Clemens v. Execupharm, Inc. et al
Filing
27
MEMORANDUM AND/OR OPINION. SIGNED BY HONORABLE GERALD J. PAPPERT ON 2/25/21. 2/25/21 ENTERED AND COPIES E-MAILED.(jaa, )
IN THE UNITED STATES DISTRICT COURT
FOR THE EASTERN DISTRICT OF PENNSYLVANIA
JENNIFER CLEMENS, individually and on
behalf of all others similarly situated,
CIVIL ACTION
NO. 20-3383
Plaintiff,
v.
EXECUPHARM, INC. and PAREXEL
INTERNATIONAL CORP.,
Defendants.
PAPPERT, J.
February 25, 2021
MEMORANDUM
Jennifer Clemens, individually and on behalf of a purported class, sued
ExecuPharm, Inc. and parent Parexel International Corporation over a data breach at
ExecuPharm. Defendants moved to dismiss the Complaint pursuant to Federal Rule of
Civil Procedure 12(b)(6), and the Court subsequently requested supplemental briefing
from the Parties as to whether Clemens has standing to bring her claims. Having
considered the supplemental briefing and for the reasons that follow, Clemens lacks
standing and the Court does not have subject matter jurisdiction to address her claims.
I
A
i
Clemens worked at ExecuPharm from February to November of 2016 and
provided the company “significant amounts of her personal and financial information”
as a “condition of her employment.” (Compl. ¶¶ 56–57, 59, ECF No. 1.) She signed an
employment agreement “[a]s a further condition of her employment.” (Id. at ¶ 58.) In
1
it, ExecuPharm agreed to “take appropriate measures to protect the confidentiality and
security of all personal information.” (Id.) Although Clemens left the company years
ago, ExecuPharm retained her sensitive personal information until at least March 13,
2020. (Id. at ¶ 59.) On that date, ExecuPharm’s server was hacked by the CLOP
ransomware group. (Id. at ¶¶ 1, 11, 14, 31.)
CLOP organized a successful email phishing scheme to obtain server access and
encrypt data by installing malware. (Id. at ¶ 13.) It accessed thousands of individuals’
sensitive information, including full names, home addresses, social security numbers,
taxpayer IDs, credit card and bank information, beneficiary information and, in some
cases, passport copies. (Id. at ¶¶ 1–2, 4.) It then demanded a ransom from
ExecuPharm in exchange for data decryption tools and threatened to release the data if
the ransom was not timely paid. (Id. at ¶ 13.) On April 26, CLOP made at least some
of the information it stole available for download on the “dark web.” (Id. at ¶¶ 2, 15,
29). “[T]he download links contained nearly 123,000 files and 162 gigabytes of data,
including nearly 19,000 files of correspondence involving ExecuPharm and Paraxel;
more than 80,600 e-mail correspondences; financial, accounting, user documents of
ExecuPharm’s employees and managers; and a complete backup file of ExecuPharm’s
document management system.” (Id. at ¶ 29.)
Clemens alleges she learned in an email from ExecuPharm on March 20 that her
information was accessed during CLOP’s data breach and ExecuPharm “confirm[ed]” in
an April 26 email “that her family’s most sensitive personal and financial [information]
was ‘shared on the dark web.’” (Id. at ¶¶ 60, 64.) In making these allegations, Clemens
appears to rely on the ExecuPharm communications she quotes elsewhere in the
2
Complaint, which do not state she specifically was a victim of the data breach.
According to the Complaint, ExecuPharm’s March 20 email stated:
Unfortunately, we now believe sensitive information has been accessed,
including social security number, banking information (copy of a personal check
for direct deposit), driver’s license, date of birth, home address, spouse’s name,
beneficiary information (including social security numbers) and payroll tax forms
(such as W-2 and W-4). For some employees, copies of passports also were
accessed.
(Compl. ¶ 18.) The email appended a pdf of a March 18 letter to former employees,
which explained to recipients “[i]f you are receiving this . . . we believe you may be
among the group of former employees impacted by this incident.” (Id. at ¶ 16 (emphasis
added).) ExecuPharm’s April 26 email stated it had “become aware that the
information accessed by the cyberattackers has been shared on the dark web”—it does
not appear to have said anything about Clemens’s or her family’s data specifically. (Id.
at ¶ 30.) Notwithstanding the apparent inconsistencies in Clemens’s allegations, the
Court interprets the Complaint in the light most favorable to her and credits that her
information was accessed and posted online.
ii
After the breach, ExecuPharm offered free identity monitoring services for one
year to all potentially affected current and former employees. (Id. at ¶¶ 24, 65.)
Clemens took advantage of these services, but also purchased additional services for
herself and her family at a cost of $39.99 per month. (Id. at ¶ 71.)
Since the breach, Clemens “has spent significant time and effort reviewing her
financial accounts, bank records, and credit reports for unauthorized activity and will
continue to do so.” (Id. at ¶¶ 61, 67–69.) She has occasionally missed work in order to
pursue mitigative measures. (Id. at ¶ 70.) Once, after she changed her family’s bank
3
account numbers, she was delayed from accessing her funds due to a mistake by the
bank. (Id. at ¶ 69.) Clemens also says she sought and paid for counseling to cope with
stress and anxiety caused by the breach. (Id. at ¶ 72.) She believes that “[g]iven the
highly-sensitive nature of the information stolen, the value of [her] [p]ersonal
[i]nformation has been diminished and she remains at substantial and imminent risk of
future harm.” (Id. at ¶¶ 73, 97.) But she does not allege she has experienced any
identity theft or fraud. See generally (id.).
According to Clemens, many breach victims “have already experienced
significant harms . . . including, but not limited to, identity theft, financial fraud, tax
fraud, medical and healthcare fraud, unauthorized financial accounts or lines of credit
opened in their names, and fraudulent payment card purchases.” (Id. at ¶ 81.) Victims
other than herself have also spent time, money and effort monitoring their accounts
and protecting their information. (Id.)
B
Clemens sued ExecuPharm and Parexel on July 10, 2020 seeking relief
individually and on behalf of a class of individuals whose personal information was
compromised by the breach. (Id. at ¶ 100.) Her Complaint asserts claims of negligence
(Count I), negligence per se (Count II), breach of implied contract (Count III) and breach
of contract (Count IV) against both Defendants and breach of fiduciary duty (Count V)
and breach of confidence (Count VI) against ExecuPharm. See generally (id. at ¶¶ 116–
56). It also seeks a declaratory judgment stating Defendants’ existing data security
measures fail to comply with their duties of care and instructing Defendants to
4
implement and maintain industry-standard measures. (Id. at ¶¶ 157–61.) Defendants
moved to dismiss the Complaint in full. See (Mot. to Dismiss 1, ECF No. 14).
On February 5, 2021, the Court ordered the Parties to provide supplemental
briefing addressing whether Clemens has standing to bring her claims. (Suppl.
Briefing Order, ECF No. 24.) In their Supplemental Brief, Defendants argue Clemens
has not alleged an injury-in-fact sufficient to establish Article III standing in this
Circuit. See generally (Defs.’ Suppl. Brief 2–8, ECF No. 25). Clemens argues she has
established standing for all claims, but contends “irrespective of her other claims,” she
“plainly” has standing for her contract-based causes of action. See generally (Pl.’s
Suppl. Brief 3–10, ECF No. 26).
II
Article III of the United States Constitution limits the exercise of judicial power
to cases and controversies. See Clapper v. Amnesty Int’l USA, 568 U.S. 398, 408 (2013);
see also Taliaferro v. Darby Twp. Zoning Bd., 458 F.3d 181, 188 (3d Cir. 2006) (“Absent
Article III standing, a federal court does not have subject matter jurisdiction to address
a plaintiff’s claims, and they must be dismissed.”). The case-or-controversy
requirement demands that plaintiffs “establish that they have standing to sue.”
Clapper, 568 U.S. at 408 (citing Raines v. Byrd, 521 U.S. 811, 818 (1997)).
To demonstrate Article III standing, a plaintiff must establish: (1) she suffered
injury-in-fact; (2) the injury is fairly traceable to the challenged action of the defendant;
and (3) it is likely, as opposed to speculative, that the injury will be redressed by a
favorable decision. Lujan v. Defenders of Wildlife, 504 U.S. 555, 560 (1992). To
establish injury-in-fact, a plaintiff must show her injury was concrete and
5
particularized and actual or imminent. Id. at 560–61. “[A]n allegation of future injury
may suffice if the threatened injury is certainly impending, or there is a substantial
risk that the harm will occur.” Susan B. Anthony List v. Driehaus, 573 U.S. 149, 158
(2014) (internal quotations and citation omitted). But “[a]llegations of ‘possible’ future
injury simply aren’t enough.” Bognet v. Sec’y Commw. of Pa., 980 F.3d 336, 348 (3d Cir.
2020).
III
Clemens does not have standing to bring this lawsuit because she has not
alleged an injury-in-fact. She argues she has because (1) her claims that her personal
information was stolen by professionals, held for ransom and posted to the dark web
demonstrate harm is certainly impending; (2) she alleges actual harm from her time,
money and effort to protect her information based on the imminent risks she faces; and
(3) she alleges harm to her private contract rights, which confers standing even in the
absence of additional harm. See (Pl.’s Suppl. Brief 2–3).
A
The Third Circuit Court of Appeals has held that “in the event of a data breach,
a plaintiff does not suffer a harm, and thus does not have standing to sue, unless
plaintiff alleges actual ‘misuse’ of the information, or that such misuse is imminent.”
Storm v. Paytime, Inc., 90 F. Supp. 3d 359, 365 (M.D. Pa. 2015) (citing Reilly v.
Ceridian Corp., 664 F.3d 38, 42 (3d Cir. 2011)). In Reilly, law firm employees sued the
firm’s payroll processing company in a putative class action after the payroll company
suffered a data breach by an unknown hacker that “potentially gained access to
personal and financial information”. See Reilly v. Ceridien Corp., No 10-5142, 2011 WL
6
735512, at *1–2 (D.N.J. Feb. 22, 2011); Reilly, 664 F.3d at 40. The payroll company
maintained plaintiffs’ personal and financial information, and plaintiffs alleged that
because of the breach they faced an increased risk of identity theft, incurred costs to
monitor their credit activity and suffered emotional distress. See Reilly, 664 F.3d at 40.
Plaintiffs did not, however, allege they suffered identity theft or fraud after the breach.
See generally id. The district court dismissed the case for lack of standing and the
Third Circuit affirmed. Id. at 41.
The Third Circuit observed the Reilly plaintiffs had yet to suffer harm from the
breach and held that “[i]n data breach cases where no misuse is alleged . . . there has
been no injury.” Id. at 45. “[I]ndeed,” there is “no change in the status quo” in such
cases—for example, plaintiffs’ “credit card statements [looked] exactly the same today
as they would have been had” the breach never occurred. Id. The court further found
plaintiffs did not face imminent future injury and stated their risk of harm was
particularly attenuated because it was “dependent on entirely speculative, future
actions of an unknown third party.” Id. at 42. It noted it could not ascertain plaintiffs’
potential future injury “without beginning our explanation with the word ‘if’” and
concluded that “if the hacker read, copied and understood the hacked information, and
if the hacker attempts to use the information, and if he does so successfully, only then
will [plaintiffs] have suffered an injury.” Id. at 43 (emphasis in original); cf. Storino v.
Borough of Point Pleasant Beach, 322 F.3d 293, 297–98 (3d Cir. 2003) (“[O]ne cannot
describe how [plaintiffs] will be injured without beginning the explanation with the
word ‘if.’ The prospective damages described by [plaintiffs] as certain, are, in reality,
conjectural.”).
7
Clemens contends “[a]t least three key factual distinctions distinguish this case
from Reilly” and demonstrate she faces a non-speculative, substantial and imminent
future injury. (Pl.’s Suppl. Brief 4.) First, the Complaint is “significantly more
developed regarding the mode and scope of the breach” than in Reilly. (Id.) Whereas in
Reilly “all that [was] known” was a third-party “potentially gained access” to the
plaintiffs’ information and it was unclear “whether the hacker, read, copied, or
understood” any accessed data, here it is known that experienced hackers intentionally
accessed sensitive information and encrypted it. (Id. at 4–5.) Second, unlike in Reilly
Clemens “clearly alleged” criminal intent behind CLOP’s hack because CLOP “is
notorious for seeking ransom payments in exchange for releasing stolen data.” (Id. at
5–6.) Third, sensitive data was confirmed stolen in the ExecuPharm breach, and the
Complaint details many ways in which the breach of sensitive information can cause
harm. (Id. at 6.) Clemens asserts “[t]he risk of harm is particularly significant in this
case—perhaps more than any other data breach case on record—because the stolen
data was made openly available for download on the dark web where anyone could
access it.” (Id. at 6–7.) “Thus, the risk of misuse does not depend on the criminal intent
of just one party, but rather hundreds or thousands of criminals who already have
access to the data and can misuse it at their discretion.” (Id. at 7 (emphasis removed).)
For purposes of constitutional standing based on imminent harm, Clemens
proffers distinctions without a difference. Her future harm remains speculative, rather
than certainly impending or at substantial risk of occurring, because it is still only
ascertainable using the word “if”—if anyone actually downloaded her information from
the dark web, if they attempt to use her information, and if they do so successfully, only
8
then will she experience actual harm. See Reilly, 664 F.3d at 43. The speculative
nature of any future harm is underscored by the fact that nearly one year has passed
since the ExecuPharm breach and Clemens has never claimed to be a victim of fraud or
identity theft because of it. See, e.g., Storm, 90 F. Supp. at 366–67 (“[E]ven if the
hackers here were more skilled or ‘malicious,’ . . . the fact remains that the harm of
misuse has yet to occur almost a year later, which undercuts the imminency
argument.”). In fact, Clemens acknowledges her “mitigative measures have so far been
successful in warding off identity theft and fraud.” (Pl.’s Suppl. Brief 8.)1 Even if
Clemens’s risk of identity theft or fraud increased post-breach, “the Third Circuit drew
a bright line—‘allegations of an increased risk of identity theft resulting from a security
breach are [] insufficient to secure standing.’” In re Rutter’s Inc Data Sec. Breach Litig.,
--- F. Supp. 3d ----, 2021 WL 29054, at *6 (M.D. Pa. Jan. 5, 2021) (quoting Reilly, 664
F.3d at 43).
B
Clemens’s allegations that she continues to invest time, money and effort to
protect her information do not give her standing either. She admits “the mitigative
measures taken by the plaintiffs in Reilly,” which included time and money
CLOP’s alleged criminal intent does not render Clemens’s future injury imminent. See
Rutter’s, 2021 WL 29054, at *5 (allegations credit card information was stolen for purpose of
committing fraud or selling to other criminals insufficient to establish standing based on imminent
future harm). Clemens’s reliance on cases outside the Third Circuit finding imminent injury-in-fact
for hacks undertaken for criminal purposes are unpersuasive. (Pl.’s Suppl. Brief 6.) Clemens points
out that Reilly “distinguished data breach cases finding standing where there was some indication
the breach was for criminal purposes.” But the two cases the court found distinguishable, Pisciotta
v. Old National Bancorp, 499 F.3d 629 (7th Cir. 2007) and Krottner v. Starbucks Corp., 628 F.3d
1139 (9th Cir. 2010), were neither decided nor adopted by the Third Circuit. See (Id. at 4); Reilly,
664 F.3d at 43–44. Moreover, neither case “discussed the constitutional standing requirements and
how they apply to generalized data theft situations” or made a determination regarding whether the
alleged injuries were “certainly impending.” Id. at 44.
1
9
expenditures, “were not actual injuries because they relied on speculative future harm
that was not imminent.” (Pl.’s Suppl. Brief 8.) Here, too, her expenditures do not
establish she has suffered actual harm because she made them based on a speculative
future risk of fraud or identity theft. See Reilly, 664 F.3d at 46 (“[C]osts incurred to
watch for a speculative chain of future events based on hypothetical future criminal
acts are no more ‘actual’ injuries than the alleged ‘increased risk of injury’ which forms
the basis for [plaintiffs’] claims. . . . . That a plaintiff has willingly incurred costs to
protect against an alleged increased risk of identity theft is not enough to demonstrate
a ‘concrete and particularized’ or ‘actual or imminent’ injury.”); see also Rutter’s, 2021
WL 29054, at *6 (“Plaintiffs . . .allege only possible future injuries and prophylactic
measures to avoid those potential injuries, neither of which confer standing in a data
breach action brought in the Third Circuit.”); cf. Clapper, 568 U.S. at 416
(“Respondents’ contention that they have standing because they incurred certain costs
as a reasonable reaction to a risk of harm is unavailing—because the harm respondents
seek to avoid is not certainly impending.”).2
i
Clemens appears to suggest she may have suffered actual harm, or injury-in-fact
in some form, because “it cannot be maintained that her information has not been
misused: it was stolen, held hostage by known criminals, and then published for trade
Clemens also claims she sought counseling for her stress and anxiety, once experienced a
delay in accessing funds and that the value of her personal information has diminished as a result of
the breach. None of these allegations confer standing. Reilly declined to find plaintiffs’ emotional
distress established standing, see 664 F.3d at 44–46, and Clemens attributed her delayed access to
funds to her own bank’s error separate from Defendants or the breach. See (Compl. ¶ 69). Nor does
Clemens allege any facts which could plausibly show a diminution in the “value of her personal
information.”
2
10
amongst data thieves.” (Pl.’s Suppl. Brief 8 (emphasis in original).) She claims “[t]he
Third Circuit has unequivocally held that ‘unauthorized disclosures of information’
have long been seen as injuries.” (Id. (quoting In re Horizon Healthcare Servs. Data
Breach Litig., 846 F.3d 625, 638 (3d Cir. 2017)).) This argument mischaracterizes the
law in data breach cases.3
Reilly refers to the “misuse” of information after a data breach exclusively as
fraud or identity theft. See Reilly, 664 F.3d at 42 (“there has been no misuse
of . . . information” unless or until plaintiffs’ “speculation that the hacker[] (1) read,
copied, and understood their personal information; (2) intends to commit future
criminal acts by misusing the information; and (3) is able to use such information to the
detriment of [plaintiffs] by making unauthorized transactions in [their] names” comes
to fruition). Since Reilly, courts in this Circuit have declined to find stolen data has
been misused in the absence of fraud or identity theft. See, e.g., Rutter’s, 2021 WL
29054, at *6; Storm, 90 F. Supp. 3d at 366 (finding no allegation of misuse where
plaintiffs “have not alleged that their bank accounts have been accessed, that credit
cards have been opened in their names, or that unknown third parties have used their
Social Security numbers to impersonate them and gain access to their accounts.”); cf.
FTC v. Wyndham Worldwide Corp., 10 F. Supp. 3d 602, 609, 623 (D.N.J. 2014) (finding
plaintiff alleged misuse where complaint stated data breach led to “fraudulent charges
on many consumers’ accounts[] and more than $10.6 million in fraud loss”). No court in
this Circuit has found that information was misused without such harm.
In addition, the quote Clemens cites from Horizon is part of a discussion about cognizable
injury in privacy torts, none of which she has alleged in her Complaint. See 846 F.3d at 638–39.
3
11
C
Clemens also cannot establish standing based on her allegations of harm to her
private contract rights “irrespective of her other claims.” See (Pl.’s Suppl. Brief 9). As
Clemens acknowledges in her Supplemental Brief, “the Third Circuit has not directly
weighed in on contractual standing” and thus has not held, as she suggests, that “a
contractual breach categorically creates an Article III injury.” (Id. at 10, 10 n.1
(emphasis in original).) Indeed, the presence of contractual claims have not been
relevant to courts’ analyses of standing in data breach cases in this Circuit. See, e.g.,
Reilly, 2011 WL 735512 (Complaint alleging negligence, breach of contract, breach of
the covenants of good faith and faith dealing, consumer fraud, and New Jersey state
law violations dismissed); Rutter’s, 2021 WL 29054, at *2 (Amended complaint alleging
negligence, negligence per se, breach of implied contract, unjust enrichment and
violations of Pennsylvania state law dismissed as to uninjured plaintiffs); Storm, 90 F.
Supp. 3d 359 (Complaints alleging negligence, breach of contract and violations of
Pennsylvania state law dismissed).
An appropriate Order follows.
BY THE COURT:
/s/ Gerald J. Pappert
________________________
GERALD J. PAPPERT, J.
12
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?