Melissa Alleruzzo v. SuperValu, Inc. ( 2017 )


Menu:
  •                 United States Court of Appeals
    For the Eighth Circuit
    ___________________________
    No. 16-2378
    ___________________________
    In re: SuperValu, Inc., Customer Data Security Breach Litigation
    ------------------------------
    Melissa Alleruzzo; Heidi Bell; Rifet Bosnjak; John Gross; Kenneth Hanff; David
    Holmes; Steve McPeak; Gary Mertz; Katherin Murray; Christopher Nelson; Carol
    Puckett; Alyssa Rocke; Timothy Roldan; Ivanka Soldan; Melissa Thompkins;
    Darla Young
    lllllllllllllllllllll Plaintiffs - Appellants
    v.
    SuperValu, Inc.; AB Acquisition, LLC; New Albertsons, Inc.
    lllllllllllllllllllll Defendants - Appellees
    ------------------------------
    Electronic Privacy Information Center
    lllllllllllllllllllllAmicus on Behalf of Appellant(s)
    ___________________________
    No. 16-2528
    ___________________________
    In re: SuperValu, Inc., Customer Data Security Breach Litigation
    ------------------------------
    Melissa Alleruzzo; Heidi Bell; Rifet Bosnjak; John Gross; Kenneth Hanff; David
    Holmes; Steve McPeak; Gary Mertz; Katherin Murray; Christopher Nelson; Carol
    Puckett; Alyssa Rocke; Timothy Roldan; Ivanka Soldan; Melissa Thompkins;
    Darla Young
    lllllllllllllllllllll Plaintiffs - Appellees
    v.
    SuperValu, Inc.; AB Acquisition, LLC; New Albertsons, Inc.
    lllllllllllllllllllll Defendants - Appellants
    ____________
    Appeals from United States District Court
    for the District of Minnesota - Minneapolis
    ____________
    Submitted: May 10, 2017
    Filed: August 30, 2017
    ____________
    Before SMITH, Chief Judge, COLLOTON and KELLY, Circuit Judges.
    ____________
    KELLY, Circuit Judge.
    In 2014, retail grocery stores owned and operated by defendants SuperValu,
    Inc., AB Acquisition, LLC, and New Albertsons, Inc. suffered two cyber attacks in
    which their customers’ financial information was allegedly accessed and stolen.
    Following the data breaches, customers who shopped at the affected stores brought
    several putative class actions, which were subsequently centralized in the United
    States District Court for the District of Minnesota by the Judicial Panel on
    Multidistrict Litigation. The district court dismissed the plaintiffs’ consolidated
    complaint under Federal Rule of Civil Procedure 12(b)(1), concluding that plaintiffs
    -2-
    failed to allege facts establishing Article III standing. Plaintiffs appealed, and we
    affirm in part, reverse in part, and remand for further proceedings.
    I. Background
    The following facts, which we accept as true, are drawn from the consolidated
    amended complaint and the appended exhibits. See Carlsen v. GameStop, Inc., 
    833 F.3d 903
    , 908 (8th Cir. 2016). Plaintiffs are sixteen customers who purchased goods
    from defendants’ grocery stores in Missouri, Illinois, Maryland, Pennsylvania,
    Delaware, Idaho, and New Jersey using credit or debit cards during the period
    between June and September 2014. From June 22, 2014, to July 17, 2014, cyber
    criminals accessed the computer network that processes payment card transactions
    for 1,045 of defendants’ stores. The hackers installed malicious software on
    defendants’ network that allowed them to gain access to the payment card information
    of defendants’ customers (hereinafter, Card Information), including their names,
    credit or debit card account numbers, expiration dates, card verification value (CVV)
    codes, and personal identification numbers (PINs). By harvesting the data on the
    network, the hackers stole customers’ Card Information.
    On August 14, 2014, defendants issued a press release notifying customers of
    the computer intrusion at their stores. The press release acknowledged that the attack
    “may have resulted in the theft” of Card Information, but it had not yet been
    determined that “any such cardholder data was in fact stolen,” and, at that point, there
    was “no evidence of any misuse of any such data.” Defendants also announced that
    they were conducting an on-going investigation into the incident, which might
    uncover additional “time frames, locations and/or at-risk data” exposed in the
    intrusion.
    On September 29, 2014, defendants announced a second data breach that took
    place in late August or early September 2014. The press release stated that an
    -3-
    intruder installed different malicious software onto the same network. Defendants
    acknowledged that the software may have captured Card Information from debit and
    credit cards used to purchase goods at their stores but, at the time of the press release,
    there had been no determination that such information “was in fact stolen.” Once
    again, defendants affirmed that their investigation was ongoing, and that further
    information on the scope of the intrusion could be identified in the future. Although
    defendants’ release states that the second intrusion was separate from the one
    announced on August 14, 2014, plaintiffs dispute this contention in their complaint,
    alleging that the two breaches were related and stemmed from the same security
    failures.
    According to the complaint, hackers gained access to defendants’ network
    because defendants failed to take adequate measures to protect customers’ Card
    Information. Defendants used default or easily guessed passwords, failed to lock out
    users after several failed login attempts, and did not segregate access to different parts
    of the network or use firewalls to protect Card Information. By not implementing
    these measures, defendants ran afoul of best practices and industry standards for
    merchants who accept customer payments via credit or debit card. Moreover,
    defendants were on notice of the risk of consumer data theft because similar security
    flaws had been exploited in recent data breaches targeting other national retailers.
    As a result of the breaches, plaintiffs’ Card Information was allegedly stolen,
    subjecting plaintiffs “to an imminent and real possibility of identity theft.”
    Specifically, plaintiffs contend that the hackers can use their Card Information to
    siphon money from their current accounts, make unauthorized credit or debit card
    charges, open new accounts, or sell the information to others who intend to commit
    fraud. Identity thieves can use the stolen Card Information to commit fraud for an
    “extended period of time after” the breach, and the information is often traded on the
    cyber black market “for a number of years after the initial theft.” In support of these
    allegations, plaintiffs cite a June 2007 United States Government Accountability
    -4-
    Office (GAO) report on data breaches. See U.S. Gov’t Accountability Off., GAO-07-
    737, Personal Information: Data Breaches are Frequent, but Evidence of Resulting
    Identity Theft is Limited; However, the Full Extent is Unknown (2007),
    http://www.gao.gov/assets/270/262899.pdf.
    Customers allegedly affected by the breaches filed putative class actions in
    several district courts. The Judicial Panel on Multidistrict Litigation transferred the
    related actions to the United States District Court for the District of Minnesota for
    coordinated or consolidated pretrial proceedings. Pursuant to the district court’s
    order, plaintiffs filed a consolidated amended complaint on June 26, 2015, with
    sixteen named plaintiffs bringing claims on behalf of a putative class of persons
    affected by defendants’ data breaches.
    Each of the sixteen plaintiffs shopped at defendants’ affected stores using a
    credit or debit card, and their Card Information was allegedly compromised in the
    data breaches. After the data breaches were announced, each plaintiff “spent time
    determining if [his or her] card was compromised” by reviewing information released
    about the breaches and the impacted locations and monitoring account information
    to guard against potential fraud. Crucial to the outcome in this appeal, one plaintiff,
    David Holmes, used his credit card at a store in Belleville, Illinois1 that was affected
    by the data breaches, and alleges his Card Information was compromised as a result
    of defendants’ security failures. Shortly after the data breach was announced,
    “Holmes noticed a fraudulent charge on his credit card statement and immediately
    cancelled his credit card, which took two weeks to replace.”
    1
    Although some of the other named plaintiffs allege the specific dates that they
    shopped, plaintiff Holmes does not include the date, but does identify the store name
    and location.
    -5-
    The complaint states six claims for relief for: (1) violations of state consumer
    protection statutes, (2) violations of state data breach notification statutes, (3)
    negligence, (4) breach of implied contract, (5) negligence per se, and (6) unjust
    enrichment. Defendants moved to dismiss the complaint under Federal Rules of Civil
    Procedure 12(b)(1) and 12(b)(6). The district court granted the Rule 12(b)(1) motion
    and dismissed the complaint without prejudice, finding that none of the plaintiffs had
    alleged an injury-in-fact and thus they did not have standing. The court did not
    address defendants’ arguments for dismissal under Rule 12(b)(6).2 Plaintiffs appeal
    the district court’s dismissal, and defendants cross-appeal, arguing that the complaint
    was alternatively subject to dismissal with prejudice under Rule 12(b)(6).
    II. Discussion
    Article III of the Constitution limits the jurisdiction of the federal courts to
    cases or controversies. Spokeo, Inc. v. Robins, 
    136 S. Ct. 1540
    , 1547 (2016). A
    plaintiff invoking the jurisdiction of the court must demonstrate standing to sue by
    showing that she has suffered an injury in fact that is fairly traceable to the
    defendant’s conduct and that is likely to be redressed by the relief she seeks. 
    Id.
     This
    case primarily concerns the injury in fact and fairly traceable elements. To establish
    an injury in fact, a plaintiff must show that her injury is “‘concrete and particularized’
    and ‘actual or imminent, not conjectural or hypothetical.’” 
    Id. at 1548
     (quoting Lujan
    v. Defs. of Wildlife, 
    504 U.S. 555
    , 560 (1992)). An injury is fairly traceable if the
    plaintiff shows “a causal connection between the injury and the conduct complained
    of” that is “not . . . th[e] result [of] the independent action of some third party not
    2
    After the entry of judgment, plaintiffs moved to alter or amend pursuant to
    Rule 59(e), attaching, for the first time, declarations from officers of financial
    institutions. Because plaintiffs did not appeal the district court’s denial of the Rule
    59(e) motion, we do not consider the arguments raised in the motion or the exhibits
    attached thereto. See Gannon Int’l, Ltd. v. Blocker, 
    684 F.3d 785
    , 793–94 (8th Cir.
    2012).
    -6-
    before the court.” Lujan, 
    504 U.S. at 560
     (alterations in original) (internal quotation
    omitted).
    Because this case is at the pleading stage, plaintiffs “must ‘clearly allege facts’
    demonstrating” the elements of standing. Spokeo, 
    136 S. Ct. at 1547
     (alteration
    omitted) (quoting Warth v. Seldin, 
    422 U.S. 490
    , 518 (1975)). Where, as here,
    defendants facially attacked plaintiffs’ standing, we review the district court’s
    dismissal for lack of standing de novo, accepting the material allegations in the
    complaint as true and drawing all inferences in plaintiffs’ favor. See Carlsen, 833
    F.3d at 908.
    The requirements for standing do not change in the class action context. See
    Spokeo, 
    136 S. Ct. at
    1547 n.6. A putative class action can proceed as long as one
    named plaintiff has standing. See Horne v. Flores, 
    557 U.S. 433
    , 446 (2009);
    Arlington Heights v. Metro. Hous. Dev. Corp., 
    429 U.S. 252
    , 264 & n.9 (1977).
    “Accordingly, at least one of the [sixteen] named Plaintiffs must have Article III
    standing in order to maintain this class action.” In re Horizon Healthcare Servs. Inc.
    Data Breach Litig., 
    846 F.3d 625
    , 634 (3d Cir. 2017); see O’Shea v. Littleton, 
    414 U.S. 488
    , 494 (1974) (“[I]f none of the named plaintiffs purporting to represent a
    class establishes the requisite of a case or controversy with the defendants, none may
    seek relief on behalf of himself or any other member of the class.”).
    The district court evaluated the standing of all the named plaintiffs collectively.
    As relevant here, the court concluded that because the complaint alleged only an
    “isolated single instance of an unauthorized charge” suffered by plaintiff Holmes,
    there was insufficient evidence of misuse of plaintiffs’ Card Information connected
    to defendants’ data breaches to “plausibly suggest[] that the hackers had succeeded
    in stealing the data and were willing and able to use it for future theft or fraud.” On
    appeal, plaintiffs argue that they have sufficiently alleged an injury in fact because
    the theft of their Card Information in the data breaches at defendants’ stores created
    -7-
    a substantial risk that they will suffer identity theft in the future. In addition, plaintiff
    Holmes specifically argues that his allegations of actual misuse of his Card
    Information are sufficient to allege a present injury in fact causally connected to
    defendants’ careless security practices. Although we conclude that the complaint
    does not sufficiently allege a substantial risk of future identity theft, we nonetheless
    find that the court has subject matter jurisdiction over this action because plaintiff
    Holmes has alleged facts giving rise to standing.
    A. Future Injury
    Plaintiffs argue that they have sufficiently alleged an injury in fact because the
    theft of their Card Information due to the data breaches at defendants’ stores creates
    the risk that they will suffer identity theft in the future. The Supreme Court has
    recognized that future injury can be sufficient to establish Article III standing. See
    Clapper v. Amnesty Int’l USA, 
    568 U.S. 398
    , 409 (2013). In future injury cases, the
    plaintiff must demonstrate that “the threatened injury is ‘certainly impending,’ or
    there is a ‘“substantial risk” that the harm will occur.’” Susan B. Anthony List v.
    Driehaus, 
    134 S. Ct. 2334
    , 2341 (2014) (quoting Clapper, 
    568 U.S. at 409
    , 414 n.5).3
    The question here is whether the complaint adequately alleges that plaintiffs face a
    “certainly impending” or “substantial risk” of identity theft as a result of the data
    breaches purportedly caused by defendants’ deficient security practices.
    3
    Defendants argue that we should apply only the “certainly impending”
    formulation of the future injury test. The Supreme Court has at least twice indicated
    that both the “certainly impending” and “substantial risk” standards are applicable in
    future injury cases, albeit without resolving whether they are distinct, and we are
    obligated to follow this precedent. See Driehaus, 
    134 S. Ct. at 2341
    , 2345–46;
    Clapper, 
    568 U.S. at 409
    , 414 n.5; see also Attias v. Carefirst, Inc., — F.3d —, 
    2017 WL 3254941
    , at *5 (D.C. Cir. 2017); Beck v. McDonald, 
    848 F.3d 262
    , 272, 275 (4th
    Cir. 2017).
    -8-
    Although we have not had occasion to address this question, several circuits
    have applied Clapper to determine whether an increased risk of future identity theft
    constitutes an injury in fact. See Attias, 
    2017 WL 3254941
    , at *3–7; Whalen v.
    Michaels Stores, Inc., No. 16-260 (L), 
    2017 WL 1556116
    , at *1–2 (2d Cir. May 2,
    2017) (Summ. Order); Beck, 848 F.3d at 273–76; Galaria v. Nationwide Mut. Ins.,
    663 F. App’x 384, 387–90 (6th Cir. 2016); Lewert v. P.F. Chang’s China Bistro, Inc.,
    
    819 F.3d 963
    , 966–69 (7th Cir. 2016); Remijas v. Neiman Marcus Grp., LLC, 
    794 F.3d 688
    , 692–93 (7th Cir. 2015). These cases came to differing conclusions on the
    question of standing. We need not reconcile this out-of-circuit precedent because the
    cases ultimately turned on the substance of the allegations before each court. Thus,
    we begin with the facts pleaded by plaintiffs here.
    Defendants argue that plaintiffs have at most alleged only that the intruders
    accessed the card data, not that they stole it. We disagree. At several points, the
    complaint alleges that the malware the hackers installed on defendants’ network
    allowed them to “harvest” plaintiffs’ Card Information, that defendants’ security
    practices “allow[ed] and ma[de] possible the theft” of plaintiffs’ Card Information,
    and that plaintiffs have actually “suffered theft” of their Card Information. Moreover,
    defendants’ own press releases, which are appended to the complaint, acknowledge
    that the data breaches “may have resulted in the theft of” Card Information.
    Defendants argue that the allegations are conclusory, but “on a motion to dismiss we
    presum[e] that general allegations embrace those specific facts that are necessary to
    support the claim.” Lujan, 
    504 U.S. at 561
     (alteration in original) (internal quotation
    omitted). Drawing all inferences in the plaintiffs’ favor, we are satisfied that the
    complaint sufficiently alleges that the hackers stole plaintiffs’ Card Information.
    Plaintiffs, however, ask us to go further and conclude that the complaint has
    adequately alleged that their Card Information has been misused. With the exception
    of plaintiff Holmes, discussed further below, the named plaintiffs have not alleged
    that they have suffered fraudulent charges on their credit or debit cards or that
    -9-
    fraudulent accounts have been opened in their names. Plaintiffs point to the
    allegations that, on information and belief, illicit websites are selling their Card
    Information to counterfeiters and fraudsters, and that plaintiffs’ financial institutions
    are attempting to mitigate their risk. Not only are these allegations speculative, they
    also fail to allege any injury “to the plaintiff[s].” Friends of the Earth, Inc. v. Laidlaw
    Envtl. Servs. (TOC), Inc., 
    528 U.S. 167
    , 181 (2000); see Spokeo, 
    136 S. Ct. at 1548
    (injury “must affect the plaintiff in a personal and individual way” (quoting Lujan,
    
    504 U.S. at
    560 n.1)). Therefore, setting aside Holmes, plaintiffs sufficiently allege
    that their Card Information was stolen by hackers as a result of defendants’ security
    practices, but not that it was misused.
    Plaintiffs argue that the theft of their Card Information creates a substantial risk
    that they will suffer identity theft. According to the GAO report cited in the
    complaint, “identity theft” “encompasses many types of criminal activities, including
    fraud on existing accounts—such as unauthorized use of a stolen credit card
    number—or fraudulent creation of new accounts—such as using stolen data to open
    a credit card account in someone else’s name.” U.S. Gov’t Accountability Off.,
    supra, at 2. Defendants appear to concede that identity theft constitutes an actual,
    concrete, and particularized injury. See Attias, 
    2017 WL 3254941
    , at *5 (“Nobody
    doubts that identity theft, should it befall one of these plaintiffs, would constitute a
    concrete and particularized injury.”). Our task is to determine whether plaintiffs’
    allegations plausibly demonstrate that the risk that plaintiffs will suffer future identity
    theft is substantial.
    Although others have ruled that a complaint could plausibly plead that the theft
    of a plaintiff’s personal or financial information creates a substantial risk that they
    will suffer identity theft sufficient to constitute a threatened injury in fact, see, e.g.,
    Remijas, 794 F.3d at 692–93, we conclude that plaintiffs have not done so here. As
    factual support for the otherwise bare assertion that “[d]ata breaches facilitate identity
    -10-
    theft,” the complaint relies solely on the 2007 GAO report.4 See generally U.S. Gov’t
    Accountability Off., supra. This report fails to support plaintiffs’ contention.
    Initially, we note that the allegedly stolen Card Information does not include
    any personally identifying information, such as social security numbers, birth dates,
    or driver’s license numbers. As the GAO report points out, compromised credit or
    debit card information, like the Card Information here, “generally cannot be used
    alone to open unauthorized new accounts.” Id. at 30 (“The type of data compromised
    in a breach can effectively determine the potential harm that can result.”). As such,
    pursuant to the factual evidence relied on in the complaint, there is little to no risk
    that anyone will use the Card Information stolen in these data breaches to open
    unauthorized accounts in the plaintiffs’ names, which is “the type of identity theft
    generally considered to have a more harmful direct effect on consumers.” Id. We are
    left with the risk that plaintiffs’ Card Information could be used to commit credit or
    debit card fraud, in which criminals make unauthorized charges to or siphon money
    from those existing accounts.
    Ultimately, the findings of the GAO report do not plausibly support the
    contention that consumers affected by a data breach face a substantial risk of credit
    or debit card fraud. Although the report acknowledges that there are some cases in
    which a data breach appears to have resulted in identity theft, it concludes based on
    the “available data and information” that “most breaches have not resulted in detected
    incidents of identity theft.” Id. at 21. Among other evidence, the report reviews the
    24 largest data breaches reported between January 2000 and June 2005, and finds
    4
    The complaint does cite a booklet prepared by the Federal Trade Commission,
    but this document only provides steps to take if a person is or suspects she may be a
    victim of identity theft. See Fed. Trade Comm’n, Taking Charge: What To Do If
    Your Identity Is Stolen (2013), https://publications.usa.gov/USAPubs.php?PubID=
    3326. This document has no bearing on the risk of identity theft following a data
    breach.
    -11-
    only four were known to have resulted in some form of identity theft, and only three
    of those were believed to be incidents of account fraud. Id. at 24–25. Because the
    report finds that data breaches are unlikely to result in account fraud, it does not
    support the allegation that defendants’ data breaches create a substantial risk that
    plaintiffs will suffer credit or debit card fraud. See Beck, 848 F.3d at 276.
    The 2007 report found that “[c]omprehensive information on the outcomes of
    data breaches is not available,” U.S. Gov’t Accountability Off., supra at 21, and the
    “extent to which data breaches result in identity theft is not well known,” id. at 5. It
    is possible that some years later there may be more detailed factual support for
    plaintiffs’ allegations of future injury. But such support is absent from the complaint
    here, and a mere possibility is not enough for standing.5 See Clapper, 
    568 U.S. at 409
    (“‘[A]llegations of possible future injury’ are not sufficient.” (quoting Whitmore v.
    Arkansas, 
    495 U.S. 149
    , 158 (1990))); Braitberg v. Charter Commc’ns, Inc., 
    836 F.3d 925
    , 930 (8th Cir. 2016) (“[A] speculative or hypothetical risk is insufficient.”).
    Plaintiffs also argue that the costs they incurred to mitigate their risk of identity
    theft, including time they spent reviewing information about the breach and
    monitoring their account information, constitute an injury in fact for purposes of
    standing. Because plaintiffs have not alleged a substantial risk of future identity
    theft, the time they spent protecting themselves against this speculative threat cannot
    create an injury. See Clapper, 
    133 S. Ct. at 1151
     (plaintiffs “cannot manufacture
    standing merely by inflicting harm on themselves based on their fears of hypothetical
    5
    We recognize there may be other means—aside from relying on reports and
    studies—to allege a substantial risk of future injury, and we do not comment on the
    sufficiency of such potential methods here. We also do not address any of the
    independent forms of injury discussed by the district court, including the argument
    that the invasion of privacy suffered by the plaintiffs constitutes an injury in fact,
    because the plaintiffs do not press them on appeal.
    -12-
    future harm that is not certainly impending”); Beck, 848 F.3d at 276–77 (“[S]elf-
    imposed harms cannot confer standing.”).6
    Accordingly, we conclude that the complaint has not sufficiently alleged a
    substantial risk of identity theft, and plaintiffs’ allegations of future injury do not
    support standing in this case.
    B. Present Injury
    Although the complaint’s allegations of future injury are insufficient, plaintiff
    Holmes alleges a present injury in fact to support his standing. He alleges that he
    suffered a fraudulent charge on the credit card he previously used to make a purchase
    at one of defendants’ stores affected by the data breaches. This misuse of Holmes’
    Card Information is credit card fraud and thus a form of identity theft. As previously
    noted, defendants do not contest that identity theft constitutes an actual, concrete, and
    particularized injury. See Attias, 
    2017 WL 3254941
    , at *5. Instead of attacking the
    nature of Holmes’ injury, defendants challenge the sufficiency of his allegations.
    First, defendants argue that Holmes’ theory of actual injury “is not properly
    before the Court because it is not alleged in the Complaint.” Contrary to defendants’
    contention, “it is unnecessary to set out a legal theory for the plaintiff’s claim for
    6
    Plaintiffs also cursorily argue that because they have alleged in claim four that
    defendants breached an implied contract to “take reasonable measures to protect”
    plaintiffs’ Card Information, the complaint adequately alleges standing. We have
    held, in the context of an express contract, that “a plaintiff who has produced facts
    indicating it was a party to a breached contract has a judicially cognizable interest for
    standing purposes, regardless of the merits of the breach alleged.” Carlsen, 833 F.3d
    at 909 (internal quotation omitted). Even if such analysis applies to an implied
    contract—a question we need not decide here—the complaint does not sufficiently
    allege that plaintiffs were party to such a contract. Therefore, the breach of implied
    contract claim does not supply plaintiffs with Article III standing.
    -13-
    relief” in a pleading. Johnson v. City of Shelby, 
    135 S. Ct. 346
    , 347 (2014) (internal
    quotation omitted). So long as the facts alleged in the complaint demonstrate
    Holmes’ actual injury, plaintiffs have met their burden at the pleading stage. Cf.
    Topchian v. JPMorgan Chase Bank, N.A., 
    760 F.3d 843
    , 849 (8th Cir. 2014) (“[I]t is
    the facts alleged in a complaint, and not the legal theories, that state a claim.”).
    Second, defendants argue that Holmes has not sufficiently alleged that his
    injury is fairly traceable to defendants’ data breaches for essentially two reasons.
    Initially, defendants contend that Holmes must allege that his particular “fraudulent
    charge occurred because of” defendants’ data breaches. By focusing narrowly on the
    allegations specific to Holmes, defendants ignore the allegations in the complaint that
    apply to all plaintiffs. These latter allegations state a “causal connection,” Bennett
    v. Spear, 
    520 U.S. 154
    , 167 (1997), between the deficiencies in defendants’ security
    system and the theft and misuse of customers’ Card Information: Defendants failed
    to secure customer Card Information on their network; their network was
    subsequently hacked; customer Card Information was stolen by the hackers; and
    Holmes became the victim of identity theft after the data breaches. At this stage of
    the litigation, “we presum[e] that [these] general allegations embrace those specific
    facts that are necessary to support” a link between Holmes’ fraudulent charge and the
    data breaches. 
    Id. at 168
     (first alteration in original) (quoting Lujan, 
    504 U.S. at 561
    ).
    We thus find Holmes has met his burden, “which is relatively modest at this stage of
    the litigation,” of alleging that his fraudulent charge is fairly traceable to the
    defendants’ breaches. Id. at 171; see Resnick v. AvMed, Inc., 
    693 F.3d 1317
    , 1324
    (11th Cir. 2012) (concluding that actual identity fraud following the theft of laptops
    containing plaintiffs’ personal information was fairly traceable to defendant’s
    failures).
    In addition, defendants argue that the fairly traceable element is not satisfied
    because without evidence of widespread misuse, the complaint does not support the
    inference that these data breaches caused Holmes’ fraudulent charge. Defendants rely
    -14-
    on the district court’s “common sense” conclusion that due to the frequency of credit
    card fraud, one would expect that in a group of sixteen named plaintiffs and
    thousands of potential class members who used a credit or debit card at defendants’
    affected stores, there would be more than one instance of a fraudulent charge. After
    finding that evidence of misuse was required to establish standing, the district court
    concluded that “the single isolated instance of an unauthorized charge [suffered by
    Holmes] is not indicative of data misuse that is fairly traceable to the Data Breach.”
    Even if evidence of misuse following a data breach is necessary for a plaintiff
    to establish standing—a conclusion we need not definitively reach today—we
    conclude that the district court erred in holding that Holmes’ standing was dependent
    on the standing of other named plaintiffs and unnamed class members. Each
    plaintiff’s standing must be assessed individually. See Red River Freethinkers v. City
    of Fargo, 
    679 F.3d 1015
    , 1023 (8th Cir. 2012) (standing requires examination of
    “whether the particular plaintiff is entitled to an adjudication of the particular claims
    asserted” (quoting Allen v. Wright, 
    468 U.S. 737
    , 752 (1984))); Jones v. Gale, 
    470 F.3d 1261
    , 1265 (8th Cir. 2006) (“[W]here one plaintiff establishes standing to sue,
    the standing of other plaintiffs is immaterial to jurisdiction.” (internal quotation
    omitted)). At a later stage of the litigation, defendants are free to litigate whether the
    data breach caused Holmes’ fraudulent charge, but “this debate has no bearing on
    standing to sue.” Remijas, 794 F.3d at 696; see Lexmark Int’l, Inc. v. Static Control
    Components, Inc., 
    134 S. Ct. 1377
    , 1391 n.6 (2014) (“Proximate causation is not a
    requirement of Article III standing.”).
    Holmes’ allegations of misuse of his Card Information were sufficient to
    demonstrate that he had standing; that is all that is required for the court to have
    subject matter jurisdiction over this action. See 2 William B. Rubenstein, Newberg
    on Class Actions § 2:1 (5th ed. 2012) (“Once threshold individual standing by the
    class representative is met, a proper party to raise a particular issue is before the
    court; there is no further, separate ‘class action standing’ requirement.”); cf. Spokeo,
    -15-
    
    136 S. Ct. at
    1547 n.6 (“[N]amed plaintiffs who represent a class must allege and
    show that they personally have been injured, not that injury has been suffered by
    other, unidentified members of the class to which they belong.” (internal quotation
    omitted)).
    Finally, defendants point to several purported deficiencies in Holmes’
    allegations, arguing that he failed to allege the date he shopped at the affected Illinois
    store, the amount of the charge, or that the charge was unreimbursed. While such
    omissions could be fatal to the complaint under the “higher hurdles” of Rules 8(a) and
    12(b)(6)—a contention that we do not opine on here—standing under Article III
    presents only a “threshold inquiry,” Brown v. Medtronic, Inc., 
    628 F.3d 451
    , 459 (8th
    Cir. 2010), requiring “general allegations” of injury, causation, and redressability,
    Lujan, 
    504 U.S. at 561
    . We conclude that these attacks on the sufficiency of Holmes’
    allegations are more properly directed at whether the complaint states a claim, not
    whether Holmes has alleged standing. See Miller v. Redwood Toxicology Lab., Inc.,
    
    688 F.3d 928
    , 936 (8th Cir. 2012) (“The issue . . . of whether Miller’s allegations are
    sufficient to state a cause of action under Rule 12(b)(6) presents a different and
    distinct matter” from Article III standing).
    Although defendants do not challenge the final element of standing, we find
    that Holmes’ injury is “likely to be redressed by a favorable judicial decision.”
    Spokeo, 
    136 S. Ct. at 1547
    . To the extent Holmes can show that the fraudulent
    charge was unreimbursed, such financial harm would be compensable in this action.
    See Remijas, 794 F.3d at 696–97; see also Warth, 
    422 U.S. at 500
     (“[S]tanding in no
    way depends on the merits of the plaintiff’s” claim).
    Because the complaint contains sufficient allegations to demonstrate that
    Holmes suffered an injury in fact, fairly traceable to defendants’ security practices,
    and likely to be redressed by a favorable judgment, Holmes has standing under
    Article III’s case or controversy requirement. See Lewert, 819 F.3d at 967 (named
    -16-
    plaintiff who “asserts that he already has experienced fraudulent charges” and “has
    spent time and effort resolving them” has “alleged sufficient facts to support standing
    based on [his] present injuries”); Resnick, 693 F.3d at 1323 (“[A] party claiming
    actual identity theft resulting from a data breach has standing to bring suit.”). Since
    one named plaintiff has standing to bring suit, the district court erred in dismissing
    the action for lack of subject matter jurisdiction.7
    III. Conclusion
    For the foregoing reasons, we reverse the district court’s dismissal of plaintiff
    Holmes for lack of Article III standing, affirm the dismissal as to the remaining
    plaintiffs, and remand for further proceedings consistent with this order.
    ______________________________
    7
    In their cross appeal, Defendants urge us, in the alternative, to hold that the
    complaint fails to state a claim for which relief can be granted. See Fed. R. Civ. P.
    12(b)(6). The district court did not reach the arguments defendants raised in their
    Rule 12(b)(6) motion. We decline to consider them for the first time on appeal and
    remand for consideration by the district court in the first instance. See ABF Freight
    Sys., Inc. v. Int’l Bhd. of Teamsters, 
    645 F.3d 954
    , 965 (8th Cir. 2011).
    -17-