17 5217 PDF
17 5217 PDF
17 5217 PDF
No. 17-5217
v.
I
As its name suggests, the U.S. Office of Personnel
Management serves as the federal government’s chief human
resources agency. In that capacity, OPM maintains electronic
personnel files that contain, among other information, copies
of federal employees’ birth certificates, military service
records, and job applications identifying Social Security
numbers and birth dates.
II
“[T]he irreducible constitutional minimum of standing
consists of three elements.” Spokeo, Inc. v. Robins, 136 S. Ct.
1540, 1547 (2016) (internal quotation marks omitted). First,
plaintiffs must demonstrate that they suffered an injury in fact
that is “concrete and particularized and actual or imminent, not
conjectural or hypothetical.” Id. at 1548 (internal quotation
marks omitted). “An allegation of future injury” passes Article
III muster only if it “is ‘certainly impending,’ or there is a
‘substantial risk’ that the harm will occur.” Susan B. Anthony
List v. Driehaus, 573 U.S. 149, 158 (2014) (quoting Clapper v.
Amnesty Int’l USA, 568 U.S. 398, 414 & n.5 (2013)). Second,
plaintiffs must demonstrate causation; that is, they must show
12
that their claimed injury is “fairly traceable to the challenged
conduct of the defendant.” Spokeo, 136 S. Ct. at 1547. “Article
III standing does not require that the defendant be the most
immediate cause, or even a proximate cause, of the plaintiffs’
injuries; it requires only that those injuries be ‘fairly traceable’
to the defendant.” Attias v. Carefirst, Inc., 865 F.3d 620, 629
(D.C. Cir. 2017), cert. denied, 138 S. Ct. 981 (2018). And
third, plaintiffs must demonstrate that “it is likely, as opposed
to merely speculative, that the[ir] injury will be redressed by a
favorable decision.” Friends of the Earth, Inc. v. Laidlaw
Environmental Servs. (TOC), Inc., 528 U.S. 167, 181 (2000).
A
We begin with NTEU Plaintiffs. For standing purposes,
we assume that NTEU Plaintiffs have, as they claim, a
“constitutional right to informational privacy” that was
13
violated “the moment that [cyberattackers stole] their
inherently personal information * * * from OPM’s deficiently
secured databases.” NTEU Br. 11; see also Estate of Boyland
v. Department of Agric., 913 F.3d 117, 123 (D.C. Cir. 2019)
(“[W]hen considering whether a plaintiff has Article III
standing, a federal court must assume, arguendo, the merits of
his or her legal claim.”) (internal quotation marks omitted).
Furthermore, given NTEU Plaintiffs’ allegations regarding
OPM’s continued failure to adequately secure its databases, it
is reasonable to infer that there remains a “substantial risk” that
their personal information will be stolen from OPM again in
the future. NTEU Plaintiffs’ Compl. ¶ 88, J.A. 182. With
respect to this claim, the loss of a constitutionally protected
privacy interest itself would qualify as a concrete,
particularized, and actual injury in fact. And the ongoing and
substantial threat to that privacy interest would be a concrete,
particularized, and imminent injury in fact. Both claimed
injuries are plausibly traceable to OPM’s challenged conduct,
and the latter is redressable either by a declaration that the
agency’s failure to protect NTEU Plaintiffs’ personal
information is unconstitutional or by an order requiring OPM
to immediately correct deficiencies in its cybersecurity
programs. Cf. ACLU v. Clapper, 785 F.3d 787, 801 (2d Cir.
2015) (holding that, where plaintiffs allege a Fourth
Amendment “injury [stemming] from the very collection of
their telephone metadata,” they “have suffered a concrete and
particularized injury fairly traceable to the challenged program
and redressable by a favorable ruling”). Accordingly, NTEU
Plaintiffs have standing based on their claimed constitutional
injury.
B
Arnold Plaintiffs allege no such constitutional injury, but
they do claim to have suffered a variety of past and future data-
breach related harms. See, e.g., Arnold Plaintiffs’ Compl. ¶ 22,
14
J.A. 44–45 (alleging that Plaintiff Jane Doe has “suffer[ed]
stress resulting from concerns for her personal safety and that
of her family members” since being informed by the FBI that
her personal information “had been acquired by the so-called
Islamic State of Iraq and al-Sham (‘ISIS’)”). For purposes of
our standing analysis, we focus on one injury they all share:
the risk of future identity theft. As we have already recognized,
“identity theft * * * constitute[s] a concrete and particularized
injury.” Attias, 865 F.3d at 627; see also Hancock v. Urban
Outfitters, Inc., 830 F.3d 511, 514 (D.C. Cir. 2016) (offering
the “increased risk of fraud or identity theft” as an “example”
of a “concrete consequence” for standing purposes). Yet, the
district court concluded that Arnold Plaintiffs’ complaint
provided an insufficient basis from which to infer that, in the
wake of the OPM breaches, Arnold Plaintiffs faced any
meaningful risk of future identity theft, much less a
“substantial” one. In re United States Office of Pers. Mgmt.
Data Security Breach Litig. (“In re OPM”), 266 F. Supp. 3d 1,
35 (D.D.C. 2017). Furthermore, finding that “the risk of
identity theft was neither clearly impending nor substantial,”
the district court concluded that any expenses that Arnold
Plaintiffs incurred attempting to mitigate that risk likewise
failed to qualify as an Article III injury in fact. Id. at 36; see
also Clapper, 568 U.S. at 416 (“[R]espondents cannot
manufacture standing merely by inflicting harm on themselves
based on their fears of hypothetical future harm that is not
certainly impending.”).
III
1
Cf. McLaughlin v. Richland Shoe Co., 486 U.S. 128, 132–133
(1988) (“willful” under the Fair Labor Standards Act includes
“reckless[]” violations); Trans World Airlines, Inc. v. Thurston, 469
U.S. 111, 126 (1985) (willfulness in the Age Discrimination in
Employment Act includes “reckless disregard for the matter of
whether [the defendant’s] conduct was prohibited by” the Act);
United States v. Murdock, 290 U.S. 389, 395 (1933) (“willful”
violation of the Revenue Acts of 1926 and 1928 is “marked by
careless disregard [for] whether or not one has the right so to act”);
Dayton Tire v. Secretary of Labor, 671 F.3d 1249, 1254 (D.C. Cir.
2012) (willful violation of the Occupational Safety and Health Act is
“an act done voluntarily with either an intentional disregard of, or
plain indifference to, the Act’s requirements”).
30
intrusion attempts every month. Arnold Plaintiffs’ Compl.
¶¶ 78–79, J.A. 64.
Third, Plaintiffs Kelly Flynn and six others had false tax
returns filed using their information and have experienced
delays in receiving federal and state tax refunds. The delay in
those Plaintiffs’ receipt of their refunds, and the forgone time
value of that money, is an actual, tangible pecuniary injury.
3
See also Resnick v. AvMed, Inc., 693 F.3d 1317, 1327 (11th
Cir. 2012) (plaintiffs plausibly alleged that data breach proximately
caused their identity theft for purposes of Florida law by “alleg[ing]
that the sensitive information on the stolen laptop was the same
sensitive information used to steal Plaintiffs’ identity”); Stollenwerk
v. Tri–West Health Care All., 254 F. App’x 664, 667 (9th Cir. 2007)
(plaintiff established that data breach proximately caused identity
theft for purposes of Arizona law where plaintiff provided his
personal information to defendant, the identity fraud incidents began
six weeks after defendant’s systems were compromised, and plaintiff
had not previously suffered from identity theft); In re Community
Health Sys., Inc., No. 15-CV-222-KOB, 2016 WL 4732630, at *25
(N.D. Ala. Sept. 12, 2016) (plaintiff plausibly alleged causal link
between data breach and identity theft by “alleg[ing] misuse
occurring subsequent to the breach that would be consistent with the
type of data stolen”).
38
incentive” were it to hold at this threshold stage of litigation
that, “so long as enough data breaches take place,” agencies
“will never be found liable.” In re Equifax, Inc., Customer
Data Security Breach Litig., 362 F. Supp. 3d 1295, 1318 (N.D.
Ga. 2019) (formatting altered); accord In re Anthem, Inc. Data
Breach Litig., 162 F. Supp. 3d 953, 988 (N.D. Cal. 2016).
IV
4
Neither OPM nor the Justice Department in its brief in this
case has endorsed KeyPoint’s claim of derivative sovereign
immunity.
40
Derivative sovereign immunity, though, is less
“embracive” than the immunity a sovereign enjoys. Campbell-
Ewald, 136 S. Ct. at 672. It applies only when a contractor
takes actions that are “authorized and directed by the
Government of the United States,” and “performed pursuant to
the Act of Congress” authorizing the agency’s activity. Id. at
673. In that way, derivative sovereign immunity ensures that
“‘there is no liability on the part of the contractor’ who simply
performed as the Government directed.” Id. (quoting Yearsley
v. W.A. Ross Constr. Co., 309 U.S. 18, 21 (1940)); id. at 673
n.7 (“Critical in Yearsley was not the involvement of public
works, but the contractor’s performance in compliance with all
federal directions.”). Said another way, a government
contractor that “violates both federal law and the government’s
explicit instructions” loses the shield of derivative immunity
and is subject to suit by those adversely affected by the
contractor’s violations. Id. at 672.
VI
So ordered.
WILLIAMS, Senior Circuit Judge, concurring in part and
dissenting in part:
* * *
* * *
* * *
12
This brings me to a final issue—the propriety of five
plaintiffs proceeding under pseudonyms. Although some of
our sister circuits take the view that a court of appeals has no
jurisdiction over plaintiffs who “fail[] to request permission
from the district court before proceeding anonymously,”
W.N.J. v. Yocom, 257 F.3d 1171, 1172 (10th Cir. 2001); accord,
e.g., United States ex rel. Little v. Triumph Gear Systems, Inc.,
870 F.3d 1242, 1249–50 (10th Cir. 2017); Citizens for a Strong
Ohio v. Marsh, 123 F. App’x 630, 636–37 (6th Cir. 2005);
Nat’l Commodity & Barter Ass’n v. Gibbs, 886 F.2d 1240,
1245 (10th Cir. 1989) (per curiam), that doctrine, if adopted by
us (which it has not been), would not change our handling of
this appeal’s merits—given the presence of other, non-
pseudonymous plaintiffs. Moreover, the five anonymous
plaintiffs in this case, see Arnold Plaintiffs’ Compl. ¶¶ 22–26,
J.A. 44–48, offer reasons that seem highly likely to prove
worthy of district court permission—once they request it. But
because pseudonymous filing impinges on values key to fair
adjudication and a free society, it is hard to see how the district
court on remand can avoid the issue once it has been noticed.
1
See Doe 2 v. Trump, 315 F. Supp. 3d 474 (D.D.C. 2018), rev’d
on other grounds sub nom. Doe 2 v. Shanahan, 755 F. App’x 19
(D.C. Cir. 2019); Doe 1 v. Buratai, 318 F. Supp. 3d 218 (D.D.C.
2018); Doe v. George Washington Univ., 305 F. Supp. 3d 126
(D.D.C. 2018); Doe 1 v. FCC, 302 F. Supp. 3d 160 (D.D.C. 2018);
Doe v. Mattis, 288 F. Supp. 3d 195 (D.D.C. 2018); Does 1–144 v.
Chiquita Brands Int’l, Inc., 285 F. Supp. 3d 228 (D.D.C. 2018).
16
accusations against others; many of those orders were sealed 2
or lacked any reasoning at all (thereby omitting the “inquiry”
required by Microsoft). 3 But cf., e.g., EEOC v. Nat’l
Children’s Center, Inc., 98 F.3d 1406, 1410 (D.C. Cir. 1996)
(“[I]t is imperative that a district court articulate its reasons for
electing to seal or not to seal a record.”).