Jenkins v. Associated Wholesale Grocers, Inc.
Filing
22
MEMORANDUM AND ORDER granting 17 Motion to Dismiss. Signed by District Judge Daniel D. Crabtree on 3/5/2025. (mam)
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 1 of 30
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF KANSAS
SCOTT JENKINS, individually and on
behalf of all others similarly situated,
Plaintiff,
v.
Case No. 24-4039-DDC-GEB
ASSOCIATED WHOLESALE
GROCERS, INC.,
Defendant.
MEMORANDUM AND ORDER
Plaintiff Scott Jenkins alleges unauthorized third parties accessed his personal identifying
information (PII) in a data breach. According to him, defendant Associated Wholesale Grocers
didn’t maintain secure data systems. Plaintiff asserts a number of claims, on behalf of himself
and a prospective class. Defendants moved to dismiss under Fed. R. Civ. P. 12(b)(1)—arguing
plaintiff lacks standing. They also invoke Rule 12(b)(6)—arguing plaintiff has failed to state a
claim. See Doc. 18 at 1.
Article III standing is complicated in data breach cases. The analyses of courts across the
country reflect as much—revealing differing results turning on nuanced facts. The court
addresses plaintiff’s alleged injuries in the context of the varied authority. The court concludes
plaintiff lacks standing to seek monetary, injunctive, and declaratory relief—at least on the
allegations in the Complaint (Doc. 1). With that conclusion comes another: the court doesn’t
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 2 of 30
have jurisdiction over this dispute. So, the court must dismiss plaintiff’s Complaint.1 Below, the
court explains these decisions, beginning with a brief background.
I.
Background
The following facts are taken from allegations in plaintiff’s Complaint.
The PII
Plaintiff is defendant’s former employee. Doc. 1 at 3 (Compl. ¶ 13). As part of the
hiring process, defendant required plaintiff to provide certain PII. Id. at 4 (Compl. ¶ 21). And
plaintiff relied on defendant to maintain confidentially and secure his PII for business purposes.
Id. (Compl. ¶ 22). Plaintiff, for his part, is careful to avoid sharing his PII. Id. at 15 (Compl.
¶ 72). He stores sensitive documents in secure locations or destroys them. Id. (Compl. ¶ 73).
His usernames and passwords are unique. Id.
All this focus on security matters, plaintiff contends, because PII is highly valuable to
criminal actors. Id. at 12 (Compl. ¶ 57). Unauthorized actors sell PII on the Dark Web, use PII
to apply for government benefits or medical services, and cross-reference PII with other data to
develop detailed dossiers—known as “Fullz packages”—about individuals. Id. at 12–14 (Compl.
¶¶ 58–63).
The Breach
In October 2023, an unknown actor breached defendant’s computer systems. Id. at 1
(Compl. ¶ 1). The breach released the PII of plaintiff (and a putative class). Id. Included in the
breach were plaintiff’s name, Social Security number, and date of birth. Id. at 14 (Compl. ¶ 66).
But it wasn’t until April 2024 that defendant notified plaintiff about the breach. Id. at 5 (Compl.
¶ 26). And when defendant did so, it left some details to the imagination. Defendant didn’t
1
Because of the court’s standing decision, this Order doesn’t address defendant’s 12(b)(6) motion.
2
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 3 of 30
explain the breach’s “root cause[,]” “vulnerabilities exploited,” or “remedial measures” taken to
prevent a future data breach. Id. (Compl. ¶ 28).
Plaintiff asserts defendant’s security procedures weren’t appropriate. Id. (Compl. ¶ 30).
That’s because defendant stored plaintiff’s PII in an unencrypted, Internet-accessible
environment. Id. at 7 (Compl. ¶ 37). And plaintiff outlines a host of preventative measures
defendant could have deployed. Id. at 8–11 (Compl. ¶¶ 45–47).
The Aftermath
After the data breach occurred, plaintiff has faced ongoing worry about when and how
unauthorized actors may use his sensitive information. Id. at 15 (Compl. ¶ 67). Such misuse has
begun already, he alleges. For starters, plaintiff received multiple notifications about
unauthorized purchases on his PayPal account and sign-in attempts to his bank accounts. Id.
(Compl. ¶ 68). Cybercriminals “were able to pose as Plaintiff and hack his financial accounts to
steal his money.” Id. (Compl. ¶ 69). On top of that, plaintiff has received spam calls referencing
falsified illegal actions. Id. (Compl. ¶ 70). These calls “are clearly attempts to use Plaintiff’s PII
to extort him for money or more PII.” Id.
Plaintiff spent 240 hours cleaning up the data breach’s consequences. Id. (Compl. ¶ 71)
(describing time spent “verifying the legitimacy of the Notice of Data Breach, self-monitoring
his accounts, reviewing credit reports, and mitigating fraud and identity theft). And plaintiff also
experiences fear, anxiety, and increased concern for the loss of his privacy. Id. at 16 (Compl.
¶ 74).
Defendant still possesses plaintiff’s PII. Id. at 32 (Compl. ¶ 155). Plaintiff believes
defendant’s security measures are still inadequate, though defendant “publicly denies these
allegations.” Id. at 38 (Compl. ¶ 189).
3
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 4 of 30
The Lawsuit
Plaintiff filed this lawsuit in May 2024, asserting claims of negligence, negligence per se,
invasion of privacy, breach of implied contract, breach of confidence, and breach of fiduciary
duty. Id. at 26–38 (Compl. ¶¶ 116–86). Plaintiff seeks monetary, injunctive, and declaratory
relief. Doc. 1 at 38–39; 40–41 (Compl. ¶¶ 191–92; VII.2–3).
Defendant moved to dismiss the Complaint. Doc. 17. Plaintiff responded. Doc. 20.
But, as defendant emphasizes, plaintiff filed his Response out of time. Doc. 21 at 1. Plaintiff’s
Response was due August 2, 2024. See Doc. 17 (filed July 12, 2024); see also D. Kan. Rule
6.1(d)(1) (requiring parties to file responses to dispositive motions within 21 days after service of
the motion). Plaintiff didn’t file his Response until August 6, 2024. Doc. 20. And a quick
survey of the docket reveals that plaintiff never requested an extension of time. Defendant asks
the court to sanction plaintiff by disregarding plaintiff’s Response. Doc. 21 at 1.
The court has discretion to take such a course. See Curran v. AMI Fireplace Co., 163 F.
App’x 714, 718 (10th Cir. 2006) (concluding district court acted within its discretion in striking
untimely response to summary judgment motion). But because the court concludes plaintiff’s
response doesn’t change the outcome, the court declines to strike it. See Sheldon v. Khanal, No.
07-2112-KHV, 2008 WL 474262, at 2 n.3 (D. Kan. Feb. 19, 2008) (“Although the Court
discourages such tardiness, it notes that these arguments will not materially change the resolution
of plaintiffs’ motion, and the Court therefore briefly considers the arguments.”).
II.
12(b)(1) Legal Standard
Under Rule 12(b)(1), a defendant may move the court to dismiss for lack of subject
matter jurisdiction. Fed. R. Civ. P. 12(b)(1). “Federal courts are courts of limited jurisdiction
and, as such, must have a statutory basis to exercise jurisdiction.” Montoya v. Chao, 296 F.3d
4
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 5 of 30
952, 955 (10th Cir. 2002). “A court lacking jurisdiction cannot render judgment but must
dismiss the cause at any stage of the proceedings in which it becomes apparent that jurisdiction is
lacking.” Basso v. Utah Power & Light Co., 495 F.2d 906, 909 (10th Cir. 1974). The party
invoking federal jurisdiction bears the burden to prove it exists. Kokkonen v. Guardian Life Ins.
Co. of Am., 511 U.S. 375, 377 (1994); see also Siloam Springs Hotel, L.L.C. v. Century Sur. Co.,
906 F.3d 926, 931 (10th Cir. 2018) (presuming “no jurisdiction exists absent an adequate
showing by the party invoking federal jurisdiction”).
Rule 12(b)(1) challenges fall into two categories: (1) facial attacks on allegations in the
complaint to challenge their sufficiency and (2) factual attacks on the facts on which subject
matter jurisdiction depends. Holt v. United States, 46 F.3d 1000, 1002–03 (10th Cir. 1995),
abrogated on other grounds by Cent. Green Co. v. United States, 531 U.S. 425, 437 (2001);
Blood v. Labette Cnty. Med. Ctr., No. 22-cv-04036-HLT-KGG, 2022 WL 11745549, at *2 (D.
Kan. Oct. 20, 2022) (explaining the two forms for a motion to dismiss for lack of jurisdiction
under Rule 12(b)(1)). Facial attacks are resolved based solely on the complaint, accepting all the
plaintiff’s allegations as true. Holt, 46 F.3d at 1002.
Defendant here presents just a facial attack in its Motion to Dismiss. See generally Doc.
18. Accordingly, the court accepts plaintiff’s allegations as true. Holt, 46 F.3d at 1002. But, on
a standing challenge raised at the pleading stage, the “court need not accept ‘conclusory
allegations, unwarranted inferences, or legal conclusions.’” Blood, 2022 WL 11745549, at *3
(quoting Brady Campaign to Prevent Gun Violence v. Brownback, 110 F. Supp. 3d 1086, 1092
(D. Kan. 2015)); Hackford v. Babbitt, 14 F.3d 1457, 1465 (10th Cir. 1994) (same).
5
Case 5:24-cv-04039-DDC-GEB
III.
Document 22
Filed 03/05/25
Page 6 of 30
Standing
Article III of the United States Constitution limits federal courts’ jurisdiction to “cases”
and “controversies.” Clapper v. Amnesty Int’l USA, 568 U.S. 398, 408 (2013). To present a case
or controversy under Article III, a plaintiff must establish that he has standing to sue. Id.
(citations omitted).
Article III’s standing analysis requires three things: (1) an “injury in fact—an invasion of
a legally protected interest which is (a) concrete and particularized, and (b) actual or imminent,
not conjectural or hypothetical;” (2) “a causal connection between the injury and the conduct
complained of—the injury has to be fairly . . . traceable to the challenged action of the defendant,
and not . . . the result of the independent action of some third party not before the court;” and (3)
that it is “likely, as opposed to merely speculative, that the injury will be redressed by a
favorable decision.” Lujan v. Defs. of Wildlife, 504 U.S. 555, 560–61 (1992) (quotation cleaned
up). At “the pleading stage, the plaintiff must clearly allege facts demonstrating each element”
of standing. Spokeo, Inc. v. Robins, 578 U.S. 330, 338 (2016) (citation, internal quotation marks,
and ellipsis omitted). And, at the pleading stage, general factual allegations can carry plaintiff’s
burden to establish the elements of Article III standing because the court must “‘presum[e] that
general allegations embrace those specific facts that are necessary to support the claim.’” Lujan,
504 U.S. at 561 (quoting Lujan v. Nat’l Wildlife Fed’n, 497 U.S. 871, 889 (1990)). Plaintiff
“must demonstrate standing for each claim that [he] press[es] and for each form of relief that [he]
seek[s.]” TransUnion LLC v. Ramirez, 594 U.S. 413, 431 (2021).
A.
Standing Considerations in Data Privacy Cases
Data breach cases present unique Article III standing questions. The issues usually
revolve around the first or second elements of standing: injury in fact and causation. One
6
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 7 of 30
problem in data breach cases is whether plaintiffs have suffered a concrete injury. “To establish
injury in fact, a plaintiff must show that he or she suffered ‘an invasion of a legally protected
interest’ that is ‘concrete and particularized’ and ‘actual or imminent, not conjectural or
hypothetical.’” Spokeo, 578 U.S. at 339 (quoting Lujan, 504 U.S. at 560). “No concrete harm,
no standing.” TransUnion, 594 U.S. at 442.
Another problem is whether plaintiffs can trace their concrete injuries to the data breach
alleged and in a nonspeculative manner. See, e.g., Blood, 2022 WL 11745549, at *5
(emphasizing that plaintiffs must allege “a plausible, non-speculative connection from the stolen
information” to the alleged injury to establish the causation element of standing). Traceability
“requires a plaintiff to ‘allege a substantial likelihood that the defendant’s conduct caused [the]
plaintiff’s injury in fact.’” Masterson v. IMA Fin. Grp., No. 23-2223-HTL-ADM, 2023 WL
8647157, at *3 (D. Kan. Dec. 14, 2023) (quoting Santa Fe All. for Pub. Health & Safety v. City
of Santa Fe, 993 F.3d 802, 814 (10th Cir. 2021)).
Take the first problem—the injury in fact. Some Circuits have concluded that data
breach plaintiffs have sustained injuries in fact because of the breach alone.2 Others have
2
See, e.g., Attias v. Carefirst, Inc., 865 F.3d 620, 628–29 (D.C. Cir. 2017) (concluding plaintiffs
had standing where plaintiffs alleged data breach exposed them to heightened risk of identity theft
because “unauthorized party ha[d] already accessed personally identifying data on [defendant’s] servers,
and it [was] much less speculative—at the very least, it [was] plausible—to infer that this party ha[d] both
the intent and the ability to use that data for ill” and focusing on the “light burden of proof the plaintiffs
bear at the pleading stage”); Galaria v. Nationwide Mut. Ins. Co., 663 F. App’x 384, 387–91 (6th Cir.
2016) (concluding plaintiffs had standing where hackers stole plaintiffs’ personal information because
where “data breach targets personal information, a reasonable inference can be drawn that the hackers
will use the victims’ data for . . . fraudulent purposes”); Remijas v. Neiman Marcus Grp., LLC, 794 F.3d
688, 691–95 (7th Cir. 2015) (concluding plaintiffs had standing where hackers stole customer credit card
numbers and explaining “customers should not have to wait until hackers commit identity theft or creditcard fraud in order to give the class standing, because there is an ‘objectively reasonable likelihood’ that
such an injury will occur” (quoting Clapper, 568 U.S. at 410)); Krottner v. Starbucks Corp., 628 F.3d
1139, 1143 (9th Cir. 2010) (concluding plaintiffs had standing where plaintiffs alleged concern about
increased risk of future identity theft because plaintiffs had “alleged a credible threat of real and
immediate harm stemming from the theft of a laptop containing their unencrypted personal data”); In re
Zappos.com, Inc., 888 F.3d 1020, 1024–29 (9th Cir. 2018) (reaffirming Krottner post Clapper).
7
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 8 of 30
concluded the opposite.3 Our Circuit has yet to weigh-in. But district courts across our Circuit
have reached something of a consensus—injury in fact requires actual misuse of the PII. Merely
experiencing a breach won’t suffice.
The court has explained in an earlier decision that misuse of the compromised data is an
important inflection point that explains many of the differing standing results. C.C. v. Med-Data
Inc., No. 21-2301-DDC-GEB, 2022 WL 970862, at *4 (D. Kan. Mar. 31, 2022) (“‘[W]here no
allegations of misuse are present, circuit courts have generally declined to find standing.’”
(quoting Legg v. Leaders Life Ins. Co., 574 F. Supp. 3d 985, 990 (W.D. Okla. 2021))); In re
Progressive Leasing Breach Litig., No. 23-cv-00783-DBB-CMR, 2025 WL 213744, at *9 (D.
Utah Jan. 16, 2025) (cataloguing data privacy cases and concluding “misuse is generally
necessary [for] standing”).4 Honing in on this inflection point, many district courts in the Tenth
Circuit “have predicted that [our] Court of Appeals will require actual misuse of stolen data to
3
See O’Leary v. TrustedID, Inc., 60 F.4th 240, 244 (4th Cir. 2023) (“[W]e’ve held that being
subjected to a data breach isn’t in and of itself sufficient to establish Article III standing without a
nonspeculative, increased risk of identity theft.”); McMorris v. Carlos Lopez & Assocs., LLC, 995 F.3d
295, 301, 303–05 (2d Cir. 2021) (noting “that plaintiffs may establish standing based on an increased risk
of identity theft or fraud following the unauthorized disclosure of their data” but ultimately concluding
plaintiffs lacked standing because they “never alleged that their data was intentionally targeted or
obtained by a third party,” failed to allege their data “was in any way misused,” and likewise failed to
allege “that the PII was intentionally taken by an unauthorized third party or otherwise misused”); Tsao v.
Captiva MVP Rest. Partners, LLC, 986 F.3d 1332, 1340–44 (11th Cir. 2021) (concluding plaintiffs’
alleged harms of substantial future risk of identity theft, proactive mitigation costs, and conclusory
allegations of unauthorized charges failed to confer standing); In re SuperValu, Inc., 870 F.3d 763, 769–
70 (8th Cir. 2017) (concluding plaintiffs lacked standing when plaintiffs alleged that “illicit websites
[were] selling their Card Information to counterfeiters and fraudsters, and that plaintiffs’ financial
institutions [were] attempting to mitigate their risk” because the allegations were “speculative” and
“fail[ed] to allege any injury ‘to the plaintiff[s]’” (quoting Friends of the Earth, Inc. v. Laidlaw Env’t
Servs. (TOC), Inc., 528 U.S. 167, 181 (2000))).
4
For a detailed assessment of cases addressing whether a plaintiff must allege actual misuse, see In
re Progressive, 2025 WL 213744, at *3–9. A minority of courts have concluded a plaintiff has standing
even absent allegations of actual misuse. See Bohnak v. Marsh & McLennan Cos., 79 F.4th 276, 289 (2d
Cir. 2023) (concluding plaintiff sufficiently alleged a substantial likelihood of future harm, even absent
allegations of actual identity theft or other misuse).
8
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 9 of 30
find that plaintiffs have standing[.]” Stern v. Academy Mortg. Corp., No. 24-cv-00015-DBBDAO, 2025 WL 239036, at *3 (D. Utah Jan. 17, 2025); Owen-Brooks v. DISH Network Corp.,
No. 23-cv-01168-RMR-SBP, 2024 WL 4338133, at *7–8 (D. Colo. Aug. 23, 2024), report and
recommendation adopted 2024 WL 4333660 (D. Colo. Sept. 27, 2024) (joining sister courts “in
predicting that the Tenth Circuit will require data breach plaintiffs to allege actual misuse of
their stolen data . . . to find that they have standing to bring claims for damages. . . . [and]
injunctive relief” (emphasis in original)); cf. Blood, 2022 WL 11745549, at *7 (“[M]ultiple
Circuits have held that without actual misuse of stolen information, plaintiffs lack standing to
bring claims because their injuries are not concrete, particularized, or imminent.”). The court
agrees with these sister courts—actual misuse generally is necessary to establish an injury in
fact.
To put a finer point on it, actual misuse establishes a past harm—when a cybercriminal
already has employed a plaintiff’s PII for his own ends. But when it comes to PII, there’s also
the question of future harm—that is, if a plaintiff’s PII is “out there,” so to speak, a bad actor
could use it at any point. The court addresses future harm separately, in a bit. It requires a
slightly different analysis (one that includes, but doesn’t end with actual misuse). For now, the
court trains its attention on plaintiff’s alleged harms to determine if any establish an injury in
fact.
Plaintiff alleges four kinds of injury: (1) actual identity theft and the risk of future
identity theft; (2) fear and anxiety; (3) lost time, annoyance, and inconvenience from mitigation
efforts; and (4) loss of privacy. Doc. 1 at 15–16 (Compl. ¶¶ 68–75).5 Each of these injuries
5
Because a “‘putative class action can proceed as long as one named plaintiff has standing[,]’” the
court evaluates just the injury allegations specific to plaintiff. Masterson, 2023 WL 8647157, at *2 n.2
(quoting In re SuperValu, Inc., 870 F.3d at 768).
9
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 10 of 30
allegedly supports a claim for damages. Plaintiff also requests declaratory and injunctive relief.
Recall that plaintiff “must demonstrate standing for each claim that [he] press[es] and for each
form of relief that [he] seek[s.]” TransUnion, 594 U.S. at 431 (emphasis added). To assess
whether plaintiff has standing, the court evaluates each of his alleged injuries supporting
damages. Then, the court addresses whether plaintiff has standing to seek injunctive and
declaratory relief.
B.
Damages
The court structures its standing analysis about damages as follows: First, the court
evaluates plaintiff’s alleged injuries premised on identity theft and fraud. These injuries
subdivide into two categories—past and future identity theft. And each category merits a
slightly different analysis. So, the court first addresses allegations of past identity theft,
completing both the injury-in-fact and causation standing analyses. After completing that
analysis, the court turns to future identity theft. It explains the three-part test employed when a
court analyzes standing based on future identity theft allegations, and then conducts that analysis.
As preview of the result, the court concludes that plaintiff doesn’t have standing to seek damages
premised on either past or future identity theft.
Then, the court assesses whether plaintiff has damages standing premised on emotional
distress, lost time, or lost privacy injuries. Again, the answer is no for all three.
1.
Past and Prospective Identity Theft and Fraud
Plaintiff alleges he “has had his identity stolen or attempts” at stealing his identity. Doc.
1 at 15 (Compl. ¶ 68). And he alleges that facing “imminent and impending injury arising from
the substantially increased risk of fraud, identity theft, and misuse” of his data. Id. at 16 (Compl.
¶ 75). Start with plaintiff’s alleged past identity theft.
10
Case 5:24-cv-04039-DDC-GEB
a.
Document 22
Filed 03/05/25
Page 11 of 30
Past Identity Theft
Three allegations of identity theft appear in plaintiff’s Complaint. First, plaintiff alleges
that because of the data breach, he received a number of spam calls. Id. at 15 (Compl. ¶ 70).
Those calls, he asserts, were “clearly attempts to use Plaintiff’s PII to extort him for money or
more PII.” Id. Second, he alleges unauthorized actors attempted to sign in to his bank accounts.
Id. (Compl. ¶ 68). And, third, he alleges that cybercriminals “were able to pose as Plaintiff and
hack his financial accounts to steal his money[,]” including making unauthorized purchases on
his PayPal account. Id. (Compl. ¶¶ 68–69). The first and second of these allegations don’t
qualify as misuse constituting injuries in fact. The third is misuse constituting an injury in fact.
But on that third allegation—as the court shows, below—plaintiff’s standing theory runs out on
causation.
i.
Injury in Fact
Begin with plaintiff’s allegation that he received an increased number of spam calls
attempting to extort him. Our court has concluded that increased spam calls after a data breach
are not an injury in fact. Blood, 2022 WL 11745549, at *6 (“[T]he alleged inconvenient
disruptions (such as spam calls, texts, and emails) do not constitute an injury in fact.”); see also
Legg, 574 F. Supp. 3d at 993 (“[T]he receipt of phishing emails, while perhaps ‘consistent with’
data misuse, does not ‘plausibly suggest’ that any actual misuse of Plaintiff’s personal
identifying information has occurred.” (quoting Bell Atl. Corp. v. Twombly, 550 U.S. 544, 557
(2007)); In re Practicefirst Data Breach Litig., No. 21-CV-00790 (JLS/MJR), 2022 WL 354544,
at *5 n.8 (W.D.N.Y. Feb. 2, 2022) (collecting cases and explaining “even if plaintiffs had shown
that they received an increase in spam because of this data breach, the Court would still find
11
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 12 of 30
these allegations insufficient to allege injury in fact”). Spam calls are annoying. But an
annoyance isn’t an actual and concrete injury.
An identical fate befalls plaintiff’s allegations theorizing that unauthorized actors have
tried to access his bank accounts. Plaintiff never pleads that hackers succeeded in their sign-in
attempts. See generally Doc. 1. He just alleges that he received “multiple notifications” that
unknown actors had tried to sign-in into his account. Id. at 15 (Compl. ¶ 68). Courts have
concluded that receiving notice about attempted logins doesn’t constitute an injury in fact. See
De Medicis v. Ally Bank, No. 21 Civ. 6799 (NSR), 2022 WL 3043669, at *6 (S.D.N.Y. Aug. 2,
2022) (“Plaintiff still fails to establish that he suffered a concrete, particularized injury because
the alleged [email account access] attempts were all unsuccessful.”); Kim v. McDonald’s USA,
LLC, No. 21-cv-05287, 2022 WL 4482826, at *5 (N.D. Ill. Sept. 27, 2022) (emphasizing that no
plaintiff alleged identity theft, and that “notifications that an individual attempted to log in to his
email” weren’t sufficient (quotation cleaned up)). The unsuccessful sign-in attempts don’t
qualify as actual and concrete injuries here.
Plaintiff’s allegations about financial hacks and purchases fare far better—at least on the
injury in fact prong. Recall that plaintiff asserts cybercriminals stole his money by hacking his
financial accounts and making unauthorized PayPal purchases. Doc. 1 at 15 (Compl. ¶¶ 68–69).
Responding, defendant argues that plaintiff’s allegations merely reflect attempts at stealing his
identity. Doc. 18 at 10. In defendant’s view, plaintiff’s Complaint suggests he was “reimbursed
for any fraudulent transaction, if any actual transaction occurred.” Id. And, because plaintiff
doesn’t allege an out-of-pocket loss, defendant suggests, it’s not plausible that his identity was
stolen. Id. But plaintiff needn’t allege an out-of-pocket loss to establish an injury in fact.
TransUnion, 594 U.S. at 425 (recognizing that physical, monetary, and “[v]arious intangible
12
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 13 of 30
harms” are sufficiently concrete injuries). Our court already has declined to adopt a theory
similar to defendant’s argument here, concluding that a data breach plaintiff needn’t plead
financial harm to show actual injury. Masterson, 2023 WL 8647157, at *4 n.4 (rejecting
argument “that neither [named plaintiff] has shown an actual injury because neither pleaded that
they actually paid the unauthorized charges”). Unauthorized purchases are actual misuses of a
plaintiff’s PII constituting injuries in fact. Blood, 2022 WL 11745549, at *5 (concluding
unauthorized bank fees constitute concrete injuries); In re Progressive, 2025 WL 213744, at
*12–13 (concluding named plaintiffs had alleged actual injury sufficiently from unauthorized
charges on debit card); Masterson, 2023 WL 8647157, at *4 (assuming that fraudulent debit card
charges were concrete and actual injuries). This court reaches the same conclusion here.
Plaintiff plausibly has alleged an injury in fact based on his PayPal and financial hacks.
Having established an injury in fact, the court next evaluates whether plaintiff has alleged
a causal link between the data breach and plaintiff’s injury.
ii.
Causation
To establish the requisite causal link, a plaintiff plausibly must allege an injury that’s
“fairly traceable” to the data breach. Clapper, 568 U.S. at 409 (internal quotation marks and
citation omitted). And those allegations can’t involve a “speculative chain of possibilities[.]” Id.
at 414; Masterson, 2023 WL 8647157, at *3 (same). In other data privacy cases, courts
(including this one) have found causation missing when a plaintiff fails to explain how the PII
disclosed in the data breach connects to the injury alleged. For example, in Blood v. Labette
County Medical Center, our court concluded data breach plaintiffs had failed to plead the
causation element of standing. 2022 WL 11745549, at *5. There, like here, a data breach
allegedly disclosed plaintiffs’ names and Social Security numbers. Id. at *1. And while
13
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 14 of 30
plaintiffs had alleged an injury in fact—unauthorized charges on their bank accounts—they
never pleaded “facts suggesting how the mere possession of their Social Security numbers and
names would enable someone to make unauthorized charges on an existing account[.]” Id. at *5.
“To assume someone could have done so with the allegedly stolen information . . . requires a
level of speculation and conjecture this Court is unwilling to accept.” Id.; see also Fernandez v.
Leidos, Inc., 127 F. Supp. 3d 1078, 1086 (E.D. Cal. Aug. 28, 2015) (concluding attempts to open
bank accounts and access plaintiff’s email not fairly traceable to data breach because stolen data
tapes didn’t include bank account information and email addresses). Instead, to survive a
standing challenge, plaintiff must allege the PII disclosed in this data breach was misused, or
otherwise show a nonspeculative connection between this data breach and the misuse.
So, how do plaintiff’s causation allegations fare here? Plaintiff never pleads allegations
that, if true, trace how unauthorized actors could use the disclosed PII (his name, Social Security
number, and date of birth) to make unauthorized PayPal purchases or steal his money. But he
does explain how cybercriminals develop “complete dossiers on individuals”—known as Fullz
packages—by cross-referencing stolen PII with other stolen PII or publicly available data. Doc.
1 at 13–14 (Compl. ¶¶ 61–64). According to plaintiff, creating Fullz packages “means that
stolen PII from the Data Breach can easily be used to link and identify it to Plaintiff’s and the
Class’s phone numbers, email addresses, and other unregulated sources and identifiers.” Id. at
14 (Compl. ¶ 63). And, plaintiff concludes, “[t]hat is exactly what is happening to Plaintiff[,]”
making it “reasonable for any trier of fact . . . to find that Plaintiff’s and the Class’s stolen PII is
being misused, and that such misuse is fairly traceable to the Data Breach.” Id. (Compl. ¶ 64).
But this causation argument is speculative on two fronts. First, plaintiff speculates that
unknown cybercriminals took his PII from this data breach and compiled along with other
14
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 15 of 30
information to create a Fullz package. Second, he implicitly speculates that the Fullz package
included plaintiff’s financial and PayPal account information, information decidedly not part of
this data breach. Plaintiff never alleges that his PayPal or bank account information was
involved in another data breach or was otherwise publicly available. In fact, he explains that he
“stores any documents containing his sensitive PII in safe and secure locations” and “diligently
chooses unique usernames and passwords for his various online accounts.” Id. at 15 (Compl.
¶ 73). Plaintiff’s causation theory simply describes Fullz packages as a concept. And then his
theory jumps to the conclusion that the information disclosed in the data breach enabled
unauthorized actors to access his financial accounts.
Blanket explanations about the development of Fullz packages don’t suffice to plead
causation. See Masterson , 2023 WL 8647157, at *5, *5 n.7 (concluding plaintiffs hadn’t
established causation where plaintiff never alleged defendant possessed the misused data or
“explain[ed] how the combination of PII . . . taken in the data breach . . . combined with
‘unregulated data’ . . . can lead to the misuse alleged, let alone how that misuse is traceable to
[defendant]”); Zerbe v. IMA Fin. Grp., No. 24-2026-HLT-GEB, 2024 WL 3677395, at *6 (D.
Kan. Aug. 6, 2024) (concluding in companion case to Masterson that the Fullz package
allegations weren’t sufficient to show “how the combination of some stolen data with
unspecified other data available on the internet results in an injury traceable to [defendant]”);
Doe v. Mission Essential Grp., No. 23-cv-3365, 2024 WL 3877530, at *7 (S.D. Ohio Aug. 20,
2024) (noting in traceability analysis that “[a]lthough [plaintiff] insists that the PII possibly
accessed in the Data Incident” may combine “with other sources to create ‘Fullz’ packages that
can be sold or used to commit fraud[,]” that allegation relies “upon speculation about the actions
15
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 16 of 30
of independent actors in combining the PII with information” from other sources). Plaintiff here
doesn’t “fairly trace” the alleged data breach to Fullz package misuse.6
Because plaintiff’s alleged instances of past identity theft don’t qualify either as injuries
in fact or as fairly traceable to the data breach, plaintiff hasn’t shown the all-important “actual
misuse” required to plead standing. See Blood, 2022 WL 11745549, at *8 (concluding the court
had “no sufficient allegations of data misuse” when each allegation of misuse failed as either an
injury in fact or as fairly traceable to the data breach). Next, the court considers whether
plaintiff’s future identity theft allegations can qualify as an injury in fact.
b.
Risk of Future Identity Theft and Fraud
Plaintiff takes his identity theft and fraud allegations one step further, alleging he faces
“imminent and impending injury arising from the substantially increased risk of fraud, identity
theft, and misuse resulting from [his] PII, especially his Social Security number, being placed in
the hands of unauthorized third parties and possibly criminals.” Doc. 1 at 16 (Compl. ¶ 75).
Defendant argues that these allegations merely speculate about future events and conduct of
unknown third parties, which undercut plaintiff’s risk of future harm. Doc. 18 at 11.
Before the court applies case law to evaluate plaintiff’s allegations of future risk, the
court clarifies an important, orienting principle: Risk of future identity theft alone doesn’t confer
standing for damages claims. TransUnion, 594 U.S. at 437 (finding mere risk of future harm—
without showing the risk had materialized—doesn’t suffice to confer standing for damages
claims). So, one might ask, why should the court evaluate that risk here? A cognizable risk of
6
Plaintiff identifies three out-of-circuit cases accepting allegations about Fullz packages as
plausible explanations of traceability. See Doc. 20 at 10 (first citing Fox v. Iowa Health Sys., 399 F.
Supp. 3d 780, 792 (W.D. Wis. 2019); then citing Flores v. Aon Corp., 242 N.E. 3d 340, 354 (Ill. App. Ct.
2023); and then citing In re GEICO Customer Data Breach Litig., No. 21-CV-2210-KAM-SJB, 2023 WL
4778646, at *6–7 (E.D.N.Y. July 21, 2023)). The court doesn’t find these cases persuasive on the facts
alleged here, given our court’s rejection of a similar theory in other cases.
16
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 17 of 30
future harm may suffice for plaintiff to allege a past injury in fact based on his emotional distress
and mitigation efforts. See below § III.B.2–3. The court evaluates plaintiff’s standing based on
those alleged injuries later in this Order. But, first, the court examines the threshold question:
whether plaintiff has alleged sufficiently a risk of future identity theft.
Other Circuits have developed a three-factor test to determine “when the risk of future
misuse of PII following a data breach is imminent and substantial.” Webb v. Injured Workers
Pharmacy, LLC, 72 F.4th 365, 375 (1st Cir. 2023). Those three factors are:
(1) whether the plaintiffs’ data has been exposed as the result of a targeted attempt
to obtain the data; (2) whether any portion of the dataset has already been misused,
even if the plaintiffs themselves have not yet experienced identity theft or fraud;
and (3) whether the type of data that has been exposed is sensitive such that there
is a high risk of identity theft or fraud.
McMorris, 995 F.3d at 303.7 These factors aren’t exclusive. Id. And, in the First
Circuit’s view, they aren’t “necessarily determinative[.]” Webb, 72 F.4th at 375. “[B]ut they do
provide guidance.” Id.
Our court also has evaluated these three factors—even after concluding a plaintiff’s
failure to allege misuse “alone puts plaintiff on shaky standing grounds.” F.S. v. Captify Health,
Inc., No. 23-1142-DDC-BGS, 2024 WL 1282437, at *4 (D. Kan. Mar. 26, 2024). The court
takes the same approach again, here. It concludes plaintiff hasn’t shown an imminent risk of
future identity theft.
i. Targeted Attempt
First, consider whether the breach resulted from an intentional, targeted effort. To be
sure, “all cyber-attacks involve some degree of intentional conduct just by the very nature of the
7
The First, Second, and Third Circuits all consider these three factors. See Webb, 72 F.4th at 375–
77; Bohnak, 79 F.4th at 283 (reaffirming three McMorris factors post-TransUnion); Clemens v.
ExecuPharm Inc., 48 F.4th 146, 153–54, 157 (3d Cir. 2022).
17
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 18 of 30
attack.” In re Samsung Data Sec. Breach Litig., No. 23-md-03055, 2025 WL 271059, at *6
(D.N.J. Jan. 3, 2025) (internal quotation marks and citation omitted). But a clearly “intentional
breach makes standing more likely.” Alonzo v. Refresco Beverages US, Inc., No. 23-22695 (GC)
(JBD), 2024 WL 4349592, at *5 (D.N.J. Sept. 30, 2024) (citing McMorris, 995 F.3d at 301).
Here, plaintiff attaches the data breach letter distributed by defendants to his Complaint.8
See Doc. 1-1 at 2 (Pl. Ex. 1). The letter repeatedly used the passive voice to explain the data
breach incident: “[T]here was unauthorized access to [defendant’s] network” and “certain files
and folders were viewed or taken without authorization[.]” Id. Plaintiff interprets this language
to mean that “cybercriminals obtained everything they needed to commit identity theft and wreak
havoc on the financial and personal lives of thousands of individuals[.]” Doc. 1 at 2 (Compl.
¶ 8). But that interpretation seems like a leap, given the information provided in defendant’s
letter. And there’s no indication plaintiff has any other information to support his conclusory
allegation. Cf. Deevers v. Wing Fin. Servs., LLC, No. 22-CV-550-CVE-JFJ, 2023 WL 6133181,
at *5 (N.D. Okla. Sept. 19, 2023) (explaining that it’s “unclear” whether plaintiffs sufficiently
alleged a targeted attack because they just had alleged unauthorized parties could access client
records and defendant identified unauthorized access, but plaintiffs didn’t “allege that a specific
third party actor stole information, or that a known third party targeted” the systems). The court
thus acknowledges the possibility of a targeted attack by cybercriminals, as plaintiff alleges, but
doesn’t unqualifiedly accept it as true. See Blood, 2022 WL 11745549, at *3 (explaining that “a
court need not accept conclusory allegations” as true at the pleading stage (quotation cleaned
8
“Exhibits attached to a complaint are properly treated as part of the pleadings for purposes of
ruling on a motion to dismiss.” Tal v. Hogan, 453 F.3d 1244, 1264 n.24 (10th Cir. 2006) (evaluating
plaintiff’s exhibits in ruling a 12(b)(6) motion). A facial 12(b)(1) challenge proceeds under the “same
standards” as a 12(b)(6) motion to dismiss. Muscogee (Creek) Nation v. Okla. Tax Comm’n, 611 F.3d
1222, 1227 n.1 (10th Cir. 2010).
18
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 19 of 30
up)). And so, the first factor slightly favors finding an injury in fact from plaintiff’s future
identity theft allegations.
ii.
Misuse
Second, the test directs courts to consider whether plaintiff has alleged any portion of the
dataset was misused. As established above, plaintiff’s alleged misuses fall short of the mark
because they don’t qualify either as injuries in fact or as fairly traceable to the data breach. So,
this factor significantly cuts against finding a “certainly impending” future injury. Clapper, 568
U.S. at 409 (quotation cleaned up).
While some cases conclude misuse isn’t an essential part of the test, sister district courts
in the Tenth Circuit emphasize the vitality of misuse to the standing calculus. In fact, some don’t
evaluate the other two factors at all and concentrate solely on actual misuse at the future harms
stage, as well. Compare Bohnak, 79 F.4th at 289 (“[A known misuse of information] allegation
is not necessary to establish that an injury is sufficiently imminent to constitute an injury in
fact.”); with Masterson, 2023 WL 8647157, at *8 (emphasizing the importance of actual misuse
in risk of future injuries analysis to show a data breach injury is concrete, particularized, or
imminent without evaluating other two factors); and Deevers, 2023 WL 6133181, at *5–6
(applying three factors and explaining “the majority of courts, including district courts in this
circuit, have concluded that plaintiffs must allege actual misuse . . . to demonstrate they face an
imminent risk of fraud”). Indeed, our court has required some form of actual misuse to show an
imminent and substantial risk of future harm in data privacy cases. See Blood, 2022 WL
11745549, at *7–8 (evaluating plaintiff’s allegations of actual misuse and whether those
allegations support an injury in fact based on risk of future identity theft); see also In re Equifax
Inc. Customer Data Sec. Breach Litig., 999 F.3d 1247, 1263 (11th Cir. 2021), cert. denied sub
19
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 20 of 30
nom. Huang v. Spector, 142 S. Ct. 431 (2021) (finding plaintiffs plausibly had alleged an injury
in fact because some plaintiffs already had their identities stolen already and the “the allegations
of some Plaintiffs that they have suffered injuries resulting from actual identity theft support the
sufficiency of all Plaintiffs’ allegations that they face a risk of identity theft” (emphasis in
original)). This factor—a weighty one for district courts in our Circuit—significantly undercuts
plaintiff’s future-risk-of-identity-theft argument.
iii.
Sensitive Data
Third, consider whether data exposed in the breach is susceptible to fraud. Plaintiff
alleges his name, Social Security number, and date of birth were exposed in the breach. Doc. 1
at 14 (Compl. ¶ 66). This data is precisely the type of sensitive, high-risk information
susceptible to fraud. McMorris, 995 F.3d at 302 (“Naturally, the dissemination of high-risk
information such as Social Security numbers and dates of birth—especially when accompanied
by victims’ names—makes it more likely that those victims will be subject to future identity theft
or fraud.”). This factor favors a conclusion that plaintiff has alleged a sufficient injury in fact.
As the First Circuit explained, the three factors “are neither exclusive nor necessarily
determinative, but they do provide guidance.” Webb, 72 F.4th at 375. Next, the court evaluates
one last factor before deciding whether plaintiff has alleged a “certainly impending” risk of
future identity theft. See Clapper, 568 U.S. at 409 (quotation cleaned up).
iv.
Miscellaneous Consideration
Aside from allegations of identity theft, plaintiff attempts to show imminence by citing a
plethora of research and reports about identity theft crimes and data breaches. See Doc. 1 at 12–
14, 17 (Compl. ¶¶ 57–63, 81). But this court already has rejected this approach, concluding it
doesn’t establish a cognizable risk of future harm. See Med-Data Inc., 2022 WL 970862, at *7
20
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 21 of 30
(finding that plaintiffs hadn’t pleaded “any particularized facts to corroborate” fear of future
identity theft and “research and reports about identity theft crimes” don’t suffice to show a risk
of future harm); Legg, 574 F. Supp. 3d at 993 (finding that plaintiff “relies on reports that
describe the general risks of identity theft, explain how personal information can be sold on illicit
internet cites, and identify other data breaches” but those reports “‘do nothing to clarify the risks
to the plaintiffs in this case’” (quoting Tsao, 986 F.3d at 1343)). Simply put, the referenced
reports don’t persuade the court that the threatened injury is “certainly impending.” Clapper,
568 U.S. at 409 (quotation cleaned up).
At bottom, the court concludes plaintiff hasn’t alleged a risk that future identity theft is
imminent. While the data’s sensitivity favors an injury in fact conclusion, the court isn’t
convinced plaintiff’s allegations about cybercriminals and a targeted attack move beyond the
conclusory stage. And the alleged misuse factor—arguably the most important factor—strongly
disfavors concluding that plaintiff has alleged a sufficient injury in fact. Finally, plaintiff’s
attempt to lean into research and reports doesn’t help his cause. Without the alleged misuse, his
threats of future identity theft are too speculative to confer standing.
But even if one assumes plaintiff had alleged sufficiently a risk of future identity theft,
that risk wouldn’t confer standing for damages automatically. That’s because, recall, future
identity theft alone doesn’t suffice as an injury in fact for damages. TransUnion, 594 U.S. at
436–37. But sometimes, a risk of future harm can couple with other harms to create a cognizable
injury in fact supporting damages. Plaintiff seeks damages from two harms that fit this bill:
emotional distress and mitigation efforts. So, the court evaluated plaintiff’s future injury
allegations as a potential companion to establish standing under emotional distress and
21
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 22 of 30
mitigation efforts. The court’s conclusion—that plaintiff hadn’t alleged a future risk of identity
theft—thus dooms plaintiff’s emotional distress and mitigation injuries.
2.
Emotional Distress
Plaintiff alleges he experienced fear and anxiety from the loss of his privacy. Doc. 1 at
16 (Compl. ¶ 74). And, he alleges, he will continue suffering emotional distress. Id. (Compl.
¶ 79). Defendant responds, contending that this emotional distress won’t support standing unless
plaintiff also has alleged an impending risk of future identity theft or actual misuse of the PII
disclosed in the data breach. Doc. 18 at 13. Defendant is correct—emotional distress plus actual
misuse or certainly impending future harm can qualify as an injury in fact. Masterson, 2023 WL
8647157, at *7 (“[T]here are no allegations of misuse tied to [defendant]. And, . . . there is no
risk of future harm that is certainly impending or substantial. Based on this, Plaintiffs’ barebones allegations of emotional distress are not sufficient to confer standing.”). Plaintiffs can’t
“manufacture standing merely by inflicting harm on themselves[.]” Clapper, 568 U.S. at 416.
Absent allegations of actual misuse or an imminent threat of future harm, emotional distress
allegation can’t qualify as a present or future harm sufficient for standing.
His next asserted injury suffers the same fate.
3.
Lost Time from Mitigation Efforts
Plaintiff alleges he spent 240 hours mitigating the data breach’s consequences. Doc. 1 at
15 (Compl. ¶ 71). In those hours, he verified the legitimacy of the Notice of Data Breach, selfmonitored his accounts, reviewed his credit reports, and otherwise “mitigat[ed] fraud and identity
theft.” Id. But mitigation time constitutes a concrete injury only if it’s “based on a threat of
future injury that is certainly impending.” Blood, 2022 WL 11745549, at *6 (concluding
mitigation time not an injury in fact after concluding plaintiffs hadn’t alleged fraud injuries fairly
22
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 23 of 30
traceable to the data breach); Legg, 574 F. Supp. 3d at 994 (“[W]hile it may have been
reasonable to take some steps to mitigate the risks associated with the data breach, those actions
cannot create a concrete injury where there is no imminent threat of harm.”); Stern, 2025 WL
239036, at *7 (“Plaintiffs’ fear about misuse of their PII is not certainly impending harm, as no
Plaintiff has alleged that their data is actually available on the dark web or otherwise has been
transmitted to others for imminent use.”). Without actual misuse or a certainly impending threat
of future injury, plaintiff again “manufacture[s] standing merely by inflicting harm on [himself]
based on [his] fears of hypothetical future harm[.]” Clapper, 568 U.S. at 416. That’s not
sufficient to constitute an injury in fact—for past mitigation efforts or future ones.
Last up, the final injury allegation to support damages—lost privacy.
4.
Lost Privacy
Plaintiff alleges defendant “affirmatively and recklessly disclosed” plaintiff’s PII to
“unauthorized third parties.” Doc. 1 at 31 (Compl. ¶ 147). And defendant’s “reckless and
negligent failure to protect Plaintiff and Class Members’ PII constitutes an intentional
interference with [their] interest in solitude or seclusion . . . [in a manner] that would be highly
offensive to a reasonable person.” Id. at 31–32 (Compl. ¶ 149). Based on these allegations, the
court interprets plaintiff’s lost privacy claim here as one sounding in the intrusion upon seclusion
tort. So, the court next evaluates whether these intrusion upon seclusion allegations confer
standing.
Remember, standing requires an injury that is both actual or imminent, and concrete.
Lujan, 504 U.S. at 560. The court has referenced many cases that—when evaluating commonly
alleged data breach injuries—fail to distinguish between those two injury-in-fact requirements.
But when evaluating a lost privacy harm, the distinction comes into focus. While a plaintiff may
23
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 24 of 30
allege an actual loss of privacy resulting from a data breach, that doesn’t mean their asserted
injury is concrete. So, the court’s analysis now must focus on the concreteness of plaintiff’s
alleged lost privacy.9
The Supreme Court has clarified that concrete injuries are those with “a close relationship
to a harm traditionally recognized as providing a basis for a lawsuit in American courts.”
TransUnion, 594 U.S. at 424 (quotation cleaned up). And to identify such a traditionally
recognized harm, the Supreme Court has looked to the Restatement of Torts. Id. at 432
(referencing the Restatement when assessing whether the alleged injury bore a “close
relationship to a harm traditionally recognized as providing a basis for a lawsuit in American
courts” on the concrete harm requirement (internal quotation marks and citation omitted)). The
Restatement outlines four, traditionally distinct privacy torts: (1) intrusion upon seclusion; (2)
appropriation of name or likeness; (3) public disclosure of private facts; and (4) false light
publicity. See Restatement (Second) of Torts § 652A (Am. L. Inst. 1977) (October 2024
Update). As TransUnion explained, “disclosure of private information, and intrusion upon
seclusion” may constitute concrete, intangible harms. 594 U.S. at 425.10 The court evaluates
9
As a case in point, plaintiff here focused his briefing on whether his loss of privacy injury was
actual or imminent. See Doc. 20 at 5 (“‘To sustain an injury based on loss of privacy, other courts have
required some allegation that personal information has been viewed of exposed in a way that would
facilitate easy, imminent access.’” (quoting Masterson, 2023 WL 8647157, at *7)); In re Sci. Applications
Int’l Corp. Backup Tape Data Theft Litig., 45 F. Supp. 3d 14, 28–29 (D.D.C. 2014) (concluding invasion
of privacy didn’t satisfy imminence requirement when plaintiff hadn’t alleged their PII was viewed or
“exposed in a way that would facilitate easy, imminent access”).
Taking plaintiff’s allegations as true, the court assumes an actual or imminent loss of privacy
injury under the definitions used in these cases. Nonetheless, his loss of privacy allegations still don’t
establish injury in fact because they aren’t concrete, as the court explains in this section.
10
In the data breach context, courts—including ours—have evaluated loss of privacy for standing
purposes by comparison to the public disclosure of private facts tort. See Med-Data, Inc., 2022 WL
970862, at *9 (“Plaintiff’s alleged loss of privacy damages here arise from her invasion of privacy tort
claim—specifically, the tort of public disclosure of private information.” (quotation cleaned up)); In re
Practicefirst Data Breach Litig., 2022 WL 354544, at *8 (“[E]ven if plaintiffs could plead facts sufficient
24
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 25 of 30
whether plaintiff’s alleged lost privacy injury here establishes standing because of its close
relationship to the intrusion upon seclusion tort.
The Restatement provides:
One who intentionally intrudes, physically or otherwise, upon the solitude or
seclusion of another or his private affairs or concerns, is subject to liability to the
other for invasion of his privacy, if the intrusion would be highly offensive to a
reasonable person.
Restatement (Second) of Torts § 652B (Am. L. Inst. 1977) (October 2024 Update) (emphasis
added). “[O]ne who suffers an intrusion upon his solitude or seclusion, under § 652B, may
recover damages for the deprivation of his seclusion.” Id. § 652H cmt. a. “While plaintiffs are
not required to prove the elements for a common-law analogue in order to secure standing, they
must demonstrate that the harm posed by the theft of their information bears a close relationship
to these traditionally recognized harms.” I.C. v. Zynga, Inc., 600 F. Supp. 3d 1034, 1049 (N.D.
Cal. 2022) (quotation cleaned up).
Here, plaintiff’s intrusion upon seclusion claim falls short of the requisite close
relationship because intent is absent. According to plaintiff, defendant “acted with a knowing
to allege the tort of public disclosure of private information, the Court would still find a lack of subject
matter jurisdiction here. Indeed, this theory of standing has been rejected in the data breach context
where, like in this case, plaintiffs have failed to demonstrate any concrete or particularized injury
associated with the disclosure.”).
Our court also has emphasized that, in a claim for public disclosure of private facts, “loss of
privacy, in and of itself, is not a concrete harm that can provide the basis for Article III standing.” MedData Inc., 2022 WL 970862, at *10. So, even if the court construed plaintiff’s claim as one for public
disclosure of private facts, plaintiff hasn’t alleged actual harm fairly traceable to the data breach. So, loss
of privacy wouldn’t confer standing.
Nonetheless, the court construes plaintiff’s claim as one of intrusion upon seclusion. Doc. 1 at
31–32 (Compl. ¶ 149) (alleging defendant’s conduct intentionally interfered with plaintiff’s “interest in
solitude or seclusion”); Doc. 20 at 14 (responding to motion to dismiss invasion of privacy claim by
recounting the elements of an intrusion upon seclusion claim). And so, this section engages in an
intrusion upon seclusion analysis.
25
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 26 of 30
state of mind when it permitted the Data Breach because it knew its information security
practices were inadequate.” Id. at 32 (Compl. ¶ 150). But as defendant emphasizes, plaintiff
can’t “tie any alleged privacy invasion to [defendant] rather than the criminal cyberattackers.”
Doc. 18 at 12. Plaintiff doesn’t allege defendant intentionally permitted a third party to intrude
his seclusion. He simply alleges defendant knew its security systems were inadequate, and
therefore “permitted the Data Breach[.]” Doc. 1 at 32 (Compl. ¶ 150). But the intrusion upon
seclusion tort traditionally permitted recovery only when the defendant intentionally had invaded
the plaintiff’s private affairs. Even viewing plaintiff’s nonconclusory allegations in the light
most favorable to him, he hasn’t alleged an intentional invasion by defendant.
The court thus concludes plaintiff’s harm resulting from the data breach doesn’t bear a
close relationship to the type of harm contemplated under the intrusion upon seclusion tort. See
Zynga, 600 F. Supp. 3d at 1050 n.10 (deciding standing on other grounds but noting that “it is
doubtful whether [plaintiffs] can show that Zynga (whom plaintiffs sue for negligence) directly
harmed them in a way that is analogous to the harm from intentional intrusion upon seclusion”
because plaintiffs alleged a third-party stole their PII (emphasis in original)). Plaintiff’s loss of
privacy injury—even if actual and imminent—isn’t concrete and thus doesn’t suffice as an injury
in fact.
For his damages claims, plaintiff hasn’t alleged any injuries in fact fairly traceable to the
data breach. That means he doesn’t have standing to seek damages. But recall that “plaintiffs
must demonstrate standing for each claim that they press and for each form of relief that they
seek (for example, injunctive relief and damages).” TransUnion, 594 U.S. at 431. Having
26
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 27 of 30
addressed plaintiff’s standing to seek damages, the court next must evaluate plaintiff’s standing
to seek injunctive and declaratory relief.11
C.
Injunctive & Declaratory Relief
Remember, a “threatened injury must be certainly impending to constitute an injury in
fact.” Clapper, 568 U.S. at 409 (quotation cleaned up). “Allegations of possible future injury
are not sufficient.” Id. (quotation cleaned up); TransUnion, 594 U.S. at 435 (“[A] person
exposed to a risk of future harm may pursue forward-looking, injunctive relief to prevent the
harm from occurring, at least so long as the risk of harm is sufficiently imminent and
substantial.”). The “threat of injury must be both real and immediate, not conjectural or
hypothetical.” City of Los Angeles v. Lyons, 461 U.S. 95, 102 (1983) (quotation cleaned up).
In the current case, plaintiff asks the court to declare: (1) defendant owes a duty to secure
the proposed class’s PII; (2) defendant continues to breach that duty by failing to employ
reasonable measures to secure the proposed class’s PII; and (3) these ongoing breaches continue
to cause the proposed class harm. Doc. 1 at 39 (Compl. ¶ 191). And he asks for “corresponding
prospective injunctive relief requiring Defendant to employ adequate security protocols . . . to
protect consumers’ PII.” Id. (Compl. ¶ 192). Has plaintiff alleged an injury in fact sufficient to
seek this injunctive and declaratory relief?
First, an important point about the future injury undergirding this injunctive and
declaratory relief: the injury supporting this relief is not future misuse of the PII already
disclosed in the breach. Instead, it’s the risk that defendant will face another data breach, and
11
The parties didn’t focus much of their efforts on this topic. See Doc. 18 at 15 (briefly explaining
that prospective injunctive relief wouldn’t redress plaintiff’s alleged future risk of identity theft); Doc. 20
at 11–12 (briefly suggesting an ongoing risk of another data breach); id. at 15 (explaining why declaratory
relief is available). The court aligns itself with the parties’ approach and addresses these forms of relief
more briefly.
27
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 28 of 30
release plaintiff’s PII into the world again. See In re Progressive, 2025 WL 213744, at *13
(“Here, the complained of harm supporting an injunction is that [defendant] will experience
another data breach and further compromise Plaintiffs’ PII.”); see also Webb, 72 F.4th at 378
(“[A]n injunction requiring [defendant] to improve its cybersecurity systems cannot protect the
plaintiffs from future misuse of their PII by the individuals they allege now possess it.”). An
injunction couldn’t remedy future misuse of data already in the hands of unknown third parties.
In a strikingly similar situation, the District of Utah recently concluded plaintiffs lacked
standing to seek injunctive relief. In re Progressive concluded that plaintiffs “failed to plausibly
allege that there is a substantial risk of another breach of [defendant’s] systems or that a breach is
certainly impending.” 2025 WL 213744, at *14. To be certain, the plaintiffs had alleged that
defendant stored plaintiffs’ data in an unencrypted, internet-accessible system. Id. And, they
also emphasized, in the wake of the data breach, defendant didn’t remove the PII from that
system or add encryption. Id. What’s more, the plaintiffs alleged, defendant’s security was still
inadequate. Id. But defendant “publicly denie[d] these allegations.” Id. In the court’s view,
though, the complaint’s allegations didn’t show defendant faced a greater risk of a data breach
than “any other entity that holds PII.” Id. The court explained that—if the court concluded these
allegations sufficed to establish an imminent risk of future injury—“‘virtually every company
and government agency might be exposed to requests for injunctive relief like the one the
plaintiffs seek here.’” Id. (quoting Webb, 72 F.4th at 378); see also Hall v. Centerspace, LP, No.
22-cv-2028 (KMM/DJF), 2023 WL 3435100, at *3–4 (D. Minn. May 12, 2023) (concluding
plaintiff fell short of proving a future data breach was imminent—he hadn’t alleged hackers were
presently targeting defendant or otherwise shown defendant was “uniquely vulnerable to
incursions”—so he didn’t have standing to seek injunctive and declaratory relief); cf. In re
28
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 29 of 30
MOVEit Customer Data Sec. Breach Litig., No. 23-md-03083-ADB-PGL, 2024 WL 5092276, at
*3 n.3 (D. Mass. Dec. 12, 2024) (briefly addressing redressability and emphasizing that the
“Court agrees that many of Plaintiffs’ claims for injunctive relief require dismissal because
prospective remedies targeting the named Defendants cannot address the risk of future harm
caused by the Data Breach”).
This case is a close cousin to In re Progressive. Plaintiff here likewise alleges that
defendant “elected to store the unencrypted PII . . . in an Internet-accessible environment[.]”
Doc. 1 at 7 (Compl. ¶ 37). And, according to plaintiff, defendant’s “data security measures
remain inadequate[,]” but defendant “publicly denies these allegations.” Id. at 38 (Compl.
¶ 189). Simply put, plaintiff alleges it doesn’t know of any efforts defendant has made to protect
his sensitive PII in the aftermath of the breach. Id. But the data breach notice—attached to
plaintiff’s Complaint—indicates the company “confirm[ed] the security” of its systems,
“reported this event to federal law enforcement[,]” and was “reviewing [its] policies, procedures,
and processes to reduce the likelihood of a similar future event.” Doc. 1-1 at 2 (Pl. Ex. 1).
These efforts “cut against any inference that defendant’s prior data breach might make a future
data breach more likely.” Scifo v. Alvaria, Inc., No. 23-cv-10999-ADB, 2024 WL 4252694, at
*5 n.10 (D. Mass. Sept. 20, 2024) (quotation cleaned up) (finding plaintiff’s standing to seek
injunctive relief undercut by notice indicating defendant secured its networks, initiated enhanced
security measures, sought forensic investigation assistance, and notified the FBI). The court
finds that plaintiff here hasn’t alleged any more to show a future data breach is “certainly
impending” than plaintiffs in In re Progressive. Clapper, 568 U.S. at 409 (quotation cleaned
up).
29
Case 5:24-cv-04039-DDC-GEB
Document 22
Filed 03/05/25
Page 30 of 30
And so, the court concludes plaintiff lacks standing to seek his requested injunctive and
declaratory relief.
IV.
Conclusion
Taking stock of all plaintiff’s alleged injuries and requested relief, plaintiff doesn’t have
standing to maintain this suit. Plaintiff must support his damages request with an injury in fact.
But at every alleged injury specific to plaintiff, the Complaint’s allegations fall short. Plaintiff
hasn’t alleged actual misuse of his stolen PII that is fairly traceable to the data breach. He hasn’t
shown that the risk of future identity theft and fraud is sufficiently imminent. And his emotional
distress, mitigation costs, and loss of privacy aren’t cognizable injuries in fact. Plaintiff also
lacks standing to seek injunctive and declaratory relief against defendant because he hasn’t
shown another data breach is imminent.
Without standing, there’s no Article III case or controversy before the court. In turn, that
conclusion means that the court lacks subject matter jurisdiction over this action.
IT IS THEREFORE ORDERED THAT defendant’s Motion to Dismiss (Doc. 17) is
granted. Plaintiff’s Complaint is dismissed without prejudice.
IT IS SO ORDERED.
Dated this 5th day of March, 2025, at Kansas City, Kansas.
s/ Daniel D. Crabtree
Daniel D. Crabtree
United States District Judge
30
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?