Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Despite the rules and security measures that many organizations put in place to protect the personal information of their clients or customers, sensitive information may still fall prey to hackers and other kinds of breaches. Those affected may seek counsel to aid in bringing suit to hold an entity liable for its intermediary role when a third party commits a data breach. While data breaches have become too common, case law and statutory law governing redress for data breaches is limited. This article explores standing and potential causes of action in data breach suits.
Standing in data breach cases may be impacted or determined by various factors, including especially the types of information stolen, and the action taken after the breach. In Antman v. Uber Technologies, (N.D. Cal. Oct. 19, 2015), the trial court dismissed the plaintiffs' argument that Uber's failure to protect their data was sufficient to confer standing because, among other reasons, they failed to establish Article III standing. Article III standing has three constitutional requirements. The plaintiff must have: suffered some actual or threatened injury; the injury can fairly be traced to the challenged action of the defendant; and, the injury is likely to be redressed by a favorable decision." See, Legal Information Institute, "Constitutional Standards: Injury in Fact, Causation, and Redressability." For example, the court in Antman stated that the plaintiffs had not adequately established injury. But, it suggested the result would have been different had Social Security numbers been stolen (stating that the plaintiff "specifies disclosure only of his name and drivers' license information. It is not plausible that a person could apply for a credit card without a social security number … plaintiff alludes to the disclosure of unspecified 'other personal information; this is insufficient'").
Thus it is critical when attempting to establish standing under Article III in a data breach suit that the type of information stolen places plaintiff in danger of immediate harm (if the harm has not already occurred). Social Security numbers are the kind of information that would bring about such harm, while a name or address alone is not.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?
Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.