Data Breach Notification & Compensation Demand Letters

California Breach Laws & CCPA Private Right of Action

Data Breach Notification Laws
📋 50-State Patchwork: All 50 states have data breach notification laws. California's laws (Civ. Code §§1798.29, 1798.82) are among the strictest and serve as model. CCPA §1798.150 provides limited private right of action for certain security failures.
California Breach Notification Requirements

Cal. Civ. Code §§1798.29 (government agencies) & 1798.82 (businesses):

  • Trigger: Unauthorized acquisition of unencrypted computerized data containing personal information
  • Timing: Notify "in the most expedient time possible and without unreasonable delay"
  • Who must notify: Any person/business that owns or licenses computerized data with California residents' PI
  • To whom: Each affected California resident
  • AG notification: If breach affects 500+ California residents, notify CA Attorney General
What Triggers Notification Duty?
Element Definition
Personal Information Name + (SSN, driver's license, financial account info, medical info, health insurance info, biometric data, username+password/security Q&A)
Unauthorized Acquisition Breach of security; data accessed/acquired by unauthorized person
Unencrypted/Unredacted If data encrypted with key not compromised, no notification required
Likelihood of Harm Some statutes (not CA) require notification only if "reasonable likelihood of harm"
Required Notice Content (§1798.82(d))
  • Title: "Notice of Data Breach"
  • General description of incident
  • Type of personal information involved
  • General description of company's response and investigation
  • Toll-free numbers and addresses for major credit bureaus if SSN/DL compromised
  • Toll-free contact number for more information
  • Advice to remain vigilant for identity theft (reviewing account statements, monitoring credit reports)
CCPA Private Right of Action – §1798.150
⚠️ Limited Private Right: CCPA's private right of action applies ONLY to data breaches resulting from business's failure to implement reasonable security. Most CCPA violations can only be enforced by CA Attorney General.

§1798.150 elements:

  • Business failed to implement and maintain reasonable security procedures
  • Resulted in breach of nonencrypted/nonredacted personal information
  • Statutory damages: $100–$750 per consumer per incident OR actual damages (whichever is greater)
  • 30-day notice & cure: Must give business 30 days' notice and opportunity to cure before filing suit
Other State Breach Laws

If you're a resident of another state, similar laws apply. Key variations:

  • New York: Notice "without unreasonable delay"; AG and state agencies notification
  • Texas: Notice "without unreasonable delay"; AG notification required
  • Florida: Notice within 30 days (with extensions); specific biometric breach requirements
  • Massachusetts: Strict security requirements (201 CMR 17.00) with enforcement mechanism
Consumer Rights After Data Breach
What You're Entitled To
Right/Remedy Legal Basis What You Get
Timely notification State breach laws Notice of breach, what data was compromised, steps to protect yourself
Credit monitoring Often offered voluntarily; may be required by settlement/AG action 12–24 months free credit monitoring, identity theft insurance
Out-of-pocket loss reimbursement Common law negligence, breach of contract Documented expenses: fraudulent charges, credit freezes, time spent resolving identity theft
Statutory damages (CCPA) Cal. Civ. Code §1798.150 $100–$750 per incident (CA residents only, certain breach types)
Class action participation Various theories Share of settlement fund (often modest per-person recovery)
Documenting Your Damages

To maximize recovery, document:

  • Time spent: Hours dealing with breach (freezing credit, disputing charges, monitoring accounts) × reasonable hourly rate
  • Out-of-pocket costs: Credit monitoring fees you paid yourself, credit freeze fees, notary fees, mailings
  • Fraudulent charges: Even if reimbursed by bank, document as evidence of harm
  • Emotional distress: Stress, anxiety, sleep loss (harder to quantify but documentable with therapy records)
  • Future risk: Increased vulnerability to identity theft (basis for credit monitoring demand)
💡 Standing Challenge: Many breach lawsuits fail because plaintiffs can't show actual harm—"my data was exposed but I haven't suffered identity theft yet" is often insufficient for standing. Document any concrete injury, no matter how small.
When to Act Individually vs. Join Class Action

Individual demand/lawsuit if:

  • You suffered significant individual harm (actual identity theft, substantial fraud, quantifiable losses)
  • Your damages exceed $5,000–$10,000 (worthwhile to pursue individually)
  • You want faster resolution than class action timeline (which takes years)

Join class action if:

  • Your individual harm is modest (typical for most breach victims)
  • Class action already filed and certified (check PACER or breach settlement websites)
  • You want to participate without hiring own attorney
  • Your primary goal is holding company accountable (class actions create systemic change)
Credit Monitoring & Identity Theft Protection

Companies often offer free credit monitoring. You can demand:

  • Extended duration: 24 months instead of 12 months
  • Full-service monitoring: All three bureaus (Experian, Equifax, TransUnion), not just one
  • Identity theft insurance: $1 million policy covering costs of identity theft resolution
  • Credit freezes: Reimbursement for credit freeze fees (though now free at all three bureaus)
Drafting Breach Compensation Demands
CCPA §1798.150 Pre-Suit Notice Requirement
🚨 Mandatory 30-Day Notice: Before filing CCPA §1798.150 lawsuit, you must provide 30 days' written notice to business describing violations and opportunity to cure. Send via certified mail. If business cures within 30 days, you cannot sue.
Demand Letter Strategy
  • Immediate demands: Credit monitoring, identity theft protection, reimbursement of out-of-pocket expenses
  • CCPA notice: If CA resident and unreasonable security, include §1798.150 pre-suit notice
  • Preserve class action rights: Individual demand doesn't waive right to join class action
  • Document everything: Certified mail, detailed expense records, timeline of harm
Letter Structure
Section Content
Breach identification Date of breach, date you were notified, company's breach notice letter
What data was compromised Type of personal information (SSN, financial accounts, medical, etc.)
Legal violations State breach notification law, CCPA §1798.150 (if applicable), negligence, breach of implied contract
Your damages Itemized out-of-pocket costs, time spent (hours × rate), emotional distress, increased risk
Demand Credit monitoring (24 months, all bureaus), identity theft insurance, reimbursement of expenses ($X), compensation for time ($Y)
CCPA §1798.150 notice If applicable: "This constitutes 30-day notice under Cal. Civ. Code §1798.150. If you do not cure within 30 days, I will pursue litigation for statutory damages."
Deadline 30 days (if CCPA notice); 14-21 days for immediate relief demands
Tone & Approach
  • Firm but professional: You're a breach victim, not making unreasonable demands
  • Document-focused: Attach records of expenses, time logs, notification letters
  • Reasonable demands: Credit monitoring + out-of-pocket costs is standard; excessive demands undermine credibility
  • CCPA-specific language: If relying on §1798.150, cite statute precisely and comply with notice requirements
What to Avoid
  • Demanding damages for speculative future harm without concrete current injury (standing issues)
  • Signing settlement releases before consulting attorney (may waive class action participation)
  • Missing 30-day CCPA notice requirement (case will be dismissed)
  • Accepting inadequate credit monitoring (12 months, single bureau) without negotiation
Negotiation Strategy

Companies often respond with offers. Evaluate:

  • Credit monitoring value: 24 months full-service = ~$500–$1,000 retail value
  • Cash offers: Compare to your documented expenses + statutory damages potential
  • Release scope: Ensure release doesn't waive participation in class action (unless you're getting substantial individual settlement)
  • Time value: Quick modest settlement may be better than years of litigation for uncertain recovery
Sample Demand Letters
Sample 1: General Breach Compensation Demand
[Your Name] [Address] [Email / Phone] [Date] [Company Name] Legal Department / Data Privacy Officer [Address] CERTIFIED MAIL – RETURN RECEIPT REQUESTED Re: Data Breach – Demand for Compensation and Credit Monitoring Dear [Company]: I am writing regarding the data breach you disclosed on [Date] affecting [number] customers, including myself. According to your notification letter [attached], the breach compromised [list: Social Security numbers, financial account information, driver's license numbers, etc.]. LEGAL VIOLATIONS: Your data breach and inadequate security practices violated: 1. California Civil Code §1798.82 (notification requirements); 2. Your duty of reasonable care to protect my personal information; 3. Implied contract to safeguard data I entrusted to you; 4. [If applicable: California Civil Code §1798.150 (failure to implement reasonable security procedures)]. MY DAMAGES AND EXPENSES: As a direct result of your data breach, I have incurred the following damages: 1. Out-of-Pocket Expenses: • Credit monitoring service: $[amount] (purchased on [date]) • Credit freeze fees: $[amount] (placed freezes with all three bureaus) • Identity theft protection: $[amount] • Time and postage for correspondence: $[amount] TOTAL OUT-OF-POCKET: $[X] 2. Time Spent Resolving Breach: • [Number] hours monitoring accounts, freezing credit, contacting creditors • Reasonable value at $[rate/hour]: $[Y] 3. Increased Risk of Identity Theft: • My Social Security number and [other sensitive data] are now permanently compromised • I face years of increased vulnerability to fraud and identity theft • This requires ongoing monitoring and vigilance 4. Emotional Distress: • Significant anxiety and stress over potential identity theft • Sleep disruption and worry about financial security TOTAL DAMAGES: $[X + Y] DEMAND FOR RELIEF: I demand that you provide: 1. Full reimbursement of my out-of-pocket expenses: $[X] 2. Compensation for time spent: $[Y] 3. Extended credit monitoring: 24 months of comprehensive three-bureau credit monitoring and identity theft insurance (minimum $1 million policy) 4. Written confirmation of enhanced security measures to prevent future breaches If you do not respond with acceptable resolution within 21 days, I will pursue all available legal remedies, including joining or initiating class action litigation and filing complaints with the California Attorney General and Federal Trade Commission. I am open to reasonable resolution. Please contact me at [Email/Phone] to discuss. Sincerely, [Your Name] Enclosures: - Your breach notification letter - Documentation of expenses - Time log
Sample 2: CCPA §1798.150 Pre-Suit Notice
[Your Name] [California Address] [Email / Phone] [Date] [Company Name] Legal Department [Address] CERTIFIED MAIL – RETURN RECEIPT REQUESTED Re: Notice of Violation of California Civil Code §1798.150 – 30-Day Cure Period Dear [Company]: This letter constitutes formal notice under California Civil Code §1798.150(b) that you have violated the California Consumer Privacy Act of 2018. FACTS: On or about [Date], you suffered a data breach that resulted in unauthorized access to and acquisition of my personal information, including [list: name, Social Security number, financial account numbers, etc.]. You notified me of this breach on [Date]. VIOLATIONS: You violated California Civil Code §1798.150(a)(1) by failing to implement and maintain reasonable security procedures and practices appropriate to the nature of the personal information to protect that information from unauthorized access, destruction, use, modification, or disclosure. Evidence of your inadequate security includes: • [Describe known security failures from public reports: unencrypted database, lack of multi-factor authentication, failure to patch known vulnerabilities, etc.] • [If known: Prior breaches showing pattern of inadequate security] As a result of your failure to implement reasonable security, my nonencrypted and nonredacted personal information was subject to unauthorized access and exfiltration. DAMAGES: Under §1798.150(a)(1)(A), I am entitled to recover statutory damages of not less than one hundred dollars ($100) and not greater than seven hundred and fifty dollars ($750) per consumer per incident, or actual damages, whichever is greater. My actual damages include: • Out-of-pocket expenses: $[amount] • Time spent addressing breach: [hours] × $[rate] = $[amount] • Increased risk of future identity theft requiring ongoing vigilance • Emotional distress 30-DAY CURE PERIOD: Pursuant to §1798.150(b), you have 30 days from receipt of this notice to cure the alleged violation. To cure, you must: 1. Provide written confirmation that you have implemented comprehensive reasonable security measures to prevent future breaches; 2. Provide me with 24 months of comprehensive credit monitoring and identity theft insurance; 3. Reimburse my out-of-pocket expenses totaling $[amount]; 4. Compensate me $[amount] for time and damages. If you fail to cure within 30 days, I will proceed with filing a civil action under §1798.150 seeking statutory damages of $750 per incident, injunctive relief, and any other relief the court deems proper. Please respond within 30 days to [Email/Address]. Sincerely, [Your Name] Enclosures: - Breach notification letter - Evidence of damages
Sample 3: Follow-Up After Company Refuses
[Your Name] [Address] [Email] [Date] [Company Name] Legal Department [Address] Re: Follow-Up Demand – Data Breach Compensation Dear [Company]: On [Date], I sent you a demand letter regarding your data breach and my damages. You responded on [Date] denying responsibility and refusing to provide any compensation or credit monitoring. Your position is unacceptable. Your data breach was the direct result of your inadequate security practices, as evidenced by [cite: public reports of security failures, regulatory findings, expert analysis]. I have now also: • Filed a complaint with the California Attorney General's Office (Consumer Protection Division); • Filed a complaint with the Federal Trade Commission; • Reported this matter to [relevant industry regulator if applicable]; • Researched pending class action litigation [cite case name and court if known]. I am aware that a class action lawsuit has been filed [OR: I am evaluating whether to initiate individual litigation or join/file class action]. [If class action exists: I intend to participate as a class member and provide testimony about my damages.] This is your final opportunity to resolve this matter directly. I am willing to accept: • 24 months comprehensive credit monitoring and identity theft insurance; AND • Reimbursement of $[reduced amount] for expenses and time. If I do not receive a reasonable settlement offer within 14 days, I will proceed with litigation and/or full participation in class action proceedings without further notice. Sincerely, [Your Name]
Litigation & Class Actions
Common Legal Theories in Breach Cases
Claim Elements Damages Available
CCPA §1798.150 CA resident; unreasonable security; breach of nonencrypted PI; 30-day notice & no cure $100–$750 per incident OR actual damages (whichever greater); injunctive relief
Negligence Duty of care; breach (inadequate security); causation; damages Actual damages (out-of-pocket losses, time, emotional distress)
Breach of implied contract You provided PI; company implicitly promised to protect it; breach; damages Contract damages (expectation, reliance)
Breach of fiduciary duty Special relationship (e.g., healthcare, financial); duty to safeguard PI; breach; damages Actual damages, possibly punitive if reckless
Unjust enrichment Company benefited from collecting your data; failed to protect it; unjust to retain benefit Restitution (value of services/data)
Standing Challenge in Breach Cases
⚠️ Article III Standing Requirement: In federal court, you must show concrete injury, not just increased risk. Many breach cases dismissed for lack of standing where plaintiff suffered no actual identity theft or fraud. Document any concrete harm, no matter how small.

Concrete injuries that establish standing:

  • Actual fraudulent charges or identity theft
  • Time and money spent responding to breach (freezing credit, monitoring, correspondence)
  • Overpayment for services (paid for secure storage; got inadequate security)
  • Mitigation costs (credit monitoring purchased)
Class Action Landscape

Major breaches typically result in class actions:

  • Filed quickly: Often within days/weeks of breach disclosure
  • Multiple filings: Competing class actions in multiple jurisdictions → MDL (multidistrict litigation)
  • Typical timeline: 2–5 years from filing to settlement
  • Typical recovery: Credit monitoring for all class members + modest cash fund ($25–$125 per person typical)
  • Attorney's fees: 25–33% of settlement fund + costs (often millions)
Settlement Structures

Common breach settlement terms:

  • Credit monitoring: 12–24 months for all class members
  • Cash payments: $25–$500 per person depending on breach severity and proof of harm
  • Reimbursement pool: Up to $X per person for documented out-of-pocket losses
  • Enhanced security commitments: Company agrees to specific security improvements
💡 Claim Your Benefits: If you receive class action settlement notice, file a claim even if payout is small. Most settlements have low claim rates (5–15%), so those who file often receive more than estimated.
Regulatory Enforcement

In addition to private litigation:

  • FTC: Enforces unfair/deceptive practices; can bring actions for inadequate security
  • State AGs: Enforce state breach laws and consumer protection statutes
  • CCPA enforcement: California AG has exclusive enforcement authority for most CCPA violations
  • Industry regulators: HIPAA (healthcare), GLBA (financial), etc.
Attorney Services for Data Breach Matters
Data Breach Victim?

I represent consumers in data breach matters, including CCPA §1798.150 claims, class actions, and individual breach litigation. I also counsel businesses on breach response, notification obligations, and regulatory compliance.

For Consumers
  • Evaluate strength of breach claims (CCPA, negligence, contract)
  • Draft demand letters and CCPA §1798.150 pre-suit notices
  • Negotiate settlements for credit monitoring and compensation
  • Pursue individual breach litigation when damages justify
  • Assist with class action participation and claim filing
  • File complaints with FTC, CA AG, and regulatory agencies
  • Assess standing issues (concrete injury requirements)
For Businesses (Breach Response)
  • Immediate breach response and containment
  • Determine notification obligations (50-state analysis)
  • Draft consumer notifications and regulatory reports
  • Coordinate with cyber insurance carriers
  • Respond to CCPA §1798.150 pre-suit notices (30-day cure)
  • Defend breach litigation and class actions
  • Negotiate with state AGs and FTC
  • Implement enhanced security measures post-breach
Why Early Legal Advice Matters
Preserve Rights & Maximize Recovery: For consumers, early attorney involvement ensures CCPA notice requirements are met, damages are properly documented, and settlement offers are fairly evaluated. For businesses, immediate breach counsel prevents notification missteps, manages regulatory exposure, and coordinates insurance coverage.
Common Breach Scenarios
  • Healthcare data breaches (HIPAA + state breach laws)
  • Financial institution breaches (account numbers, SSNs)
  • Retail/e-commerce breaches (credit cards, customer data)
  • Employer breaches (employee SSNs, W-2s, health info)
  • Government agency breaches
  • Third-party vendor breaches affecting multiple entities
Schedule a Call

Book a call to discuss your data breach matter. I'll review the breach facts, assess your legal claims, and recommend strategy for pursuing compensation or defending against claims.

Contact Information

Email: owner@terms.law

Frequently Asked Questions
Difficult in federal court due to standing requirements. You need "concrete injury"—not just increased risk of future harm. However, you can establish standing by documenting time/money spent responding to breach (credit monitoring, freezing accounts, correspondence). Any documented out-of-pocket expense, no matter how small, helps establish standing. CCPA §1798.150 may provide statutory damages even without traditional harm if reasonable security was lacking.
Under §1798.150(b), before filing lawsuit for data breach under CCPA, you must give business 30 days' written notice specifying violations and opportunity to cure. Send via certified mail. If business cures within 30 days (provides credit monitoring, fixes security, compensates you), you cannot sue. This is mandatory—failure to provide proper notice will get your case dismissed.
Depends. Check: (1) Duration—24 months better than 12; (2) Coverage—all three bureaus better than one; (3) Identity theft insurance—$1M+ policy valuable; (4) Release terms—don't sign broad release waiving right to sue or join class action unless getting substantial additional compensation. Accepting credit monitoring alone typically doesn't waive legal rights, but read terms carefully. Consider negotiating for extended monitoring or additional cash payment.
Varies widely: (1) CCPA §1798.150: $100–$750 per incident (statutory) OR actual damages, whichever greater; (2) Actual damages: documented out-of-pocket costs + time spent × reasonable rate + any fraud losses; (3) Class actions: typically $25–$125 per person for general class members, more for those with documented harm; (4) Individual settlements: $500–$5,000+ if you have strong documentation and negotiate effectively. Most people's damages are modest unless they suffered actual identity theft.