Yazoo Sanders 6 Complaint
Yazoo Sanders 6 Complaint
Defendant.
Plaintiff Milisa Jones Young (“Plaintiff”) brings this First Amended Class Action
individual and on behalf of all others similarly situated, and alleges, upon personal knowledge as
to her own actions and her counsels’ investigation, and upon information and belief as to all other
matters, as follows:
PARTIES
2. Defendant Yazoo Valley Electric Power Association is a company with its principal
SUMMARY OF ACTION
3. Plaintiff brings this class action against Defendant for its failure to properly secure
                                                      1
     Case 3:25-cv-00131-KHJ-MTP              Document 6        Filed 02/28/25      Page 2 of 57
Mississippi.
entrusted to Defendant on the mutual understanding that Defendant would protect it against
disclosure—was targeted, compromised and unlawfully accessed due to the Data Breach.
Plaintiff and the putative Class Members (defined below), who are (or were) customers at
Defendant.
7. The PII compromised in the Data Breach included Plaintiff’s and Class Members’
full names and Social Security numbers (“personally identifiable information” or “PII”).
8. The PII compromised in the Data Breach was exfiltrated by cyber-criminals and
remains in the hands of those cyber-criminals who target PII for its value to identity thieves.
9. As a result of the Data Breach, Plaintiff and approximately 20,000 Class Members, 1
suffered concrete injuries in fact including, but not limited to: (i) invasion of privacy; (ii) theft of
their PII; (iii) lost or diminished value of PII; (iv) lost time and opportunity costs associated with
attempting to mitigate the actual consequences of the Data Breach; (v) loss of benefit of the
bargain; (vi) lost opportunity costs associated with attempting to mitigate the actual consequences
of the Data Breach; (vii) actual misuse of the compromised data consisting of an increase in spam
calls, texts, and/or emails; (viii) Plaintiff experiencing fraud and misuse of her PII in the form of a
hard inquiry being placed on her credit report, in or about February 2025; (ix) nominal damages;
and (x) the continued and certainly increased risk to their PII, which: (a) remains unencrypted and
available for unauthorized third parties to access and abuse; and (b) remains backed up in
1                    https://www.maine.gov/agviewer/content/ag/985235c7-cb95-4be2-8792-
a1252b4f8318/93c8c3c5-1c8d-47bc-bf45-aefb701811f9.html
                                                   2
    Case 3:25-cv-00131-KHJ-MTP              Document 6        Filed 02/28/25      Page 3 of 57
10. The Data Breach was a direct result of Defendant’s failure to implement adequate
and reasonable cyber-security procedures and protocols necessary to protect consumers’ PII from
11. Moreover, upon information and belief, Defendant was targeted for a cyber-attack
due to its status as a utility company that collects and maintains highly valuable PII on its systems.
12. Defendant maintained, used, and shared the PII in a reckless manner. In particular,
the PII was used and transmitted by Defendant in a condition vulnerable to cyberattacks. Upon
information and belief, the mechanism of the cyberattack and potential for improper disclosure of
Plaintiff’s and Class Members’ PII was a known risk to Defendant, and thus, Defendant was on
notice that failing to take steps necessary to secure the PII from those risks left that property in a
dangerous condition.
13. Defendant disregarded the rights of Plaintiff and Class Members by, inter alia,
intentionally, willfully, recklessly, or negligently failing to take adequate and reasonable measures
to ensure its data systems were protected against unauthorized intrusions; failing to take standard
and reasonably available steps to prevent the Data Breach; and failing to provide Plaintiff and
14. Plaintiff’s and Class Members’ identities are now at risk because of Defendant’s
negligent conduct because the PII that Defendant collected and maintained has been accessed and
15. Armed with the PII accessed in the Data Breach, data thieves have already engaged
in identity theft and fraud and can in the future commit a variety of crimes including, e.g., opening
                                                  3
     Case 3:25-cv-00131-KHJ-MTP             Document 6        Filed 02/28/25      Page 4 of 57
new financial accounts in Class Members’ names, taking out loans in Class Members’ names,
using Class Members’ information to obtain government benefits, filing fraudulent tax returns
using Class Members’ information, obtaining driver’s licenses in Class Members’ names but with
another person’s photograph, and giving false information to police during an arrest.
16. As a result of the Data Breach, Plaintiff and Class Members have been exposed to
a heightened and imminent risk of fraud and identity theft. Plaintiff and Class Members must now
and in the future closely monitor their financial accounts to guard against identity theft.
17. Plaintiff and Class Members may also incur out of pocket costs, e.g., for purchasing
credit monitoring services, credit freezes, credit reports, or other protective measures to deter and
18. Plaintiff brings this class action lawsuit on behalf all those similarly situated to
address Defendant’s inadequate safeguarding of Class Members’ PII that it collected and
maintained, and for failing to provide timely and adequate notice to Plaintiff and other Class
Members that their information had been subject to the unauthorized access by an unknown third
19. Through this Complaint, Plaintiff seeks to remedy these harms on behalf of herself
and all similarly situated individuals whose PII was accessed during the Data Breach.
20. Plaintiff and Class Members have a continuing interest in ensuring that their
information is and remains safe, and they should be entitled to injunctive and other equitable relief.
21. This Court has subject matter jurisdiction over this action under the Class Action
Fairness Act, 28 U.S.C. § 1332(d)(2). There are at least 100 putative Class Members, the
aggregated claims of the individual Class Members exceed the sum or value of $5,000,000
                                                  4
     Case 3:25-cv-00131-KHJ-MTP              Document 6        Filed 02/28/25      Page 5 of 57
exclusive of interest and costs, and members of the proposed Class are citizens of states different
from Defendant.2
22. This Court has jurisdiction over Defendant through its business operations in this
District, the specific nature of which occurs in this District. Defendant’s principal place of business
is in this District. Defendant intentionally avails itself of the markets within this District to render
Defendant’s principal place of business is located in this District and a substantial part of the events
FACTUAL ALLEGATIONS
Defendant's Business
24. Defendant is a rural electric power association serving parts of six counties in
Mississippi.
25. Plaintiff and Class Members are current and former customers at Defendant.
26. In the course of their relationship, customers, including Plaintiff and Class
Members, provided Defendant with at least the following: names, Social Security numbers, and
27. Upon information and belief, in the course of collecting PII from customers,
including Plaintiff, Defendant promised to provide confidentiality and adequate security for the
data it collected from customers through its applicable privacy policy and through other disclosures
2 According
            to the breach report submitted to the Office of the Maine Attorney General, 1 Maine
resident was impacted in the Data Breach. See
https://www.maine.gov/agviewer/content/ag/985235c7-cb95-4be2-8792-
a1252b4f8318/93c8c3c5-1c8d-47bc-bf45-aefb701811f9.html
                                                   5
     Case 3:25-cv-00131-KHJ-MTP            Document 6       Filed 02/28/25      Page 6 of 57
28. Indeed, Defendant provides on its website that: "[w]e are committed to ensuring
the security of your personal information. To prevent unauthorized access, maintain data accuracy,
and ensure the proper use of information, we have established and implemented appropriate
physical, electronic and managerial procedures to safeguard and secure the information we collect
online." 3
29. Plaintiff and the Class Members, as customers at Defendant, relied on these
promises and on this sophisticated business entity to keep their sensitive PII confidential and
securely maintained, to use this information for business purposes only, and to make only
their PII, especially when their Social Security numbers and other sensitive PII is involved.
30. On or about January 30, 2025, Defendant began sending Plaintiff and other Data
Breach victims an untitled letter (the "Notice Letter"), informing them that:
        What Happened: On or about August 26, 2024, we became aware of suspicious activity
        on our network. Upon discovery, we took immediate action to secure the network and
        engaged a team of third-party specialists to assist with determining the full nature and
        scope of the incident. A thorough investigation determined that an unauthorized actor
        accessed certain files on our network. We then conducted a thorough review of the
        potentially impacted data to determine the types of information contained therein and to
        whom the information related. On October 24, 2024, we completed our review and
        determined that a limited amount of personal information may have been accessed by an
        unauthorized party in connection with this incident. We then diligently worked to obtain
        address information for potentially affected individuals and completed this process on
        December 20, 2024.4
31. Omitted from the Notice Letter were the identity of the cybercriminals who
perpetrated this Data Breach, the date(s) of the Data Breach, the details of the root cause of the
3
 https://www.yazoovalley.com/index.php/about-us/
4      The     “Notice     Letter”.     A     sample     copy      is             available     at
https://www.maine.gov/agviewer/content/ag/985235c7-cb95-4be2-8792-
a1252b4f8318/93c8c3c5-1c8d-47bc-bf45-aefb701811f9.html
                                                 6
    Case 3:25-cv-00131-KHJ-MTP             Document 6        Filed 02/28/25       Page 7 of 57
Data Breach, the vulnerabilities exploited, and the remedial measures undertaken to ensure such a
breach Jones Youngs not occur again. To date, these omitted details have not been explained or
clarified to Plaintiff and Class Members, who retain a vested interest in ensuring that their PII
remains protected.
32. This “disclosure” amounts to no real disclosure at all, as it fails to inform, with any
degree of specificity, Plaintiff and Class Members of the Data Breach’s critical facts. Without
these details, Plaintiff’s and Class Members’ ability to mitigate the harms resulting from the Data
33. Despite Defendant’s intentional opacity about the root cause of this incident,
several facts may be gleaned from the Notice Letter, including: a) that this Data Breach was the
work of cybercriminals; b) that the cybercriminals first infiltrated Defendant’s networks and
systems, and downloaded data from the networks and systems (aka exfiltrated data, or in
layperson’s terms “stole” data; and c) that once inside Defendant’s networks and systems, the
cybercriminals targeted information including Plaintiff’s and Class Members’ Social Security
34. In the context of notice of data breach letters of this type, Defendant’s use of the
phrase “potentially accessed” is misleading lawyer language. Companies only send notice letters
because data breach notification laws require them to do so. And such letters are only sent to those
persons who Defendant itself has a reasonable belief that such personal information was accessed
sending a notice of data breach letter to Plaintiff and Class Members, it admits that Defendant
itself has a reasonable belief that Plaintiff’s and Class Members’ names, Social Security numbers,
                                                 7
    Case 3:25-cv-00131-KHJ-MTP             Document 6       Filed 02/28/25     Page 8 of 57
and other sensitive information was accessed or acquired by an unknown actor – aka
cybercriminals.
35. Moreover, in its Notice Letter, Defendant failed to specify whether it undertook
any efforts to contact the approximate 20,000 Class Members whose data was accessed and
acquired in the Data Breach to inquire whether any of the Class Members suffered misuse of their
data, whether Class Members should report their misuse to Defendant, and whether Defendant set
up any mechanism for Class Members to report any misuse of their data.
36. Defendant had obligations created by the FTC Act, contract, common law, and
industry standards to keep Plaintiff’s and Class Members’ PII confidential and to protect it from
37. Defendant did not use reasonable security procedures and practices appropriate to
the nature of the sensitive information they were maintaining for Plaintiff and Class Members,
causing the exposure of PII, such as encrypting the information or deleting it when it is no longer
needed.
38. The attacker accessed and acquired files containing unencrypted PII of Plaintiff and
Class Members. Plaintiff’s and Class Members’ PII was accessed and stolen in the Data Breach.
39. Plaintiff further believes that her PII and that of Class Members was subsequently
sold on the dark web following the Data Breach, as that is the modus operandi of cybercriminals
40. Defendant did not use reasonable security procedures and practices appropriate to
the nature of the sensitive information they were maintaining for Plaintiff and Class Members,
                                                8
    Case 3:25-cv-00131-KHJ-MTP               Document 6        Filed 02/28/25      Page 9 of 57
causing the exposure of PII, such as encrypting the information or deleting it when it is no longer
needed.
41. Defendant could have prevented this Data Breach by, among other things, properly
encrypting or otherwise protecting their equipment and computer files containing PII.
effective defense against ransomware and it is critical to take precautions for protection.” 5
43. To prevent and detect cyber-attacks and/or ransomware attacks, Defendant could
and should have implemented, as recommended by the United States Government, the following
measures:
       •     Implement an awareness and training program. Because end users are targets,
             employees and individuals should be aware of the threat of ransomware and how it is
             delivered.
       •     Enable strong spam filters to prevent phishing emails from reaching the end users and
             authenticate inbound email using technologies like Sender Policy Framework (SPF),
             Domain Message Authentication Reporting and Conformance (DMARC), and
             DomainKeys Identified Mail (DKIM) to prevent email spoofing.
       •     Scan all incoming and outgoing emails to detect threats and filter executable files from
             reaching end users.
       •     Manage the use of privileged accounts based on the principle of least privilege: no users
             should be assigned administrative access unless absolutely needed; and those with a
             need for administrator accounts should only use them when necessary.
                                                   9
      Case 3:25-cv-00131-KHJ-MTP                   Document 6       Filed 02/28/25      Page 10 of 57
          •       Disable macro scripts from office files transmitted via email. Consider using Office
                  Viewer software to open Microsoft Office files transmitted via email instead of full
                  office suite applications.
          •       Use application whitelisting, which only allows systems to execute programs known
                  and permitted by security policy.
          •       Categorize data based on organizational value and implement physical and logical
                  separation of networks and data for different organizational units.6
44. To prevent and detect cyber-attacks or ransomware attacks, Defendant could and
should have implemented, as recommended by the Microsoft Threat Protection Intelligence Team,
6
    Id. at 3-4.
                                                         10
    Case 3:25-cv-00131-KHJ-MTP                Document 6        Filed 02/28/25     Page 11 of 57
Harden infrastructure
45. Given that Defendant was storing the PII of its current and former customers,
Defendant could and should have implemented all of the above measures to prevent and detect
cyberattacks.
46. The occurrence of the Data Breach indicates that Defendant failed to adequately
implement one or more of the above measures to prevent cyberattacks, resulting in the Data Breach
and data thieves acquiring and accessing the PII of more than twenty thousand individuals,
47. Defendant acquires, collects, and stores a massive amount of PII on its current and
former customers.
7 See Human-operated ransomware attacks: A preventable disaster (Mar 5, 2020), available at:
https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-
preventable-disaster/
                                                    11
    Case 3:25-cv-00131-KHJ-MTP            Document 6       Filed 02/28/25      Page 12 of 57
customers and other personnel entrust it with highly sensitive personal information.
49. By obtaining, collecting, and using Plaintiff’s and Class Members’ PII, Defendant
assumed legal and equitable duties and knew or should have known that it was responsible for
50. Plaintiff and the Class Members have taken reasonable steps to maintain the
confidentiality of their PII and would not have entrusted it to Defendant absent a promise to
51. Upon information and belief, in the course of collecting PII from customers,
including Plaintiff, Defendant promised to provide confidentiality and adequate security for their
data through its applicable privacy policy and through other disclosures in compliance with
52. Plaintiff and the Class Members relied on Defendant to keep their PII confidential
and securely maintained, to use this information for business purposes only, and to make only
       Defendant Knew, Or Should Have Known, of the Risk Because Utility Companies In
       Possession Of PII Are Particularly Susceptible To Cyber Attacks
53. Defendant’s data security obligations were particularly important given the
substantial increase in cyber-attacks and/or data breaches targeting utility companies that collect
and store PII, like Defendant, preceding the date of the breach.
54. Data breaches, including those perpetrated against utility companies that store PII
55. In 2023, an all-time high for data compromises occurred, with 3,205 compromises
affecting 353,027,892 total victims. The estimated number of organizations impacted by data
                                                12
    Case 3:25-cv-00131-KHJ-MTP             Document 6        Filed 02/28/25      Page 13 of 57
compromises has increased by +2,600 percentage points since 2018, and the estimated number of
victims has increased by +1400 percentage points. The 2023 compromises represent a 78
percentage point increase over the previous year and a 72 percentage point hike from the previous
56. In light of recent high profile data breaches at other industry leading companies,
including National Public Data (2.9 billion records, August 2024), Ticketmaster Entertainment,
LLC (560 million records, May 2024), Change Healthcare Inc. (145 million records, February
2024), Dell Technologies, Inc. (49 million records, May 2024), and AT&T Inc. (73 million
records, April 2024), Defendant knew or should have known that the PII that they collected and
57. Indeed, cyber-attacks, such as the one experienced by Defendant, have become so
notorious that the Federal Bureau of Investigation (“FBI”) and U.S. Secret Service have issued a
warning to potential targets so they are aware of, and prepared for, a potential attack. As one report
explained, smaller entities that store PII are “attractive to ransomware criminals…because they
often have lesser IT defenses and a high incentive to regain access to their data quickly.” 8
their business,9 e.g., working remotely as a result of the Covid-19 pandemic, and the Internet of
Things (“IoT”), the danger posed by cybercriminals is magnified, thereby highlighting the need
8
        https://www.law360.com/consumerprotection/articles/1220974/fbi-secret-service-warn-of-
targeted-ransomware?nl_pk=3ed44a08-fcc2-4b6c-89f0-
aa0155a8bb51&utm_source=newsletter&utm_medium=email&utm_campaign=consumerprotect
ion
9https://www.federalreserve.gov/econres/notes/feds-notes/implications-of-cyber-risk-for-
financial-stability-20220512.html
10      https://www.picussecurity.com/key-threats-and-cyber-risks-facing-financial-services-and-
banking-firms-in-2022
                                                 13
    Case 3:25-cv-00131-KHJ-MTP            Document 6        Filed 02/28/25       Page 14 of 57
59. Defendant knew and understood unprotected or exposed PII in the custody of
insurance companies, like Defendant, is valuable and highly sought after by nefarious third parties
60. At all relevant times, Defendant knew, or reasonably should have known, of the
importance of safeguarding the PII of Plaintiff and Class Members and of the foreseeable
consequences that would occur if Defendant’s data security system was breached, including,
specifically, the significant costs that would be imposed on Plaintiff and Class Members as a result
of a breach.
61. Plaintiff and Class Members now face years of constant surveillance of their
financial and personal records, monitoring, and loss of rights. The Class is incurring and will
continue to incur such damages in addition to any fraudulent use of their PII.
62. The injuries to Plaintiff and Class Members were directly and proximately caused
by Defendant’s failure to implement or maintain adequate data security measures for the PII of
63. The ramifications of Defendant’s failure to keep secure the PII of Plaintiff and Class
Members are long lasting and severe. Once PII is stolen––particularly Social Security numbers––
fraudulent use of that information and damage to victims may continue for years.
64. As a utility company in custody of the PII of its customers, Defendant knew, or
should have known, the importance of safeguarding PII entrusted to it by Plaintiff and Class
Members, and of the foreseeable consequences if its data security systems were breached. This
includes the significant costs imposed on Plaintiff and Class Members as a result of a breach.
Defendant failed, however, to take adequate cybersecurity measures to prevent the Data Breach.
                                                14
     Case 3:25-cv-00131-KHJ-MTP             Document 6       Filed 02/28/25      Page 15 of 57
65. The Federal Trade Commission (“FTC”) defines identity theft as “a fraud
committed or attempted using the identifying information of another person without authority.” 11
The FTC describes “identifying information” as “any name or number that may be used, alone or
in conjunction with any other information, to identify a specific person,” including, among other
things, “[n]ame, Social Security number, date of birth, official State or government issued driver’s
66. The PII of individuals remains of high value to criminals, as evidenced by the prices
they will pay through the dark web. Numerous sources cite dark web pricing for stolen identity
credentials.13
67. For example, Personal Information can be sold at a price ranging from $40 to
$200.14 Criminals can also purchase access to entire company data breaches from $900 to $4,500.15
68. Of course, a stolen Social Security number – standing alone – can be used to wreak
untold havoc upon a victim’s personal and financial life. The popular person privacy and credit
monitoring service LifeLock by Norton notes “Five Malicious Ways a Thief Can Use Your Social
Security Number,” including 1) Financial Identity Theft that includes “false applications for loans,
credit cards or bank accounts in your name or withdraw money from your accounts, and which
can encompass credit card fraud, bank fraud, computer fraud, wire fraud, mail fraud and
11
   17 C.F.R. § 248.201 (2013).
12
   Id.
13 Your personal data is for sale on the dark web. Here’s how much it costs, Digital Trends, Oct.
browsing/in-the-dark/
                                                  15
     Case 3:25-cv-00131-KHJ-MTP              Document 6       Filed 02/28/25      Page 16 of 57
employment fraud; 2) Government Identity Theft, including tax refund fraud; 3) Criminal Identity
Theft, which involves using someone’s stolen Social Security number as a “get out of jail free
69. It is little wonder that courts have dubbed a stolen Social Security number as the
“gold standard” for identity theft and fraud. Social Security numbers are among the worst kind of
PII to have stolen because they may be put to a variety of fraudulent uses and are difficult for an
individual to change.
70. According to the Social Security Administration, each time an individual’s Social
Security number is compromised, “the potential for a thief to illegitimately gain access to bank
accounts, credit cards, driving records, tax and employment histories and other private information
increases.” 16 Moreover, “[b]ecause many organizations still use SSNs as the primary identifier,
71. The Social Security Administration stresses that the loss of an individual’s Social
Security number, as experienced by Plaintiff and some Class Members, can lead to identity theft
       A dishonest person who has your Social Security number can use it to get other
       personal information about you. Identity thieves can use your number and your
       good credit to apply for more credit in your name. Then, they use the credit cards
       and don’t pay the bills, it damages your credit. You may not find out that someone
       is using your number until you’re turned down for credit, or you begin to get calls
       from unknown creditors demanding payment for items you never bought. Someone
       illegally using your Social Security number and assuming your identity can cause
       a lot of problems. 18
16
   See
https://www.ssa.gov/phila/ProtectingSSNs.htm#:~:text=An%20organization's%20collection%20
and%20use,and%20other%20private%20information%20increases.
17 Id.
18 Social Security Administration, Identity Theft and Your Social Security Number, available at:
https://www.ssa.gov/pubs/EN-05-10064.pdf
                                                    16
     Case 3:25-cv-00131-KHJ-MTP            Document 6        Filed 02/28/25     Page 17 of 57
72. In fact, “[a] stolen Social Security number is one of the leading causes of identity
theft and can threaten your financial health.” 19 “Someone who has your SSN can use it to
impersonate you, obtain credit and open bank accounts, apply for jobs, steal your tax refunds, get
73. What’s more, it is no easy task to change or cancel a stolen Social Security number.
An individual cannot obtain a new Social Security number without significant paperwork and
evidence of actual misuse. In other words, preventive action to defend against the possibility of
misuse of a Social Security number is not permitted; an individual must show evidence of actual,
74. Even then, a new Social Security number may not be effective. According to Julie
Ferguson of the Identity Theft Resource Center, “[t]he credit bureaus and banks are able to link
the new number very quickly to the old number, so all of that old bad information is quickly
75. For these reasons, some courts have referred to Social Security numbers as the
“gold standard” for identity theft. Portier v. NEO Tech. Sols., No. 3:17-CV-30111, 2019 WL
7946103, at *12 (D. Mass. Dec. 31, 2019) (“Because Social Security numbers are the gold standard
for identity theft, their theft is significant . . . . Access to Social Security numbers causes long-
lasting jeopardy because the Social Security Administration Jones Youngs not normally replace
Social Security numbers.”), report and recommendation adopted, No. 3:17-CV-30111, 2020 WL
19
   See https://www.equifax.com/personal/education/identity-theft/articles/-/learn/social-security-
number-identity-theft/
20 See https://www.investopedia.com/terms/s/ssn.asp
21 Bryan Naylor, Victims of Social Security Number Theft Find It’s Hard to Bounce Back, NPR
                                                 17
      Case 3:25-cv-00131-KHJ-MTP             Document 6        Filed 02/28/25    Page 18 of 57
877035 (D. Mass. Jan. 30, 2020); see also McFarlane v. Altice USA, Inc., 2021 WL 860584, at *4
(citations omitted) (S.D.N.Y. Mar. 8, 2021) (the court noted that Plaintiff’s Social Security
numbers are: arguably “the most dangerous type of personal information in the hands of identity
thieves” because it is immutable and can be used to “impersonat[e] [the victim] to get medical
services, government benefits, ... tax refunds, [and] employment.” . . . Unlike a credit card number,
which can be changed to eliminate the risk of harm following a data breach, “[a] social security
number derives its value in that it is immutable,” and when it is stolen it can “forever be wielded
to identify [the victim] and target her in fraudulent schemes and identity theft attacks.”)
76. Similarly, the California state government warns consumers that: “[o]riginally,
your Social Security number (SSN) was a way for the government to track your earnings and pay
you retirement benefits. But over the years, it has become much more than that. It is the key to a
lot of your personal information. With your name and SSN, an identity thief could open new credit
77. Based on the foregoing, the information compromised in the Data Breach is
significantly more valuable than the loss of, for example, credit card information in a retailer data
breach because, there, victims can cancel or close credit and debit card accounts. The information
compromised in this Data Breach is impossible to “close” and difficult, if not impossible, to
78. This data demands a much higher price on the black market. Martin Walter, senior
22
     See https://oag.ca.gov/idtheft/facts/your-ssn
                                                     18
     Case 3:25-cv-00131-KHJ-MTP           Document 6       Filed 02/28/25        Page 19 of 57
personally identifiable information and Social Security numbers are worth more than 10x on the
black market.” 23
79. Among other forms of fraud, identity thieves may obtain driver’s licenses,
government benefits, medical services, and housing or even give false information to police.
80. The fraudulent activity resulting from the Data Breach may not come to light for
years. There may be a time lag between when harm occurs versus when it is discovered, and also
between when PII is stolen and when it is used. According to the U.S. Government Accountability
       [L]aw enforcement officials told us that in some cases, stolen data may be held for
       up to a year or more before being used to commit identity theft. Further, once stolen
       data have been sold or posted on the Web, fraudulent use of that information may
       continue for years. As a result, studies that attempt to measure the harm resulting
       from data breaches cannot necessarily rule out all future harm.24
81. Plaintiff and Class Members now face years of constant surveillance of their
financial and personal records, monitoring, and loss of rights. The Class is incurring and will
continue to incur such damages in addition to any fraudulent use of their PII.
82. The Federal Trade Commission (“FTC”) has promulgated numerous guides for
businesses which highlight the importance of implementing reasonable data security practices.
According to the FTC, the need for data security should be factored into all business decision-
making.
23
   Tim Greene, Anthem Hack: Personal Data Stolen Sells for 10x Price of Stolen Credit Card
Numbers,          IT        World,       (Feb.    6,       2015),       available         at:
https://www.networkworld.com/article/2880366/anthem-hack-personal-data-stolen-sells-for-10x-
price-of-stolen-credit-card-numbers.html
24 Report to Congressional Requesters, GAO, at 29 (June 2007), available at:
https://www.gao.gov/assets/gao-07-737.pdf
                                                19
     Case 3:25-cv-00131-KHJ-MTP            Document 6       Filed 02/28/25      Page 20 of 57
83. In 2016, the FTC updated its publication, Protecting Personal Information: A Guide
for Business, which established cyber-security guidelines for businesses. These guidelines note
that businesses should protect the personal consumer information that they keep; properly dispose
networks; understand their network’s vulnerabilities; and implement policies to correct any
security problems.25
84. The guidelines also recommend that businesses use an intrusion detection system
to expose a breach as soon as it occurs; monitor all incoming traffic for activity indicating someone
is attempting to hack the system; watch for large amounts of data being transmitted from the
85. The FTC further recommends that companies not maintain PII longer than is
needed for authorization of a transaction; limit access to sensitive data; require complex passwords
to be used on networks; use industry-tested methods for security; monitor for suspicious activity
on the network; and verify that third-party service providers have implemented reasonable security
measures.
86. The FTC has brought enforcement actions against businesses for failing to
adequately and reasonably protect consumer data, treating the failure to employ reasonable and
unfair act or practice prohibited by Section 5 of the Federal Trade Commission Act (“FTCA”), 15
U.S.C. § 45. Orders resulting from these actions further clarify the measures businesses must take
25
   Protecting Personal Information: A Guide for Business, Federal Trade Commission (2016).
Available at https://www.ftc.gov/system/files/documents/plain-language/pdf-0136_proteting-
personal-information.pdf
26 Id.
                                                 20
      Case 3:25-cv-00131-KHJ-MTP           Document 6       Filed 02/28/25      Page 21 of 57
87. These FTC enforcement actions include actions against utility companies, like
Defendant.
88. Section 5 of the FTC Act, 15 U.S.C. § 45, prohibits “unfair . . . practices in or
affecting commerce,” including, as interpreted and enforced by the FTC, the unfair act or practice
by businesses, such as Defendant, of failing to use reasonable measures to protect PII. The FTC
publications and orders described above also form part of the basis of Defendant's duty in this
regard.
against unauthorized access to the PII of its customers or to comply with applicable industry
standards constitutes an unfair act or practice prohibited by Section 5 of the FTC Act, 15 U.S.C. §
45.
91. Upon information and belief, Defendant was at all times fully aware of its
obligation to protect the PII of its customers, Defendant was also aware of the significant
repercussions that would result from its failure to do so. Accordingly, Defendant's conduct was
particularly unreasonable given the nature and amount of PII it obtained and stored and the
foreseeable consequences of the immense damages that would result to Plaintiff and the Class.
92. As noted above, experts studying cyber security routinely identify utility companies
in possession of PII as being particularly vulnerable to cyberattacks because of the value of the PII
93. Several best practices have been identified that, at a minimum, should be
implemented by utility companies in possession of PII, like Defendant, including but not limited
                                                 21
    Case 3:25-cv-00131-KHJ-MTP              Document 6        Filed 02/28/25      Page 22 of 57
to: educating all employees; strong passwords; multi-layer security, including firewalls, anti-virus,
and anti-malware software; encryption, making data unreadable without a key; multi-factor
authentication; backup data and limiting which employees can access sensitive data. Defendant
failed to follow these industry best practices, including a failure to implement multi-factor
authentication.
94. Other best cybersecurity practices that are standard for utility companies include
installing appropriate malware detection software; monitoring and limiting the network ports;
protecting web browsers and email management systems; setting up network systems such as
firewalls, switches and routers; monitoring and protection of physical security systems; protection
against any possible communication system; training staff regarding critical points. Defendant
failed to follow these cybersecurity best practices, including failure to train staff.
95. Defendant failed to meet the minimum standards of any of the following
frameworks: the NIST Cybersecurity Framework Version 2.0 (including without limitation
DE.CM-09, and RS.CO-04), and the Center for Internet Security’s Critical Security Controls (CIS
96. These foregoing frameworks are existing and applicable industry standards for
utility companies, and upon information and belief, Defendant failed to comply with at least one–
–or all––of these accepted standards, thereby opening the door to the threat actor and causing the
Data Breach.
                                                  22
    Case 3:25-cv-00131-KHJ-MTP               Document 6        Filed 02/28/25       Page 23 of 57
97. As a result of Defendant's ineffective and inadequate data security practices, the
Data Breach, and the foreseeable consequences of PII ending up in the possession of criminals,
the risk of identity theft to the Plaintiff and Class Members has materialized and is imminent, and
Plaintiff and Class Members have all sustained actual injuries and damages, including: (i) invasion
of privacy; (ii) theft of their PII; (iii) lost or diminished value of PII; (iv) lost time and opportunity
costs associated with attempting to mitigate the actual consequences of the Data Breach; (v) loss
of benefit of the bargain; (vi) lost opportunity costs associated with attempting to mitigate the
actual consequences of the Data Breach; (vii) nominal damages; and (viii) the continued and
certainly increased risk to their PII, which: (a) remains unencrypted and available for unauthorized
third parties to access and abuse; and (b) remains backed up in Defendant’s possession and is
subject to further unauthorized disclosures so long as Defendant fails to undertake appropriate and
98. The unencrypted PII of Class Members will end up for sale on the dark web as that
99. Unencrypted PII may also fall into the hands of companies that will use the detailed
PII for targeted marketing without the approval of Plaintiff and Class Members. Simply put,
unauthorized individuals can easily access the PII of Plaintiff and Class Members.
100. The link between a data breach and the risk of identity theft is simple and well
established. Criminals acquire and steal PII to monetize the information. Criminals monetize the
data by selling the stolen information on the black market to other criminals who then utilize the
                                                   23
     Case 3:25-cv-00131-KHJ-MTP             Document 6      Filed 02/28/25      Page 24 of 57
101. Plaintiff’s and Class Members’ PII is of great value to hackers and cyber criminals,
and the data stolen in the Data Breach has been used and will continue to be used in a variety of
sordid ways for criminals to exploit Plaintiff and Class Members and to profit off their misfortune.
102. Due to the risk of one’s Social Security number being exposed, state legislatures
have passed laws in recognition of the risk: “[t]he social security number can be used as a tool to
perpetuate fraud against a person and to acquire sensitive personal, financial, medical, and familial
information, the release of which could cause great financial or personal harm to an individual.
While the social security number was intended to be used solely for the administration of the
federal Social Security System, over time this unique numeric identifier has been used extensively
103. Moreover, “SSNs have been central to the American identity infrastructure for
years, being used as a key identifier[.] . . . U.S. banking processes have also had SSNs baked into
their identification process for years. In fact, SSNs have been the gold standard for identifying and
104. “Despite the risk of fraud associated with the theft of Social Security numbers, just
five of the nation’s largest 25 banks have stopped using the numbers to verify a customer’s identity
after the initial account setup[.]” 29 Accordingly, since Social Security numbers are frequently used
27
   See N.C. Gen. Stat. § 132-1.10(1).
28
   See https://www.americanbanker.com/opinion/banks-need-to-stop-relying-on-social-security-
numbers
29 See https://archive.nytimes.com/bucks.blogs.nytimes.com/2013/03/20/just-5-banks-prohibit-
use-of-social-security-numbers/
                                                 24
     Case 3:25-cv-00131-KHJ-MTP            Document 6        Filed 02/28/25      Page 25 of 57
“[h]aving access to your Social Security number may be enough to help a thief steal money from
105. One such example of criminals piecing together bits and pieces of compromised
106. With “Fullz” packages, cyber-criminals can cross-reference two sources of PII to
marry unregulated data available elsewhere to criminally stolen data with an astonishingly
complete scope and degree of accuracy in order to assemble complete dossiers on individuals.
107. The development of “Fullz” packages means here that the stolen PII from the Data
Breach can easily be used to link and identify it to Plaintiff’s and Class Members’ phone numbers,
email addresses, and other unregulated sources and identifiers. In other words, even if certain
information such as emails, phone numbers, or credit card numbers may not be included in the PII
that was exfiltrated in the Data Breach, criminals may still easily create a Fullz package and sell it
at a higher price to unscrupulous operators and criminals (such as illegal and scam telemarketers)
30
   See https://www.credit.com/blog/5-things-an-identity-thief-can-do-with-your-social-security-
number-108597/
31 “Fullz” is fraudster speak for data that includes the information of the victim, including, but not
limited to, the name, address, credit card information, social security number, date of birth, and
more. As a rule of thumb, the more information you have on a victim, the more money that can be
made off of those credentials. Fullz are usually pricier than standard credit card credentials,
commanding up to $100 per record (or more) on the dark web. Fullz can be cashed out (turning
credentials into money) in various ways, including performing bank transactions over the phone
with the required authentication details in-hand. Even “dead Fullz,” which are Fullz credentials
associated with credit cards that are no longer valid, can still be used for numerous purposes,
including tax refund scams, ordering credit cards on behalf of the victim, or opening a “mule
account” (an account that will accept a fraudulent money transfer from a compromised account)
without the victim’s knowledge. See, e.g., Brian Krebs, Medical Records for Sale in Underground
Stolen From Texas Life Insurance Firm, Krebs on Security (Sep. 18, 2014),
https://krebsonsecuritv.eom/2014/09/medical-records-for-sale-in-underground-stolen-from-texas-
life-insurance-](https://krebsonsecuritv.eom/2014/09/medical-records-for-sale-in-underground-
stolen-from-texas-life-insurance-finn/
                                                 25
      Case 3:25-cv-00131-KHJ-MTP            Document 6       Filed 02/28/25      Page 26 of 57
108. The existence and prevalence of “Fullz” packages means that the PII stolen from
the data breach can easily be linked to the unregulated data (like contact information) of Plaintiff
109. Thus, even if certain information (such as contact information) was not stolen in
the data breach, criminals can still easily create a comprehensive “Fullz” package.
110. Then, this comprehensive dossier can be sold—and then resold in perpetuity—to
crooked operators and other criminals (like illegal and scam telemarketers).
111. As a result of the recognized risk of identity theft, when a Data Breach occurs, and
an individual is notified by a company that their PII was compromised, as in this Data Breach, the
reasonable person is expected to take steps and spend time to address the dangerous situation, learn
about the breach, and otherwise mitigate the risk of becoming a victim of identity theft of fraud.
Failure to spend time taking steps to review accounts or credit reports could expose the individual
to greater financial harm – yet, the resource and asset of time has been lost.
112. Thus, due to the actual and imminent risk of identity theft, Defendant, in its Notice
Letter instructs Plaintiff and Class Members to take the following measures to protect themselves:
“remain vigilant against incidents of identity theft and fraud by reviewing your credit
113. In addition, Defendant’s Notice letter includes multiple pages that recommend
Plaintiff and Class Members to partake in activities such as enrolling in the credit monitoring
services offered by Defendant, placing security freezes and fraud alerts on their accounts, and
32   Notice Letter.
33
     Id.
                                                  26
     Case 3:25-cv-00131-KHJ-MTP             Document 6        Filed 02/28/25      Page 27 of 57
114. Defendant’s extensive suggestion of steps that Plaintiff and Class Members must
take in order to protect themselves from identity theft and/or fraud demonstrates the significant
time that Plaintiff and Class Members must undertake in response to the Data Breach. Plaintiff’s
and Class Members’ time is highly valuable and irreplaceable, and accordingly, Plaintiff and Class
Members suffered actual injury and damages in the form of lost time that they spent on mitigation
activities in response to the Data Breach and at the direction of Defendant’s Notice Letter.
115. Plaintiff and Class Members have spent, and will spend additional time in the
future, on a variety of prudent actions, such as researching and verifying the legitimacy of the Data
Breach. Accordingly, the Data Breach has caused Plaintiff and Class Members to suffer actual
116. Plaintiff’s mitigation efforts are consistent with the U.S. Government
Accountability Office that released a report in 2007 regarding data breaches (“GAO Report”) in
which it noted that victims of identity theft will face “substantial costs and time to repair the
117. Plaintiff’s mitigation efforts are also consistent with the steps that FTC
recommends that data breach victims take several steps to protect their personal and financial
information after a data breach, including: contacting one of the credit bureaus to place a fraud
alert (consider an extended fraud alert that lasts for seven years if someone steals their identity),
reviewing their credit reports, contacting companies to remove fraudulent charges from their
accounts, placing a credit freeze on their credit, and correcting their credit reports.35
34
   See United States Government Accountability Office, GAO-07-737, Personal Information: Data
Breaches Are Frequent, but Evidence of Resulting Identity Theft Is Limited; However, the Full
Extent Is Unknown (June 2007), https://www.gao.gov/new.items/d07737.pdf.
35 See Federal Trade Commission, Identity Theft.gov, https://www.identitytheft.gov/Steps
                                                  27
     Case 3:25-cv-00131-KHJ-MTP            Document 6       Filed 02/28/25     Page 28 of 57
118. And for those Class Members who experience actual identity theft and fraud, the
United States Government Accountability Office released a report in 2007 regarding data breaches
(“GAO Report”) in which it noted that victims of identity theft will face “substantial costs and
time to repair the damage to their good name and credit record.”[4]
119. PII is a valuable property right.36 Its value is axiomatic, considering the value of
Big Data in corporate America and the consequences of cyber thefts include heavy prison
sentences. Even this obvious risk to reward analysis illustrates beyond doubt that PII has
120. Sensitive PII can sell for as much as $363 per record according to the Infosec
Institute. 37
121. An active and robust legitimate marketplace for PII also exists. In 2019, the data
122. In fact, the data marketplace is so sophisticated that consumers can actually sell
their non-public information directly to a data broker who in turn aggregates the information and
36
    See “Data Breaches Are Frequent, but Evidence of Resulting Identity Theft Is Limited;
However, the Full Extent Is Unknown,” p. 2, U.S. Government Accountability Office, June 2007,
https://www.gao.gov/new.items/d07737.pdf (“GAO Report”).
37 See, e.g., Milisa T. Soma, et al, Corporate Privacy Trend: The “Value” of Personally Identifiable
Information (“PII”) Equals the “Value" of Financial Assets, 15 Rich. J.L. & Tech. 11, at *3-4
(2009) (“PII, which companies obtain at little cost, has quantifiable value that is rapidly reaching
a level comparable to the value of traditional financial assets.”) (citations omitted).
38 See Ashiq Ja, Hackers Selling Healthcare Data in the Black Market, InfoSec (July 27, 2015),
https://resources.infosecinstitute.com/topic/hackers-selling-healthcare-data-in-the-black-market/
39 https://www.latimes.com/business/story/2019-11-05/column-data-brokers
40 https://datacoup.com/
                                                   28
      Case 3:25-cv-00131-KHJ-MTP           Document 6       Filed 02/28/25       Page 29 of 57
123. Consumers who agree to provide their web browsing history to the Nielsen
124. As a result of the Data Breach, Plaintiff’s and Class Members’ PII, which has an
inherent market value in both legitimate and dark markets, has been damaged and diminished by
its compromise and unauthorized release. However, this transfer of value occurred without any
consideration paid to Plaintiff or Class Members for their property, resulting in an economic loss.
Moreover, the PII is now readily available, and the rarity of the Data has been lost, thereby causing
125. At all relevant times, Defendant knew, or reasonably should have known, of the
importance of safeguarding the PII of Plaintiff and Class Members, and of the foreseeable
consequences that would occur if Defendant's data security system was breached, including,
specifically, the significant costs that would be imposed on Plaintiff and Class Members as a result
of a breach.
126. The fraudulent activity resulting from the Data Breach may not come to light for
years.
127. Plaintiff and Class Members now face years of constant surveillance of their
financial and personal records, monitoring, and loss of rights. The Class is incurring and will
continue to incur such damages in addition to any fraudulent use of their PII.
128. Defendant was, or should have been, fully aware of the unique type and the
significant volume of data on Defendant's network, amounting to more than twenty thousand
individuals’ detailed personal information and, thus, the significant number of individuals who
41
     https://digi.me/what-is-digime/
                                                 29
    Case 3:25-cv-00131-KHJ-MTP             Document 6        Filed 02/28/25      Page 30 of 57
129. The injuries to Plaintiff and Class Members were directly and proximately caused
by Defendant's failure to implement or maintain adequate data security measures for the PII of
Future Cost of Credit and Identity Theft Monitoring is Reasonable and Necessary
130. Given the type of targeted attack in this case, sophisticated criminal activity, and
the type of PII involved, there is a strong probability that entire batches of stolen information have
been placed, or will be placed, on the black market/dark web for sale and purchase by criminals
intending to utilize the PII for identity theft crimes –e.g., opening bank accounts in the victims’
names to make purchases or to launder money; file false tax returns; take out loans or lines of
131. Such fraud may go undetected until debt collection calls commence months, or even
years, later. An individual may not know that her or her PII was used to file for unemployment
benefits until law enforcement notifies the individual’s employer of the suspected fraud.
Fraudulent tax returns are typically discovered only when an individual’s authentic tax return is
rejected.
132. Consequently, Plaintiff and Class Members are at an increased risk of fraud and
133. The retail cost of credit monitoring and identity theft monitoring can cost around
$200 a year per Class Member. This is reasonable and necessary cost to monitor to protect Class
Members from the risk of identity theft that arose from Defendant's Data Breach.
134. Furthermore, Defendant’s poor data security practices deprived Plaintiff and Class
Members of the benefit of their bargain. When agreeing to pay Defendant and/or its agents for
                                                 30
      Case 3:25-cv-00131-KHJ-MTP             Document 6       Filed 02/28/25       Page 31 of 57
utility services, Plaintiff and other reasonable consumers understood and expected that they were,
in part, paying for the service and necessary data security to protect the PII, when in fact, Defendant
did not provide the expected data security. Accordingly, Plaintiff and Class Members received
services that were of a lesser value than what they reasonably expected to receive under the
135. Upon information and belief, Defendant obtained Plaintiff’s PII in the course of
136. Upon information and belief, at the time of the Data Breach, Defendant maintained
137. Plaintiff Jones Young is very careful about sharing her sensitive PII. Plaintiff stores
any documents containing her PII in a safe and secure location. Plaintiff has never knowingly
transmitted unencrypted sensitive PII over the internet or any other unsecured source. Plaintiff
would not have entrusted her PII to Defendant had she known of Defendant’s lax data security
policies.
138. Plaintiff Milisa Jones Young received the Notice Letter, by U.S. mail, directly from
Defendant, dated January 30, 2025. According to the Notice Letter, Plaintiff’s PII was improperly
accessed and obtained by unauthorized third parties, including her name and Social Security
number.
139. As a result of the Data Breach, and at the direction of Defendant’s Notice Letter,
which instructs Plaintiff to “remain vigilant against incidents of identity theft and fraud by
reviewing your credit reports/account statements for suspicious activity and to detect errors[,]” 42
42
     Notice Letter.
                                                   31
    Case 3:25-cv-00131-KHJ-MTP              Document 6        Filed 02/28/25       Page 32 of 57
Plaintiff made reasonable efforts to mitigate the impact of the Data Breach, including researching
and verifying the legitimacy of the Data Breach. Plaintiff has spent significant time dealing with
the Data Breach₋₋valuable time Plaintiff otherwise would have spent on other activities, including
but not limited to work and/or recreation. This time has been lost forever and cannot be recaptured.
140. Plaintiff suffered actual injury from having her PII compromised as a result of the
Data Breach including, but not limited to: (i) invasion of privacy; (ii) theft of her PII; (iii) lost or
diminished value of PII; (iv) lost time and opportunity costs associated with attempting to mitigate
the actual consequences of the Data Breach; (v) loss of benefit of the bargain; (vi) lost opportunity
costs associated with attempting to mitigate the actual consequences of the Data Breach; (vii)
nominal damages; and (viii) the continued and certainly increased risk to her PII, which: (a)
remains unencrypted and available for unauthorized third parties to access and abuse; and (b)
long as Defendant fails to undertake appropriate and adequate measures to protect the PII.
141. Plaintiff further suffered actual injury in the form of a hard inquiry being placed on
her credit report, in or about February 2025, which, upon information and belief, was caused by
142. Plaintiff additionally suffered actual injury in the form of experiencing an increase
in spam calls, texts, and/or emails, which, upon information and belief, was caused by the Data
Breach. This misuse of her PII was caused, upon information and belief, by the fact that
cybercriminals are able to easily use the information compromised in the Data Breach to find more
information about an individual, such as their phone number or email address, from publicly
available sources, including websites that aggregate and associate personal information with the
owner of such information. Criminals often target data breach victims with spam emails, calls, and
                                                  32
    Case 3:25-cv-00131-KHJ-MTP               Document 6      Filed 02/28/25      Page 33 of 57
texts to gain access to their devices with phishing attacks or elicit further personal information for
143. The Data Breach has caused Plaintiff to suffer fear, anxiety, and stress, which has
been compounded by the fact that Defendant has still not fully informed Plaintiff of key details
144. As a result of the Data Breach, Plaintiff anticipates spending considerable time and
money on an ongoing basis to try to mitigate and address harms caused by the Data Breach.
145. As a result of the Data Breach, Plaintiff is at a present risk and will continue to be
146. Plaintiff Milisa Jones Young has a continuing interest in ensuring that her PII,
which, upon information and belief, remains backed up in Defendant’s possession, is protected
CLASS ALLEGATIONS
147. Plaintiff brings this nationwide class action on behalf of herself and on behalf of all
others similarly situated, pursuant to Fed. R. Civ. P. 23(a), 23(b)(1), 23(b)(2), 23(b)(3), 23(c)(4)
and/or 23(c)(5).
       Nationwide Class
       All individuals residing in the United States whose PII was accessed and/or
       acquired by an unauthorized party as a result of the data breach reported by
       Defendant in January 2025 (the “Class”).
149. Excluded from the Class are the following individuals and/or entities: Defendant
and Defendant's parents, subsidiaries, affiliates, officers and directors, and any entity in which
Defendant have a controlling interest; all individuals who make a timely election to be excluded
                                                 33
     Case 3:25-cv-00131-KHJ-MTP           Document 6       Filed 02/28/25      Page 34 of 57
from this proceeding using the correct protocol for opting out; and all judges assigned to hear any
150. Plaintiff reserves the right to amend the definitions of the Class or add a Class or
Subclass if further information and discovery indicate that the definitions of the Class should be
151. Numerosity: The members of the Class are so numerous that joinder of all members
is impracticable, if not completely impossible. According to the breach report submitted to the
Office of the Maine Attorney General, at least 20,000 Class Members were impacted in the Data
Breach.43 The Class is apparently identifiable within Defendant's records, and Defendant has
already identified these individuals (as evidenced by sending them breach notification letters).
152. Common questions of law and fact exist as to all members of the Class and
predominate over any questions affecting solely individual members of the Class. Among the
questions of law and fact common to the Class that predominate over questions which may affect
a. Whether and to what extent Defendant had a duty to protect the PII of Plaintiff and
Class Members;
b. Whether Defendant had respective duties not to disclose the PII of Plaintiff and
c. Whether Defendant had respective duties not to use the PII of Plaintiff and Class
d. Whether Defendant failed to adequately safeguard the PII of Plaintiff and Class
Members;
43        See        https://www.maine.gov/agviewer/content/ag/985235c7-cb95-4be2-8792-
a1252b4f8318/93c8c3c5-1c8d-47bc-bf45-aefb701811f9.html
                                                34
    Case 3:25-cv-00131-KHJ-MTP           Document 6       Filed 02/28/25      Page 35 of 57
g. Whether Defendant violated the law by failing to promptly notify Plaintiff and
procedures and practices appropriate to the nature and scope of the information
j. Whether Plaintiff and Class Members are entitled to actual damages and/or nominal
k. Whether Plaintiff and Class Members are entitled to injunctive relief to redress the
imminent and currently ongoing harm faced as a result of the Data Breach.
153. Typicality: Plaintiff’s claims are typical of those of the other members of the Class
because Plaintiff, like every other Class Member, was exposed to virtually identical conduct and
now suffers from the same violations of the law as each other member of the Class.
154. Policies Generally Applicable to the Class: This class action is also appropriate for
certification because Defendant acted or refused to act on grounds generally applicable to the
Class, thereby requiring the Court’s imposition of uniform relief to ensure compatible standards
of conduct toward the Class Members and making final injunctive relief appropriate with respect
to the Class as a whole. Defendant's policies challenged herein apply to and affect Class Members
                                               35
    Case 3:25-cv-00131-KHJ-MTP             Document 6        Filed 02/28/25     Page 36 of 57
uniformly and Plaintiff’s challenges of these policies hinges on Defendant's conduct with respect
155. Adequacy: Plaintiff will fairly and adequately represent and protect the interests of
the Class Members in that she has no disabling conflicts of interest that would be antagonistic to
those of the other Class Members. Plaintiff seeks no relief that is antagonistic or adverse to the
Class Members and the infringement of the rights and the damages she has suffered are typical of
other Class Members. Plaintiff has retained counsel experienced in complex class action and data
156. Superiority and Manageability: The class litigation is an appropriate method for fair
and efficient adjudication of the claims involved. Class action treatment is superior to all other
available methods for the fair and efficient adjudication of the controversy alleged herein; it will
permit a large number of Class Members to prosecute their common claims in a single forum
simultaneously, efficiently, and without the unnecessary duplication of evidence, effort, and
expense that hundreds of individual actions would require. Class action treatment will permit the
adjudication of relatively modest claims by certain Class Members, who could not individually
afford to litigate a complex claim against large corporations, like Defendant. Further, even for
those Class Members who could afford to litigate such a claim, it would still be economically
157. The nature of this action and the nature of laws available to Plaintiff and Class
Members make the use of the class action device a particularly efficient and appropriate procedure
to afford relief to Plaintiff and Class Members for the wrongs alleged because Defendant would
necessarily gain an unconscionable advantage since they would be able to exploit and overwhelm
the limited resources of each individual Class Member with superior financial and legal resources;
                                                 36
    Case 3:25-cv-00131-KHJ-MTP                Document 6      Filed 02/28/25      Page 37 of 57
the costs of individual suits could unreasonably consume the amounts that would be recovered;
proof of a common course of conduct to which Plaintiff was exposed is representative of that
experienced by the Class and will establish the right of each Class Member to recover on the cause
of action alleged; and individual actions would create a risk of inconsistent results and would be
158. The litigation of the claims brought herein is manageable. Defendant's uniform
conduct, the consistent provisions of the relevant laws, and the ascertainable identities of Class
159. Adequate notice can be given to Class Members directly using information
160. Unless a Class-wide injunction is issued, Defendant may continue in its failure to
properly secure the PII of Class Members, Defendant may continue to refuse to provide proper
notification to Class Members regarding the Data Breach, and Defendant may continue to act
161. Further, Defendant has acted on grounds that apply generally to the Class as a
whole, so that class certification, injunctive relief, and corresponding declaratory relief are
162. Likewise, particular issues are appropriate for certification because such claims
present only particular, common issues, the resolution of which would advance the disposition of
this matter and the parties’ interests therein. Such particular issues include, but are not limited to:
a. Whether Defendant failed to timely notify the Plaintiff and the class of the Data
Breach;
                                                  37
    Case 3:25-cv-00131-KHJ-MTP             Document 6        Filed 02/28/25     Page 38 of 57
b. Whether Defendant owed a legal duty to Plaintiff and the Class to exercise due care
amounted to negligence;
recommended by data security experts would have reasonably prevented the Data
Breach.
CAUSES OF ACTION
                                           COUNT I
                                           Negligence
                              (On Behalf of Plaintiff and the Class)
163. Plaintiff re-alleges and incorporates by reference all of the allegations contained in
164. Defendant requires its customers, including Plaintiff and Class Members, to submit
165. Defendant gathered and stored the PII of Plaintiff and Class Members as part of its
business of soliciting its services to its customers, which solicitations and services affect
commerce.
166. Plaintiff and Class Members entrusted Defendant with their PII with the
                                                 38
    Case 3:25-cv-00131-KHJ-MTP            Document 6        Filed 02/28/25     Page 39 of 57
167. Defendant had full knowledge of the sensitivity of the PII and the types of harm
that Plaintiff and Class Members could and would suffer if the PII were wrongfully disclosed.
168. By voluntarily undertaking and assuming the responsibility to collect and store this
data, and in fact doing so, and sharing it and using it for commercial gain, Defendant had a duty
of care to use reasonable means to secure and safeguard their computer property—and Class
Members’ PII held within it—to prevent disclosure of the information, and to safeguard the
which they could detect a breach of its security systems in a reasonably expeditious period of time
and to give prompt notice to those affected in the case of a data breach.
169. Defendant had a duty to employ reasonable security measures under Section 5 of
the Federal Trade Commission Act, 15 U.S.C. § 45, which prohibits “unfair . . . practices in or
affecting commerce,” including, as interpreted and enforced by the FTC, the unfair practice of
170. Defendant owed a duty of care to Plaintiff and Class Members to provide data
security consistent with industry standards and other requirements discussed herein, and to ensure
171. Defendant's duty of care to use reasonable security measures arose as a result of the
special relationship that existed between Defendant and Plaintiff and Class Members. That special
relationship arose because Plaintiff and the Class entrusted Defendant with their confidential PII,
172. Defendant’s duty to use reasonable care in protecting confidential data arose not
only as a result of the statutes and regulations described above, but also because Defendant is
                                                39
    Case 3:25-cv-00131-KHJ-MTP              Document 6        Filed 02/28/25     Page 40 of 57
174. Defendant also had a duty to exercise appropriate clearinghouse practices to remove
175. Moreover, Defendant had a duty to promptly and adequately notify Plaintiff and
176. Defendant had and continues to have a duty to adequately disclose that the PII of
Plaintiff and the Class within Defendant’s possession might have been compromised, how it was
compromised, and precisely the types of data that were compromised and when. Such notice was
necessary to allow Plaintiff and the Class to take steps to prevent, mitigate, and repair any identity
177. Defendant breached its duties, pursuant to the FTC Act and other applicable
standards, and thus was negligent, by failing to use reasonable measures to protect Class Members’
PII. The specific negligent acts and omissions committed by Defendant include, but are not limited
d. Failing to detect in a timely manner that Class Members’ PII had been
compromised;
e. Failing to remove former customers’ PII it was no longer required to retain pursuant
to regulations, and
                                                  40
    Case 3:25-cv-00131-KHJ-MTP              Document 6       Filed 02/28/25      Page 41 of 57
f. Failing to timely and adequately notify Class Members about the Data Breach’s
occurrence and scope, so that they could take appropriate steps to mitigate the
178. Defendant violated Section 5 of the FTC Act by failing to use reasonable measures
to protect PII and not complying with applicable industry standards, as described in detail herein.
Defendant’s conduct was particularly unreasonable given the nature and amount of PII it obtained
and stored and the foreseeable consequences of the immense damages that would result to Plaintiff
179. Plaintiff and Class Members were within the class of persons the Federal Trade
Commission Act was intended to protect and the type of harm that resulted from the Data Breach
was the type of harm that the statute was intended to guard against.
181. The FTC has pursued enforcement actions against businesses, which, as a result of
their failure to employ reasonable data security measures and avoid unfair and deceptive practices,
caused the same harm as that suffered by Plaintiff and the Class.
182. A breach of security, unauthorized access, and resulting injury to Plaintiff and the
practices.
183. It was foreseeable that Defendant’s failure to use reasonable measures to protect
Class Members’ PII would result in injury to Class Members. Further, the breach of security was
reasonably foreseeable given the known high frequency of cyberattacks and data breaches in the
utility industry.
                                                  41
    Case 3:25-cv-00131-KHJ-MTP              Document 6     Filed 02/28/25      Page 42 of 57
184. Defendant has full knowledge of the sensitivity of the PII and the types of harm
that Plaintiff and the Class could and would suffer if the PII were wrongfully disclosed.
185. Plaintiff and the Class were the foreseeable and probable victims of any inadequate
security practices and procedures. Defendant knew or should have known of the inherent risks in
collecting and storing the PII of Plaintiff and the Class, the critical importance of providing
adequate security of that PII, and the necessity for encrypting PII stored on Defendant’s systems
186. It was therefore foreseeable that the failure to adequately safeguard Class Members’
187. Plaintiff and the Class had no ability to protect their PII that was in, and possibly
188. Defendant was in a position to protect against the harm suffered by Plaintiff and
189. Defendant’s duty extended to protecting Plaintiff and the Class from the risk of
foreseeable criminal conduct of third parties, which has been recognized in situations where the
actor’s own conduct or misconduct exposes another to the risk or defeats protections put in place
to guard against the risk, or where the parties are in a special relationship. See Restatement
(Second) of Torts § 302B. Numerous courts and legislatures have also recognized the existence of
190. Defendant has admitted that the PII of Plaintiff and the Class was wrongfully lost
191. But for Defendant’s wrongful and negligent breach of duties owed to Plaintiff and
the Class, the PII of Plaintiff and the Class would not have been compromised.
                                                42
    Case 3:25-cv-00131-KHJ-MTP              Document 6       Filed 02/28/25       Page 43 of 57
security measures to protect the PII of Plaintiff and the Class and the harm, or risk of imminent
harm, suffered by Plaintiff and the Class. The PII of Plaintiff and the Class was lost and accessed
as the proximate result of Defendant’s failure to exercise reasonable care in safeguarding such PII
193. As a direct and proximate result of Defendant’s negligence, Plaintiff and the Class
have suffered and will suffer injury, including but not limited to: (i) invasion of privacy; (ii) theft
of their PII; (iii) lost or diminished value of PII; (iv) lost time and opportunity costs associated
with attempting to mitigate the actual consequences of the Data Breach; (v) loss of benefit of the
bargain; (vi) lost opportunity costs associated with attempting to mitigate the actual consequences
of the Data Breach; (vii) actual misuse of the compromised data consisting of an increase in spam
calls, texts, and/or emails; (viii) Plaintiff experiencing fraud and misuse of her PII in the form of a
hard inquiry being placed on her credit report, in or about February 2025; (ix) nominal damages;
and (x) the continued and certainly increased risk to their PII, which: (a) remains unencrypted and
available for unauthorized third parties to access and abuse; and (b) remains backed up in
and the Class have suffered and will suffer the continued risks of exposure of their PII, which
Defendant fails to undertake appropriate and adequate measures to protect the PII in its continued
possession.
                                                  43
    Case 3:25-cv-00131-KHJ-MTP             Document 6       Filed 02/28/25      Page 44 of 57
195. Plaintiff and Class Members are entitled to compensatory and consequential
196. Plaintiff and Class Members are also entitled to injunctive relief requiring
Defendant to (i) strengthen its data security systems and monitoring procedures; (ii) submit to
future annual audits of those systems and monitoring procedures; and (iii) continue to provide
                                           COUNT II
                                       Negligence Per Se
                               (On Behalf of Plaintiff and the Class)
197. Plaintiff re-alleges and incorporates by reference all of the allegations contained in
198. Section 5 of the Federal Trade Commission Act, 15 U.S.C. § 45, prohibits “unfair
. . . practices in or affecting commerce” including, as interpreted and enforced by the FTC, the
unfair act or practice by companies, such as Defendant, of failing to use reasonable measures to
protect Private Information. Various FTC publications and orders also form the basis of
Defendant’s duty.
199. Defendant violated Section 5 of the FTC Act by failing to use reasonable measures
to protect PII and not complying with industry standards. Defendant’s conduct was particularly
unreasonable given the nature and amount of PII obtained and stored and the foreseeable
200. Defendant’s violation of Section 5 of the FTC Act constitutes negligence per se.
201. Class Members are consumers within the class of persons that Section 5 of the FTC
                                                 44
    Case 3:25-cv-00131-KHJ-MTP               Document 6        Filed 02/28/25       Page 45 of 57
202. Moreover, the harm that has occurred is the type of harm that the FTC Act intended
to guard against. Indeed, the FTC has pursued over fifty enforcement actions against businesses
which, as a result of their failure to employ reasonable data security measures and avoid unfair and
deceptive practices, caused the same harm suffered by Plaintiff and Class Members.
203. But for Defendant’s wrongful and negligent breach of duties owed to Plaintiff and
the Class, the PII of Plaintiff and the Class would not have been compromised.
security measures to protect the PII of Plaintiff and the Class and the harm, or risk of imminent
harm, suffered by Plaintiff and the Class. The PII of Plaintiff and the Class was lost and accessed
as the proximate result of Defendant’s failure to exercise reasonable care in safeguarding such PII
205. As a direct and proximate result of Defendant’s negligence per se, Plaintiff and the
Class have suffered and will suffer injury, including but not limited to: (i) invasion of privacy; (ii)
theft of their PII; (iii) lost or diminished value of PII; (iv) lost time and opportunity costs associated
with attempting to mitigate the actual consequences of the Data Breach; (v) loss of benefit of the
bargain; (vi) lost opportunity costs associated with attempting to mitigate the actual consequences
of the Data Breach; (vii) actual misuse of the compromised data consisting of an increase in spam
calls, texts, and/or emails; (viii) Plaintiff experiencing fraud and misuse of her PII in the form of a
hard inquiry being placed on her credit report, in or about February 2025; (ix) nominal damages;
and (x) the continued and certainly increased risk to their PII, which: (a) remains unencrypted and
available for unauthorized third parties to access and abuse; and (b) remains backed up in
                                                   45
    Case 3:25-cv-00131-KHJ-MTP              Document 6        Filed 02/28/25      Page 46 of 57
206. As a direct and proximate result of Defendant’s negligence per se, Plaintiff and the
Class have suffered and will continue to suffer other forms of injury and/or harm, including, but
not limited to, anxiety, emotional distress, loss of privacy, and other economic and non-economic
losses.
207. Additionally, as a direct and proximate result of Defendant’s negligence per se,
Plaintiff and the Class have suffered and will suffer the continued risks of exposure of their Private
disclosures so long as Defendant fails to undertake appropriate and adequate measures to protect
208. Plaintiff and Class Members are entitled to compensatory and consequential
209. Defendant’s negligent conduct is ongoing, in that it still holds the PII of Plaintiff
210. Plaintiff and Class Members are also entitled to injunctive relief requiring
Defendant to (i) strengthen its data security systems and monitoring procedures; (ii) submit to
future annual audits of those systems and monitoring procedures; and (iii) continue to provide
                                           COUNT III
                                   Breach Of Implied Contract
                               (On Behalf of Plaintiff and the Class)
211. Plaintiff re-alleges and incorporates by reference all of the allegations contained in
212. Plaintiff and Class Members were required deliver their PII to Defendant as part of
the process of obtaining utility services provided by Defendant. Plaintiff and Class Members paid
                                                  46
    Case 3:25-cv-00131-KHJ-MTP             Document 6        Filed 02/28/25      Page 47 of 57
money, or money was paid on their behalf, to Defendant in exchange for services and would not
have paid for Defendant’s services, or would have paid less for them, had they known that
213. Defendant solicited, offered, and invited Class Members to provide their PII as part
of Defendant’s regular business practices. Plaintiff and Class Members accepted Defendant’s
214. Defendant accepted possession of Plaintiff’s and Class Members’ PII for the
215. Plaintiff and the Class entrusted their PII to Defendant. In so doing, Plaintiff and
the Class entered into implied contracts with Defendant by which Defendant agreed to safeguard
and protect such information, to keep such information secure and confidential, and to timely and
accurately notify Plaintiff and the Class if their data had been breached and compromised or stolen.
216. In entering into such implied contracts, Plaintiff and Class Members reasonably
believed and expected that Defendant’s data security practices complied with relevant laws and
regulations (including FTC guidelines on data security) and were consistent with industry
standards.
217. Implicit in the agreement between Plaintiff and Class Members and the Defendant
to provide PII, was the latter’s obligation to: (a) use such PII for business purposes only, (b) take
reasonable steps to safeguard that PII, (c) prevent unauthorized disclosures of the PII, (d) provide
Plaintiff and Class Members with prompt and sufficient notice of any and all unauthorized access
and/or theft of their PII, (e) reasonably safeguard and protect the PII of Plaintiff and Class Members
from unauthorized disclosure or uses, (f) retain the PII only under conditions that kept such
                                                 47
    Case 3:25-cv-00131-KHJ-MTP              Document 6       Filed 02/28/25      Page 48 of 57
218. The mutual understanding and intent of Plaintiff and Class Members on the one
hand, and Defendant, on the other, is demonstrated by their conduct and course of dealing.
219. On information and belief, at all relevant times Defendant promulgated, adopted,
and implemented written privacy policies whereby it expressly promised Plaintiff and Class
Members that it would only disclose PII under certain circumstances, none of which relate to the
Data Breach.
220. On information and belief, Defendant further promised to comply with industry
standards and to make sure that Plaintiff’s and Class Members’ PII would remain protected.
221. Plaintiff and Class Members paid money to Defendant with the reasonable belief
and expectation that Defendant would use part of its earnings to obtain adequate data security.
222. Plaintiff and Class Members would not have entrusted their PII to Defendant in the
absence of the implied contract between them and Defendant to keep their information reasonably
secure.
223. Plaintiff and Class Members would not have entrusted their PII to Defendant in the
absence of their implied promise to monitor their computer systems and networks to ensure that it
224. Every contract in this State has an implied covenant of good faith and fair dealing,
which is an independent duty and may be breached even when there is no breach of a contract’s
225. Plaintiff and Class Members fully and adequately performed their obligations under
                                                  48
    Case 3:25-cv-00131-KHJ-MTP              Document 6       Filed 02/28/25       Page 49 of 57
226. Defendant breached the implied contracts it made with Plaintiff and the Class by
failing to safeguard and protect their personal information, by failing to delete the information of
Plaintiff and the Class once the relationship ended, and by failing to provide accurate notice to
them that personal information was compromised as a result of the Data Breach.
227. Defendant breached the implied covenant of good faith and fair dealing by failing
to maintain adequate computer systems and data security practices to safeguard PII, failing to
timely and accurately disclose the Data Breach to Plaintiff and Class Members and continued
acceptance of PII and storage of other personal information after Defendant knew, or should have
known, of the security vulnerabilities of the systems that were exploited in the Data Breach.
228. As a direct and proximate result of Defendant’s breach of the implied contracts,
Plaintiff and Class Members sustained damages, including, but not limited to: (i) invasion of
privacy; (ii) theft of their PII; (iii) lost or diminished value of PII; (iv) lost time and opportunity
costs associated with attempting to mitigate the actual consequences of the Data Breach; (v) loss
of benefit of the bargain; (vi) lost opportunity costs associated with attempting to mitigate the
actual consequences of the Data Breach; (vii) actual misuse of the compromised data consisting of
an increase in spam calls, texts, and/or emails; (viii) Plaintiff experiencing fraud and misuse of her
PII in the form of a hard inquiry being placed on her credit report, in or about February 2025; (ix)
nominal damages; and (x) the continued and certainly increased risk to their PII, which: (a) remains
unencrypted and available for unauthorized third parties to access and abuse; and (b) remains
Defendant fails to undertake appropriate and adequate measures to protect the PII.
229. Plaintiff and Class Members are entitled to compensatory, consequential, and
                                                  49
    Case 3:25-cv-00131-KHJ-MTP             Document 6        Filed 02/28/25      Page 50 of 57
230. Plaintiff and Class Members are also entitled to injunctive relief requiring
Defendant to, e.g., (i) strengthen its data security systems and monitoring procedures; (ii) submit
to future annual audits of those systems and monitoring procedures; and (iii) immediately provide
                                          COUNT IV
                                     Unjust Enrichment
                              (On Behalf of Plaintiff and the Class)
231. Plaintiff re-alleges and incorporates by reference all of the allegations contained in
232. Plaintiff brings this Count in the alternative to the breach of implied contract count
above.
Specifically, they paid Defendant and/or its agents for utility services and in so doing also provided
Defendant with their PII. In exchange, Plaintiff and Class Members should have received from
Defendant the services that were the subject of the transaction and should have had their PII
234. Defendant knew that Plaintiff and Class Members conferred a benefit upon it and
has accepted and retained that benefit by accepting and retaining the PII entrusted to it. Defendant
profited from Plaintiff’s retained data and used Plaintiff’s and Class Members’ PII for business
purposes.
235. Defendant failed to secure Plaintiff’s and Class Members’ PII and, therefore, did
not fully compensate Plaintiff or Class Members for the value that their PII provided.
236. Defendant acquired the PII through inequitable record retention as it failed to
investigate and/or disclose the inadequate data security practices previously alleged.
                                                 50
       Case 3:25-cv-00131-KHJ-MTP          Document 6        Filed 02/28/25      Page 51 of 57
237. If Plaintiff and Class Members had known that Defendant would not use adequate
data security practices, procedures, and protocols to adequately monitor, supervise, and secure
their PII, they would have entrusted their PII at Defendant or obtained services at Defendant.
239. Defendant enriched itself by saving the costs it reasonably should have expended
on data security measures to secure Plaintiff’s and Class Members’ Personal Information. Instead
of providing a reasonable level of security that would have prevented the hacking incident,
Defendant instead calculated to increase its own profit at the expense of Plaintiff and Class
Members by utilizing cheaper, ineffective security measures and diverting those funds to its own
profit. Plaintiff and Class Members, on the other hand, suffered as a direct and proximate result of
Defendant’s decision to prioritize its own profits over the requisite security and the safety of their
PII.
240. Under the circumstances, it would be unjust for Defendant to be permitted to retain
any of the benefits that Plaintiff and Class Members conferred upon it.
241. As a direct and proximate result of Defendant’s conduct, Plaintiff and Class
Members have suffered and will suffer injury, including but not limited to: (i) invasion of privacy;
(ii) theft of their PII; (iii) lost or diminished value of PII; (iv) lost time and opportunity costs
associated with attempting to mitigate the actual consequences of the Data Breach; (v) loss of
benefit of the bargain; (vi) lost opportunity costs associated with attempting to mitigate the actual
consequences of the Data Breach; (vii) actual misuse of the compromised data consisting of an
increase in spam calls, texts, and/or emails; (viii) Plaintiff experiencing fraud and misuse of her
PII in the form of a hard inquiry being placed on her credit report, in or about February 2025; (ix)
nominal damages; and (x) the continued and certainly increased risk to their PII, which: (a) remains
                                                 51
    Case 3:25-cv-00131-KHJ-MTP             Document 6        Filed 02/28/25      Page 52 of 57
unencrypted and available for unauthorized third parties to access and abuse; and (b) remains
Defendant fails to undertake appropriate and adequate measures to protect the PII.
242. Plaintiff and Class Members are entitled to full refunds, restitution, and/or damages
from Defendant and/or an order proportionally disgorging all profits, benefits, and other
compensation obtained by Defendant from its wrongful conduct. This can be accomplished by
establishing a constructive trust from which the Plaintiff and Class Members may seek restitution
or compensation.
243. Plaintiff and Class Members may not have an adequate remedy at law against
Defendant, and accordingly, they plead this claim for unjust enrichment in addition to, or in the
A. For an Order certifying the Class, and appointing Plaintiff and her Counsel to
B. For equitable relief enjoining Defendant from engaging in the wrongful conduct
C. For injunctive relief requested by Plaintiff, including but not limited to, injunctive
and other equitable relief as is necessary to protect the interests of Plaintiff and
                                                 52
Case 3:25-cv-00131-KHJ-MTP           Document 6       Filed 02/28/25       Page 53 of 57
described herein;
collected through the course of its business in accordance with all applicable
iii. requiring Defendant to delete, destroy, and purge the personal identifying
the Court reasonable justification for the retention and use of such information
when weighed against the privacy interests of Plaintiff and Class Members;
prevention, detection, and recovery from identity theft, tax fraud, and/or
unauthorized use of their PII for Plaintiff’s and Class Members’ respective
lifetimes;
vi. prohibiting Defendant from maintaining the PII of Plaintiff and Class
                                           53
Case 3:25-cv-00131-KHJ-MTP           Document 6        Filed 02/28/25      Page 54 of 57
ix. requiring Defendant to audit, test, and train its security personnel regarding
checks;
includes at least annual information security training for all employees, with
Members;
xiii. requiring Defendant to routinely and continually conduct internal training and
breach;
                                           54
Case 3:25-cv-00131-KHJ-MTP              Document 6          Filed 02/28/25     Page 55 of 57
Defendant’s information networks for threats, both internal and external, and
updated;
xvi. requiring Defendant to meaningfully educate all Class Members about the
threats that they face as a result of the loss of their confidential personal
xviii. for a period of 10 years, appointing a qualified and independent third party
provide such report to the Court and to counsel for the class, and to report any
E. For an award of attorneys’ fees, costs, and litigation expenses, as allowed by law;
G. Such other and further relief as this Court may deem just and proper.
                                              55
   Case 3:25-cv-00131-KHJ-MTP             Document 6       Filed 02/28/25   Page 56 of 57
Respectfully submitted,
                                                 56
    Case 3:25-cv-00131-KHJ-MTP              Document 6        Filed 02/28/25       Page 57 of 57
CERTIFICATE OF SERVICE
I hereby certify that First Amended Class Action Complaint was filed electronically on this
the 28th day of February, 2025. Notice of Electronic Case Filing has been sent automatically to all
parties listed in the Service List in effect on the date of electronic filing and is being sent to known
57