LASALLE v. ADOPTIONS FROM THE HEART, INC.

CourtDistrict Court, E.D. Pennsylvania
DecidedAugust 1, 2025
Docket2:25-cv-00974
StatusUnknown

This text of LASALLE v. ADOPTIONS FROM THE HEART, INC. (LASALLE v. ADOPTIONS FROM THE HEART, INC.) is published on Counsel Stack Legal Research, covering District Court, E.D. Pennsylvania primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
LASALLE v. ADOPTIONS FROM THE HEART, INC., (E.D. Pa. 2025).

Opinion

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA

ERIK LASALLE, on behalf of himself and : all others similarly situated, : : CIVIL ACTION v. : No. 25-974 : ADOPTIONS FROM THE HEART, INC. :

McHUGH, J. August 1, 2025 MEMORANDUM This is a data breach case. In April 2024, an adoption agency inadvertently exposed the sensitive personal data of over 2,000 present and former clients. The data remained publicly accessible on the internet for a nine-day period before it was taken down, and the agency failed to notify any impacted parties for nine months. Soon after his data was exposed, Erik LaSalle, a former client, experienced a spike in spam communications and attempted bank fraud. Mr. LaSalle now brings a putative class action for both monetary and injunctive relief on behalf of himself and the other individuals whose data was compromised. Defendant has moved to dismiss for lack of standing, arguing that Plaintiff has not experienced injuries fairly traceable to the data incident. I disagree. In an era of data mining by sophisticated programs, once information is made public on the internet, even if only for a few days, the vulnerability is real. Here, Plaintiff has sufficiently alleged that he is both at risk of, and has already begun to experience, serious harms that plausibly flow from the data incident. The motion to dismiss will therefore be denied. I. Facts as Pled Defendant Adoptions from the Heart, Inc. is a non-profit adoption agency. Compl. ¶¶ 9, 13, ECF 11. In running its business, Defendant receives and maintains adoption files containing personal identifiable information (“PII”) and protected health information (“PHI”) of thousands of its current and former clients. Id. ¶ 14. Some of this information includes names, dates of birth, social security numbers, medical records, and names of social workers. Id. ¶ 3. In agreeing to

work with Defendant, clients sign a Privacy Policy, wherein Defendant promises not to share the PHI or PII with anyone outside of the Agency. Id. ¶ 17. Despite this assurance, on April 17, 2024, the data stored in Defendant’s internal database was made available and searchable on the internet (“the Incident”). Id. ¶ 18. At least 2,502 of Defendant’s former patients and clients’ data files were exposed, and the data remained public for nine days. Id. ¶¶ 4, 22. During this period, the data was susceptible to search engine indexing bots, which are automated data harvesting mechanisms designed to crawl the internet for publicly accessible data. Id. ¶ 19. Such bots often facilitate large-scale automated data scraping, a known exploitation method used by cybercriminals and data brokers to capture sensitive personal information at scale. Id. ¶ 20. Personal data collected through web scraping is frequently sold or

published on the Dark Web.1 Id. ¶ 35. Plaintiff asserts that “on information and belief,” the PII/PHI data jeopardized in the Incident has already been made publicly accessible and has been published, or will be published imminently, by cybercriminals on the Dark Web. Id. ¶ 36. Yet, Defendant did not notify affected parties of the Incident until January 24, 2025 – over nine months after the exposure. Id. ¶ 23. This dramatic delay limited the ability of affected parties to try to mitigate their injuries in a timely manner. 2 Id. ¶ 24.

1 The Harvard Business Review describes the Dark Web as a “hub of criminal and illicit activity” where cybercriminals “sell data from companies they have gained unauthorized access to through credential stuffing attacks, phishing attacks, [or] hacking.” Compl. ¶ 35; Brenda R. Sharton, Your Company’s Data Is for Sale on the Dark Web. Should You Buy It Back?, HARVARD BUS. REV. (Jan. 4, 2023) https://hbr.org/2023/01/your-companys-data-is-for-sale-on-the-dark-web-should-you-buy-it-back. 2 In their Notice, Defendant offered to provide some victim credit monitoring and identity related services. Id. ¶ 31. But this offer carries little import when it was not made until over nine months had lapsed, for time is of the essence when attempting to mitigate a data breach. Plaintiff Erik LaSalle is a former client of Defendant, and thus provided the Agency with his PII and PHI, trusting that the Agency would use reasonable measures to keep his information

safe. Plaintiff “is very careful about the privacy and security of his PII/PHI,” “does not knowingly transmit his PII/PHI over the internet in an unsafe manner,” and is careful to store any sensitive documents in a secure location. Id. ¶ 40. But in February 2025, LaSalle received notice that his data file was one of those exposed in the Incident. Id. ¶ 45. LaSalle avers that following the Incident, he experienced a spike in spam and scam text messages and phone calls. Id. ¶ 47. Within a year of the Incident, LaSalle also asserts that he received a call from Capital One informing him that an unauthorized actor had made several attempts to withdraw money from his account. Capital One consequently froze his account, which he then decided to close. Id. ¶ 46. LaSalle believes that these episodes of fraudulent activity are a product of the Incident. To this point, LaSalle does not recall ever learning that his information

was compromised in any other data security incident, other than the Incident at issue here, leading him to infer that as a result of the Incident and the widespread prevalence of indexing bots, his information was compromised and accessed by nefarious third parties. Id. ¶¶ 44, 49. In addition to the spam calls and attempted bank fraud, LaSalle states that he has spent, and will continue to spend, significant time, effort, and money monitoring his accounts to protect himself from identity theft. Id. ¶¶ 51, 62. He avers that he has suffered from anxiety, sleep disruption, stress, fear, and frustration. Id. ¶ 53. He also alleges a loss of opportunity costs and wages from spending time trying to mitigate the fraud, and an ongoing risk of additional data breaches until Defendant takes appropriate protective measures. Id. ¶ 62.

Plaintiff purports that Defendant knew or should have known that a failure to safeguard sensitive data presents great risk, but that they nevertheless failed to take adequate precautions, follow statutory or industry standards, or sufficiently notify affected parties once aware of the Incident. Id. ¶¶ 77, 83, 84, 86, 90.

LaSalle brings this suit as a class action on behalf of himself and a similarly situated class consisting of “all individuals residing in the United States whose PII/PHI was compromised and/or made accessible to internet search engines as a result of the indexing error discovered by Adoptions From The Heart in April 2024, including all individuals who received a Notice of Security Incident.” Id. ¶ 92. Defendant does not dispute that the Incident occurred, nor that they failed to notify putative Plaintiffs for nine months. Defendant argues instead that Plaintiff cannot establish a causal connection between the Incident and Plaintiff’s alleged fraud, warranting dismissal for lack of standing. II. Standard of Review Defendant argues that the action should be dismissed for lack of subject matter jurisdiction

pursuant to Rule 12(b)(1). A challenge to subject matter jurisdiction under Rule 12(b)(1) may be either a facial or factual attack. “A facial attack, as the adjective indicates, is an argument that considers a claim on its face and asserts that it is insufficient to invoke the subject matter of the court[.]” Const. Party of Pa. v. Aichele, 757 F.3d 347, 358 (3d Cir. 2014). In contrast, a factual attack is “an argument that there is no subject matter jurisdiction because the facts of the case . . . do not support the asserted jurisdiction.” Id.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Lujan v. Defenders of Wildlife
504 U.S. 555 (Supreme Court, 1992)
Reilly Ex Rel. Pluemacher v. Ceridian Corp.
664 F.3d 38 (Third Circuit, 2011)
Clapper v. Amnesty International USA
133 S. Ct. 1138 (Supreme Court, 2013)
Connie Edmonson v. Lincoln National Life Insuranc
725 F.3d 406 (Third Circuit, 2013)
Constitution Party of Pennsylv v. Carol Aichele
757 F.3d 347 (Third Circuit, 2014)
Spokeo, Inc. v. Robins
578 U.S. 330 (Supreme Court, 2016)
Melissa Alleruzzo v. SuperValu, Inc.
870 F.3d 763 (Eighth Circuit, 2017)
McMorris v. Carlos Lopez & Assocs., LLC
995 F.3d 295 (Second Circuit, 2021)
Shiyang Huang v. Equifax Inc.
999 F.3d 1247 (Eleventh Circuit, 2021)
TransUnion LLC v. Ramirez
594 U.S. 413 (Supreme Court, 2021)
Jennifer Clemens v. Execupharm Inc
48 F.4th 146 (Third Circuit, 2022)
Kehr Packages, Inc. v. Fidelcor, Inc.
926 F.2d 1406 (Third Circuit, 1991)

Cite This Page — Counsel Stack

Bluebook (online)
LASALLE v. ADOPTIONS FROM THE HEART, INC., Counsel Stack Legal Research, https://law.counselstack.com/opinion/lasalle-v-adoptions-from-the-heart-inc-paed-2025.