“Further, deficiencies of legacy systems used in recording, monitoring and processing of such claims present significant risk of breach of privacy of parties involved. This is evidenced by the multi ...