are intended to help the federal government account for its spending more accurately. Id. The
Treasury DOGE Team “agreed to help” with the process of adding these symbols and codes “in
support of its goal of modernizing and identifying inefficiencies.” Id.
Because understanding “the full end-to-end payment process, across multiple payment
systems,” was “an important part of” the Treasury DOGE Team’s work on the payment process
engagement, that work “required review of the source code for BFS’s payment systems as well as
11
the ability to review sensitive payment data.” Krause Decl. II ¶ 15; see also Decl. of Joseph
Gioeli III (“Gioeli Decl.”), ECF No. 24-2, ¶ 13.
BFS officials recognized that the access they were providing to the Treasury DOGE Team
as part of this engagement was “broader in scope than what has occurred in the past.” Gioeli Decl.
¶ 13. Specifically, BFS had never provided “a single individual with access to multiple systems
and data records,” as it did for the Treasury DOGE Team. Id. Although BFS had provided
extensive “read-only” access to Treasury systems to auditors in the past, “in those scenarios the
availability of production data”—that is, sensitive data about real federal payments and payees—
“was significantly limited.” Id. By contrast, BFS officials have not identified any limitations
placed on the Treasury DOGE Team’s ability to view “production data” through secure BFS
systems as part of the new payment process engagement. See id. ¶¶ 11–13.
BFS officials also recognized that allowing “broad access” to such sensitive information
would present “risks,” including “potential operational disruptions” to payment systems, risk of
improper “access to sensitive data elements,” and “insider threat risk.” Gioeli Decl. ¶ 11.
To mitigate these risks “to the extent possible,” BFS officials took several measures to
monitor and control the Treasury DOGE Team’s access to BFS systems. Gioeli Decl. ¶¶ 12–15.
For example, BFS chose just one person, Elez, to be the “technical team member” with direct,
personal access to BFS systems and data for use in the engagement. Id. ¶ 14; Krause Decl. II ¶ 3.
Krause would have “over the shoulder” access and would be authorized to receive updates from
Elez about his work, but Krause would not have direct access. Gioeli Decl. ¶ 4. BFS provided
Elez with a dedicated laptop to use with BFS systems, and all usage of this laptop was
automatically logged. Id. ¶¶ 12, 21. To allow Elez to review and interact with source code for
BFS systems without directly modifying active BFS systems, BFS set up a “secure code
12
repository” or “sandbox” environment that would allow Elez to “review and make changes locally
to copies of the source code” in a “cordoned-off” setting in which he “did not have the authority
or capability to publish any code changes to the production system or underlying test
environments.” Id. ¶ 16. BFS officials also planned to provide Elez with “read-only” access to
BFS payment systems, meaning that he would not have the ability to modify any records stored in
any BFS systems. Id. ¶ 13.
However, operating on a compressed timeline, BFS officials failed to implement some of
these protective measures as planned. On February 5, a BFS employee mistakenly granted Elez
“read/write permissions” for the Secure Payment System (“SPS”), a BFS system that federal
agencies use to “create, certify, and submit individual payment files to Treasury” for processing.
Gioeli Decl. ¶¶ 5, 8, 20. SPS is the system “typically used for one-time large dollar amount
transactions.” Id. ¶ 8. BFS personnel corrected Elez’s access to be “read-only” on the morning of
February 6. Id. ¶ 20. Elez resigned from Treasury the same day. Id. ¶ 22.
Despite the configuration mistake, BFS officials believe that Elez never exercised his
“write” permissions on the SPS database. Gioeli Decl. ¶ 20. An initial “forensic investigation”
by BFS officials into Elez’s access “confirmed” that Elez interacted with the system only during a
“supervised, walk-through session” and that “no unauthorized actions had taken place.” Id. As of
February 24, a complete “forensic analysis” of Elez’s activities had not yet been completed. See
id.; Feb. 24 Tr. at 107:23–108:2
5. The DOGE Team’s Use of BFS Systems to Review Foreign Aid Payments
On or about January 26, 2025, Treasury leaders “approved a process” intended to “assist
agencies in complying with the President’s January 20, 2025 Executive Order on foreign aid.”
Robinson Decl. ¶ 7.
The President’s Executive Order directed agencies to pause foreign
13
development assistance payments “immediately,” but it provided that the Secretary of State “may
waive the pause” for “specific programs.” See Exec. Order 14,169, 90 Fed. Reg. 8619 (Jan. 20,
2025) § 3(a), (e); Krause Decl. II ¶ 17. To assist in the implementation of this Order, the Treasury
DOGE Team and BFS worked to identify “payments that matched certain Treasury Account
Symbols (TAS) associated with foreign payments” and “flag[] those payments for the State
Department for review consistent with the Executive Order.” Krause Decl. II ¶¶ 18–20.
“Treasury leadership” initially directed BFS on January 26 to “develop a process to identify
all USAID payment files within the [Payment Automation Manager] file system’s ‘landing zone’”
and “flag those payments for the State Department . . . prior to their entry into” BFS’s payment
processing systems. Robinson Decl. ¶ 8. However, on January 27, “Treasury leadership informed
BFS that the State Department had decided to intercept the USAID files prior to the initial
submission to BFS,” making it “unnecessary to continue to flag any USAID payment files for the
State Department’s review.” Id.
Later, on January 31, BFS was directed to identify payment files matching any of four
specific “Treasury Account Symbol” codes—codes indicating that the proposed payments may
have been related to foreign aid—and to provide copies of those payment files to “certain
designated Department of State officials” for their review and a determination of whether “the
Executive Order required a pause” on the payments. Robinson Decl. ¶ 10. The present record
does not reveal who gave this direction. See id. To complete this task, “BFS career staff queried
the PAM file system manually to identify payment files.” Id. ¶ 11. BFS career staff also shared
the relevant payment files with Elez. Id. Later, Elez “assisted in automating the manual review
of the payment files.” Id. The record does not indicate exactly which systems Elez accessed or
used to accomplish this task; however, based on BFS’s “preliminary log reviews,” on February 3,
14
Elez “copied two USAID files directly from the PAM database to his BFS laptop”; on February 4
and 5, he “accessed the PAM file system; and on February 5, he “accessed the PAM payment
processing database.” Gioeli Decl. ¶ 18. BFS’s preliminary reviews concluded that Elez “did not
change or alter any BFS payment system or record within their source systems.” Id.
The record indicates that only one payment was halted as a result of BFS’s new process for
reviewing foreign aid payments: On February 10, BFS identified a payment request from the
Department of the Interior on behalf of the Millenium Challenge Corporation, which it forwarded
to authorized officials at the State Department for that Department’s review. Robinson Decl. ¶¶
14, 16. Later that day, an official from the Department of the Interior requested that BFS not
process the payment. Id. BFS also identified four other payment files and forwarded them to
authorized officials at the State Department, but the State Department instructed that those
payments “could be processed normally.” Id. ¶ 13. Those files “were then processed in the normal
course that same day.” Id.
Since February 10, BFS has “ensured that the State Department review process will not
proceed for payment requests within the scope of the [temporary restraining order] issued in New
York v. Trump, No. 1:25-cv-39-JJM-PAS,” a case pending in the U.S. District Court for the District
of Rhode Island. Robinson Decl. ¶ 12.
In sum, the present record shows that Defendants, acting in haste, made multiple mistakes
in onboarding the Treasury DOGE Team. There is no indication in the present record that these
mistakes have resulted in disclosures outside the federal government, but neither is there any
indication that Defendants have yet completed any independent forensic review to determine
exactly what information may have been shared outside Treasury.
15
6. The Plaintiff Organizations
Plaintiffs in this case are three membership organizations: Alliance for Retired Americans
(“Alliance”); American Federation of Government Employees, AFL-CIO (“AFGE”); and Service
Employees International Union (“SEIU”).
Compl. ¶¶ 10–12.
Each of these organizations
advocates on behalf of its members’ social and economic interests. See Decl. of Richard J. Fiesta
(“Fiesta Decl.”), ECF No. 8-2, ¶ 3; Decl. of Everett Kelley (“Kelley Decl.”), ECF No. 8-3, ¶ 3;
Decl. of Steven K. Ury (“Ury Decl.”), ECF No. 8-4, ¶ 3. And each has many thousands of
members who receive payments from the federal government, meaning that Treasury holds their
bank information and other sensitive identifying information about them. Fiesta Decl. ¶¶ 4–6;
Kelley Decl. ¶¶ 4–6; Ury Decl. ¶¶ 4–6. Many of these members are concerned that having this
information shared with individuals associated with DOGE violates their privacy and increases the
risk that they will become victims of identity theft or other misuses of their personal information.
See, e.g., Fiesta Decl. ¶¶ 7–9; Kelley Decl. ¶¶ 7–9; Ury Decl. ¶¶ 7–9; Decl. of Carol Rosenblatt
(“Rosenblatt Decl.”), ECF No. 16-2, ¶¶ 7–10; Decl. of Jeanette L. McElhaney (“McElhaney
Decl.”), ECF No. 16-3, ¶¶ 7–10; Decl. of Barabara Casey (“Casey Decl.”), ECF No. 16-4, ¶¶ 7–
10; Decl. of Henrietta Jenkins (“Jenkins Decl.”), ECF No. 16-5, ¶¶ 7–10; Decl. of Pia Morrison
(“Morrison Decl.”), ECF No. 16-6, ¶¶ 5–8; Decl. of Patrice Peterson (“Peterson Decl.”), ECF No.
16-7, ¶¶ 6–9; Decl. of Susan Tousignant (“Tousignant Decl.”), ECF No. 16-8, ¶¶ 6–9.
C. Procedural History
Plaintiffs filed the Complaint in this matter on February 3, 2025. ECF No. 1. Two days
later, they moved for a temporary restraining order enjoining Defendants “from disclosing
information about individuals to individuals affiliated with the” USDS and further enjoining
Defendants “to retrieve and safeguard any information that has already been obtained by [USDS]
16
or individuals associated with it.” Pl.’s Mot., ECF No. 8, at 1. In response, this Court ordered the
parties to appear for a hearing on February 5 “to answer factual questions related to the Plaintiffs’
allegations and set an expedited briefing schedule on the Plaintiffs’ Motion.” Order, ECF No. 10.
During that preliminary hearing, Defendants’ counsel made representations to the Court
about the scope of access granted to the BFS systems of records. See generally Transcript of Feb.
5, 2025 Scheduling Conference (“Feb. 5 Tr.”), ECF No. 14.
First, counsel stated that “[t]here is one person who has been given access to the systems”:
Marko Elez. Feb. 5 Tr. at 7:3–5. Counsel further represented that Mr. Elez “is a Treasury
employee”—specifically, a “Special Government Employee[] within the Treasury Department.”
Id. at 7:9, 12:25–13:4. According to counsel, Mr. Elez had “read-only access” to BFS systems in
his capacity as a Special Government Employee and had not disclosed the records in those systems
to anyone “outside of the Treasury Department.” Id. at 15:1–7.
Second, counsel reported that Thomas Krause—another “Treasury employee”—“is
provided information from the [BFS] system[s]” but “does not have direct access to” those systems
himself. Feb. 5 Tr. at 7:10–13. Put differently, counsel represented that although Krause “does
not actually work in the system . . . information [from the system] is provided to him through Mr.
Elez.” Id. at 38:17–21. Counsel reported that he was “unaware of any plan in which the employees
who are located in the Treasury Department, Mr. Krause and Mr. Elez, . . . would share”
information in BFS systems with anyone else. Id. at 25:15–19. Instead, counsel’s “understanding
[was] that they are the ones who will be reviewing the records and that [the records] will not leave
the Treasury Department.” Id. at 25:19–21.
Defendants later clarified that some of these early representations to the Court were
inaccurate. On February 10, Defendants filed a Notice of Correction to advise the Court that Elez
17
was not, in fact, a Special Government Employee, as Defendants’ counsel had been informed prior
to the preliminary hearing; instead, Elez was hired by Treasury as a temporary transitional
Schedule C employee. See Defs.’ Not. of Correction, ECF No. 15.
Two days later, on February 12, Defendants filed another declaration stating that Elez had
mistakenly been given “read/write permissions,” rather than “read only” permissions, for one BFS
database. Gioeli Decl. ¶ 20. This declaration also stated that that BFS officials “have found no
indication . . . that Mr. Elez used his BFS laptop to share any BFS payment systems data outside
the U.S. Government,” leaving open the possibility—contrary to the information Defendants’
counsel conveyed at the preliminary hearing—that Elez may have shared BFS records outside of
Treasury. Id. ¶ 21. Defendants also filed a separate declaration stating that Elez had participated
in a new initiative to share certain BFS payment files with State Department officials. Robinson
Decl. ¶¶ 8–11. Based on this information, Defendants now admit that Elez “may have taken part
in helping disseminate information from BFS systems outside of Treasury as part of the new State
Department review process,” but they do not specify exactly who may have received that
information. See Defs.’ Opp’n at 6–7 & n.2.
During the preliminary hearing on February 5, the Court encouraged the parties to confer
and determine whether they could reach agreement on a consent order that would preserve the
status quo pending full briefing and consideration of a motion for a preliminary injunction. See
Feb. 5 Tr. at 25:22–26:12; 27:4–28:14. Plaintiffs agreed to convert their Motion for a Temporary
Restraining Order into a Motion for a Preliminary Injunction if the Court entered such an order.
Id. at 45:25–46:1; see Min. Order (Feb. 2, 2025).
Soon after the preliminary hearing concluded, the parties agreed on a consent order to
preserve the status quo and jointly requested that the Court enter that order. See Joint Mot. for
18
Entry of Proposed Order, ECF No. 11. The Court then entered the parties’ proposed order and
converted the Plaintiffs’ Motion for a Temporary Restraining Order into a Motion for a
Preliminary Injunction. See Order, ECF No. 13. With the parties’ consent, the Court later
modified this order to provide that Ryan Wunderly, a new Treasury employee who will be a
member of the Treasury DOGE Team, may exercise “read only” access to BFS payment records
and systems of records “as needed for the performance of his duties.” Order, ECF No. 32.
Defendants have now had a full opportunity to respond to Plaintiffs’ Motion, and Plaintiffs
have filed a reply in support of the Motion. See Defs.’ Opp’n, ECF No. 24; Pls.’ Reply, ECF No.
28. The Court granted both Plaintiffs and Defendants leave to supplement their submissions to
add declarations that further develop the factual record. See Order, ECF No. 19; Min. Order (Feb.
18, 2025). The Court also called for supplemental memoranda from the parties addressing whether
the Court’s consideration of the Plaintiffs’ Motion should focus on an administrative record. See
Order, ECF No. 27. The Plaintiffs and Defendants each filed supplements in response to this
Order, agreeing that the Court may decide the pending Motion without reviewing an administrative
record. See Defs.’ Mem., ECF No. 29; Pls.’ Mem., ECF No. 31.
The Court held a hearing on Plaintiffs’ Motion on February 24, 2025, at which the parties
presented oral arguments and made additional representations about the factual basis for the
Motion. See generally Feb. 24 Tr., ECF No. 36.
After the hearing, the Court ordered Defendants to “file the administrative record
underlying the decisions challenged in this case on or before March 10, 2025.” Min. Order (Feb.
25, 2025). The Court explained that “binding precedent compels the Court to call for the
administrative record” before ruling on the likelihood of Plaintiffs’ success on the merits of their
APA claims. Id. (citing Am. Bioscience, Inc. v. Thompson, 243 F.3d 579, 582 (D.C. Cir. 2001)).
19
The Court further explained that there was “no impediment to ordering the production of the
administrative record at this stage” because the Court had concluded, for the reasons explained
later in this Memorandum Opinion, that it “has subject-matter jurisdiction over this matter.” Id.
Plaintiffs’ Motion for a Preliminary Injunction is now ripe for decision.
D. Related Proceedings
The parties have alerted the Court to three recent orders in related cases involving BFS and
the Treasury DOGE Team that are pending in other federal district courts. See Pls.’ First Not. of
Suppl. Auth., ECF No. 33; Pls.’ Second Not. of Suppl. Auth., ECF No. 34.
First, Judge Jeannette A. Vargas of the U.S. District Court for the Southern District of New
York has issued a preliminary injunction against multiple defendants, including Secretary Bessent
and the Treasury Department, limiting the Treasury DOGE Team’s access to Treasury payment
records and systems. See New York v. Trump, No. 25-cv-1144-JAV, 2025 WL 573771, at *27
(S.D.N.Y. Feb. 21, 2025). Judge Vargas’s order restrains these defendants from:
granting access to any Treasury Department payment record, payment systems, or
any other data systems maintained by the Treasury Department containing
personally identifiable information and/or confidential financial information of
payees to any employee, officer or contractor employed or affiliated with the United
States DOGE Service, DOGE, or the DOGE Team established at the Treasury
Department
until further order. Id.
Judge Vargas concluded that the plaintiffs in the case before her were entitled to that relief
because they had shown, among other things, a likelihood of success on the merits of their claim
that “the agency’s processes for permitting the Treasury DOGE Team access to critical BFS
payment systems, with full knowledge of the serious risks that access entailed, was arbitrary and
capricious.” Id. at 50. In support of this conclusion, Judge Vargas noted that “everything about
this process was rushed” and that “[t]he record is silent as to what vetting or security clearance
20
process [Krause and Elez] went through prior to their appointment.” Id. She also noted that the
pace of implementation “left career staff with almost no time to develop their mitigation
measures.” Id. at 51. And she noted with concern the facts that “Elez was mistakenly given
read/write access” to a BFS payment database, that Treasury had not yet determined whether Elez
“emailed . . . confidential information to officials outside the Treasury Department,” and that
Treasury DOGE Team members appear to “take instruction” about some matters from USDS
officials rather than Treasury officials. Id.
Judge Vargas also concluded that the plaintiffs had made a sufficient showing of
irreparable harm to support a preliminary injunction. Id. at 59–60. Specifically, she held that the
plaintiffs had “sufficiently allege[d] irreparable harm from the risk of ‘expanded access’ to the
BFS payment systems that will possibly compromise the systems to become ‘far more vulnerable
to hacking or activities that render the information corrupted or compromised.’” Id. at 59 (quoting
plaintiffs’ brief). Judge Vargas found that these conditions created a “substantial risk of harm”
because “the data access protocols in place do not satisfactorily vet the employees with access and
rigorously train them in data security measures.” Id.
Judge Vargas has ordered the defendants in the case before her to submit a report on or
before March 24, 2025, advising the court of the “training,” “vetting,” and “mitigation” procedures
used to ensure the security of the Treasury DOGE Team’s work, among other matters. Id. This
preliminary injunction remains in effect, and no notice of appeal has yet been filed. See id.
Second, Judge Rossie D. Alston, Jr. of the U.S. District Court for the Eastern District of
Virginia denied a consolidated motion for a temporary restraining order and preliminary injunction
against multiple defendants, including Secretary Bessent and Treasury, that would have limited
the Treasury DOGE Team’s access to Treasury payment records and systems. See Elec. Privacy
21
Info. Ctr. v. U.S. Off. of Pers. Mgmt., 25-cv-0255-RDA/WBP, ECF No. 35 (E.D. Va. Feb. 21,
2025). Judge Alston concluded that the plaintiffs in the case—an unnamed federal employee and
a nonprofit organization suing on behalf of its members—had failed to make a sufficient showing
of irreparable harm to support a temporary restraining order or a preliminary injunction. Id. at 13–
15. Judge Alston concluded that the plaintiffs’ assertions about threatened injuries from improper
disclosures or data breaches involving their personal information were “speculative” and “based
on a series of possibilities, any one of which may never materialize.” Id. at 14.
Third, Judge Deborah L. Boardman of the U.S. District Court for the District of Maryland
denied a motion for a temporary restraining order that would have prevented Secretary Bessent
and Treasury from sharing sensitive personal information with “individuals who are implementing
the President’s DOGE agenda.” See Am. Fed. of Teachers v. Bessent, No. 25-cv-0430-DLB, ECF
No. 38 at 1–2 & n.1 (Feb. 24, 2025). Although Judge Boardman granted similar temporary
restraining orders against other defendants, she declined to do so as to Secretary Bessent and the
Treasury Department because she concluded, in light of Judge Vargas’s preliminary injunction in
the Southern District of New York, that the plaintiffs could not “establish that they would be
irreparably harmed” in the absence of a further temporary restraining order. Id. at 2 n.1.
II. LEGAL STANDARD
“A preliminary injunction is an extraordinary remedy that should be granted only when the
party seeking the relief, by a clear showing, carries the burden of persuasion.” Cobell v. Norton,
391 F.3d 251, 258 (D.C. Cir. 2004). To obtain a preliminary injunction, Plaintiffs must establish
(1) that they are “likely to succeed on the merits,” (2) that they are “likely to suffer irreparable
harm in the absence of preliminary relief,” (3) that “the balance of equities tips in [their] favor,”
and (4) that “an injunction is in the public interest.” Winter v. Nat. Res. Def. Council, Inc., 555
22
U.S. 7, 20 (2008). “[W]hen the Government is the opposing party,” as it is in this case, the balanceof-equities and public-interest factors “merge,” and courts address those factors together. Nken v.
Holder, 556 U.S. 418, 435 (2009); Singh v. Berger, 56 F.4th 88, 107 (D.C. Cir. 2022).
III. ANALYSIS
A. The Court Has Jurisdiction Over This Case.
Defendants raise two challenges to this Court’s subject-matter jurisdiction in their briefing
on Plaintiffs’ Motion.3 First, they argue that Plaintiffs have not established Article III standing.
Defs.’ Opp’n at 16–20. Second, they contend that Defendants have sovereign immunity against
Plaintiffs’ claims because the Privacy Act and Internal Revenue Code impliedly forbid injunctive
relief under the Administrative Procedure Act and because those statutes provide Plaintiffs with
adequate alternative remedies. Id. at 22–27.
Defendants present these arguments as bases to deny Plaintiffs’ request for a preliminary
injunction. See Defs.’ Opp’n at 16. Because the Court resolves Plaintiffs’ Motion on other
grounds, it does not reach Defendants’ arguments about subject-matter jurisdiction in that context.
But this Court has “an independent obligation to determine whether subject-matter jurisdiction
exists” even before any party has raised a challenge to that jurisdiction. Arbaugh v. Y&H Corp.,
546 U.S. 500, 514 (2006). Accordingly, before turning to Plaintiff’s Motion, the Court begins by
assuring itself of its subject-matter jurisdiction.
For the reasons that follow, the Court concludes that it has subject-matter jurisdiction over
this case.
Defendants also raise a third “threshold obstacle to Plaintiffs’ claims.” Defs.’ Opp’n at 16. Namely, Defendants
argue that Plaintiffs cannot secure a preliminary injunction under the APA because they do not challenge a final
agency action. Id. at 20. And Defendants briefly suggest that without a final agency action, this Court lacks subjectmatter jurisdiction. See Defs.’ Mem. at 1. But binding precedent holds that “the APA’s final agency action
requirement is not jurisdictional.” Trudeau v. FTC, 456 F.3d 178, 184 (D.C. Cir. 2006). As a result, as Defendants’
counsel agreed during the hearing on Plaintiffs’ Motion, this argument goes to the merits, rather than to the Court’s
subject-matter jurisdiction. See Feb. 24 Tr. at 88:9–17. The Court therefore does not reach that argument at this stage.
3
23
1. Plaintiffs have standing.
Article III of the Constitution confines the federal judicial power to the resolution of
“Cases” and “Controversies.” U.S. Const. art. III, § 2, cl. 1. And the doctrine of “standing is an
essential and unchanging part of the case-or-controversy requirement of Article III.” Lujan v.
Defs. of Wildlife, 504 U.S. 555, 560 (1992). For that reason, deciding that a plaintiff has standing
is a necessary “predicate to any exercise of [the Court’s] jurisdiction.” Fla. Audubon Soc’y v.
Bentsen, 94 F.3d 658, 663 (D.C. Cir. 1996) (en banc).
When an organization seeks to establish standing, it may do so in two ways. It may show
that it has “organizational standing” to sue on its own behalf. FDA v. All. For Hippocratic Med.,
602 U.S. 367, 393 (2024). Or it may demonstrate that it has “associational standing” to sue on
behalf of its members. Sierra Club v. EPA, 754 F.3d 995, 999 (D.C. Cir. 2014). Here, Plaintiffs
assert associational standing.
See Pls.’ Reply at 14–20 (discussing harms to “Plaintiffs’
members”); Feb. 24 Tr. at 7:17–23.
To establish associational standing, an organization must show that “(1) its members would
otherwise have standing to sue in their own right; (2) the interests it seeks to protect are germane
to the organization’s purpose; and (3) neither the claim asserted nor the relief requested requires
the participation of individual members in the lawsuit.” Int’l Dark-Sky Ass’n, Inc. v. FCC, 106
F.4th 1206, 1217 (D.C. Cir. 2024) (quoting Ctr. for Sustainable Econ. v. Jewell, 779 F.3d 588, 596
(D.C. Cir. 2015)). Defendants do not dispute the latter two requirements, see Defs.’ Opp’n at 17,
Feb. 24 Tr. at 75:20–78:5, and the Court agrees they are satisfied. The privacy interests of
Plaintiffs’ members are germane to Plaintiffs’ organizational missions.4 And the Court discerns
See Fiesta Decl. ¶ 3 (declaring that the “Alliance advocates on behalf of its members . . . on issues such as . . .
consumer protection”); Kelley Decl. ¶ 3 (declaring that AFGE “seeks to promote dignity, safety, and fairness for
government employees”); Ury Decl. ¶ 3 (declaring that SEIU “advocates on behalf of its members and seeks to
improve the lives of workers and their families and to promote an equitable society and economy”).
4
24
no reason Plaintiffs’ members must participate directly in this case rather than allow their
associations to speak on their behalf.
The associational standing inquiry in this case turns on the first requirement: that Plaintiffs’
members would have standing to sue as individuals. To satisfy that requirement, Plaintiffs must
contend with the familiar three-pronged standing inquiry. That is, each Plaintiff “must show that:
(1) at least one of its members has suffered an injury-in-fact that is concrete and particularized and
actual or imminent, not conjectural or hypothetical; (2) the injury is fairly traceable to the
challenged action; and (3) it is likely, as opposed to merely speculative, that the injury will be
redressed by a favorable decision.” Sierra Club v. FERC, 827 F.3d 59, 65 (D.C. Cir. 2016)
(internal quotation marks omitted) (quoting Friends of the Earth, Inc. v. Laidlaw Env’t Servs., 528
U.S. 167, 180–81 (2000)).
Although the plaintiff “bears the burden of establishing” these three elements, “the manner
and degree of evidence required” to do so varies “at the successive stages of the litigation.” Lujan,
504 U.S. at 561. This Memorandum Opinion follows from Plaintiffs’ Motion for a Preliminary
Injunction, on which Plaintiffs bear the burden of proof. But here, the Court considers only the
threshold question of whether it has subject-matter jurisdiction over this action. And because
Defendants have “not yet filed an answer,” the Court “must evaluate whether [Plaintiffs] have
established standing under the standard applicable pursuant to Federal Rule of Civil Procedure
12(b)(1).” Food & Water Watch, Inc. v. Vilsack, 808 F.3d 905, 913 (D.C. Cir. 2015).
For that reason, the Court does not assess here whether Plaintiffs have “‘show[n] a
“substantial likelihood” of standing’ ‘under the heightened standard’” applicable on a motion for
a preliminary injunction. Elec. Priv. Info. Ctr. v. Presidential Advisory Comm’n on Election
Integrity, 878 F.3d 371, 377 (D.C. Cir. 2017) (quoting Food & Water Watch, 808 F.3d at 912–13).
25
But the Court notes that—consistent with that heightened standard—Plaintiffs’ argument for
standing does not “rest on . . . mere allegations” because they have “set forth by affidavit or other
evidence specific facts” that support the existence of a case or controversy. Id. (quoting Lujan,
504 U.S. at 561).
In any event, to satisfy Article III’s case-or-controversy requirement under the 12(b)(1)
standard applicable here, Plaintiffs need only “state a plausible claim” to standing. Humane Soc’y
of the U.S. v. Vilsack, 797 F.3d 4, 8 (D.C. Cir. 2015). When assessing whether Plaintiffs have
cleared this hurdle, the Court “must accept as true all material allegations of the [C]omplaint.”
Warth v. Seldin, 422 U.S. 490, 501 (1972). But the Court is not bound to the Complaint alone.
Rather, “[i]n determining standing,” the Court may also “consider materials outside of the
Complaint.” Food & Water Watch, 808 F.3d at 913.
Further, the Court must “assume [Plaintiffs] will prevail on the merits of their” claims when
evaluating their standing to sue. LaRoque v. Holder, 650 F.3d 777, 785 (D.C. Cir. 2011). That is
particularly so where, as here, Defendants argue that “even assuming” the merits of Plaintiffs’
claims, “Plaintiffs still fail to establish standing.” Defs.’ Opp’n at 18. That defense is a “facial
challenge” to Plaintiffs’ standing. Ranchers-Cattlemen Action Legal Fund v. USDA, 573 F. Supp.
3d 324, 332–33 (D.D.C. 2021) (RDM) (distinguishing facial challenges from factual challenges).
And because Defendants question only the “legal sufficiency” of Plaintiffs’ standing, the Court
need not “go beyond the pleadings [to] resolve . . . disputed issues.” Phoenix Consulting v.
Republic of Angl., 216 F.3d 36, 40 (D.C. Cir. 2000).
Having expounded on the relevant burdens and standards of review, the Court returns to
the elements of the standing analysis. The parties focus their briefing on the first Article III
requirement: that Plaintiffs’ members have “suffered an injury-in-fact that is concrete and
26
particularized and actual or imminent, not conjectural or hypothetical.” Sierra Club, 827 F.3d at
65 (internal quotation marks omitted). Plaintiffs allege their members have suffered one form of
injury: “Defendants have allowed third parties unlawful access to Plaintiffs’ members’ private
information” by failing to comply with the Privacy Act, the Internal Revenue Code, and the
Administrative Procedure Act. Pls.’ Mot. at 21. But an alleged violation of statutory privacy
protections does not complete the injury-in-fact inquiry. Under Article III, “an injury in law is not
an injury in fact.” TransUnion LLC v. Ramirez, 594 U.S. 413, 427 (2021).
“Article III standing requires a concrete injury even in the context of a statutory violation.”
Spokeo, Inc. v. Robins, 578 U.S. 330, 341 (2016). To be “concrete,” an injury must be “real” rather
than “abstract”—that is, “it must actually exist.” Id. A “bare procedural violation” (for example,
failing to publish a notice of a new routine use in the Federal Register) does not qualify as
“concrete” on its own, even if it is directly contrary to law or gives rise to a statutory cause of
action. Id. at 342. The question, then, is “[w]hat makes a harm concrete for purposes of
Article III?” TransUnion, 594 U.S. at 424. To answer that question in a case like this one, which
does not involve an alleged constitutional violation, Plaintiffs must “identif[y] a close historical or
common-law analogue for their asserted injur[ies].” Id.
The Supreme Court illustrated this exercise in analogy in TransUnion LLC v. Ramirez, 594
U.S. 413 (2021). There, a credit reporting agency had erroneously placed alerts in the plaintiffs’
credit files “labeling them as potential terrorists.” Id. at 431. The Supreme Court assumed that
the credit reporting agency’s error “violated its obligations under the Fair Credit Reporting Act”
to maintain accurate information about customers. Id. And the Court analogized the harm
associated with that violation to “the reputational harm associated with the tort of defamation.” Id.
at 432. Although the Court did “not require an exact duplicate” of a defamation claim to support
27
this common-law analogy, it reasoned that “[p]ublication is ‘essential to liability’ in a suit for
defamation.” Id. at 433–34 (quoting Restatement (First) of Torts § 577, cmt. a (Am. L. Inst.
1938)). As a result, it concluded that the plaintiffs whose erroneous “reports were disseminated to
third parties suffered a concrete injury in fact” while the plaintiffs whose erroneous reports were
never shared did not. Id. at 433–35.
Defendants argue that TransUnion dooms Plaintiffs’ standing here.
Relying on
TransUnion and other cases discussing the tort of defamation, they contend that, “for Plaintiffs to
establish some concrete harm,” they must show “that the information had been disclosed in a way
that causes them harm, such as a public disclosure.” Defs.’ Opp’n at 18. Because Plaintiffs allege
“(at most) an exchange internal to the federal government,” Defendants argue, Plaintiffs have not
shown the type of public exposure “that causes tangible harm.” Id. at 19.
This argument relies on the premise that the public-vs.-internal distinction in TransUnion
grafts onto this case as a public-vs.-all-of-government distinction. That is not obviously so. After
all, the Privacy Act draws the line between “the agency which maintains” a given record and “any
person” or any “[]other agency.” 5 U.S.C. §§ 552a(b), (b)(1). The privacy interest the statute
creates does not turn on publicity in the traditional sense. Instead, the issue under the Privacy Act
is whether a protected record has been disclosed to anyone outside the relevant agency, even others
in government.
But in any event, Defendants’ publicity argument is fundamentally inapposite. A lack of
public exposure supports an argument that the harm that Plaintiffs describe is not analogous to the
reputational harm caused by defamation. (Indeed, it is only the second-best evidence for that
argument because Plaintiffs have not alleged the most essential element of defamation: a false and
defamatory statement. See Restatement (Second) of Torts § 558 (Am. L. Inst. 1977).) But
28
TransUnion does not require that Plaintiffs’ injury be analogous to defamation or reputational
harm; it requires that Plaintiffs’ injury “has a ‘close relationship’ to a harm ‘traditionally’
recognized as providing a basis for a lawsuit in American courts.” 594 U.S. at 424 (quoting
Spokeo, 578 U.S. at 341).
Here, Plaintiffs have satisfied their burden of showing that their harm has a close
relationship to the harm to privacy vindicated by the common-law tort of intrusion upon seclusion.
TransUnion recognizes that the privacy harm arising from an “intrusion upon seclusion” is an
intangible injury sufficiently “concrete” to satisfy Article III. 594 U.S. at 425. And Courts in this
District and across the country have followed suit when assessing standing.5
At common law, the essential features of intrusion upon seclusion are that the defendant
intentionally intruded “upon the solitude or seclusion of another or his private affairs or concerns”
and that such intrusion “would be highly offensive to a reasonable person.” Restatement (Second)
of Torts § 652B. Crucially, intrusion upon seclusion “does not depend upon any publicity given
to the person whose interest is invaded.” Id. cmt. a. Rather, “[t]he intrusion itself makes the
defendant subject to liability, even though there is no publication.” Id. cmt. b.
Plaintiffs’ alleged injury—the disclosure of their private information to third parties
without a lawful right to access it—bears a close relationship to the harm essential to an intrusion
upon seclusion at common law.
First, the harm Plaintiffs describe involves an intrusion into their members’ “private affairs
or concerns.” Restatement (Second) of Torts § 652B. Courts vary in their assessments of what
See, e.g., Gadelhak v. AT&T Servs., Inc., 950 F.3d 458, 461–63 (7th Cir. 2020) (Barrett, J.) (holding that a plaintiff’s
receipt of unwanted automated text messages was sufficient to confer standing because it was an “intrusive invasion
of privacy” with a close relationship to the harm vindicated by intrusion upon seclusion); Dickson v. Direct Energy,
LP, 69 F.4th 338, 344–45 (6th Cir. 2023); Lupia v. Medicredit, Inc., 8 F.4th 1184, 1191–92 (10th Cir. 2021); Attias v.
CareFirst, Inc., 344 F.R.D. 38, 46 n.2 (D.D.C. 2023) (CRC); Pileggi v. Wash. Newspaper Publ’g Co., No. 23-cv-345,
2024 WL 324121, at *5–8 (D.D.C. Jan. 29, 2024) (BAH).
5
29
constitutes a private affair or concern within the ambit of intrusion upon seclusion. But one
frequent consideration is whether the plaintiff had a “reasonable expectation of privacy” in the
information or thing intruded upon.6 Here, Plaintiffs’ members have a reasonable expectation that
the records at issue will be private. It is entirely reasonable for those members to rely on the
explicit statutory protections provided by the Privacy Act and the Internal Revenue Code. And
individual members of the Plaintiff organizations aver that they have in fact formed an expectation
that federal agencies will keep their records private. See Rosenblatt Decl. ¶ 10 (“I have trusted the
government to maintain the privacy of my information and to only use my information for lawful
purposes.”); McElhaney Decl. ¶ 10 (same); Casey Decl. ¶ 10 (same).
Moreover, the District of Columbia Court of Appeals has recognized, under D.C. common
law, that “examining a plaintiffs’ private bank account” is one of the “types of invasion intrinsic
in the tort of intrusion upon seclusion.” Wolf v. Regardie, 553 A.3d 1213, 1217–18 (D.C. 1989).
The systems of records at issue in this litigation contain the exact type of private information that
might be found through inspection of an individual’s bank account. System .002 contains the
“routing number” and “account number” of federal payees. 85 Fed. Reg. 11779. System .012
contains information about household “income, assets, [and] liabilities.” Id. at 11794. And System
.013 contains “information about an individual’s bank account(s)” and “credit and debit card
numbers.” Id. at 11796–97.
Here, the intrusion at issue is upon the privacy of information that Plaintiffs have already
turned over to the government. And “there is no liability” for intrusion upon seclusion when the
See, e.g., In re Nickelodeon Consumer Priv. Litig., 827 F.3d 262, 294 (3d Cir. 2016) (“Viacom’s promise not to
collect ‘ANY personal information’ from children itself created an expectation of privacy . . . .”); Reuber v. Food
Chem. News, Inc., 899 F.2d 271, 286 (4th Cir. 1990) (“[T]he jury could have reasonably found that Reuber had a
legitimate expectation of privacy in the letter . . . .”); Bogie v. Rosenberg, 705 F.3d 603, 611 (7th Cir. 2013) (“Bogie
must therefore establish that a reasonable person could have an expectation of privacy . . . .”).
6
30
defendant merely examines “a public record concerning the plaintiff” or “documents that the
plaintiff is required to keep and make available for public inspection.” Restatement (Second) of
Torts § 652B cmt. c. But the common law recognizes that, even when the plaintiff has opened his
affairs to some scrutiny, there are still “matters about the plaintiff . . . that are not exhibited to the
public gaze.” Id.
An illustration from the Restatement clarifies the point: A is seeking evidence for a suit
against B; B has disclosed his financial information to a bank; A goes to the bank with a forged
court order and demands access to B’s bank records; when the bank acquiesces to that demand,
“A has invaded B’s privacy.” Id. cmt. b, illus. 4. The fact that B had disclosed his information to
the bank does not defeat A’s liability because B still has a privacy interest in those records vis-àvis A. That disclosure is closely analogous to the scenario Plaintiffs have alleged here: Plaintiffs’
members disclosed their information to Treasury; individuals falsely purporting to have lawful
access to that information demanded its disclosure; when Treasury acquiesced to that demand, the
individuals invaded Plaintiffs’ members’ privacy.
Second, the intrusion at issue must be of a kind that “would be highly offensive to a
reasonable person.” Restatement (Second) of Torts § 652B. “The question of what kinds of
conduct will be regarded as a ‘highly offensive’ intrusion is largely a matter of social conventions
and expectations.” J. Thomas McCarthy, The Rights of Publicity and Privacy § 5.1(A)(2) (1993).
But in the District of Columbia at least, the law is clear that:
In this age of identity theft and other wrongful conduct through the unauthorized
use of electronically-stored data, . . . conduct giving rise to unauthorized viewing
of personal information such as a plaintiff’s Social Security number and other
identifying information can constitute an intrusion that is highly offensive to any
reasonable person . . . .
Randolph v. ING Life Ins. & Annuity Co., 973 A.2d 702, 710 (D.C. 2009). Plaintiffs allege exactly
this kind of unauthorized viewing. See Compl. ¶¶ 21–23; Pls.’ Mot. at 21. And according to the
31
affidavits submitted by Plaintiffs’ members, this alleged conduct has caused offense and distress.
E.g., Rosenblatt Decl. ¶ 10 (“I am disturbed, anxious, and frustrated that the government violated
my trust . . . .”). That anxiety is reasonable given the sensitivity of the information at issue. And
it is particularly reasonable here because, by Defendants’ own admission, Treasury’s security
measures limiting access to BFS records by the Treasury DOGE Team have proven imperfect. See
Gioeli Decl. ¶ 20 (reporting that BFS’s information-security team “discovered that Mr. Elez’s
database access . . . had mistakenly been configured” to allow “read/write” access to the SPS
database when BFS had intended to grant “read only” access).
At the hearing on Plaintiffs’ Motion, Defendants argued that Plaintiffs’ asserted injury does
not align perfectly with the harm that could be vindicated by a common-law action for intrusion
upon seclusion. See Feb. 24 Tr. at 84:12–85:14. But Article III “does not require an exact duplicate
in American history and tradition.” TransUnion, 594 U.S. at 424. Rather, courts assessing a
plaintiffs’ standing “are meant to look for a ‘close relationship’ in kind, not degree.” Gadelhak,
950 F.3d at 462 (Barrett, J.). Even if Defendants could show that an invasion of Plaintiffs’
members’ privacy interests in the information stored in Treasury’s systems of records would not
be “actionable at common law,” that invasion would still implicate “the same kind of harm that
common law courts recognize.” Id. For that reason, the injury that Plaintiffs allege that their
members face is a concrete injury-in-fact for Article III purposes.
That still leaves the final two prongs of the classic standing analysis: causation and
redressability. As the D.C. Circuit has recognized, the two “‘are closely related,’ like ‘two sides
of a . . . coin.’” West v. Lynch, 845 F.3d 1228, 1235 (D.C. Cir. 2017) (alteration in original)
(quoting Dynalantic Corp. v. Dep’t of Defense, 115 F.3d 1012, 1017 (D.C. Cir. 1997)). Causation
requires “a fairly traceable connection” between the complained-of conduct and the claimed injury.
32
Steel Co. v. Citizens for a Better Env’t, 523 U.S. 83, 103 (1998). And redressability requires “a
likelihood that the requested relief will redress the alleged injury.” Id.
Neither party spills much ink on these requirements. That is understandable. Plaintiffs
allege that their members are injured because they have been deprived of statutory privacy
protections. See Compl. ¶ 40. That alleged injury is fairly traceable to Defendants’ alleged
conduct: granting unauthorized access to Plaintiffs’ members’ protected records without obtaining
their consent or complying with relevant procedures. See id. ¶ 44; Feb. 24 Tr. at 14:12–15:11.
And Plaintiffs’ requested relief—an injunction prohibiting Defendants from continuing to allow
that access—would undoubtedly redress the alleged injury to their members. See Compl. at 18;
Feb. 24 Tr. at 16:2–12.
In sum, the Court concludes that Plaintiffs have adequately alleged that their members
suffered a concrete injury in fact, that this injury is caused by Defendant’s alleged conduct, and
that this injury is redressable through this suit. For that reason, Plaintiffs’ members would have
standing to bring this action in their own right. Because the Court also concludes that the privacy
interest Plaintiffs seek to protect is germane to their organizational purposes and that their
members need not participate in this suit individually, Plaintiffs have associational standing to
bring this suit.
2. Sovereign immunity does not bar this suit.
Defendants’ next jurisdictional argument is that they have immunity from this action.
Absent a waiver, sovereign immunity shields the United States and its officers, agencies, and
instrumentalities from suit. See Loeffler v. Frank, 486 U.S. 549, 554 (1988). That sovereign
immunity is jurisdictional in nature. FDIC v. Meyer, 510 U.S. 471, 475 (1994). And “the terms
of [the United States’s] consent to be sued in any court define that court’s jurisdiction to entertain
33
the suit.” United States v. Sherwood, 312 U.S. 584, 586 (1941). Because each Defendant in this
matter is protected by the aegis of the United States’s sovereign immunity, the Court has subjectmatter jurisdiction over this suit only if Plaintiffs’ claims fall within the scope of a statutory waiver
of that immunity.
Plaintiffs’ Complaint seeks only declaratory and injunctive relief.
Compl. at 18.
Therefore, the relevant waiver of sovereign immunity is Section 702 of the Administrative
Procedure Act. See Sea-Land Serv., Inc. v. Alaska R.R., 659 F.2d 243, 244 (D.C. Cir. 1981)
(holding that Section 702 “eliminat[es]” the “sovereign immunity defense in all actions for
specific, nonmonetary relief against a United States agency or officer acting in an official
capacity”). Section 702 provides, in relevant part:
An action in a court of the United States seeking relief other than money damages
and stating a claim that an agency or an officer or employee thereof acted or failed
to act in an official capacity or under color of legal authority shall not be dismissed
nor relief therein be denied on the ground [of sovereign immunity]. . . . Nothing
herein . . . confers authority to grant relief if any other statute that grants consent to
suit expressly or impliedly forbids the relief which is sought.
5 U.S.C. § 702.
Defendants briefly argue that Congress intended the remedies in the Privacy Act to be
exclusive, impliedly forbidding related forms of relief under the APA. Defs.’ Opp’n at 19–20
(citing Match-E-Be-Nash-She-Wish Band of Pottawatomi Indians v. Patchak, 567 U.S. 209, 215
(2012)). In the decision on which Defendants rely in support of this argument, the Supreme Court
explained that “‘[w]hen Congress has dealt in particularity with a claim and [has] intended a
specified remedy’—including its exceptions—to be exclusive, that is the end of the matter; the
APA does not undo the judgment.” Match-E-Be-Nash-She-Wish Band, 567 U.S. at 216 (second
alteration in original) (quoting Block v. North Dakota ex rel. Board of Univ. and School Lands,
461 U.S. 273, 286 n.22 (1983)).
34
However, the Supreme Court’s more recent decision in Department of Agriculture Rural
Development Rural Housing Service v. Kirtz, 601 U.S. 42 (2024), suggests that the Privacy Act is
not the kind of comprehensive and “exclusive” remedial statute that impliedly displaces related
remedies under other statutes. In Kirtz, the Supreme Court considered whether the Privacy Act’s
remedies for inaccurate agency recordkeeping foreclose a similar remedy under the Fair Credit
Reporting Act (“FCRA”). Id. at 63. The Court concluded that the Privacy Act and FCRA are
“complementary” and that the Privacy Act’s remedial scheme did not evince congressional intent
to forbid the remedy available under FCRA. Id.
Informed by that analysis, this Court concludes that Congress did not intend for the Privacy
Act to be an “exclusive” source of claims or remedies for alleged mishandling of records about
individuals that impliedly forbids other relief under the APA. See Match-E-Be-Nash-She-Wish
Band, 567 U.S. at 216. Therefore, the availability of a Privacy Act suit for damages does not take
this case outside the scope of the waiver of sovereign immunity in § 702 of the APA and does not
affect this Court’s subject-matter jurisdiction over Plaintiffs’ APA claims.
Defendants advance one final, related argument that this Court lacks jurisdiction over
Plaintiffs’ APA claims. See Defs.’ Opp’n at 15–19. That argument proceeds as follows: Section
704 of the APA subjects to judicial review “agency action for which there is no other adequate
remedy in a court.” 5 U.S.C. § 704. The Privacy Act provides for individual damages suits for
“intentional and willful” violations of its provisions. 5 U.S.C. § 552a(g)(1)(D), (g)(4). Similarly,
the Internal Revenue Code provides for “damages against the United States” for improper
inspection or disclosure of tax return information. 26 U.S.C. § 7431(a)–(b). According to
Defendants, damages suits afford an “adequate” remedy for improper disclosures of protected
records about individuals or individuals’ tax return information. See Defs.’ Opp’n at 15–19.
35
Therefore, the argument concludes, injunctive relief is not available under the APA to prevent
improper disclosure of the information at issue. See id.
However, as Defendants conceded during the hearing on Plaintiffs’ Motion, this argument
APA is not jurisdictional. See Feb. 24 Tr. at 92:21–93:8. The D.C. Circuit has held explicitly that
there is “no textual or logical basis for construing § 704—which limits judicial review to ‘final
agency action for which there is no other adequate remedy’—to condition a waiver of sovereign
immunity on the absence of an adequate remedy.” Perry Capital LLC v. Mnuchin, 864 F.3d 591,
621 (D.C. Cir. 2017). Section 704’s adequate-remedy requirement “determine[s] whether there is
a cause of action under the APA, not whether there is federal subject[-]matter jurisdiction.” Id. In
other words, the existence of an adequate remedy under the Privacy Act or the Internal Revenue
Code would not deprive the Court of subject-matter jurisdiction. Because this argument is not
jurisdictional, the Court need not resolve it here at the threshold.
B. Plaintiffs Are Not Entitled to a Preliminary Injunction.
Assured of its jurisdiction, the Court turns to the four-factor Winter test for the issuance of
preliminary injunctive relief. Under this test, Plaintiffs have the burden of establishing that
(1) they are “likely to succeed on the merits,” (2) they are “likely to suffer irreparable harm in the
absence of preliminary relief,” (3) “the balance of equities tips in [their] favor,” and (4) “an
injunction is in the public interest.” Winter, 555 U.S. at 20.
Here, the Court’s analysis of the Winter factors begins and ends with irreparable harm. To
obtain a preliminary injunction, “the movant has the burden to show that all four [Winter] factors,
taken together, weigh in favor of the injunction.” Abdullah v. Obama, 753 F.3d 193, 197 (D.C.
Cir. 2014) (quoting Davis v. Pension Benefit Guar. Corp., 571 F.3d 1288, 1292 (D.C. Cir. 2009)).
However, “the basis of injunctive relief in the federal courts has always been irreparable harm.”
36
Chaplaincy of Full Gospel Churches, 454 F.3d at 297. Therefore, “[a] movant’s failure to show
any irreparable harm is . . . grounds for refusing to issue a preliminary injunction,” regardless of
the strength of the movant’s evidence as to any other factor. Alpine Sec. Corp. v. Fin. Indus. Regul.
Auth., 121 F.4th 1314, 1336 (D.C. Cir. 2024) (quoting Chaplaincy of Full Gospel Churches, 454
F.3d at 297).
Moreover, because a preliminary injunction is “an extraordinary remedy” that is “never
awarded as of right” and that “may only be awarded upon a clear showing that the plaintiff is
entitled to such relief,” courts must not issue such injunctions “based only on a possibility of
irreparable harm.” Winter, 555 U.S. at 22, 24 (emphasis added). Instead, to obtain a preliminary
injunction, the moving party must demonstrate “that irreparable injury is likely in the absence of
an injunction.” Id. at 22 (emphasis in original).
Consistent with these standards, the U.S. Court of Appeals for the D.C. Circuit has “set a
high standard” for the showing of irreparable harm necessary to obtain a preliminary injunction.
Chaplaincy of Full Gospel Churches, 454 F.3d at 297. In this Circuit, the asserted injury offered
to support a preliminary injunction “must be both certain and great.” Wis. Gas Co. v. FERC, 758
F.2d 669, 674 (D.C. Cir. 1985). Accordingly, “[i]njunctive relief ‘will not be granted against
something merely feared as liable to occur at some indefinite time,’” nor will such relief be granted
against an injury that is merely “theoretical.” Id. (quoting Connecticut v. Massachusetts, 282 U.S.
660, 674 (1931)). Instead, “[t]he moving party must show [that] ‘[t]he injury complained of is of
such imminence that there is a “clear and present” need for equitable relief to prevent irreparable
harm.’” Chaplaincy of Full Gospel Churches, 454 F.3d at 297 (alteration in original) (quoting Wis.
Gas Co., 758 F.2d at 674). And as with all elements of the preliminary-injunction standard, the
37
party seeking the injunction “carries the burden of persuasion” in establishing the likelihood of
irreparable harm. Cobell, 391 F.3d at 258.
The standard for irreparable harm in this Circuit appears to be more demanding than that
in the Second Circuit. In the Second Circuit, longstanding precedent holds that a “distinct risk” of
certain harms “may be found to constitute irreparable injury” sufficient to support a preliminary
injunction. See Holt v. Cont’l Grp., Inc., 708 F.2d 87, 91 (2d Cir. 1983); Mullins v. City of New
York, 626 F.3d 47, 55 (2d Cir. 2010). Relying in part on this line of authority, Judge Jeannette A.
Vargas recently concluded that “increased ‘risk’ of negative consequences is sufficient to meet the
irreparable harm requirement for a preliminary injunction” in the Second Circuit. See New York v.
Trump, No. 25-cv-1144-JAV, 2025 WL 573771, at *25 (S.D.N.Y. Feb. 21, 2025) (citing Mullins,
626 F.3d at 55). In the D.C. Circuit, by contrast, an irreparable injury “must be both certain and
great” to support a preliminary injunction. See Wis. Gas Co., 758 F.2d at 674. This Court is
therefore bound not to issue an injunction based on a risk of harm that is only “theoretical.” Id.
In this case, Plaintiffs identify two types of harm that they contend warrant injunctive relief
under the governing standards in this Circuit. However, at this stage, Plaintiffs have not carried
their heavy burden of clearly showing that either asserted harm is an irreparable injury that is both
“certain and great.” See id.
Plaintiffs first assert that Defendants have unlawfully shared their members’ sensitive
information with members of the Treasury DOGE Team without their consent, resulting in an
immediate injury to their legitimate privacy interests. Pls.’ Reply at 8–9. But on the present
record, Plaintiffs have not made a “clear showing” that allowing the Treasury DOGE Team to
access their information is an irreparable harm warranting injunctive relief. See Winter, 555 U.S.
at 22. Although the privacy harms Plaintiffs have asserted are real and sufficiently concrete to
38
support the exercise of this Court’s subject-matter jurisdiction, those asserted harms are not
necessarily “irreparable.” See Cal. Ass’n of Private Postsecondary Schools v. DeVos, 344 F. Supp.
3d 158, 170 (D.D.C. 2018) (RDM) (noting that an injury “sufficient to establish standing . . . does
not necessarily satisfy the more demanding burden of demonstrating irreparable injury”).
As Judge Randolph D. Moss recently observed, courts in this District have consistently
“declined to find irreparable injury” from the disclosure of private information “where the
challenged disclosure is not ‘public,’” but instead is to a small number of “individuals obligated
to keep [the information] confidential.” Univ. of Cal. Student Ass’n v. Carter, No. 25-cv-0354, __
F. Supp. 3d __, 2025 WL 542586, at *5 (D.D.C. Feb. 17, 2025) (RDM).7
Under those
circumstances, a court can fashion “adequate . . . corrective relief” after the fact. See Wis. Gas.
Co., 758 F.2d at 674 (quoting Va. Petroleum Jobbers Ass’n v. FPC, 259 F.2d 921, 925 (D.C. Cir.
1958)). For example, this Court could order the small number of individuals who received the
information to return or destroy it. The “possibility” that adequate relief of that kind “will be
available at a later date, in the ordinary course of litigation[,] weighs heavily against a claim of
irreparable harm.” Id. (quoting Va. Petroleum Jobbers, 259 F.2d at 925).
Plaintiffs also assert that Defendants’ actions “create a nonspeculative risk of dissemination
of private information to additional unauthorized parties” beyond the Treasury DOGE Team. Pls.’
Reply at 10. There is no doubt that public dissemination of sensitive, private information is an
irreparable harm.8 But on the present record, Plaintiffs have not carried their burden of showing
that such dissemination is likely. Instead, the record shows that Defendants have taken measures
7
See also Baker DC v. NLRB, 102 F. Supp. 3d 194, 203 (D.D.C. 2015) (ABJ); Ashland Oil, Inc. v. FTC, 409 F. Supp.
297, 308 (D.D.C. 1976) (HFC), aff’d, 548 F.2d 977 (D.C. Cir. 1976).
8
See, e.g., Hosp. Staffing Sols., LLC v. Reyes, 736 F. Supp. 2d 192, 200 (D.D.C. 2010) (CKK) (concluding that
“disclosure of proprietary information” to “competitors in the market” would constitute irreparable harm); Council on
Am.-Islamic Rels. v. Gaubatz, 667 F. Supp. 2d 67, 76 (D.D.C. 2009) (CKK) (concluding that public disclosure of
confidential information, including “personal information” about a party’s employees, would be irreparable harm).
39
to monitor and control the Treasury DOGE Team’s access to BFS systems and limit the risk of
improper disclosure outside the agency. See, e.g., Gioeli Decl. ¶¶ 12–15. Defendants’ counsel
represented at the hearing on Plaintiffs’ Motion that these measures will remain in place going
forward. Feb. 24 Tr. 113:12–114:14. Meanwhile, Plaintiffs have not shown that any improper
disclosure of private information outside the federal government has taken place or that any such
dissemination is planned in the future. See Gioeli Decl. ¶ 21. The record does show that BFS
made mistakes while onboarding the Treasury DOGE Team: For example, it improperly granted
Elez “read/write” access to the SPS database for a brief period, and it failed to process Krause’s
appointment paperwork accurately and in a timely manner. Id. ¶ 20; Wenzler Decl. ¶ 5. However,
there is no direct evidence that any of these mistakes resulted in improper disclosure outside of the
federal government or made such disclosure more likely in the future. See Gioeli Decl. ¶ 21.
Therefore, these mistakes do not, without more, show that improper dissemination of private
information obtained from BFS systems is likely in the future.
During the hearing on their Motion, Plaintiffs argued that certain language in the
President’s Executive Order reorganizing the USDS supports an inference that Defendants will
make improper disclosures of sensitive records in the absence of an injunction from this Court.
See Feb. 24 Tr. at 46:2–14. In relevant part, that Executive Order directs the heads of federal
agencies to:
take all necessary steps, in coordination with the USDS Administrator and to the
maximum extent consistent with law, to ensure USDS has full and prompt access
to all unclassified agency records, software systems, and IT systems.
Exec. Order No. 14,158, 90 Fed. Reg. 8441 (Jan. 20, 2025) § 4(b). Plaintiffs argue that this
language shows that Defendants are “going to share data [with USDS] as soon as the courts allow
them to,” causing their members an irreparable loss of privacy. Feb. 24 Tr. at 46:10–17.
40
However, Defendants’ counsel represented to the Court that Defendants interpret the
Executive Order to require agencies like Treasury to share information with USDS only if that
sharing is “consistent with,” among other sources of law, the Privacy Act and the Internal Revenue
Code. Id. at 117:9–17. Defendants’ counsel further represented that, in the absence of a court
order, Defendants “would not share information with USDS unless it were authorized by the
Privacy Act or the Internal Revenue Code.” Id. at 118:7–10. Because Plaintiffs have not produced
any evidence to rebut this representation, they have not shown that unlawful dissemination of their
members’ private information is likely in the absence of a preliminary injunction.
Plaintiffs’ inability to show a likelihood of future wrongful dissemination of their
members’ private information is fatal to their Motion. Under the law of this Circuit, an increased
risk of future harm, however grave that harm may be, is not sufficient to support a preliminary
injunction in the absence of a showing that the threatened harm is likely to materialize.9 Therefore,
merely asserting that the Treasury DOGE Team’s operations increase the risk of a catastrophic
data breach or public disclosure of sensitive information from BFS systems is not sufficient to
support a preliminary injunction. Instead, Plaintiffs have the heavy burden of demonstrating that
such a breach or improper disclosure is “likely in the absence of an injunction.” Winter, 555 U.S.
at 22 (emphasis in original). On the present record, Plaintiffs have not carried this burden.
9
See, e.g., Standing Rock Sioux Tribe v. U.S. Army Corps of Eng’rs, 205 F. Supp. 3d 4, 33–34 (D.D.C. 2016) (JEB)
(concluding that Tribes were not entitled to a preliminary injunction against permitting of oil pipeline operations, in
part because they had not shown that resulting harm to “sites of great cultural or historical significance” was
“probable,” even though that harm would be “significant”); Sierra Club v. United States Army Corps of Eng’rs, 990
F. Supp. 2d 9, 41 (D.D.C. 2013) (KBJ) (concluding that even “fearsome” harms from a potential future oil spill did
not support the issuance of a preliminary injunction against permitting of an oil pipeline where the plaintiffs had not
“shown that a damaging oil spill [was] likely” (emphasis in original)); Nat. Res. Def. Council v. Kempthorne, 525 F.
Supp. 2d 115, 126 (D.D.C. 2007) (concluding that the potential for gas drilling operations to cause methane seeps that
may kill or injure people did not warrant preliminary injunction in the absence of evidence that such harms were
“likely”); see also Standing Rock Sioux Tribe v. U.S. Army Corps of Eng’rs, 540 F. Supp. 3d 45, 57 (D.D.C. 2021)
(JEB) (concluding, under the related standard for the issuance of a permanent injunction, that the threat of an oil spill
into water used “for drinking, industry, and sacred practices” was not sufficient to support injunctive relief against
operation of an oil pipeline without a showing that a spill was “likely,” rather than merely “possible”).
41
Similarly, in the absence of a showing that irreparable harm from improper disclosure is
likely, Plaintiffs’ evidence that their members are suffering and will continue to suffer emotional
distress because of Defendants’ actions is not sufficient to support a preliminary injunction. See,
e.g., Rosenblatt Decl., ¶¶ 7–10; McElhaney Decl., ¶¶ 7–10; Casey Decl. ¶¶ 7–10; Jenkins Decl.,
¶¶ 7–10; Morrison Decl., ¶¶ 5–8; Peterson Decl., ¶¶ 6–9; Tousignant Decl., ¶¶ 6–9. The Court
does not doubt the sincerity of Plaintiffs’ members’ understandable distress. But in this Circuit,
emotional distress, no matter how sincere, cannot support a preliminary injunction without a
showing that the feared event giving rise to that distress is likely to occur. See, e.g., Standing
Rock, 540 F. Supp. 3d at 63; Sierra Club, 990 F. Supp. 3d at 41 & n.18.
On this point, now-Chief Judge James E. Boasberg’s decision in Standing Rock Sioux
Tribe v. United States Army Corps of Engineers, 540 F. Supp. 3d 45 (D.D.C. 2021), is instructive.
There, a group of sovereign American Indian Tribes had sued to halt the construction and operation
of the Dakota Access Pipeline, which they argued threatened a vital source of drinking water for
the Tribes on land that historically belonged to the Standing Rock Sioux Tribe and the Cheyenne
River Sioux Tribe. See id. at 51. Chief Judge Boasberg ultimately agreed with the Tribes on one
of their legal challenges to the pipeline project, concluding that the pipeline had unlawfully
encroached on federal land. Id. at 49. Nonetheless, he declined to issue a permanent injunction
against the pipeline’s operation because he concluded that the Tribes had not carried their burden
of showing a likely, irreparable injury under the law of this Circuit. Id. at 64. In reaching this
conclusion, Chief Judge Boasberg considered the argument that Tribe Members’ sincere “anxiety
and trauma” that would result from the contemplation of “a hypothetical damaging oil spill” on
sacred land might be an “irreparable injury” unto itself, regardless of the measurable risk of such
a spill. Id. at 62–63. He rejected that argument, reasoning that “when the risk of the feared harm
42
from the agency action in question is ‘low,’ plaintiffs cannot claim irreparable injury from any
‘emotional distress’ surrounding the prospect of that speculative harm.” Id. at 63 (quoting Colo.
Wild Horse v. Jewell, 130 F. Supp. 3d 205, 220 (D.D.C. 2015) (CRC)).
The same reasoning precludes the issuance of a preliminary injunction based on Plaintiffs’
members’ emotional distress in this case. Because Plaintiffs have not carried their burden of
showing that improper dissemination of their private information is likely in the absence of an
injunction, the emotional distress they may endure as a result of exposure to that risk—no matter
how sincere—does not provide a basis for injunctive relief. See Standing Rock, 540 F. Supp. 3d
at 63; Sierra Club, 990 F. Supp. 3d at 41 & n.18; Colo. Wild Horse, 130 F. Supp. 3d at 220.
Finally, the Court briefly addresses one theory on which it does not rely in concluding that
Plaintiffs have not made the required showing of irreparable harm. Parties sometimes argue that
an injunction is not necessary to prevent irreparable harm because another district court has already
issued an injunction covering similar subject matter. However, this Court agrees with the many
others that “routinely grant follow-on injunctions against the Government, even in instances when
an earlier nationwide injunction has already provided plaintiffs in the later action with their desired
relief.” Whitman-Walker Clinic, Inc. v. U.S. Dep’t of Health & Hum. Servs., 485 F. Supp. 3d 1,
60 (D.D.C. 2020) (JEB) (collecting cases). As Plaintiffs correctly noted during the hearing on
their Motion, a prior injunction may later be appealed or modified, so the existence of such an
injunction is not necessarily adequate to protect the interests of other parties. See Feb. 24 Tr. at
6:3–20. Accordingly, this Court has assessed Plaintiffs’ evidence of irreparable harm independent
of the preliminary injunction that Judge Vargas issued in the Southern District of New York, and
its conclusion does not depend on the existence of that injunction.
43
In sum, at this stage, Plaintiffs’ Motion falls short of the standard for issuance of a
preliminary injunction in this Circuit, which forbids courts from awarding that relief in the absence
of evidence of an injury that is “both certain and great.” Wis. Gas Co. v. FERC, 758 F.2d at 674;
see also Winter, 555 U.S. at 22 (holding that courts may not award the “extraordinary” remedy of
a preliminary injunction “based only on a possibility of irreparable harm”). Courts in this Circuit
“must faithfully and fairly apply that standard in all cases, regardless of how high the stakes or
how worthy the cause.” Standing Rock Sioux Tribe, 205 F. Supp. 3d at 34. This Court must
therefore deny Plaintiffs’ Motion.
If Plaintiffs could show that Defendants imminently planned to make their private
information public or to share that information with individuals outside the federal government
with no obligation to maintain its confidentiality, the Court would not hesitate to find a likelihood
of irreparable harm. But on the present record, Plaintiffs have not shown that Defendants have
such a plan. If circumstances change, Plaintiffs are free to return to federal court to seek any proper
emergency remedy. Accord, e.g., Am. For. Serv. Ass’n v. Trump, 25-cv-0352, ECF No. 49 at 14
n.2 (D.D.C. Feb. 21, 2025) (CJN). Nothing in today’s opinion should be understood to foreclose
or in any way prejudge any future request for such relief.
IV. CONCLUSION
For the foregoing reasons, the Court shall DENY Plaintiffs’ [8] Motion for a Preliminary
Injunction. An appropriate Order accompanies this Memorandum Opinion.
DATED: March 7, 2025
COLLEEN KOLLAR-KOTELLY
United States District Judge
44
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?