The U.S. Supreme Court’s recent ruling in a case about warrantless wiretapping could make it easier for companies to seek early dismissal of consumer data breach and privacy lawsuits.

In Clapper v. Amnesty International USA, the Supreme Court upheld the stringent requirements under Article III of the U.S. Constitution for a plaintiff to have standing to sue in privacy cases. To establish standing to sue, a plaintiff must show that the threatened harm is “certainly impending” and not merely speculative. A plaintiff also cannot manufacture Article III standing by incurring costs in order to avoid hypothetical future harm. The Supreme Court concluded that neither the plaintiffs’ fear that the government might monitor future communications with likely targets of surveillance nor the expenditures incurred to avoid monitoring were sufficient to confer standing.

Clapper will likely prove useful in cases where there is no evidence that the data breach actually resulted in identity theft or other fraudulent use. Companies can argue that such cases should be quickly tossed out because the consumers are unable to meet the strict standing threshold set by Clapper.

Standing in privacy cases

Standing is one of the first hurdles plaintiffs filing privacy cases in federal court have to overcome before getting to the merits of their case. Injury-in-fact, an essential element to demonstrate standing, requires a “concrete, particularized and actual or imminent” injury. Courts, however, have been split over whether the alleged increased risk of harm following a data breach is sufficient to confer standing upon plaintiffs.

Some circuits, such as the Seventh and Ninth Circuits, have concluded that where the plaintiffs’ personal information was stolen but not misused, the increased risk that the data would be misused in the future was sufficient to confer Article III standing. Other circuits, such as the Third Circuit, have found that there was no standing when the plaintiffs did not allege that their data was misused, while the First Circuit rejected a standing argument where the plaintiff failed to claim that the information had actually been accessed by an unauthorized user.

Courts have also been all over the map in non-data breach privacy cases. District courts have been reluctant to find standing based solely on a theory that an app store developer’s actions increased the risk to the security of sensitive personal information. Other courts, however, have granted Article III standing whenever a plaintiff alleged a statutory violation, even when the alleged violation did not cause actual harm or injury. Last year, the U.S. Supreme Court declined to decide in First American Financial Corp. v. Edwards whether plaintiffs can show harm through a statutory violation or must establish standing through an actual injury.

While Clapper may not have much of an impact on privacy cases involving allegations of statutory violations, the decision effectively resolves the inconsistency over the standing requirements for data breach and privacy cases where the personal information was not actually misused. Companies defending data breach claims can now rely on Clapper to make the following arguments in support of a motion to dismiss:

Scenario One

    : A company’s website was hacked and sensitive personal information was exposed. The unknown hacker was able to obtain access to plaintiffs’ information. The hacker may or may not have read, copied or understood the information.

This theory of standing relies on a string of hypothetical possibilities, namely that the hacker read, copied and understood the information; intends to commit future criminal acts by misusing the information; actually attempts to use the information, and is able to use such information by making unauthorized transactions.

As the Supreme Court stated in Clapper, standing theories that “rest on speculation about the decisions of independent actors” will not hold water. The speculative fear that an unknown third party might misuse the information at some point in the future is insufficient to demonstrate the imminent harm required to establish Article III standing.

Scenario Two

    : A company laptop containing unencrypted personal information was stolen. There is no evidence to suggest that the information has been or will be misused.

The actions of a third-party criminal are too unpredictable because he or she may not access the information or even possess the ability to commit identity theft or fraud using the information obtained. This theory requires a court to make assumptions about the skills and intent of the third party even though the laptop may have not been stolen by a person intent on identity theft and the person may not be able to use the personal information to commit financial harm.

Scenario Three

    : Plaintiffs claim that the increased risk of identity theft following a privacy breach forced them to purchase identity theft insurance. They also contend that they shelled out time and money monitoring their credit and closing and opening financial accounts.

Consumers cannot create Article III standing simply by racking up expenditures such as credit-monitoring costs to guard against a fear of future identity theft or other financial harm. The Supreme Court has stated that an enterprising plaintiff cannot “secure a lower standard for Article III standing simply by making an expenditure based on a nonparanoid fear.”

Written By

Shannon Tan


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find a KnowledgeNet Chapter Near You

Talk privacy and network with local members at IAPP KnowledgeNet Chapter meetings, taking place worldwide.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

The Privacy Core™ Library Has Evolved

Privacy Core™ e-learning essentials just expanded to include seven new units for marketers. Keep your data safe and your staff in the know!

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

Upcoming Web Conferences

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Team

Get your team up to speed on privacy by bringing IAPP training to your organization.

Let’s Get You DPO Ready

There’s no better time to train than right now! We have all the resources you need to meet the challenges of the GDPR.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

FIP Designation

Recognizing the advanced knowledge and issue-spotting skills a privacy pro must attain in today’s complex world of data privacy.

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.


The IAPP’S CIPP/E and CIPM are the ANSI/ISO-accredited, industry-recognized combination for DPO readiness. Learn more today.

Learn more about IAPP certification »

Are You Ready for the GDPR?

Check out the IAPP's EU Data Protection Reform page for all the tools and resources you need.

IAPP-OneTrust PIA Platform

New U.S. Government Agency privacy impact assessments - free to IAPP members!

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

Privacy Vendor List

Find a privacy vendor to meet your needs with our filterable list of global service providers.

More Resources »

Europe Data Protection Intensive 2017

The Intensive is sold out! But cancellations do happen—so hurry and get on the wait list in case more seats become available.

Global Privacy Summit 2017

The world’s premier privacy conference returns with the sharpest minds, unparalleled programs and preeminent networking opportunities.

Canada Privacy Symposium 2017

The Symposium returns to Toronto this spring and registration has opened! Take advantage of Early Bird rates and join your fellow privacy pros for another stellar program.

The Privacy Bar Section Forum 2017

The Privacy Bar Section Forum is sold out! But you can still add your name to the wait list, and we'll keep in touch about your status. Good luck!

Asia Privacy Forum 2017

Call for Speakers open! Join the Forum in Singapore for exclusive networking and intensive education on data protection trends and challenges in the Asia Pacific region.

Privacy. Security. Risk. 2017

Call for Speakers open! This year, we're bringing P.S.R. to San Diego. Submit today and be a part of something big! Submission deadline: February 26.

Europe Data Protection Congress 2017

Call for Speakers open! The Congress is your source for European policy debate, multi-level strategic thinking and thought-provoking discussion. Submit a proposal by March 19.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»