Data Breach and Privacy Legal Claims Under U.S. Law
Data breach and privacy legal claims occupy a complex intersection of federal statutes, state laws, and regulatory frameworks that govern how individuals may seek redress when personal information is exposed, stolen, or misused. This page covers the definition of actionable privacy harms, the legal mechanisms by which claims proceed, the most common factual scenarios that give rise to litigation, and the threshold questions that determine whether a claim is viable. The subject carries significant practical weight: the IBM Cost of a Data Breach Report 2023 placed the average total cost of a U.S. data breach at $9.48 million, the highest of any country surveyed, underscoring the scale of harm that drives both regulatory enforcement and private litigation.
Definition and Scope
A data breach legal claim arises when a person's personally identifiable information (PII) — or a category of specially protected data such as protected health information (PHI) or financial account credentials — is accessed, disclosed, or used without authorization, causing cognizable harm. The legal definition of a "breach of security" varies by statute. Under the Health Insurance Portability and Accountability Act (HIPAA), a breach is defined as the unauthorized acquisition, access, use, or disclosure of unsecured PHI that compromises its security or privacy (45 C.F.R. § 164.402). HIPAA enforcement is conducted by the U.S. Department of Health and Human Services Office for Civil Rights (HHS OCR), which can impose civil monetary penalties up to $1.9 million per violation category per calendar year (HHS OCR Enforcement).
The scope of actionable privacy claims extends well beyond HIPAA. The Gramm-Leach-Bliley Act (GLBA) governs financial institutions' handling of consumer financial data. The Children's Online Privacy Protection Act (COPPA), enforced by the Federal Trade Commission (FTC), applies to the online collection of personal information from children under 13. At the state level, the California Consumer Privacy Act (CCPA) and its 2020 amendment, the California Privacy Rights Act (CPRA), created a private right of action for consumers whose nonencrypted, nonredacted personal information is subject to unauthorized access due to a business's failure to implement reasonable security. As of 2023, at least 13 states had enacted comprehensive consumer privacy statutes with varying breach and enforcement provisions (National Conference of State Legislatures).
The scope question in any given claim turns on three classification axes: the type of data involved, the identity of the entity holding the data (covered entity, business associate, financial institution, general commercial actor), and the jurisdiction whose law applies. Understanding jurisdiction and venue explained is therefore a threshold task in any multi-state breach scenario.
How It Works
Privacy and data breach claims proceed through overlapping enforcement channels: administrative regulatory action, class or individual civil litigation, and, in limited circumstances, criminal prosecution. The private litigation pathway follows the standard legal claims process overview, but with several distinctive structural features.
The typical litigation sequence involves five phases:
-
Injury identification and standing analysis. Plaintiffs must establish concrete injury — not merely the risk of future harm. The U.S. Supreme Court's decision in Spokeo, Inc. v. Robins, 578 U.S. 330 (2016), held that a bare procedural violation of the Fair Credit Reporting Act (FCRA), absent concrete harm, does not satisfy Article III standing. The subsequent TransUnion LLC v. Ramirez, 594 U.S. 413 (2021), further tightened the standard, requiring that intangible harms have "a close relationship to harms traditionally recognized as providing a basis for lawsuits." The doctrinal details of standing to sue are therefore dispositive in many data breach cases.
-
Cause of action selection. Plaintiffs choose from negligence (failure to implement reasonable security), breach of contract (violation of a privacy policy), statutory claims (FCRA, CCPA, state breach notification statutes), unjust enrichment, or invasion of privacy torts. Each theory carries different elements, damages structures, and defenses.
-
Class certification or individual filing. Because data breaches often affect thousands or millions of individuals, class action claims are the predominant vehicle. Federal Rule of Civil Procedure 23 requires numerosity, commonality, typicality, and adequate representation. Courts have split on whether the "ascertainability" of class members and the uniformity of damages defeat certification in breach cases.
-
Discovery and evidence gathering. Plaintiffs rely heavily on forensic evidence: breach notification letters, incident response reports, and network logs. The discovery process in U.S. litigation in these cases is technically intensive, often requiring expert testimony on cybersecurity standards such as those published by the National Institute of Standards and Technology (NIST) in SP 800-53.
-
Damages quantification and resolution. Compensable damages may include out-of-pocket losses, lost time mitigating the breach, credit monitoring costs, and — in statutory claims — liquidated damages per violation. Punitive damages require demonstration of willful or reckless conduct. The CCPA's private right of action allows statutory damages between $100 and $750 per consumer per incident, or actual damages if greater (Cal. Civ. Code § 1798.150).
Common Scenarios
Data breach and privacy claims cluster around four recurring factual patterns:
Healthcare record exposures. Breaches of electronic health records at hospitals, insurers, or their business associates generate HIPAA-based regulatory enforcement and, where state law permits, parallel civil claims. Because HIPAA does not create a private right of action, plaintiffs typically plead negligence per se — using HIPAA's Security Rule (45 C.F.R. Part 164, Subpart C) as the applicable standard of care — alongside state tort theories.
Financial account credential theft. Breaches at financial institutions, payment processors, or retailers that expose credit card or bank account data trigger GLBA enforcement (FTC or federal banking regulators), FCRA claims if credit reporting is implicated, and state-law negligence or statutory claims. The consumer protection claims framework often overlaps here, particularly where the FTC Act's Section 5 prohibition on unfair or deceptive practices is invoked.
Large-scale commercial data breaches. Incidents at major technology companies or retailers — where names, email addresses, passwords, or Social Security numbers are exposed — produce class litigation under state breach notification laws, the CCPA for California residents, and negligence theories. These cases frequently proceed as multidistrict litigation when plaintiffs span multiple states; see multidistrict litigation explained for the procedural structure.
Tracking and surveillance-based privacy violations. Claims arising from non-breach privacy harms — unauthorized location tracking, sale of browsing data, or biometric data collection without consent — rely on statutes like the Illinois Biometric Information Privacy Act (BIPA), 740 ILCS 14/1 et seq., which allows a private right of action with statutory damages of $1,000 per negligent violation and $5,000 per intentional or reckless violation. BIPA litigation has generated some of the largest class settlements in U.S. privacy law.
Decision Boundaries
Several threshold factors determine whether a data breach or privacy claim will survive dismissal or reach resolution on the merits.
Standing and concrete harm. Post-TransUnion, federal courts apply a strict injury-in-fact analysis. Plaintiffs whose information was exposed but who suffered no documented misuse — no fraudulent charges, no identity theft, no disclosed information — face dismissal at the pleading stage in federal court. State courts applying their own standing doctrines may be more permissive.
Statute of limitations. Limitation periods vary sharply by statute and state. FCRA claims carry a two-year discovery-based period or five years from violation, whichever is earlier (15 U.S.C. § 1681p). CCPA claims are subject to California's general four-year limitations period for statutory claims absent a specific provision. BIPA claims have been contested, with the Illinois Supreme Court's 2023 ruling in Cothron v. White Castle System holding that a separate BIPA claim accrues each time a violation occurs, dramatically expanding potential liability windows. The statute of limitations by claim type reference provides broader comparative context.
Preemption. Federal statutes can preempt state law claims in this space. FCRA explicitly preempts certain state credit reporting laws (15 U.S.C. § 1681t). Courts have also analyzed whether the Stored Communications Act (18 U.S.C. § 2701 et seq.) precludes state-law wiretapping claims arising from data interception.
Private right of action versus regulatory-only enforcement. HIPAA and GLBA do not grant private rights of action; enforcement is exclusively regulatory. Plaintiffs must therefore ground their claims in state common law or other federal statutes. This distinction between statutory schemes with private enforcement and those with regulatory-only enforcement is a primary decision boundary that shapes the entire litigation strategy — and it contrasts sharply with frameworks like BIPA or the CCPA, which do vest private enforcement rights directly in consumers.
Class certification viability. Individualized damages calculations, varying proof