Los Angeles Data Breach & Privacy Litigation Lawyers

Helping victims of digital healthcare and consumer breaches pursue compensation

Our sensitive personal information is collected and electronically stored by businesses.  Medical providers, insurance companies, financial institutions, and businesses regularly store and access your sensitive personal information.  Federal and California law requires businesses to implement reasonable safeguards to protect sensitive information.  Data breaches occur when your sensitive personal information is illegally obtained by third parties, often cyber criminals.  Data breaches are often the result of businesses that did not properly secure your data by investing in cyber security.  Cyber criminals may use or sell your sensitive personal information to individuals committing identity theft.   When your sensitive personal  information is compromised by a data breach, the law requires that you receive notice of the data breach.

At McNicholas & McNicholas, we represent victims of data breaches.  Victims of data breaches face increased risk of identity theft and other harm.  Victims can recover damages when a data breach is caused because a business did not exercise reasonable care to protect their sensitive personal information.  Contact us to evaluate potential claims and remedies, including compensation where available under applicable state or federal law.

What are the different ways that healthcare and consumer data can be breached?

A data breach occurs when someone without authorization accesses and/or uses electronic information that should be confidential or protected. Breaches can happen through cyberattacks, system vulnerabilities, and insider theft.  A common cause is the failure of a business to invest and implement adequate cyber security.

Generally, the applicable health and consumer laws define who can access your information, what information must be kept private, when exceptions may apply, and how people with legal access to your information should protect that information.

Some of the causes of data breaches include:

  • Phishing attacks, where someone pretends to have authority to access your information when they don’t have that authority.
  • Malware attacks.
  • The illegal interception of information when it’s transmitted from one authorized source to another source.
  • The failure to implement reasonable safety protocols.

What are the consequences of data breaches to victims?

Improper access to your healthcare or consumer information can affect you in many ways.

Illegal access to your personal information may result in someone being able to access your financial records, healthcare records, governmental benefits, and many other types of valuable information that could be stolen, sold, or used for other improper means. Illegal access to your information could be used to damage your finances, reputation, job, and other aspects of your life.

What federal and California laws govern healthcare data and consumer data?

At McNicholas & McNicholas, LLP, we understand:

  • The laws protect your online information
  • The requirements and duty of care that businesses have to protect your sensitive personal information
  • What you can do when you learn of a breach
  • What compensation can you seek for any financial or personal damage you suffer

HIPAA

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) establishes national standards for protecting sensitive health information from improper disclosure.

The key parts of this law are:

The HIPAA Privacy Rule

This rule requires that covered entities protect your protected health information (PHI) from improper uses and disclosures, while allowing access to those who need your PHI to provide high-quality healthcare and protect the public.

Covered entities include healthcare providers who electronically transmit your PHI for insurance claims, referral authorization requests, inquiries about benefit eligibility, and other HHS-approved transactions. Additional covered entities include health plans, healthcare clearinghouses, and certain healthcare providers. HIPAA also applies to business associates that handle PHI for covered entities.

HIPAA permits certain uses and disclosures of PHI without patient authorization, including for treatment, payment, and healthcare operations, or when required by law.

The HIPAA Security Rule

The Security Rule protects your electronic protected health information (e-PHI). Written and oral PHI are governed by HIPAA’s Privacy Rule.

HIPAA’s Security Rule establishes administrative, physical, and technical safeguards for electronic PHI. Breach notification obligations are addressed by HIPAA’s Breach Notification Rule.

Damages for violations of HIPAA

Individuals who learn of a breach can file a complaint with HHS. HHS can then investigate the claim and seek to hold the responsible covered entity accountable. Accountability may include the payment of fines to HHS, but not to the patient.

HIPAA does not provide a private right of action, but its standards may inform state-law claims such as negligence or breach of contract. California’s Confidentiality of Medical Information Act (CMIA) provides statutory damages for certain negligent or improper disclosures of medical information, though courts have limited recovery in some cases based on the nature of the violation and whether it resulted in a serious invasion of privacy.

Consumer data protection laws

Many different laws protect electronic consumer information from misuse by the government, businesses, and organizations.

Consumer data may include:

  • Names and addresses
  • Driver’s license number
  • Social Security number
  • Credit card information
  • Tax records
  • Employment history
  • Passwords to accounts
  • Biometric data
  • Location and device data
  • Online behavior
  • User opinions and preferences (including religious and political views)

Some of the federal laws that protect consumer data, in addition to HIPAA, include:

  • The Federal Trade Commission Act. The FTC generally regulates unsafe business practices, which may include the improper collection and use of consumer information (such as identity theft).
  • The Privacy Act of 1974. This law governs the misuse of data by federal agencies.
  • The Children’s Online Privacy Protection Act (COPPA). COPPA requires that websites and online services obtain parental consent for the personal information of children under 13.
  • The Fair Credit Reporting Act. This law regulates credit reporting agencies and their duties to keep your credit information safe.
  • The Gramm-Leach-Bliley Act (GLBA). This law regulates financial institutions and requires that they explain how they collect and use your information.
  • Other laws, including:
    • The Computer Fraud and Abuse Act
    • The Family Educational Rights and Privacy Act (FERPA)

We can explain which laws, such as the Fair Credit Reporting Act, may provide individual remedies against the entities (such as credit reporting agencies) that control your private sensitive information.

The California Consumer Privacy Act (CCPA) and the California Privacy Rights Act

Your rights

The California Consumer Privacy Act of 2018 (CCPA) provides consumers with the following rights:

  • The right to know about the personal information a business collects about them, and how it is used and shared
  • The right to delete personal information collected from them (with some exceptions)
  • The right to opt out of the sale or sharing of their personal information, including via the GPC (Global Privacy Control)
  • The right to non-discrimination for exercising their CCPA rights

The California Privacy Rights Act (CPRA) adds the following rights:

  • The right to correct inaccurate personal information that a business has about them
  • The right to limit the use and disclosure of sensitive personal information collected about them

Consumers may have a limited right to file a legal claim under the CCPA or CPRA in connection with certain data breaches involving defined categories of personal information.

Damages for violations of the CCPA/CPRA

To bring a claim, the information must be subject to unauthorized access, exfiltration (unauthorized removal), theft, or disclosure

Your first name (or first initial) and last name in combination with any of the following:

  • Social Security number
  • Driver’s license number
  • Tax identification number
  • Passport number
  • Military ID number
  • Other government IDs
  • Financial account numbers
  • Credit or debit card number – and your password/security code/access code – to allow someone access to your account
  • Your medical or health insurance information
  • Unique biometric data used to identify you – generally not included photos unless used for facial recognition purposes

The private right of action may also apply if an email address (or username) combined with a password or security question/answer that permits account access is subject to unauthorized access, exfiltration, theft, or disclosure.

The improperly obtained information cannot be encrypted or redacted, and must be due to the failure of the business to provide reasonable security practices to protect the information.

You can seek either:

  • The actual damages
  • Statutory damages of between $100 and $750 per consumer per incident

Recoverable damages depend on the nature of the breach and judicial interpretation, and courts may limit recovery to economic harm in some cases. Recoverable damages may include:

  • The amount of any funds that are taken, such as bank accounts
  • Any other reasonably foreseeable damages
  • Loss of income if the breach affects your employment
  • The cost to restore any damage to your credit
  • Non-economic damages, such as emotional distress and any damage to your reputation, may depend on judicial interpretation
  • Other applicable damages, such as punitive damages, may apply if a defendant engaged in oppression, fraud, or malice under Civ. Code § 3294

In some cases, courts may limit recoverable damages to economic losses.

What safeguards should healthcare practices and corporations take to protect patient information from cybersecurity abuse?

HIPAA provides specific requirements in its Security Rule for protecting patient data. Other laws may provide specific requirements, too.

Generally, businesses of all types should consider reviewing the following to protect sensitive information:

  • Encryption of data
  • Access controls
  • Monitoring software
  • Data recovery plans
  • Routine security checks
  • Employee training
class action law firm

What claims can I file if my healthcare or personal electronic information is breached?

Where your sensitive personal information is disclosed because of a business’ negligence, you may have an action under state law where you can recover damages. Other laws, like HIPAA, primarily provide an administrative complaint process through HHS rather than a private damages lawsuit. HHS may require corrective action and impose civil penalties.

Do you have Los Angeles lawyers who handle data breach claims near me?

We litigate and represent victims of data breaches across the country.  Our trial lawyers are available to consult with victims by phone and through online video discussions.  Our Los Angeles office is located in Westwood at 10866 Wilshire Blvd., Suite 1400.  We also have offices in Orange County and Northern California.

We can review your case, explain your rights, and determine whether you may be able to seek compensation for the harm that you have suffered.

Contact our accomplished data breach and privacy lawyers today

At McNicholas & McNicholas, LLP, we can work with experts who demonstrate how data breaches occur and the financial and personal harm they can cause. Data breaches can affect your accounts, your job, and your reputation. Please get in touch with our Los Angeles data breach lawyers by using our online contact form to schedule a free consultation.

"*" indicates required fields

The use of the Internet or this form for communication with the firm or any individual member of the firm does not establish an attorney-client relationship. Confidential or time-sensitive information should not be sent through this form.