Travis v. Assured Imaging LLC

CourtDistrict Court, D. Arizona
DecidedMay 10, 2021
Docket4:20-cv-00390
StatusUnknown

This text of Travis v. Assured Imaging LLC (Travis v. Assured Imaging LLC) is published on Counsel Stack Legal Research, covering District Court, D. Arizona primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Travis v. Assured Imaging LLC, (D. Ariz. 2021).

Opinion

1 WO 2 3 4 5 6 IN THE UNITED STATES DISTRICT COURT 7 FOR THE DISTRICT OF ARIZONA

9 Angela T Travis, et al., No. CV-20-00390-TUC-JCH

10 Plaintiffs, ORDER

11 v.

12 Assured Imaging LLC,

13 Defendant. 14 15 Defendant Assured Imaging, LLC (“Defendant” or “Assured”) moves to dismiss 16 Plaintiffs’ Amended Class Action Complaint. (Assured Imaging, LLC’s Mot. to Dismiss, 17 Doc. 12.) The motion is fully briefed. (Pls’ Resp. and Opp’n to Def.’s Mot. to Dismiss, 18 Doc. 13; Assured Imagining, LLC’s Reply Br. in Supp. of Mot. to Dismiss, Doc. 14.) For 19 the reasons set forth below, the Court will grant Assured’s motion to dismiss without 20 prejudice. 21 I. BACKGROUND 22 a. Factual Background 23 This case arises from a ransomware1 attack. (Doc. 9 at ¶ 9.) On or about May 15,

24 1 Plaintiffs allege that a ransomware attack is a type of malicious software that blocks 25 access to a computer system or data, usually by encrypting it, until the victim pays a fee to the attacker. (First Am. Class Action Comp., Doc. 9 at 8, ¶ 34.) They allege ransomware 26 attacks are often the final piece of a multiphase coordinated cyber-attack contending that 27 “[o]nce cyberthieves have plundered the target’s systems using [malicious software], the cybercriminals unleash their ransomware virus, locking down the target’s systems for a 28 ransom.” Id. at ¶ 35. 1 2020, a cyberattack launched from an Assured employee’s email inbox allowed malignant 2 software to infect Assured’s computer networks. (Doc. 9 at ¶ 36.) From May 15 to May 3 17, 2020, Assured was unaware that its system was compromised and the cyberthieves 4 exfiltrated patient and other data from Assured’s system. Id. at ¶ 37. On May 19, 2020, 5 Defendant realized that its computer system was compromised when the nonparty actors 6 launched a targeted ransomware attack. Id. at ¶ 38. The ransomware attack disrupted 7 Assured’s computer network, leaving patient data stored on its network encrypted and 8 inaccessible for multiple days. Id. at ¶¶ 41, 42. 9 In August of 2020, Assured notified potentially affected persons and governmental 10 agencies of the ransomware attack through a Notice of Data Incident or a Notice of Data 11 Breach. Id. at ¶ 44; Docs 9-1 through 9-4. The Notice of Data Incident states in part: 12 What Happened? On May 19, 2020, Assured learned that its electronic 13 medical records system had become encrypted due to “ransomware” 14 deployed by an unknown actor. Because the impacted systems contained patient information, Assured worked quickly to (1) restore access to the 15 patient information so it could continue to care for patients without 16 disruption and (2) investigate what happened and whether this incident resulted in any unauthorized access to, or theft of, patient information by 17 the unknown actor. 18 Assured conducted an extensive investigation, with the assistance of 19 third-party computer forensic specialists to determine the nature and 20 scope of the incident. On July 1, 2020, the investigation confirmed Assured systems were accessible by an unknown actor between May 15, 21 2020 and May 17, 2020, and certain, limited data was exfiltrated from our 22 systems. The investigation was unable to determine the full extent of information that was accessed by the unknown actor. In an abundance of 23 caution, Assured performed a comprehensive review of all information stored in our systems at the time of the incident to identify the individuals 24 whose information may have been accessible to the unknown actor. We 25 then worked to determine the identities and contact information for potentially impacted individuals. 26

27 What information Was Involved. The following types of patient information were present in the electronic medical records system and 28 therefore potentially accessed and acquired by the unknown actor during 1 this incident: full name, address, date of birth, patient ID, facility, treating clinician, medical history, service performed, and assessment of the 2 service performed, including any recommendations on future testing. We 3 are unaware that any of the information was misused by the unknown actor and Assured is providing this notice in an abundance of caution. 4

5 (Doc. 9 at ¶ 44.) 6 Plaintiffs Angela T. Travis (“Travis”), Kerri G. Peters (“Peters”), Geraldine Pineda 7 (“Pineda”) and Rebecca Dawn Kelly-Hartnett (“Kelly-Hartnett”) all received medical 8 services from Assured. Id. at ¶¶ 48, 58, 63, 68. Each alleges providing Assured with 9 personal identifying information such as their name, address, phone number, email address, 10 medical history, demographic information, and insurance information in the course of 11 receiving services from Assured. See Id. at ¶¶ 49-51 (allegations regarding Travis), ¶¶ 59- 12 61 (allegations regarding Peters), ¶¶ 64-66 (allegations regarding Pineda), and ¶¶ 69-71 13 (allegations regarding Kelly-Hartnett). 14 Each named Plaintiff received a Notice of Data Breach similar to the above- mentioned Notice of Data Incident. See Doc. 9-1 at pp. 2-3 (notice sent to Travis); Doc. 9- 15 2 at pp. 2-4 (notice sent to Peters); Doc. 9-3 at p. 2 (notice sent to Pineda); Doc. 9-4 at pp. 16 2-5 (notice sent to Kelly-Hartnett).The Notice of Data Breach sent to each named Plaintiff 17 states that their personal information was “potentially accessed by the unknown actor.” The 18 words “and acquired” contained in the Notice of Data Incident are not contained in the 19 Notice of Data Breach. See Doc. 9-1 at p. 2 (Travis notice); Doc. 9-2 at p. 2 (Peters notice); 20 Doc. 9-3 at p. 2 (Pineda notice); and Doc. 9-4 at p. 2 (Kelly-Hartnett notice). 21 Travis is a resident of Washington state. Id. at ¶ 1. She alleges “see[ing] a dramatic 22 increase in targeted spam phone calls after the ransomware attack.” Id. ¶ 53. She alleges 23 suffering severe emotional distress, anxiety, and stress and claims she sought medical help 24 from a mental health counselor to deal with the anxiety and stress. Id. at ¶ 55. She claims 25 to have “spent hours and hours checking her credit monitoring services” and alleges being 26 forced to expend time “fending off” targeted phishing calls. Id. at ¶¶ 56, 57. 27 Kelly-Hartnett is also a resident of Washington state. Id. at ¶ 4. Like Travis, she 28 endorses experiencing an increase in targeted spam phone calls after the ransomware 1 attack. (Doc. 9 at ¶ 73.) She alleges suffering severe emotional distress, anxiety, and stress 2 and claims she was forced to increase her medication in an effort to manage her anxiety 3 and stress. Id. at ¶ 75. She also alleges spending time “fending off” targeted phishing calls. 4 Id. at ¶ 76. 5 Peters and Pineda are residents of the State of New Mexico. Id. at ¶¶ 2-3. Neither 6 claim to have suffered severe emotional distress or anxiety after receiving notice of the 7 ransomware attack. Neither Peters nor Pineda endorse receiving an increased number of 8 spam phone calls after the ransomware attack. 9 Plaintiffs’ First Amended Class Action Complaint alleges claims of negligence, 10 negligence per se, breach of implied contract, breach of fiduciary duty, unjust enrichment, 11 and violations of two state laws. Id. at pp. 37, 39, 41, 45, 48, 51, 53. Plaintiffs seek to 12 represent a class of all persons whose personal information was compromised in the 13 ransomware attack and two subclasses of persons (one of Washington state residents and 14 one of New Mexico state residents) whose personal information was compromised. Id. at ¶ 145. Plaintiffs claim damages as a result of: 15 (1) “being placed at an imminent, immediate, and continuing increased risk of harm 16 from fraud and identity theft” (Id.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Warth v. Seldin
422 U.S. 490 (Supreme Court, 1975)
Pennsylvania v. New Jersey
426 U.S. 660 (Supreme Court, 1976)
Lujan v. Defenders of Wildlife
504 U.S. 555 (Supreme Court, 1992)
Krottner v. Starbucks Corp.
628 F.3d 1139 (Ninth Circuit, 2010)
Michael Henry Ferdik v. Joe Bonzelet, Sheriff
963 F.2d 1258 (Ninth Circuit, 1992)
Clapper v. Amnesty International USA
133 S. Ct. 1138 (Supreme Court, 2013)
Cherny v. Emigrant Bank
604 F. Supp. 2d 605 (S.D. New York, 2009)
Shqeirat v. US AIRWAYS, GROUP INC.
515 F. Supp. 2d 984 (D. Minnesota, 2007)
Claridge v. RockYou, Inc.
785 F. Supp. 2d 855 (N.D. California, 2011)
Doe 1 v. AOL LLC
719 F. Supp. 2d 1102 (N.D. California, 2010)
Courthouse News Service v. Michael Planet
750 F.3d 776 (Ninth Circuit, 2014)
Susan B. Anthony List v. Driehaus
134 S. Ct. 2334 (Supreme Court, 2014)
Spokeo, Inc. v. Robins
578 U.S. 330 (Supreme Court, 2016)
White v. Lee
227 F.3d 1214 (Ninth Circuit, 2000)
Zimmerman v. City of Oakland
255 F.3d 734 (Ninth Circuit, 2001)
Medvend, Inc. v. YRC, Inc.
23 F. Supp. 3d 844 (E.D. Michigan, 2014)
In re Adobe Systems, Inc. Privacy Litigation
66 F. Supp. 3d 1197 (N.D. California, 2014)
Warren v. Fox Family Worldwide, Inc.
328 F.3d 1136 (Ninth Circuit, 2003)

Cite This Page — Counsel Stack

Bluebook (online)
Travis v. Assured Imaging LLC, Counsel Stack Legal Research, https://law.counselstack.com/opinion/travis-v-assured-imaging-llc-azd-2021.