Allegation of Data Breach Alone Insufficient to Sustain Claims Based on Inadequate Cybersecurity
Client Alert | 3 min read | 03.15.13
On March 6, 2013, the United States District Court for the Northern District of California held that a putative class of LinkedIn premium users lacked standing to pursue state law unfair competition, breach of contract, and negligence claims resulting from a hacking incident. The court dismissed the complaint, concluding that the plaintiffs failed to establish any legally cognizable injury and any causation between the alleged incident and any alleged economic harm.
LinkedIn, the online community for professional networking, offers both free and premium paid accounts to consumers. The Privacy Policy applicable to both types of accounts provides that user information will be protected with "industry standard protocols and technology," but notes that it provides no guarantee that LinkedIn's security will be able to prevent all security breaches. On June 6, 2012, hackers infiltrated LinkedIn's computer systems and posted 6.5 million user passwords and email addresses. LinkedIn subsequently updated its password encryption method to prevent future breaches.
A putative class of premium LinkedIn users filed an amended complaint alleging unfair competition, breach of contract, and negligence claims. LinkedIn filed a motion to dismiss for lack of standing, which the court granted.
The plaintiffs claimed that they suffered "economic harm" because they were denied the full benefit of their bargain for the paid premium memberships. Specifically, the plaintiffs alleged that they would not have purchased the premium product absent the security guarantees, and that the 2012 hacking incident shows they did not receive the promised security. The court rejected the plaintiffs' "economic harm" argument for several reasons.
First, the plaintiffs failed to show that they paid consideration for LinkedIn's promise to safeguard their information because the same security policies applied equally to the free and paid accounts. Second, unlike situations involving food-labeling misrepresentations, the plaintiffs did not allege that they actually read the alleged misrepresentation—the Privacy Policy—and thus failed to show a causal relationship between the misrepresentation and any injury. Third, the plaintiffs failed to show that the alleged breach of contract (i.e., failing to provide the security promised in the Privacy Policy) caused the economic loss (i.e., not receiving the full benefit of the bargain). Instead, the court concluded that the injury could only have occurred before the hacking incident at the time the parties entered into the contract. This particular aspect of the opinion addressing the timing of the alleged injury is likely to be the subject of debate. It was not, however, the sole basis for rejecting the plaintiffs' economic harm allegations. Indeed, the court also made clear that where plaintiffs allege harm from a defective product, plaintiffs must show "something more" than the economic harm of "overpaying for the defective product." Here, the plaintiffs alleged only that LinkedIn provided defective security, not that LinkedIn provided a product different than what the plaintiffs purchased. Consequently, the court concluded that the plaintiffs would need to allege "something more" resulted from the defective security, such as identity theft, which they did not do.
In addition to rejecting the plaintiffs' "economic harm" arguments, the court also held that the increased risk of future harm did not establish an injury sufficient to confer standing. The court concluded that the plaintiffs failed to state a legally cognizable injury by merely alleging that their passwords were publicly posted as opposed to alleging identity theft.
Based on the pleadings before it, this court concluded that the mere allegation of a security breach does not automatically confer Article III standing or provide the basis for cognizable state common law claims. Rather, the failure here to allege an injury beyond "overpaying" for a service, e.g., identity theft, required dismissal of these claims. The court also rejected the plaintiffs' claimed injury stemming from an increased risk of future identity theft, deeming it speculative and thus insufficient to sustain the claims. This decision bolsters the "lack of standing" defense to claims premised on security breaches brought in federal court. The case is In re LinkedIn User Privacy Litigation, 2013 WL 844291 (N.D. Cal. Mar. 6, 2013).
Contacts
Insights
Client Alert | 7 min read | 12.17.25
After hosting a series of workshops and issuing multiple rounds of materials, including enforcement notices, checklists, templates, and other guidance, the California Air Resources Board (CARB) has proposed regulations to implement the Climate Corporate Data Accountability Act (SB 253) and the Climate-Related Financial Risk Act (SB 261) (both as amended by SB 219), which require large U.S.-based businesses operating in California to disclose greenhouse gas (GHG) emissions and climate-related risks. CARB also published a Notice of Public Hearing and an Initial Statement of Reasons along with the proposed regulations. While CARB’s final rules were statutorily required to be promulgated by July 1, 2025, these are still just proposals. CARB’s proposed rules largely track earlier guidance regarding how CARB intends to define compliance obligations, exemptions, and key deadlines, and establish fee programs to fund regulatory operations.
Client Alert | 1 min read | 12.17.25
Client Alert | 7 min read | 12.17.25
Executive Order Tries to Thwart “Onerous” AI State Regulation, Calls for National Framework
Client Alert | 4 min read | 12.17.25
The new EU Bioeconomy Strategy: a regulatory framework in transition

