Quintero v. Metro Santurce, Inc.

CourtDistrict Court, D. Puerto Rico
DecidedDecember 9, 2021
Docket3:20-cv-01075
StatusUnknown

This text of Quintero v. Metro Santurce, Inc. (Quintero v. Metro Santurce, Inc.) is published on Counsel Stack Legal Research, covering District Court, D. Puerto Rico primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Quintero v. Metro Santurce, Inc., (prd 2021).

Opinion

UNITED STATES DISTRICT COURT DISTRICT OF PUERTO RICO

___________________________________ ) PABLO J. QUINTERO, ) JOANNIE PRINCIPE, ) individually and on behalf of ) all others similarly situated, ) ) Plaintiffs, ) ) v. ) CIVIL ACTION ) NO. 20-01075-WGY METRO SANTURCE,INC., d/b/a ) PAVIA HOSPITAL SANTURCE ) a corporation, METRO HATO REY, ) INC., d/b/a PAVIA HOSPITAL HATO ) REY, and DOES 1-10, ) Defendants. ) ___________________________________)

YOUNG, D.J.1 December 9, 2021

MEMORANDUM OF DECISION

I. INTRODUCTION In this putative class action, two patients, the plaintiffs Pablo J. Quintero and Joannie Principe (“the Patients”), individually and on behalf of all others similarly situated, bring suit against two hospitals, the defendants Metro Santurce, Inc., d/b/a Pavia Hospital Santurce, and Metro Hato Rey, Inc., d/b/a Pavia Hospital Hato Rey (“the Hospitals”) because of a ransomware attack that allegedly led to the exposure of their

1 Of the District of Massachusetts, sitting by designation. personally identifiable information (“PII”) and protected health information (“PHI”).2 See generally Compl. ECF No. 1. On October 13, 2021, this Court held oral argument on Hospitals’ motion to dismiss. See October 13, 2021 Minute Order, ECF No. 32. After hearing, the Court concluded that no

injury plausibly was alleged for Constitutional standing purposes. The motion to dismiss for lack of standing was ALLOWED, the remaining grounds of motion to dismiss were DENIED

2 “The Cybersecurity and Infrastructure Security Agency . . . an agency within the Department of Homeland Security . . . defines ‘ransomware’ as a type of malicious software . . . that is designed to restrict or deny access to computer data until a ransom, typically in the form of bitcoin, is fully paid by the victim(s).” Helena Roland, The Survival of Critical Infrastructure: How Do We Stop Ransomware Attacks on Hospitals?, 29 Cath. U.J.L. & Tech. 177, 180 (2020). Similarly, the United States Secret Service describes ransomware as “a type of malicious software (malware), which denies access to systems or data and/or exfiltrates data.” United States Secret Service Cybercrime Investigation, Preparing for a Cyber Incident: a Guide to Ransomware, https://www.secretservice.gov/sites/default/files/reports/2020- 12/Preparing%20for%20a%20Cyber%20Incident%20- %20A%20Guide%20to%20Ransomware%20v%201.0.pdf (last visited September 13, 2021). “Cyber actors hold systems or data hostage until a ransom is paid for a decryption key. Cyber actors also threaten to publish exfiltrated data, or sell it on the dark web.” Id. Hospitals are apparently particularly vulnerable to this type of attack. See Roland, supra note 2, at 181-82 (discussing the history and growing problem of ransomware). “In 2019, the United States was hit by an unprecedented number of ransomware attacks that impacted at least 966 government agencies, 1,233 educational establishments, and 764 health care providers at a potential cost in excess of $7.5 billion.” Marcus Chung, New Ransomware Innovations Bring Shame and Fear to Health Care, 22 J. Health Care Compliance 37, 38 (2020). as MOOT and the action was dismissed without prejudice. See id. This memorandum explains the Court’s decision. II. BACKGROUND A. Procedural History

The Hospitals moved to dismiss the complaint (“the Motion”). Mot. Dismiss (“Mot.”), ECF No. 18. The Patients opposed the Motion (“the Opposition”). Pls.’ Opp’n Defs.’ Mot. Dismiss (“Opp’n”), ECF No. 19. The Hospitals filed a reply and submitted supplemental authority. Reply Supp. Mot. Dismiss (“Reply”), ECF No. 21-1; Mot. Leave Submit Suppl. Authority, ECF No. 29. The Court heard oral argument and allowed the Motion solely on the ground of lack of standing on October 13, 2021. See October 13, 2021 Minute Order. B. Facts Alleged in the Complaint

In the “Factual Allegations” section of the complaint, the Patients allege that “[o]n February 12, 2019, . . . [the Hospitals] . . . suffered a computer hack in which money was demanded in exchange for the release of the computer systems.” Compl. ¶ 19.3 “During this hack, critical patient PII was exposed to the hackers.” Id. ¶ 19. “On June 18, 2019, over four months later, [the Hospitals] began sending letters to the breach victims to inform them of the data breaches.” Id. ¶ 20.

3 The Court will refer to this incident as the Ransomware Attack. According to the Patients, the Hospitals promised to safeguard the patient’s information, but nonetheless “allowed [the] hackers to obtain it” during the Ransomware Attack. Id. ¶ 22. This is the entirety of the complaint’s factual allegations with respect to the Ransomware Attack. In the “Nature of Action”

section of the complaint, the Patients also allege “[o]n information and belief, the security breach compromised [their] full names, addresses, dates of birth, gender, financial information, and social security numbers.” Id. ¶ 4. The letters, referenced in the complaint (though not attached, but submitted separately by the Hospitals), are substantively identical and state: On February 12, 2019, we learned that your information was involved in an incident that impacted the Hospital’s network . . . . We immediately took steps to ensure the security of your information. None of your information was lost as a result of the incident, and to date there is no evidence to suggest that any of your information was exfiltrated from the network or that there has been any attempt to misuse your information.

The security of your information is of the highest importance to us, and we are handling this incident with the greatest of care. Immediately after the incident, we began an investigation and retained forensic and other consultants to assist us to remediate the effects of the incident, including working with law enforcement. All data, including your information, was restored on April 6, 2019 without any corruption or exfiltration of the data. Moreover, the Hospital and its consultants found no evidence to suggest that your information was viewed, accessed or disclosed as a result of the incident. We will continue to monitor the situation and will advise you if we become aware of any new developments. We are also reinforcing our existing security protocols and providing additional training to our employees to reduce the likelihood of a similar event occurring in the future.

Mot. Tendering Ex. Mot. Dismiss, Ex. 1, June 18, 2019 Letter Pablo Quintero (“Letter Pablo Quintero”) 1, ECF No. 28-1; Id. Ex. 2, June 18, 2019, Letter Joannie Principe (“Letter Joannie Principe”) 1, ECF No. 28-2. Notably, the Patients allege in the complaint that the notification was late, but not that the contents of the letter are inaccurate. Compl. ¶ 20. The complaint is, however, rife with allegations that the Patients’ PII and PHI was “exposed,” and the Patients and class are in imminent risk of harm for identity theft and identity fraud. Compl. ¶¶ 10, 19, 51, 57, 58, 60. There are allegations that PII was “disclosed” and “accessed.” Id. ¶¶ 66, 115; see also id. ¶ 114. There are vague allegations in the “Nature of the Action” section that the Patients and putative class members PII was “harvested,” id. ¶¶ 2, 5, and that unattributed “patient information was stolen,” id. ¶ 6. The Patients, on information and belief, claim that PII was “accessed by hackers.” Id. ¶ 10. The allegations of actual theft and misuse of data are, however, conclusory, vague, and logically disconnected from the specific factual allegation concerning the alleged Ransomware Attack. For example, the Patients claim that the Hospitals promised they would not disclose PII or PHI to “any unauthorized third parties” but “[in fact] allowed them to obtain it.” Id. ¶ 22. The Plaintiff’s complaint also contains a heading claiming, “the Data Breach has Resulted and Will Result in Identity Theft and Identity Fraud.” Id. 11.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Warth v. Seldin
422 U.S. 490 (Supreme Court, 1975)
Lujan v. Defenders of Wildlife
504 U.S. 555 (Supreme Court, 1992)
National Organization for Women, Inc. v. Scheidler
510 U.S. 249 (Supreme Court, 1994)
Valentin-De-Jesus v. United Healthcare
254 F.3d 358 (First Circuit, 2001)
Deniz v. Municipality of Guaynabo
285 F.3d 142 (First Circuit, 2002)
Ocasio-Hernandez v. Fortuno-Burset
640 F.3d 1 (First Circuit, 2011)
Reilly Ex Rel. Pluemacher v. Ceridian Corp.
664 F.3d 38 (Third Circuit, 2011)
Katz v. Pershing, LLC
672 F.3d 64 (First Circuit, 2012)
Clapper v. Amnesty International USA
133 S. Ct. 1138 (Supreme Court, 2013)
Hilary Remijas v. Neiman Marcus Group, LLC
794 F.3d 688 (Seventh Circuit, 2015)
Spokeo, Inc. v. Robins
578 U.S. 330 (Supreme Court, 2016)
Hochendoner v. Genzyme Corporation
823 F.3d 724 (First Circuit, 2016)
Matthew Carlsen v. GameStop, Inc.
833 F.3d 903 (Eighth Circuit, 2016)
Reddy v. Foster
845 F.3d 493 (First Circuit, 2017)
McGuire v. Estate of Robert Cunningham
923 F.3d 240 (First Circuit, 2019)
Suarez-Torres v. Panaderia y Reposteria Espana
988 F.3d 542 (First Circuit, 2021)
TransUnion LLC v. Ramirez
594 U.S. 413 (Supreme Court, 2021)
In re Zappos.com, Inc.
108 F. Supp. 3d 949 (D. Nevada, 2015)
Khan v. Children's National Health System
188 F. Supp. 3d 524 (D. Maryland, 2016)

Cite This Page — Counsel Stack

Bluebook (online)
Quintero v. Metro Santurce, Inc., Counsel Stack Legal Research, https://law.counselstack.com/opinion/quintero-v-metro-santurce-inc-prd-2021.