DPI16_Banner_300x250 WITH COPY

A recent decision from the U.S. Court of Appeals for the Eleventh Circuit may lead to an uptick in data breach litigation. In Resnick v. AvMed, Inc., 693 F.3d 1317 (11th Cir. 2012), the Eleventh Circuit, addressing issues of first impression, held that the plaintiffs’ allegations of injury and causation were sufficient to withstand a motion to dismiss where they suffered identity theft due to a data breach affecting their health insurer, AvMed.


The plaintiffs in this putative class-action brought claims for negligence, negligence per se, breach of contract, breach of implied contract, breach of the implied covenant of good faith and fair dealing, breach of fiduciary duty and unjust enrichment in Florida state court. They alleged that two unencrypted laptops containing their personal information—including protected health information, Social Security numbers, names, addresses and phone numbers—as well as the personal information of approximately 1.2 million other current and former AvMed members, was stolen from AvMed’s corporate office in December 2009.

The plaintiffs also alleged that this information was readily accessible because AvMed did not properly secure the laptops, which were later sold to an individual with a history of dealing in stolen property. Ten and 14 months later, financial accounts were opened in the plaintiffs’ names and used to make unauthorized purchases. The plaintiffs sought to represent the class of AvMed customers whose sensitive information was stored on the stolen laptops and a subclass of individuals whose identities had been stolen since the thefts.

AvMed removed the case to federal court and filed a motion to dismiss for failure to state a claim. The plaintiffs amended their complaint twice, and AvMed again moved to dismiss the complaint. The United States District Court for the Southern District of Florida granted the motion, concluding, among its “other deficiencies,” the amended complaint failed to allege any cognizable injury.

Standing and injury

On appeal, the Eleventh Circuit began by addressing the issue of standing, acknowledging that whether a party “claiming actual identity theft resulting from a data breach has standing to bring suit” was an issue of first impression in the Eleventh Circuit. To demonstrate proper standing, the court explained, the plaintiffs were required to show that they suffered an “injury in fact” that was “fairly traceable” to the defendant’s actions and redressable.

The court concluded that the plaintiffs’ allegations, which indicated that they became the victims of identity theft after the unencrypted laptops containing their sensitive information were stolen, easily met this standard. The court also held that the plaintiffs’ monetary loss was a cognizable injury under Florida law, rejecting AvMed’s arguments to the contrary.


The court then analyzed whether the plaintiffs’ allegations of causation were sufficient to support their claims of negligence, negligence per se, breach of fiduciary duty, breach of contract, breach of implied contract and breach of the implied covenant of good faith and fair dealing. The plaintiffs’ complaint alleged that the unencrypted stolen laptop contained their sensitive information, that their identities were stolen and that the stolen identities were used to open unauthorized accounts.

The court held that the plaintiffs’ claims adequately demonstrated a “nexus” between the data breach and identity theft because the allegations indicated that the compromised information was the same information used to steal the plaintiffs’ identities and that the plaintiffs had taken “substantial precautions” to protect their personal information. The court reversed the district court’s dismissal of these claims, concluding that these allegations showed “more than a coincidence of time and sequence.”

Other claims

The court also held that the plaintiffs’ unjust enrichment claim was sufficient because it alleged that they conferred a monetary benefit on AvMed in the form of monthly premiums, which AvMed used to pay for the administrative costs of data security, and that AvMed failed to implement adequate data security measures in accordance with industry standards.

However, the court found that the plaintiffs’ negligence per se claim failed because it was based upon a Florida statute that did not apply to AvMed. The breach of the covenant of good faith and fair dealing claim also failed, given that it did not allege a “conscious and deliberate act” that frustrated “the common purpose” of AvMed’s agreement with the plaintiffs, as required under Florida law.


The case law is evolving in the area of data breach litigation. The Resnick decision is significant, given that it addressed both standing and causation in data breach cases, issues of first impression in the Eleventh Circuit. In particular, Resnick provides guidance on the causation requirement in data breach cases, which has been addressed by few courts thus far. The Resnick court held that a showing of “proximate cause” requires a logical relationship between the data breach and identity theft “beyond allegations of time and sequence,” concluding that 10- and 14-month time intervals were not too temporally distant, given the circumstances.

The existing case law diverges on the allegations necessary to establish standing in data breach cases. Some courts have held that the mere threat of identity theft is sufficient to confer standing. See Krottner v. Starbucks Corp., 628 F.3d 1139, 1143 (9th Cir. 2010) (holding, on issue of first impression, that class-action plaintiffs had standing where they alleged threat of identity theft); Pisciotta v. Old Nat. Bancorp, 499 F.3d 629, 634 (7th Cir. 2007) (same); Ruiz v. Gap, Inc., 380 F. App’x 689, 691 (9th Cir. 2010) (same).

Others have reached a contrary conclusion, holding that the plaintiff has no standing in these circumstances. SeeReilly v. Ceridian Corp., 664 F.3d 38, 43 (3d Cir. 2011), (cert. denied, 132 S. Ct. 2395 (2012) (affirming dismissal of case for lack of standing where risk of future harm was alleged); Katz v. Pershing, LLC, 672 F.3d 64, 78 (1st Cir. 2012) (same). In Reilly, the Third Circuit distinguished Pisciotta and Krottner, reasoning that the threatened harms were significantly more “imminent” and “certainly impending” in both cases because they involved intentional and malicious breaches. Similarly, in Katz, the First Circuit explained that the plaintiff’s decision to purchase identity theft insurance and credit monitoring services must be “premised on a reasonably impending threat” of “actual or imminent” harm to confer proper standing.

Courts have also reached inconsistent conclusions on the injury requirement in data breach cases, with some holding that “mitigation damages”—such as fees for replacement credit/debit cards, identity theft insurance and credit monitoring—or the lost “value” of personal information by a provider of paid services, constitute a cognizable injury. See Anderson v. Hannaford Bros. Co., 659 F.3d 151, 162-67 (1st Cir. 2011) (holding class-action plaintiffs’ negligence and implied contract claims were cognizable where plaintiffs alleged mitigation damages arising from the theft of millions of credit and debit card numbers); Claridge v. RockYou, Inc., 785 F. Supp. 2d 855, 864-66 (N.D. Cal. 2011) (holding class-action plaintiff’s breach-of-contract and negligence claims were sufficient where they alleged lost unidentified “value” and/or a “property right” inherent in plaintiff’s personal information following data breach affecting developer of social media applications); Kuhn v. Capital One Fin. Corp., 67 Mass. App. Ct. 1111, 2006 WL 3007931 (2006) (slip op.) (holding that “the value of the time spent” by the plaintiff to prevent further identity theft was compensable injury, even though she did not have to pay charges on fraudulent accounts).

Other courts have held that a showing of actual identity theft is necessary to establish the injury requirement. SeeKrottner v. Starbucks Corp., 406 F. App’x 129, 131 (9th Cir. 2010) (affirming dismissal of plaintiffs’ negligence claims based on conclusion that the “mere danger of future harm” is not a cognizable injury); In re Sony Gaming Networks & Customer Data Sec. Breach Litig., MDL No. 11MD2258, 2012 WL 4849054, at *12 (S.D. Cal. Oct. 11, 2012) (same).

The Resnick decision makes clear that an allegation of actual financial loss is sufficient to establish both adequate standing and a cognizable injury in data breach cases. The decision also underscores the importance of maintaining adequate security measures, including encryption of laptops and mobile devices, to reduce the risk of a data breach.

Written By

David Governo

Written By

Corey Dennis, CIPP/US


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

Find a KnowledgeNet Chapter Near You

Network and talk privacy at IAPP KnowledgeNet meetings, taking place worldwide.

Women Leading Privacy

Events, volunteer opportunities and more designed to help you give and get career support and expand your network.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

The Training Post—Can’t-Miss Training Updates

Subscribe now to get the latest alerts on training opportunities around the world.

New Web Conferences Added!

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Staff

Get your team up to speed on privacy by bringing IAPP training to your organization.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.

Learn more about IAPP certification »

Get Close-up

Looking for tools and info on a hot topic? Our close-up pages organize it for you in one easy-to-find place.

Where's Your DPA?

Our interactive DPA locator helps you find data protection authorities and summary of law by country.

IAPP Westin Research Center

See the latest original research from the IAPP Westin fellows.

Looking for Certification Study Resources?

Find out what you need to prepare for your exams

More Resources »

GDPR Comprehensive: Spots Going Fast

With the top minds in the field leading this exceptional program, it's no wonder it's filling quickly. Register now to secure your spot.

Be Part of Something Big: Join the Summit

Registration is open for the Global Privacy Summit 2016. Discounted early bird rates available for a short time, register today!

Data Protection Intensive Returns to London

Registration is now open for the IAPP Europe Data Protection Intensive in London. Check out the program!

P.S.R. Call for Speakers Open!

P.S.R. is THE privacy + cloud security event of the year, and you can take a leading role. Propose a session for this year's program.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

Exhibit at an Event

Put your brand in front of the largest gatherings of privacy pros in the world. Learn more.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»