In re PowerSchool Holdings, Inc. and PowerSchool Group, LLC Customer Security Breach Litigation | Ongoing | Labaton Keller Sucharow

By Cybersol·March 29, 2026·6 min read
SourceOriginally from In re PowerSchool Holdings, Inc. and PowerSchool Group, LLC Customer Security Breach Litigation | Ongoing | Labaton Keller Sucharow by LabatonView original

Private Equity Cost-Cutting and Third-Party Vendor Governance: The PowerSchool Litigation as Structural Warning

Why This Matters at Board and Regulatory Level

The PowerSchool breach litigation—now consolidated in federal court with 60+ million exposed K-12 records—exposes a governance architecture failure that extends far beyond a single vendor incident. The case demonstrates how cost optimization decisions made operationally (outsourcing cybersecurity to lower-cost contractors) create exponential liability exposure at board, regulatory, and contractual levels. Critically, the litigation names not only PowerSchool but also Bain Capital as a defendant, establishing precedent that private equity ownership bears direct accountability for vendor risk governance decisions. For organizations subject to NIS2, DORA, FERPA, and state data protection regimes, this case signals that vendor delegation without contractual safeguards, audit rights, and explicit liability allocation is no longer a procurement efficiency—it is a governance failure.

The Two-Tier Vendor Relationship and Supply Chain Opacity

The breach mechanism reveals a structural governance gap that most organizations overlook: PowerSchool outsourced critical cybersecurity and engineering functions to Movate, a third-party contractor described in the litigation as lacking "even basic security protocols." Schools contracted with PowerSchool for secure data management; PowerSchool contracted with Movate for security delivery; but schools had no contractual visibility into Movate's controls, no audit rights, and no direct liability allocation with the actual vendor. When ShinyHunters exploited compromised Movate employee credentials in December 2024, the breach propagated through a supply chain that schools could neither monitor nor contractually govern. This opacity—a vendor's vendor operating without transparent security standards—is precisely what NIS2 Article 17 (third-party risk management) and DORA Article 15 (critical third-party dependencies) now mandate organizations identify and contractually address. The PowerSchool case suggests that many organizations still treat vendor contracts as procurement documents rather than risk allocation instruments.

Bain Capital's Liability and the Board-Level Governance Implication

The litigation's inclusion of Bain Capital as a defendant—with the court sustaining claims for negligence, negligence per se, unfair competition, agency liability, direct liability, and aiding and abetting—establishes that ownership and board-level decisions about cost structure carry direct legal accountability. Plaintiffs allege that Bain, following its June 2024 acquisition of PowerSchool, "directed PowerSchool to offshore cybersecurity, engineering, and IT functions to third-party contractors with insufficient cybersecurity protocols." The court's March 2026 decision to allow these claims to proceed signals that boards cannot insulate themselves from vendor governance failures by claiming operational delegation. This is a material shift in liability allocation: cost-cutting decisions that result in inadequate vendor vetting or insufficient contractual safeguards are no longer treated as business judgment—they are treated as negligence. For boards overseeing organizations with third-party data processors or security vendors, this establishes that due diligence documentation, vendor audit protocols, and contractual security baselines are not optional governance enhancements; they are mandatory liability mitigation.

Contractual Safeguards as Liability Mitigation, Not Procurement Efficiency

The PowerSchool case underscores a critical distinction that many organizations fail to operationalize: vendor contracts are risk allocation instruments, not procurement documents. Cost-cutting justifications for outsourcing security functions must pair with explicit contractual mechanisms: security baselines and frameworks (ISO 27001, SOC 2 Type II), audit rights (annual third-party assessments, breach notification timelines), incident response protocols (detection and disclosure obligations), liability caps and indemnification clauses, and cyber liability insurance requirements. The litigation suggests these safeguards were either absent or unenforceable in PowerSchool's relationship with Movate. Schools that contracted with PowerSchool had no contractual mechanism to enforce security standards on Movate, no audit rights to verify controls, and no clear liability allocation when the breach occurred. For NIS2 and DORA-regulated entities, this contractual gap is now a direct compliance violation. Regulators will examine whether organizations have contractual requirements for vendors handling sensitive data, whether audit rights are explicit and exercisable, and whether liability allocation is clear and enforceable.

Regulatory Exposure and FERPA Responsibility Transfer Myth

PowerSchool, as an educational records processor under FERPA (Family Educational Rights and Privacy Act), bears direct responsibility for the security of student data. The litigation makes clear that outsourcing security functions to inadequately vetted vendors does not transfer that responsibility—it compounds it. Regulators examining this breach will assess: (1) whether PowerSchool conducted adequate due diligence on Movate's security posture before delegation; (2) whether contractual requirements for security standards were established and monitored; (3) whether audit rights were exercised; (4) whether incident detection and response protocols were adequate; and (5) whether notification obligations were met. The same analysis applies to any organization that delegates data processing or security functions to third parties. FERPA, state data protection laws, and now NIS2 and DORA all establish that responsibility for third-party risk management cannot be contracted away. This litigation will likely establish sector-wide precedent on what constitutes adequate due diligence, contractual governance, and audit oversight for educational technology vendors—with implications for healthcare, financial services, and critical infrastructure sectors that rely on similar outsourcing models.

Cybersol's Governance Perspective: The Overlooked Risk Layer

The PowerSchool case reveals a systemic weakness in how organizations approach vendor governance: they treat third-party risk as an operational or procurement function rather than a governance and liability function. Most organizations have vendor management processes, but few have contractual mechanisms that explicitly allocate liability, establish security baselines, grant audit rights, and require incident notification. The result is that when a breach occurs—particularly one involving a vendor's vendor—liability fragments, notification obligations become unclear, and regulatory exposure multiplies. Organizations often overlook the distinction between vendor management (operational oversight) and vendor governance (contractual risk allocation and board-level accountability). The PowerSchool litigation establishes that this distinction is now material to liability exposure. Boards cannot claim due diligence without documented evidence of vendor vetting, contractual security requirements, audit protocols, and incident response procedures. For organizations subject to NIS2, DORA, FERPA, HIPAA, or state data protection laws, vendor governance is no longer a procurement efficiency—it is a regulatory and liability imperative.


Source: Labaton Keller Sucharow, "In re PowerSchool Holdings, Inc. and PowerSchool Group, LLC Customer Security Breach Litigation," https://www.labaton.com/cases/in-re-powerschool-holdings-customer-security-breach-litigation


Closing Reflection

The PowerSchool litigation is not an isolated vendor breach case—it is a governance precedent. The court's decision to sustain claims against both PowerSchool and Bain Capital establishes that cost-cutting decisions affecting vendor security governance carry direct board-level liability. Organizations with third-party relationships involving data processing, security functions, or critical infrastructure should review this case for contractual gaps, audit protocol weaknesses, and liability allocation failures. The original complaint and court filings provide detailed analysis of what regulators and courts now consider adequate due diligence, and what they consider negligent delegation. For governance teams, this case is essential reading.