In the United States, 515 million records have been lost in data breaches since 2005. Customers seeking recovery after the loss of their personal information in data breaches have not been successful in recovering damages if they are not victims of identity theft. This lack of success can be attributed to an inability to articulate a concrete or particularized harm. Despite past setbacks, customers continue to search for legal theories to hold companies accountable.

The claims that proceed the furthest through the legal process are negligence, breach of contract and breach of implied contract. Under these legal theories, arguments have often emphasized three forms of harm: (1) lost time and effort for actions taken to mitigate the risk of identity theft or to restore accounts, (2) the expense of credit and identity-monitoring services that were obtained as a reaction to the data breach and (3) the emotional distress that accompanies loss of personal information. Given the lack of success under current theories, a new theory that claims a property right in personal information has recently been tried. Under this theory, a data breach causes a loss of personal information property and therefore a concrete or particularized harm has been realized. The use of this theory is currently being tested in Alan Claridge v. RockYou Inc (2011 WL 1361588 (N.D. Cal.; Apr. 11, 2011)).

RockYou is a developer of social games used with social networking sites. In late 2009, due to a SQL injection flaw and a failure to use other common methods for protecting stored passwords, the e-mail and social networking login credentials of approximately 32 million customers were exposed in a data breach. Claridge was a RockYou customer who lost personal information in the breach. Claridge brought nine causes of action, including breach of contract, breach of implied contract, negligence and negligence per se. He claimed damages under these causes of action by stating that customers of the RockYou programs and services bought use and access by providing their personal information, which constituted valuable property in that exchange. The damages theory here is novel. It also has a certain logical appeal. Nothing is free, so services must be paid for with something of value. The value exchanged was personal information. RockYou filed a motion to dismiss the case before evidence was gathered, but the judge allowed the contract and negligence claims to continue given the initial showing of damages under this new theory. If this legal theory allows Claridge to proceed to later stages of trial, it increases his chances of receiving a settlement. Additionally, the recognition of personal information as a form of property could increase the chances of successful consumer data breach litigation in future cases.

The early success of this new personal-information-as-property theory is not likely to result in widespread recognition of damages in data breach cases. First, the court is skeptical of this theory even at this early stage in the litigation proceedings. Claridge made a claim under California’s Unfair Competition Law, and it failed. The court held that personal information is not property that could be lost under California’s Unfair Competition Law because the information did not cease to belong to him or pass beyond his control. While this failure is specific to California’s Unfair Competition Law, the court could later apply this reasoning to his contract and negligence claims. Second, contract claims relying on a loss of value in personal information will fare much better when there is a direct exchange of personal information for services. This scenario may be common between online service providers and their customers, but many other businesses will not fit this model. Often, the exchange for services involves many parties, and defining the exchange as a simple trade of property for services becomes more difficult. For example, when a purchase is made with an online merchant, a credit card number is given as a proxy for cash in exchange for goods. If the online merchant were to lose credit card numbers in a data breach, would the credit card numbers be considered property? The value of credit card numbers depends on exposing them to other parties. Credit card numbers can also easily be changed because they are only loosely associated with a person’s identity. In that scenario, the credit card numbers do not appear to be the property for which goods are exchanged. The plaintiff would have a hard time showing a loss in value in her personal information attributable to the loss of the credit card numbers.

So what are the likely implications of the RockYou case and its novel personal-information-as-property theory? Companies that lose personal information in data breaches may see more cases by customers who can establish standing and survive motions to dismiss. This will allow discovery where potential plaintiffs will still struggle to establish injury-in-fact. Ultimately, the RockYou case may allow some data breach claims to establish injury-in-fact, but the theory will likely be limited to direct exchanges where personal information is a form of payment.

Written By

Andrew Clearwater, CIPP/US


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find a KnowledgeNet Chapter Near You

Talk privacy and network with local members at IAPP KnowledgeNet Chapter meetings, taking place worldwide.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

The Privacy Core™ Library Has Evolved

Privacy Core™ e-learning essentials just expanded to include seven new units for marketers. Keep your data safe and your staff in the know!

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

Upcoming Web Conferences

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Team

Get your team up to speed on privacy by bringing IAPP training to your organization.

Let’s Get You DPO Ready

There’s no better time to train than right now! We have all the resources you need to meet the challenges of the GDPR.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

FIP Designation

Recognizing the advanced knowledge and issue-spotting skills a privacy pro must attain in today’s complex world of data privacy.

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.


The IAPP’S CIPP/E and CIPM are the ANSI/ISO-accredited, industry-recognized combination for DPO readiness. Learn more today.

Learn more about IAPP certification »

IAPP-OneTrust Website Scanning & Cookie Compliance Tool

Scan your website for cookies, tags, forms and policies and create a custom, dynamically updated cookie policy based on the results of your scans.

Are You Ready for the GDPR?

Check out the IAPP's EU Data Protection Reform page for all the tools and resources you need.

Privacy Vendor List

Find a privacy vendor to meet your needs with our filterable list of global service providers.

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

More Resources »

Global Privacy Summit 2017

The world’s premier privacy conference returns with the sharpest minds and unparalleled programs—plus a whole new spin on Active Learning!

Canada Privacy Symposium 2017

The Symposium returns to Toronto! Take advantage of Early Bird rates before March 31 and join your fellow privacy pros for a stellar program.

The Privacy Bar Section Forum 2017

The Privacy Bar Section Forum is SOLD OUT and the wait list is closed. If you got on the wait list, we'll keep in touch about your status. Good luck!

Asia Privacy Forum 2017

Join us in Singapore for exclusive networking and intensive education on data protection trends and challenges in the Asia Pacific region.

Privacy. Security. Risk. 2017

We're bringing the best of the best in privacy and infosecurity to sunny San Diego. Early registration for P.S.R. opens in May.

Europe Data Protection Congress 2017

Your source for European policy debate, multi-level strategic thinking and thought-provoking discussion. Registration opens in early June.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»