In re Equifax Inc.

Decision Date28 January 2019
Docket NumberCIVIL ACTION FILE NO. 17-CV-3463-TWT
Citation357 F.Supp.3d 1189
Parties IN RE EQUIFAX INC. SECURITIES LITIGATION
CourtU.S. District Court — Northern District of Georgia
OPINION AND ORDER

THOMAS W. THRASH, JR., United States District Judge

This is a securities fraud class action. It is before the Court on the Defendants' Joint Motion to Dismiss [Doc. 62]. For the reasons set forth below, the Defendants' Joint Motion to Dismiss [Doc. 62] is GRANTED in part and DENIED in part.

I. Background

This case arises out of a massive data breach incident. On September 7, 2017, the Defendant Equifax Inc. announced that it was the subject of a data breach affecting more than 148 million Americans (the "Data Breach").1 Criminal hackers breached Equifax's Computer network and obtained a vast amount of personally identifiable information in the company's custody. The Lead Plaintiff, Union Asset Management Holding AG, seeks to represent a putative class of investors that purchased the securities of Equifax from February 25, 2016 through September 15, 2017. The Plaintiff alleges that the Defendants committed fraud in connection with the Data Breach that caused a loss in value of the class's investments. Specifically, the Plaintiff alleges that the Defendants made multiple false or misleading statements and omissions about the sensitive personal information in Equifax's custody, the vulnerability of its internal systems to cyberattack, and its compliance with data protection laws and cybersecurity best practices.2 Despite these assurances, Equifax allegedly failed to take some of the most basic precautions to protect its computer systems from hackers. According to the Plaintiff, these material misrepresentations artificially inflated the value of Equifax's securities, causing a loss in value of the class's investments when the truth was revealed after the Data Breach.

Equifax is a Georgia corporation with its headquarters in Atlanta, Georgia.3 It is one of the three largest credit reporting agencies in the world.4 Equifax operates primarily through four segments: U.S. Information Solutions, a segment that provides products and services to businesses; Equifax's International operating segment, which includes its Asia, Europe, Latin America, and Canada business units; Equifax's Workforce Solutions segment, which provides verification and employer services; and Global Consumer Solutions, its direct-to-consumer business that provides consumers with products to protect and monitor their credit and identity.5 The Defendants Richard F. Smith, John W. Gamble, Jr., Rodolfo O. Ploder, and Jeffrey L. Dodge (the "Individual Defendants") were corporate officers at Equifax during the putative class period. The Defendant Richard F. Smith is the former Chief Executive Officer and Chairman of the Board of Directors of Equifax.6 Smith resigned from both of these positions on September 26, 2017.7 The Defendant John W. Gamble is the Corporate Vice President and Chief Financial Officer of Equifax.8 The Defendant Rodolfo O. Ploder is the President of Equifax's Workforce Solutions operating segment.9 The Defendant Jeffrey L. Dodge is the Senior Vice President of Investor Relations at Equifax.10

As part of its business, Equifax collects, maintains, and sells a huge quantity of personal data about consumers and employees all over the world.11 This personally identifiable information is highly sensitive.12 It includes Social Security numbers, addresses, birthdays, employment history, driver's license information, detailed payment history, loans, credit card information, and more.13 Credit bureaus such as Equifax acquire this information from banks, mortgage lenders, credit card issuers, and other financing companies.14 This personally identifiable information is a highly valuable target for cybercriminals; it includes some of the most private information about consumers.15 This information can be used to enter into a mortgage, set up a bank account, change a phone number, and even more.16

The Defendants recognized the importance of safeguarding this highly sensitive personal information.17 In its SEC filings, Equifax acknowledged that it collected and stored sensitive data, including the personally identifiable information of consumers, and stated that safeguarding this data was "critical" to its "business operations and strategy."18 It noted that its success was dependent upon its "reputation as a trusted steward of information."19 Equifax also acknowledged that it was a valuable target for cybercriminals due to the vast trove of information it collected.20 In its SEC filings, Equifax recognized that it was regularly the target of criminal hackers, and that a cybersecurity incident could subject it to a variety of serious consequences.21

Acknowledging the importance of protecting the data in its custody, the Defendants made a number of statements during the class period regarding Equifax's networks and the security of the personal data in its custody. According to the Plaintiff, the Defendants issued statements concerning the strength of Equifax's cybersecurity systems, its compliance with data protection laws, and the integrity of its internal controls.22 For example, with regard to the strength of its data security, Equifax's website provided that the company employed "strong data security and confidentiality standards" and maintained "a highly sophisticated data information network that includes advanced security, protections and redundancies."23 With regard to Equifax's compliance with data protection laws, regulations, and standards, the Defendants stated in SEC filings that they continuously monitored federal and state legislative and regulatory activities "in order to remain in compliance" with those laws.24 The Defendants also certified in SEC filings during the class period that Equifax had effective internal controls that would provide "reasonable assurance regarding prevention or timely detection of unauthorized acquisition, use or disposition of our assets."25

However, despite these assurances, Equifax's cybersecurity was dangerously deficient. The Data Breach, according to the Plaintiff, was the inevitable result of widespread shortcomings in Equifax's data security systems. According to the Plaintiff's allegations, Equifax's data protection measures were "grossly inadequate," "failed to meet the most basic industry standards," and "ran afoul of the well-established mandates of applicable data protection laws."26 These shortcomings spanned a number of facets of cybersecurity practices, including a failure to implement proper patching protocols, failure to encrypt sensitive information, the storage of sensitive data on public-facing servers, the use of inadequate network monitoring practices, the use of obsolete software, and more. Overall, according to cybersecurity experts, a "catastrophic breach of Equifax's systems was inevitable because of systemic organizational disregard for cybersecurity and cyber-hygiene best practices."27

According to the Plaintiff, Equifax failed to implement an adequate patch management process, while also failing to remediate known deficiencies in its cybersecurity infrastructure.28 The company relied upon a single individual to manually implement its patching process across its entire network.29 This individual had no way to know where vulnerable software in need of patching was being run on Equifax's systems.30 This protocol was far less secure than the automatic patching processes that many other companies, including Equifax's peers, employ in their systems.31 According to cybersecurity experts, this patching process fell far short of industry standards.32

Equifax also failed to encrypt sensitive data in its custody. According to the Amended Complaint, Equifax admitted that sensitive personal information relating to hundreds of millions of Americans was not encrypted, but instead was stored in plaintext, making it easy for unauthorized users to read and misuse.33 Not only was this information unencrypted, but it also was accessible through a public-facing, widely used website.34 This enabled any attacker that compromised the website's server to immediately have access to this sensitive personal data in plaintext.35 Smith also admitted during congressional testimony that, with respect to its core credit databases, Equifax failed to encrypt any of its data.36 It also failed to encrypt its highly vulnerable mobile applications, meaning that in addition to keeping sensitive data unencrypted in its own systems, it also failed to encrypt data being transmitted over the internet.37 This, according to experts, was a major security failure.38 And, when Equifax did encrypt data, it left the keys to unlocking the encryption on the same public-facing servers, making it easy to remove the encryption from the data.39 These inadequacies in Equifax's encryption protocol fell far short of industry standards and data security laws, and showed that Equifax did not "know what they were doing" with respect to data security.40

Moreover, Equifax also failed to implement adequate authentication measures.41 Authentication measures are mechanisms, such as passwords, that verify that a party attempting to access a system or network is authorized to do so.42 According to the Amended Complaint, Equifax's authentication measures were insufficient to protect the sensitive personal data in its custody from unauthorized access.43 These mechanisms included weak passwords and security questions.44 For example, Equifax relied upon four digit pins derived from Social Security numbers and birthdays to guard personal information, despite the fact that these weak passwords had already been compromised in previous breaches.45 Furthermore, Equifax employed the username "admin" and the password "admin" to protect a portal used to manage credit disputes, a password that "is a surefire way to get hacked."46 This portal contained a vast trove...

To continue reading

Request your trial
13 cases
  • Howard v. Arconic Inc., 2:17-cv-1057
    • United States
    • United States District Courts. 3th Circuit. United States District Courts. 3th Circuit. Western District of Pennsylvania
    • June 21, 2019
    ...not rendered misleading by product safety issues related to Reynobond PE's ultimate use.As another illustration, Equifax Inc. Securities Litigation came to the opposite conclusion because plaintiffs alleged with specificity that, inter alia , the company "stored personal data in easily acce......
  • In re Marriott Int'l, Inc., Customer Data Sec. Breach Litig.
    • United States
    • United States District Courts. 4th Circuit. United States District Court (Maryland)
    • June 11, 2021
    ...the data breach occurred, and therefore they could not disclose anyPage 31 information about it. Cf. In re Equifax Inc. Sec. Litig., 357 F. Supp. 3d 1189, 1225 (N.D. Ga. 2019) ("[T]he Defendants were under no duty to disclose the existence of the Data Breach before they knew it had occurred......
  • In re Marriott Int'l, Inc. Customer Data Sec. Breach Litig.
    • United States
    • United States District Courts. 4th Circuit. United States District Court (Maryland)
    • June 11, 2021
    ...not know that the data breach occurred, and therefore they could not disclose anyinformation about it. Cf. In re Equifax Inc. Sec. Litig., 357 F. Supp. 3d 1189, 1225 (N.D. Ga. 2019) ("[T]he Defendants were under no duty to disclose the existence of the Data Breach before they knew it had oc......
  • In re Marriott Int'l, Inc. Customer Data Sec. Breach Litig.
    • United States
    • United States District Courts. 4th Circuit. United States District Court (Maryland)
    • June 11, 2021
    ...disclosures before then were not false and misleading for not disclosing the Starwood data beach. Cf. In re Equifax Inc. Sec. Litig., 357 F. Supp. 3d 1189, 1225 (N.D. Ga. 2019) ("[T]he Defendants were under no duty to disclose the existence of the Data Breach before they knew it had occurre......
  • Request a trial to view additional results
1 firm's commentaries

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT