Washington educational resource

Washington business deliberately shared, sold, or sent your personal information to someone you did not authorize? Demand letter strategy

A hacker breach is a security failure. A deliberate disclosure of your personal information is a business decision. When a Washington company sold a list with your data, sent your file to a vendor outside the scope of its privacy notice, accidentally emailed your records to the wrong recipient, or posted your information on a public site, the legal framing is not the same as a Ch. 19.255 RCW breach case. The lever is the Consumer Protection Act at Chapter 19.86 RCW, supplemented by contract claims based on the company's stated privacy policy. Ch. 19.255 RCW remains relevant when the disclosure involves "personal information" within the statutory definition and the recipient was unauthorized, because the statute reaches unauthorized acquisitions of computerized data regardless of whether the acquirer is a hacker or a recipient who should not have received the file. The honest answer up front: the strength of the matter depends heavily on what the company's privacy policy actually said and how the disclosure happened.

Fast triage: what kind of disclosure is this?

The legal hooks: how Washington frames a deliberate disclosure

The CPA frame is usually the lead. prohibits unfair or deceptive acts or practices in trade or commerce. A company's privacy policy is a representation about how data will be handled; using the data in a way the policy did not authorize is deceptive on its face. The public-interest element under is rarely a problem because companies that handle data this way usually do it for many consumers, not just one. The remedy at supplies actual damages, the discretionary trebling enhancement capped at twenty-five thousand dollars per RCW 19.86.020 violation, and one-way attorney's fees. The four-year SOL under applies.

The Ch. 19.255 frame is the backup. defines a breach of system security by reference to unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information. A disclosure to a recipient who was not authorized to receive the data is an unauthorized acquisition by an unauthorized person. The encryption safe harbor still applies. If the company should have sent notice and did not, the consumer protection section at gives the Attorney General CPA-style enforcement authority and separately lets an injured consumer bring a civil action for damages and injunctive relief. The statute itself says, however, that an action to enforce Chapter 19.255 may not be brought under RCW 19.86.090, so the full Chapter 19.86 remedy stack (treble damages, one-way attorney fees) does not automatically attach to the breach-notification frame. A separate Chapter 19.86 CPA claim may still be available when the deliberate-disclosure facts independently satisfy the CPA elements, and that independent claim is what carries the trebling and fee-shifting leverage.

The contract frame is the third path. The company's privacy policy is a representation that, depending on the surrounding documentation, may also be a contract term. Breach of a privacy promise can support a separate contract claim with its own remedy. Most demand letters combine the CPA and contract frames because the CPA supplies the fee-shifting and the contract claim supplies a remedy for harms that are not "injury to business or property" in the CPA sense.

The publication-of-private-facts and intrusion-on-seclusion frames are common-law privacy tort theories. They have their own elements (a highly offensive disclosure, private facts not of legitimate public concern, identifiable injury). These are useful as parallel theories when the company posted something publicly that should never have been public.

What a Washington unauthorized-disclosure demand letter should do

Documents to gather before the letter goes out

When this is worth hiring an attorney

An attorney-drafted Washington unauthorized-disclosure letter is more likely to change the outcome when the privacy-policy gap is clean and documented in writing, when the recipient is a real third party whose conduct can be tracked (a data broker, a competitor, an unrelated business that started contacting you), and when documented injury is in the low four figures or higher. It is less likely to change the outcome when the privacy policy actually authorized the disclosure (read it carefully), when the recipient is a vendor whose use of the data is internal and not visible to you, or when the disclosure is so old that the four-year SOL is close to running.

What I review when you send a Washington disclosure matter

When you send the file I read the privacy policy in the version that was live when you provided the data, the disclosure evidence, your account record, and the company's response. I walk the CPA elements and the Ch. 19.255 backup against the specific facts and form an honest view of whether a $575 attorney-drafted demand letter is the right move, whether AG referral is more efficient, or whether the matter belongs in a class case already pending. The output is a written evaluation, not a sales pitch.

Primary sources

This page is an educational resource. Sergei Tokmakov is a California attorney (CA Bar #279869) currently seeking admission to the Washington State Bar. Nothing on this page creates an attorney-client relationship, and nothing on this page is Washington legal advice for a specific matter. A Washington-admitted attorney should verify both the operative statute text and any case citations before relying on them in court or correspondence on a live dispute.