About
Data Breach Response

Data Breach Response

Tracking how regulators, courts, and counsel are setting standards for cyber incidents - notification rules, ransomware response, and post-breach litigation.

10 entries in Litigator Tracker

DOJ export indictment triggers new probe of Super Micro’s controls

The Department of Justice unsealed an indictment in March 2026 charging three individuals tied to Super Micro Computer—two former employees and one contractor—with conspiring to violate U.S. export controls. The defendants allegedly diverted approximately $2.5 billion worth of servers containing advanced AI technology, including Nvidia chips, to China between 2024 and 2025. The indictment names co-founder and former senior vice president Yih‑Shyan "Wally" Liaw and a general manager from Super Micro's Taiwan office, who prosecutors say coordinated shipments through a third-party intermediary to circumvent export restrictions. Super Micro itself is not charged and has stated it was not accused of wrongdoing.

Data as Value – and Risk: Litigation Issues Facing Technology Providers and Their Customers

Organizations across all sectors are facing a wave of litigation over their data practices and AI systems. According to a Baker Donelson report, these legal challenges now extend well beyond technology companies and data brokers to affect organizations of every size that rely on data for operations, network security, regulatory compliance, and contractual obligations. The disputes involve civil liberties groups, workers' advocates, and privacy organizations pursuing claims centered on data privacy violations, algorithmic bias, unauthorized data use, AI system liability, and worker surveillance.

Federal Court Rules AI Chatbot Communications Not Protected by Attorney-Client Privilege

On February 17, 2026, Judge Jed S. Rakoff of the U.S. District Court for the Southern District of New York ruled in United States v. Heppner that a criminal defendant's communications with Anthropic's Claude AI platform were not protected by attorney-client privilege or work product doctrine. The defendant had used the public chatbot to create analysis documents after receiving a grand jury subpoena, then claimed privilege when sharing them with counsel. The court ordered disclosure to the government.

ACC Urges CA Appeals Court to Rule CIPA Doesn't Cover Website Cookies, Pixels

The Association of Corporate Counsel filed an amicus brief on April 8, 2026, urging the California Court of Appeal to clarify that the California Invasion of Privacy Act does not extend to routine website technologies like cookies, tracking pixels, and analytics metadata. ACC argues that plaintiffs are mischaracterizing these tools as "pen registers" or "trap and trace devices"—law enforcement surveillance mechanisms that require court orders under CIPA—when they serve ordinary business functions. The brief, authored by Fisher Phillips attorneys Usama Kahf, Darcey Groden, and David Shannon, contends that applying CIPA's warrant requirement to standard web analytics creates untenable compliance burdens for businesses nationwide.

Workers File 7 Class-Action Lawsuits Against Mercor Over Data Breach Exposure[1][2]

Mercor, a $10 billion San Francisco AI startup that supplies training data to OpenAI, Anthropic, and Meta, is defending itself against at least seven class-action lawsuits filed in recent weeks. The suits stem from a data breach last month that exposed contractor information including recorded job interviews, facial biometric data, computer screenshots, and background checks. Plaintiffs allege Mercor violated federal privacy regulations by collecting extensive data through monitoring software like Insightful, sharing it with AI partners, and using interviews and proprietary materials to train models without adequate consent or disclosure.

Unintentional AI Adoption Is Already Inside Your Company. The Only Question Is Whether You Know It.

Unauthorized AI tools have become endemic in corporate environments, with nearly half of all workers admitting to using unapproved platforms like ChatGPT and Claude at work. A 2025 Gartner survey found that 69% of organizations either suspect or have confirmed that employees are using prohibited generative AI tools, while research indicates the figure reaches 98% when accounting for all unsanctioned applications. The problem spans organizational hierarchies: 93% of executives report using unauthorized AI, with 69% of C-suite members and 66% of senior vice presidents unconcerned about the practice. Gen Z employees lead adoption at 85%, and notably, 68% of workers using ChatGPT at work deliberately conceal it from employers.

GrayRobinson Hit with Additional Lawsuits Over 2025 Data Breach

GrayRobinson, P.A., a Florida-based law and lobbying firm, disclosed a cybersecurity breach affecting 65,113 individuals. Unauthorized actors accessed the firm's network between March 5 and March 24, 2025, potentially exposing names, Social Security numbers, dates of birth, driver's licenses, financial account information, and protected health information. The firm detected the intrusion on March 24, secured its systems, notified law enforcement, and engaged external cybersecurity experts. The forensic investigation concluded April 13, 2026. Notifications to affected individuals began April 24, 2026, with regulatory reports filed to state attorneys general including California and Maine. GrayRobinson offered complimentary Experian IdentityWorks credit monitoring and reported no evidence of actual misuse.

If you see this iCloud message on your iPhone, don’t click it—it’s a scam

A widespread phishing campaign is targeting Apple users globally with fraudulent emails and text messages impersonating iCloud notifications. The scams warn recipients that their cloud storage is full and direct them to click links to upgrade or manage their accounts. Those links lead to convincing fake websites designed to harvest Apple ID credentials, credit card information, and other sensitive data—sometimes triggering malware downloads. Apple has confirmed it sends legitimate storage alerts only through device settings and official system notifications, never through unsolicited emails or texts requesting passwords or payment information.

GrayRobinson Faces Class Action Over 2025 Data Breach Negligence

GrayRobinson, P.A., a Florida-based law firm, disclosed a data breach affecting 65,113 individuals between March 5 and March 24, 2025. Unauthorized actors accessed the firm's network during that period, potentially exposing names, Social Security numbers, and other sensitive personal information. The firm detected the intrusion on March 24, secured its systems, notified law enforcement, and retained third-party investigators. A forensic review completed in April 2026 confirmed the exposure, and GrayRobinson sent breach notices on April 24, 2026. The firm is offering two years of free identity monitoring through Experian. No evidence of actual misuse has emerged.

CT AG Tong Issues Feb. 25 Memo Applying Existing Laws to AI

Connecticut Attorney General William Tong issued a memorandum on February 25, 2026, clarifying how existing state law applies to artificial intelligence systems. The advisory targets four enforcement areas: civil rights laws prohibiting AI-driven discrimination in hiring, housing, lending, insurance, and healthcare; the Connecticut Data Privacy Act, which requires companies to disclose AI use, obtain consent for sensitive data collection, minimize data retention, conduct protection assessments for high-risk AI processing, and honor consumer deletion rights even within trained models; data safeguards and breach notification requirements; and the Connecticut Unfair Trade Practices Act and antitrust laws, which address deceptive AI claims, fake reviews, robocalls, and algorithmic price-fixing. The memorandum applies broadly to any business deploying AI in consequential decisions and specifically references harms including AI-generated nonconsensual imagery on platforms like xAI's Grok.

LawSnap Briefing Updated May 7, 2026

State of play.

  • The state privacy patchwork has reached 20 active regimes, with Indiana, Kentucky, and Rhode Island activating January 1, 2026, and California's DELETE Act DROP platform operationalizing ahead of an August 1 deadline carrying $200-per-day penalties — enforcement is accelerating without cure periods across most jurisdictions (→ Three New State Privacy Laws Activate January 1, 2026, Expanding U.S. Patchwork to 20 States).
  • Private equity cyber liability has broken new ground: a federal judge in California has allowed data breach claims against Bain Capital to proceed for a breach at PowerSchool that predated Bain's acquisition close, with the court examining pre-closing veto rights and post-closing offshoring of cybersecurity functions as the liability hook .
  • Law firms remain high-value targets with active litigation: GrayRobinson faces multiple class actions after a 2025 breach affecting 65,113 individuals, with complaints citing outdated technology and reckless security practices — filed within days of breach notifications going out (→ GrayRobinson Faces Class Action Over 2025 Data Breach Negligence, GrayRobinson Hit with Additional Lawsuits Over 2025 Data Breach).
  • CIRCIA finalization is imminent: CISA is expected to finalize rules in May 2026 triggering 72-hour incident reporting and 24-hour ransomware payment reporting obligations across 16 critical infrastructure sectors, with commercial real estate now flagged as potentially covered .
  • For counsel advising corporate clients, PE sponsors, or professional service firms, the practical baseline is a multi-front exposure: state privacy enforcement without cure periods, novel PE-level breach liability, and federal incident-reporting obligations that may arrive before clients have mapped their covered-entity status.

Where things stand.

  • Unsanctioned AI use is a structural breach surface. A 2025 Gartner survey found 69% of organizations suspect or have confirmed prohibited generative AI tool use; research puts the figure at 98% when accounting for all unsanctioned applications, with 33% of workers admitting to sharing enterprise research and 27% exposing employee data through these tools (→ Unintentional AI Adoption Is Already Inside Your Company. The Only Question Is Whether You Know It.). This is a workforce-governance problem, not a perimeter-security problem.
  • "Silent ransom" attacks on law firms are active and documented. The Silent Ransom Group has confirmed breaches at Jones Day and Orrick Herrington & Sutcliffe, using vishing and social engineering that bypass traditional endpoint detection — no malware, no lockup, direct extortion under threat of dark-web publication .
  • C-suite social engineering has escalated. Former Black Basta affiliates ran a coordinated campaign in March 2026 targeting senior leadership in manufacturing and professional services, compressing the full compromise cycle to approximately 12 minutes; 77% of incidents that month targeted C-suite .
  • SEC and FINRA enforcement against RIAs is active. Amended Regulation S-P requirements for larger advisers are in effect in 2026; the SEC settled with an RIA and broker-dealer in November 2025 for Reg S-P and S-ID violations; FINRA's 2026 Oversight Report flags voice-spoofing MFA fatigue and AI-enabled fraud as primary vectors .
  • CalPrivacy DROP platform is live and audit rulemaking is underway. Over 242,000 deletion requests have been submitted since January 2026; mandatory broker audits begin January 2028; the comment period on audit standards closed May 7, 2026 (→ CalPrivacy Opens Preliminary Comments on DROP Audit Rules for Data Brokers, Three New State Privacy Laws Activate January 1, 2026, Expanding U.S. Patchwork to 20 States).
  • Stolen credentials are the dominant initial-access vector. Reporting synthesizing Verizon, IBM, and Darktrace data indicates 49-70% of breaches now begin with compromised logins; the average breach cost involving credential theft reached $4.44 million in 2026 .
  • Nation-state supply chain attacks are targeting software dependencies. North Korea-affiliated actors breached the Axios npm package in a supply chain attack that exposed OpenAI's macOS app signing workflow; Russia-linked actors compromised 170+ Ukrainian prosecutors' email accounts .
  • Local government ransomware incidents are escalating. Winona County, Minnesota experienced its second ransomware attack in four months, prompting gubernatorial National Guard deployment — a rare state-level response that signals the ceiling on local incident-response capacity .
  • Quantum computing is an emerging encryption threat. Practitioner commentary flags the accelerating timeline for post-quantum cryptography migration as a compliance planning issue .

Latest developments.

  • Three new state privacy laws activated January 1, 2026 (Indiana, Kentucky, Rhode Island), bringing active regimes to 20; California DELETE Act DROP platform live with August 1 broker-processing deadline and $200/day penalties (→ Three New State Privacy Laws Activate January 1, 2026, Expanding U.S. Patchwork to 20 States)
  • Federal judge allows data breach claims against Bain Capital to proceed for pre-acquisition PowerSchool breach — first ruling of its kind extending PE liability to portfolio company cyber failures
  • GrayRobinson faces multiple class actions over 2025 breach affecting 65,113 individuals; first suit filed four days after breach notifications issued (→ GrayRobinson Faces Class Action Over 2025 Data Breach Negligence, GrayRobinson Hit with Additional Lawsuits Over 2025 Data Breach)
  • Stryker Q1 2026 earnings miss attributed directly to March 11 Iran-linked cyberattack disrupting operations across 61 countries; six employee lawsuits filed over stolen personal data
  • Mercor AI startup defending seven class actions after breach exposed contractor biometric data, recorded interviews, and background checks; Meta has paused its relationship with the company (→ Workers File 7 Class-Action Lawsuits Against Mercor Over Data Breach Exposure[1][2])
  • CIRCIA finalization expected May 2026; Clark Hill flags commercial real estate as potentially covered under 16-sector critical infrastructure framework
  • RIA cybersecurity enforcement active: amended Reg S-P in effect for larger advisers; SEC exam priorities include governance, data loss prevention, and ransomware preparedness
  • Nelson Mullins publishes playbook framing viral social media posts as cyber incidents requiring tabletop-exercise preparation and designated response teams (→ Law Firm Highlights Rising Demand for Viral Post Removal Services)
  • HaystackID's EU expansion highlights EU e-Evidence Regulation compliance pressure on multinational eDiscovery workflows
  • IRS-ICE tax data sharing injunctions remain in effect after court finds approximately 42,695 disclosures violated federal law; IRS Chief Privacy Officer resigned

Active questions and open splits.

  • PE-level breach liability standard. The Bain/PowerSchool ruling has not yet detailed its reasoning for piercing the corporate structure or the standard for when post-closing cost-cutting decisions retroactively expose a PE firm to predecessor-breach liability — the doctrine is unsettled and the decision will be closely watched for its reasoning .
  • AI training data and contractor privacy rights. The Mercor litigation tests whether biometric data collection, worker monitoring, and use of contractor-generated materials for model training without explicit consent constitute actionable privacy violations — no settled federal standard governs this in the AI training context (→ Workers File 7 Class-Action Lawsuits Against Mercor Over Data Breach Exposure[1][2]).
  • Shadow AI as a reportable breach vector. Whether regulators will treat unsanctioned AI use — where employees share enterprise data with third-party platforms — as a notice-required event or as a contributing factor in enforcement is unresolved; no agency has yet named it as a standalone trigger (→ Unintentional AI Adoption Is Already Inside Your Company. The Only Question Is Whether You Know It.).
  • "Silent ransom" notification timing. When extortion occurs without traditional ransomware indicators — no encryption, no system lockup — the point at which the notification clock starts and what constitutes a reportable "incident" under state and federal frameworks remains contested .
  • CIRCIA covered-entity scope. The final rule has not yet defined which commercial real estate operations, professional service firms, or technology companies fall within the 16 critical infrastructure sectors — clients in adjacent industries cannot yet determine their reporting obligations .
  • Geopolitically motivated breach liability. Stryker's Iran-linked attack and the Mercor breach both raise the question of whether courts will apply a different liability standard when the threat actor is a state-affiliated hacktivist group versus a commercial ransomware operator — particularly for healthcare infrastructure .
  • VPPA circuit split on Meta Pixel claims. Federal courts continue to diverge on whether Facebook User IDs transmitted via Meta Pixel constitute personally identifiable information under the Video Privacy Protection Act, creating inconsistent exposure for media and e-commerce clients .

What to watch.

mail Subscribe to Data Breach Response email updates

Primary sources. No fluff. Straight to your inbox.

Also on LawSnap