Nobles v. Google, Inc. et al
Filing
1
CLASS ACTION COMPLAINT against Google, Inc., Pointroll, Inc. ( Filing fee $ 350, receipt number 44611009082). DEMAND FOR JURY TRIAL. Filed byZetha Nobles. (far, COURT STAFF) (Filed on 7/10/2012) (Additional attachment(s) added on 7/12/2012: # 1 part two, # 2 Civil Cover Sheet) (far, COURT STAFF).
I'
.'(
1
2
3
4
'-.~
REGINA D TERRELL, ESQ.
THE TE
LL LAW GROUP
Post Offic Box 13315, PMB #148
Oakland, alifornia 94661
Tele{'hon : (510) 237-9700
Facsimile: (510) 237-4616
Email: R iet2 aol.com
~
r
JUL 7 ·
AI
0 2012
cL£JHAAo
NORTHeR~ 0 DISTArl£ktNG
U.s.
UNITED STATES DISTRICT COURT
3f:fAcNro;6~B~Ar
5
6
w
D
8
ZETHA OBLES, individually and on behalf) CASE NO.:
of all othe s similarly situated,
~
10
Plaintiff,
11
14
GOOGLE INC., a Delaware Corporation and ~
POINTR LL, INC., a Delaware Corporation )
)
Defendants.
)
17
DEMAND FOR JURY TRIAL
~
15
~
C12-03589
)
) CLASS ACTION COMPLAINT
)
~
v.
12
13
Q
ORN!A • \
NORTHERN DISTRICT OF CALIFORNIA
7
9
Jl ~
l.....c::,Q
)
)
------4-------------------------)
18
CLASS ACTION COMPLAINT
19
"
PI intiff Zetha Nobles ("Plaintiff'), by and through her attorney brings this action on
20
behalf of erself and all others similarly situated against Google, Inc. and PointRoll, Inc.
21
Plaintiff's allegations as to herself and her own actions, as set forth herein, are based upon her
22
informati n and belief and personal knowledge, and all other allegations are based upon
23
informati n and belief pursuant to the investigations of counsel. This Court has subject matter
24
jurisdictio pursuant to the Class Action Fairness Act of2005, 28 U.S.C. § 1332 (d) as set forth
25
below.
26
I. NATURE OF THE ACTION
27
28
1.
Plaintiff brings this consumer Class Action lawsuit pursuant to Federal Rules of
Civil Pro edure 23(a), (b)(l), (b)(2), and (b)(3), on behalf of herself and a proposed class of
CLASS ACTION COMPLAINT
1
i
1
2
similarly ituated Individuals, (hereinafter referred to as the "Class Members"), who were
victims o unfair, deceptive, and unlawful business practices; wherein their privacy, financial
3
interests,
d security rights were violated by Defendant Google, Inc. (hereinafter referred to
4
5
individua ly as "Google"), and Defendant PointRoll, Inc. (hereinafter referred to individually as
6
"PointRo 1" and collectively with Google as "Defendants"), that acted individually, and in
7
concert, t gain unauthorized access, use, and retention of Plaintiffs and Class members' data
8
contained within their computing devices, which includes computers and mobile electronic
9
10
11
12
13
devices u ed for communication, internet, and multimedia capabilities (hereinafter referred to
collective y as "Computing Devices").
2.
This Class Action lawsuit is brought by Plaintiff and Class Members who had
their Co puting Devices accessed without notice or consent, by circumventing their privacy
14
settings i order to obtain personally identifiable information, including that of minor children,
15
16
17
18
19
including but not limited to, settling tracking mechanisms within their computing devices for
subseque t online tracking by Defendants.
Defendants acted individually, and jointly, and knowing authorized, directed,
ratified, a proved, acquiesced in, or participated in conduct made the basis of this Class Action.
20
Defendan s used Plaintiffs and Class Members' Computing Devices to access, retain, and
21
22
disclose p rsonal information ("PI"), personally identifiable information ("PII"), and/or sensitive
23
identifiab e information ("SII") derived from Plaintiffs and Class Members' Computing Device
24
while the browsed online or wirelessly. Defendants accomplished this covertly, without actual
25
notice, a areness, or consent and choice, and which information Defendants obtained
26
27
deceptive y, for purposes which included Defendants' commercial gain and nefarious purposes.
28
CLASS ACTION COMPLAINT
2
f
1
2
4.
Defendants acted individually, and jointly, with entities involved in whole, or
part, with advertising networks, data exchanges, traffic measurement service providers, and
3
marketin and analytic service providers that develop and service websites (hereinafter referred
4
ely as "Google Affiliates").
5
Each Google Affiliate committed acts made the basis of this action, individually
6
7
8
, both intentionally and negligently, in whole or part, acting as a direct or contributory
party tot e action made the basis of this action. Pending discovery of the Google Affiliates'
9
and involvement at the various stages of the acts complained of, and made the bases
10
plaint, Plaintiff will amend the complaint to include such parties.
11
12
13
6.
Defendants individually, and in concert with Google Affiliates, have been
systemati ally engaged in and facilitated a covert operation of surveillance of Class Members
14
and the :D llowing violations:
15
1)
Violations ofthe Computer Fraud and Abuse Act, 18 U.S.C. § 1030;
17
2)
Violations ofthe Electronic Communications Privacy Act, 18 U.S.C. §
18
2510 et seq.;
16
19
3)
Violations of California Computer Crime Law, Penal Code § 502;
4)
Violations of California's Invasion Of Privacy Act, California Penal
20
21
22
Code§ 630 et seq.;
23
5)
24
Professions Code § 17200 et seq.;
25
6)
Violations of California Unfair Competition Law, Business and
Violations of California Consumers Legal Remedies Act, Civil Code §
26
27
1750 et seq.;
28
CLASS ACTION COMPLAINT
3
1
7)
2
Violations of California Customer Records Act, Cal. Civ. Code §
1798.80 et seq.;
3
8)
Conversion;
5
9)
Trespass to Personal Property I Chattels; and
6
10)
Unjust Enrichment.
4
7
8
II.
7.
JURISDICTION AND VENUE
This Court has diversity jurisdiction in this case under a Class Action Fairness
9
Act, 28 U.S.C. § 1332(d)(2). This complaint states claims on behalf of a national class of
10
11
consumer who are minimally diverse from Defendants. The amount in controversy exceeds $5
12
million, e elusive of interest and costs. The class consists of more than one hundred members.
13
8.
This Court also has federal question jurisdiction under 28 U.S. C. § 13 31 as this
14
action ari s in part under a federal statute, the Computer Fraud and Abuse Act.
15
16
17
18
19
9.
This Court has supplemental jurisdiction with respect to the pendent state law
claims un er 28 U.S.C. § 1367.
10
This Court has personal jurisdiction over Defendants because some ofthe acts
alleged he ein were committed in the state of California and because Defendants are registered to
20
do busine s in this state and systematically and continuously conduct business here.
21
22
11
Venue is proper in this Court under 28 U.S.C. § 1391 because Google is a
23
corporati
24
in, was di ected from, and/or emanated from this District.
25
12
headquartered in this District and/or because Defendants' improper conduct occurred
INTRADISTRICT ASSIGNMENT: Pursuant to Civil Local Rule 3-2(e), this
26
case shall be assigned to the San Jose Division as it arises from Santa Clara County where
27
28
CLASS ACTION COMPLAINT
4
f
1
2
Defendan Google is headquartered and where the actions alleged as the basis of this claim took
place.
3
III.
PARTIES
4
5
Plaintiff is an individual who owns and uses Apple's Safari and Microsoft's
13
6
Internet E~plorer ("IE") browsers that were protected by default privacy settings and/or higher
7
privacy st ttings to restrict the ability of websites that use persistent browser cookies in collecting
8
users' PI, PII, and SII.
9
14.
Plaintiff Zetha Nobles is a resident of Oakland, Alameda County, California.
1' .
On information and belief, Plaintiff Zetha Nobles incorporates all allegations
10
11
12
13
14
within this complaint.
H.
At all relevant times herein, Villegas owned Computing Devices, including a
personal~ omputer with IE and a mobile device which had Apple's Safari browser, and used the
15
16
17
Computi1 g Devices, and on one or more occasions during the class period, in the city of
residence and accessed the following websites reportedly associated with Defendants:
18
a.
http://allrecipes.com/
b.
http://www. businessweek.com/
c.
http://www.cbsnews.com/
22
d.
http://www.foodnetwork.com/
23
e.
http://www.huffingtonpost.com/
24
f.
http://www.meriam-webster.com/
g.
http://www. washingtonpost.com/
19
20
21
25
26
1 ~.
Defendants, acting in concert individually and jointly, gained unauthorized acces
27
28
to, and u~authorized use ofNobles' Computing Device data.
CLAS
ACTION COMPLAINT
5
1
2
18
Defendant Google, Inc. is a publicly traded Delaware corporation headquartered
at 1600 Alnphitheatre Parkway, Mountain View, California 94043 (Santa Clara County,
3
California11. Google does business throughout the United States.
4
5
6
7
8
19
Google is the owner and operator of the website located at
htto://wwlv.Goo2:le.com, as well as a provider of advertising services through doubleclick.net.
20
Defendant PointRoll, Inc. is a publicly traded Delaware corporation
headquart red at 7950 Jones Branch Drive, McLean, Virginia 22102. PointRoll does business
9
10
11
throughou the United States.
21
PointRoll, a rich media advertising company, entered into a contract with
12
Defendan Google, a California Corporation, and the acts made the basis of this action emanated
13
to and fro jn the Defendant Google's servers located in Mountain View, California.
14
22
PointRoll is the owner and operator of the website located at
15
16
17
18
19
htto://wwlv.Pointroll.com, and provides digital marketing solutions and technology for rich
media can paigns in interactive advertising,
23
On February 17, 2012, Jonathan Mayer, a Stanford researcher, published a study,
"Web Pol'cy- Do Not Track, Measurement, Privacy," ("Mayer Study") which "found that a
20
PointRoll rookie helper script circumvents Safari's cookie blocking." In a blog post, PointRoll
21
22
23
said it "co~ducted a limited test within the Safari browser to determine the effectiveness of our
mobile ad ,"but claims it does not currently use the technique mentioned in Mayer's report.
24
25
IV.
GENERAL ALLEGATIONS
I.
A Brief Overview
24
On October 13,2011, Defendant Google signed a consent order with the FTC
26
27
28
which bar ed it from making misrepresentations regarding its privacy policies, required the
CLASS ~CTION COMPLAINT
6
f
1
2
implemen ation of a comprehensive privacy program, and the retention of an independent thirdparty profl~ssional to access its privacy controls.
3
25
On October 19,2011, the World Wide Web Consortium ("W3C"), the main
4
5
internatio ~al standards organization for the World Wide Web, announced that Google was one o
6
its sponsors for the W3C Organization Sponsor Program, a program to enhance the W3C's
7
capacity tp support the deployment of web standards:
8
9
10
11
"W3C has been a cornerstone component of the World Wide
Web's evolution and Google is pleased to be able to support and
participate in its process," said Vint Cerf, Chieflnternet Evangelist
at Google and an Internet pioneer.
W3C, "Vv 3C Welcomes Google as First Gold Sponsor, Adobe Backs Initiative Supporting W3C
12
Mission 't Silver Level," (last accessed February 21, 2012), available online at:
13
14
15
16
17
htto://wv.w_.w3.ond2011/09/soonsor-or.html.
2<.
During this week of October 13-19, 2011, while Defendant Google was agreeing
to new p ivacy constraints and accepting accolades, it was also circumventing the privacy
settings c n Computing Devices for billions of Internet users, intentionally ignoring a cornerstom
18
component of the World Wide Web's evolution: Platform for Privacy Preferences ("P3P").
19
On February 17, 2012, a research study by Jonathan Mayer, revealed Defendants
20
21
Google and PointRoll were circumventing and exploiting the Safari browser in order to place
22
diagnost'c tools to track Safari browser users' activity. A research study by Microsoft confirmec
23
the same exploits for users of Internet Explorer.
24
2$.
While the Mayer Study can be credited with revealing the Defendants' recent
25
26
activitie , a past study by Professor Lorrie Faith Cranor of Carnegie Mellon University first
27
revealed these practices by some entities in September 2010 in a study titled "Token Attempt:
28
CLASS ACTION COMPLAINT
7
1
2
The Misrepresentation of Website Privacy Policies through the Misuse ofP3P Compact Policy
Tokens."
3
2S.
Google's Senior Vice President of Communications Policy, Rachel Whetstone,
4
5
issued as atement, noting in part in response to its practice, "that it is impractical to comply with
6
Microsof 's request while providing modem web functionality." GreekWire.com, Todd Bishop,
7
"Google: Microsoft's IE gotcha based on outdated, little-used privacy protocol," (last accessed
8
February 21, 20 12), available online: http://www. IZeekwire.com/20 12/fmo!Zle-microsofts-gotcha
9
10
based-ou dated-littleused-orivacv-nrotocol.
3b.
11
Interestingly enough, the privacy setting protections not afforded Internet users
12
involved with Defendants, claimed by Google to be archaic and impractical, are at the same tim
13
sought bty Defendant Google: it uses a valid P3P syntax for its advertising sites.
14
1.
An analysis using "Fiddler 2," a Web Debugging Proxy which logs all HTTP(S)
15
16
traffic b~>tween your computer and the Internet, (last accessed on: February 22, 2012) online:
17
http://fi dler2.com/fiddler2/, revealed the following: P3P Header is present: policy ref=
18
htto://www.!Zoo!Zleadservices.com/oa1Zead/o3o.xml, CP= "NOI DEV PSA PSD IVA PVD OTP
19
OTR I1' D OTC" compact policy token is present. Date: Wednesday, 22 February, 2012 11:41: 2
20
GMT.
21
22
32.
P3P provides protection like a fortress around one's Computing Devices.
23
Defenc ants' actions have unleashed a "Trojan Horse" of entities armed with every conceivabl~
24
trackin~
25
tool into Plaintiffs and Class Members' Computing Devices. Due to the amount of
third-p~rties
associated with Defendants, the task to identify and delete all tracking tools
26
27
impler~ented
will be a Herculean task. As such, analysis of each "cookie" that now exists in e ch
28
CL SS ACTION COMPLAINT
8
1
2
ofPlainti fs and Class Members' Computing Devices is needed, requiring a "toxic cookie
cleanup."
3
3 .
Plaintiff and Class Members do require the use of authorized cookies; thus they
4
5
cannot m rely push one button and delete all tracking devices. As such, since the identifying of
6
entities a sociated with each cookie residing within the Plaintiffs and Class Members'
7
Computi g Devices are unknown, but at least some include Defendants' cookies, an analysis of
8
each coo ie is required and appropriate detection required. An estimate of such a requirement is
9
10
in excess often thousand dollars ($10,000) per Plaintiff and Class Member.
11
Background: Web Browser's Incorporation ofP3P for Cookie Filtering
12
P3P, the Platform for Privacy Preferences, provides a language and process that
13
websites an use to post their privacy policies in a machine-readable form - that is, a form that
14
can be pr cessed by software such as web browsers. A website can post a full P3P policy,
15
16
describi g a variety of its privacy practices, or a "Compact Policy," describing its uses of
17
18
19
In 2001, Microsoft released version 6 of its market-leading Internet browser
software Internet Explorer ("IE6"), and included in it the capabilities to process websites' P3P
20
Compac Policies. IE6 processed websites' Compact Policies automatically and, based on
21
22
privacy ettings that Microsoft set by default and that users could adjust, automatically allowed
23
or restri ted websites' storage of cookies on users' computers.
24
25
36.
Before P3P, a privacy-conscious Internet user who wanted to learn about
websites cookie practices had only one choice - to read the privacy policy of every website
26
27
28
visited
and to do so often, given that many websites advised users to "check back regularly to
view up ates to this policy."
CLAS
ACTION COMPLAINT
9
1
3 .
This approach to managing cookies raised problems for users:
2
a.
It is effectively impossible for a user to take the time to read the privacy
3
policy of very website visited - and to do so continually to stay abreast of changes.
4
b.
5
It is challenging for a user to try to interpret websites' privacy policies
6
because, ven among websites with substantially similar privacy practices, each website
7
describes its practices in different ways and with varying levels of detail.
8
c.
It is difficult for a user to determine which details of a website's privacy
9
10
policy ap ly to which parts of the website, since a website's privacy practices may vary from
11
page top ge, such as a home page where the user signs up to use the website, a shopping-cart
12
page whe e the user's purchase selections are listed, or a checkout page where the user provides
13
credit car and shipping information.
14
d.
It is impossible for a user to read a website's privacy policy "manually"
15
16
without a tually visiting the website, which means the user has to visit a website and receive
17
whatever ookies the website delivers before the user has the chance to learn what the site's
18
practices
19
e.
38.
The advent ofP3P helped address these issues, as follows:
20
a.
P3P provided a common language and syntax that websites could use to
21
22
provide
23
Policies. ee "The Platform for Privacy Preferences 1.1 (P3P 1.1) Specification, W3C Working
24
Group No e, Nov. 2006, available at http://www.w3.org/TR/P3P11 (last accessed on February
25
achine-readable versions of their privacy policies, including cookie-specific Compact
21, 2012).
26
27
28
b.
P3P privacy statements could be quickly read by the user's web browser
each time he user directed the browser to access a web page.
CLASS ACTION COMPLAINT
10
1
2
c.
P3P permitted websites to offer granular privacy policies, tailored to the
unique c okie practices of specific web pages within a website.
3
d.
P3P-enabled web browsers could alert users to a websites' privacy
4
5
practices before the user actually communicated with, and received cookies from, the website,
6
and coul automatically filter and restrict cookies based on the users' privacy settings, includin
7
default rivacy settings.
8
9.
In a world in which websites automatically and non-transparently examine a
9
user's e ery online movement, IE6 gave users the ability to have their computers automatically
10
11
examin the abbreviated privacy information that websites choose to disclose in their Compact
12
Policies Subsequent versions of IE gave users the same or better capabilities. IE assessed
13
website ' cookie policies for users before the users even visited and acquired cookies from
14
website . In addition, in response to the users' privacy settings, IE could take certain actions in
15
to the P3P information it acquired, such as accept, reject, or restrict the cookies that
16
17
transmitted to users.
18
0.
19
throu
Compact Policies, such as those that IE enabled users to assess automatically
their web browser, are expressed as a series of codes, called "tokens," each of which
20
represe ts a standardized privacy expression defined in the P3P specification. For example, in
21
22
23
24
25
CP= "NOI DSP COR NID ADMa OPTa OUR NOR"
The" ID" token means that no identified user information is collected by the web pages to
which he Compact Policy applies or, if it is collected, it is anonymized in a way that cannot
26
reason bly be reversed to reveal the user's identity; and the "OUR" token means that identifie
27
28
CL SS ACTION COMPLAINT
11
1
user infmmation is shared only with an agent whose use of the information is restricted to the
2
purposes stated by the website. Likewise, the other tokens have predetermined meanings.
3
4 .
Under IE's default privacy settings, a website's unsatisfactory P3P Compact
4
Policy c2 n lead to several consequences. IE allows or limits cookies in different ways, dependin
5
on the st tements in the Compact Policy and whether the web entity offering the policy is a first
6
7
party (a Nebsite that the user explicitly chooses to visit) or a third party (such as entities that
8
display l dvertisements on a first-party website). For example, if a first-party website's Compact
9
Policy sates that the website shares user PII without user consent, IE downgrades the website's
10
"persistt nt" cookie to a "session" cookie- i.e., one that expires at the end of the user's browser
11
sesswn.
12
13
14
2.
collect heir information; the release of IE6 prompted many websites to implement P3P Compact
15
16
17
Persistent cookies serve as an important device for websites to identify users anc
Policie
so they could continue to set persistent cookies on the computers of users who adoptee
IE6.
18
III.
Defendants' Misuse of P3P
19
43.
On February 17, 2012, Jonathan Mayer, a Stanford researcher published a stud',
20
"Web
21
22
23
24
25
26
27
intenti
olicy- Do Not Track, Measurement, Privacy" that revealed the Defendants were
nally circumventing Safari privacy features. Microsoft researchers also completed a st1 dy
that sh~wed similar circumvention.
A. The Mayer Study
Apple's Safari web browser is configured to block third-party
cookies by default. We identified four advertising companies that
unexpectedly place trackable cookies in Safari. Google and
Vibrant Media intentionally circumvent Safari's privacy feature.
28
1
C ASS ACTION COMPLAINT
Media Innovation Group and PointRoll serve scripts that appear to
be derived from circumvention example code ....
1
2
5
Some companies track the cookies generated by the websites you
visit, so they can gather and sell information about your web
activity. Safari is the first browser that blocks these tracking
cookies by default, better protecting your privacy. Safari accepts
6
cookies only from their current domain ....
3
4
7
8
9
10
11
12
13
14
15
16
17
18
These allowances in the Safari cookie blocking policy enable three
potentially undesirable behaviors by advertising networks,
analytics services, social widgets, and other 'third-party websites.'
If a company operates both a first-party website and a third-party
website from the same domain, visitors to the first-party website
will be open to cookie-based tracking by the third-party service ....
Separating first-party websites from third-party services improves
security: interactions between google.com content and other
websites could introduce vulnerabilities. The domain separation
also benefits user privacy: Google associates user account
information with google.com cookies. By serving its third-party
services from other domains, Google ensures it will not receive
google.com cookies, and therefore will not be able to trivially
identify user activities on other websites.
"Web Pt>licy" (last accessed on: February 21, 2012), available online at:
19
20
21
22
23
24
25
http://w boolicv.org/20 12/02117/safari-trackers/.
:J. Microsoft Study
When the IE team heard the Google had bypassed user privacy
settings on Safari, we asked ourselves a simple question: is Google
circumventing the privacy preferences of Internet Explorer users
too? We've discovered the answer is yes: Google is employing
similar methods to get around the default privacy protections in IE
and track IE users with cookies ....
26
27
28
We've found that Google bypasses the P3P Privacy Protection
feature in IE. The result is similar to the recent reports of Google' s
circumvention of privacy protections in Apple's Safari Web
13
CLPSS ACTION COMPLAINT
1
browser, even though the actual bypass mechanism Google uses is
different. ...
2
3
Google secretly developed a way to circumvent default privacy
settings established by a ... competitor, Apple ... [and] Google then
used the workaround to drop ad-tracking cookies on the Safari
users, which is exactly the sort of practice that Apple was trying to
prevent. Third-party cookies are a common mechanism used to
track what people do online. Safari protects its users from being
tracked this way by a default user setting that blocks third-party
cookies ....
4
5
6
7
8
9
By default, IE blocks third-party cookies unless the site presents a
P3P Compact Policy Statement indicating how the site will use the
cookie and that the site's use does not include tracking the user.
Google's P3P policy causes Internet Explorer to accept Google's
cookies even though the policy does not state Google's intent.
10
11
12
13
P3P, an official recommendation of the W3C Web standards body,
is a Web technology that all browsers and sites can support. Sites
use P3P to describe how they intend to use cookies and user
information. By supporting P3P, browsers can block or allow
cookies to honor user privacy preferences with respect to the site's
stated intentions ....
14
15
16
17
18
Technically, Google utilizes a nuance in the P3P specification that
has the effect of bypassing user preferences about cookies. The
P3P specification (in attempt to leave room for future advances in
privacy policies) states that browsers should ignore any undefined
policies they encounter. Google sends a P3P policy that fails to
inform the browser about Google's use of cookies and user
information. Google's P3P policy is actually a statement that it is
not a P3P policy. It's intended for humans to read even though P3P
policies are designed for browsers to "read."
19
20
21
22
23
24
25
"Google Bypassing User Privacy Settings" (last accessed on February 21, 2012) online at:
26
htto :/lbl< 12:s.msdn.com/b/ie/archi ve/20 12/02/20/google-bypassing-user-ori vacv -settings.asox
27
28
~ 4.
Defendant Google did not refute the findings, and although individuals had set
their pri acy settings to their preferences, knowingly circumvented users' preferences:
CLAS
ACTION COMPLAINT
14
1
"Microsoft uses a 'self-declaration' protocol (known as 'P3P')
dating from 2002 under which Microsoft asks websites to represent
their privacy practices in machine-readable form. It is well known
- including by Microsoft- that it is impractical to comply with
Microsoft's request while providing modern web functionality. We
have been open about our approach, as have many other websites."
Google's Senior Vice President of Communications and Policy,
Rachel Whetstone.
2
3
4
5
6
7
1'.
8
9
Harm
A. "Tox c Cookies" Reouire a "Toxic Cookie Cleanup"
10
4 .
Defendants have left tracking mechanisms and files within Plaintiffs and Class
11
Memben' Computing Devices. Like a toxic oil spill in the Gulf of Mexico causing loss and/or
12
13
damage to the area residents, embedded "toxic cookies" now require a "toxic cookie cleanup."
4p.
14
15
Plaintiff and Class Members demand that Defendants return their Computing
Devices o the state that existed prior to any and all activity implemented by Defendants and
16
Google
~~ffiliates.
Such a demand is premised on the fact that although Defendants have ceased
17
18
setting tl e cookies, Defendants may still continue their tracking practices using such tracking
19
mechani ms. Plaintiffs and Class Members' Computing Devices are at risk, and Plaintiff and
20
Class M mbers do not desire to accept such a risk.
21
47.
Defendants' actions have caused harm to the Plaintiff and Class Members,
22
includin~,
but not limited to, the following:
23
24
25
26
27
a.
Loss due to costs associated with requiring Computing Device
forensics to investigate, locate, and delete any and all tracking
nechanisms located within Plaintiffs and Class Members' Computing
Devices without removing authorized cache storage cookies;
28
b.
Impairment of the Computing Devices;
CLA S ACTION COMPLAINT
15
1
c.
Loss due to "interception of internet service";
2
d.
Use of bandwidth to set Defendants' tracking mechanisms;
e.
Use of bandwidth for ad "calls" and ad insertion; and
f.
Loss due to the collection, storage, use, and sale of the Plaintiffs and
3
4
5
Class Members' personal information.
6
4
Plaintiff and Class members use their Computing Devices' cache to store and use
data, inc
ding, but not limited to, files of interest, website passwords, and bookmarks. Plaintiff
and Clas
Members do not want to use the Computing Devices' software to delete their entire
7
8
9
10
11
cache bu
only that data within their hardware associated with Defendants and Google Affiliates.
12
, though, requires accessing the Plaintiffs and Class Members' hard drive to examine
13
every data file.
14
Cleaning software provides the cache deletion mechanisms that delete the brows
15
16
17
cache.
is purges all ETag values. The cost for cleaning is quite low if a user merely runs the
cached letion of all browsers; however, Plaintiff and Class Members do not desire to delete all
18
Plaintiffs and Class Members' concerns relate to data remanence, or the residu 1
19
20
represe tation of data that remains even after attempts have been made to remove or erase the
21
is residue may result from data being left intact by a nominal file deletion operation, b
22
23
24
ting the storage media that does not remove data previously written to the media, or
throug physical properties of the storage medium that allow previously written data to be
25
26
51.
It is a misconception about deleting computer files that by simply pressing the
27
delete utton, emptying the "Recycle Bin," or even formatting the drive that it deletes all files.
28
16
CL SS ACTION COMPLAINT
1
Informaf on still remains on the hard disk drive ("HDD"). Formatting the HDD also does not
2
erase hid~en files. The data is not permanently erased and formatting still leaves unused parts of
3
the HDD and the swap file holding data.
4
5
5 J.
When information is written to a drive, the location of the information is stored ir
6
a file tha resembles a table of contents for a book. On computers running DOS and Windows
7
operatin systems, the File Allocation Table ("FAT") or the Master File Table ("MFT") holds
8
this info mation. When a file is deleted, the FAT or MFT is updated to tell the computer the
9
10
space on the HDD is available; however, the actual data is not deleted until it is overwritten wit
11
new dat . This is the reason why computer forensic software is able to recover data. Using
12
software undelete tools, files that were accidentally or otherwise deleted can be restored.
13
3.
The U.S. Department of Defense 5220.22-M standard for disk-sanitization is the
14
most rig oro us data wipe procedure. This wiping standard requires seven passes, with each pass
15
16
17
18
19
formed pf three different data wipes. The HDD is rewritten and covered with random patterns.
With ea~h wipe, the deleted data becomes harder to piece back together.
4.
The most effective and efficient way to clean a computer would be to
indiscri ~inately erase ALL tracking files on the computer which would include cookies, flash
20
cookies HTML5 storage, etc. To go through and erase solely the Defendants' related files wou d
21
22
take ex ra time and would bear the risk of not eliminating all of the potential threats. Plaintiff and
23
Class !\ embers desire to have their Computing Devices restored to the state the hardware existed
24
in befo e Defendants' activities without deleting any of their cache data.
25
B. Loss and/or Damal!e in Excess of$5,000.00 ("CFAA")
26
27
28
55.
Plaintiff and Class Members have suffered loss and/or damages that exceed fiv1
thousru d dollars ($5,000.00) in order to mitigate Defendants' invasive actions by expending
CL!SS ACTION COMPLAINT
17
1
2
time, morey, and resources, to investigate and repair their Computing Devices, a conduct
violation s defined in the Computer Fraud and Abuse Act ("CF AA"), Title 18, United States
3
Code, Se< tion 1030. The CF AA defines "damage" as "any impairment to the integrity or
4
5
availabili y of data, a program, a system, or information." 18 U.S.C. § 1030(e)(8). Under the
6
CFAA, "loss" is treated differently from "damage," and is defined as "any reasonable cost to any
7
victim, including the cost of responding to an offense, conducting a damage assessment, and
8
restoring he data, program, system, or information to its condition prior to the offense, and any
9
10
revenue 1pst, cost incurred, or other consequential damages incurred because of interruption of
11
service." 18 U.S.C. § 1030(e)(l1). Accordingly, Plaintiff must claim economic loss or damages
12
in an am< unt aggregating at least $5,000 in value during any 1-year period to one or more
13
individuds. See 18 U.S.C. § 1030(c)(4)(A)(i)(I).
14
5 ~.
Plaintiffs and Class Members' economic loss involves costs to obtain a complet~
15
16
forensic< xamination of their Computing Devices. Estimates for such services exceed thirty-five
17
(35) hou sat a cost of three hundred and fifty dollars ($350.00) per hour, or exceeding a total
18
cost ofhvelve thousand two hundred and fifty dollars ($12,250.00) per device:
19
20
21
22
23
24
25
26
"A complete examination of a single 80 GB hard drive can have
over 18,000,000 pages of electronic information and may take
between 15 to 3 5 hours or more to examine, depending on the size
and types of media. A reasonable quote can be obtained prior to
the investigation's start. This time could increase or decrease,
depending upon the type [of] operating system used, the type of
data contained within, and the size and amount of data in question.
Computer forensic investigations have an unusually high return on
investment. The total computer forensic price can average from
$250 to $350 an hour."
New Yo k Computer Forensics Services, "Computer Forensics Frequently Asked Questions"
27
(last ace ~ssed February 21, 20 12), available online at:
28
httn ://W'~W .newvorkcomnuterforensics.com/learn/forensics faw. ohn
CLAS~
ACTION COMPLAINT
18
1
2
3
5'.
The average costs of Computing Devices range from one hundred and fifty dollan
($150.00) to fifteen hundred dollars ($1,500.00). Plaintiff and Class Members use such devices
to conduc both personal and commercial business. Any interference of any kind to such devices
4
5
would int~rfere with their personal enjoyment and/or commercial use. Plaintiff and Class
6
Members were harmed due to any delay in use once the Defendants' actions became known, and
7
delay in t me to investigate and repair any loss and/or damage. Moreover, Plaintiffs and Class
8
Member~' loss shall include the purchase of a new Computing Device's hardware and operating
9
10
11
system.
5
Plaintiff and Class Members purchased Computing Devices with consideration o
12
costs, sp1 ed, and security features. The cost of the hardware and software necessary for the
13
security eatures were factored into the total price of the Computing Devices; thus a specific sun
14
was allo1 ated to the cost of including the security features. As such, Defendants' circumvention
15
of Plaint ff s and Class Members' Computing Devices rendered such hardware and software
16
17
18
19
20
protections purchased within the Computing Devices worthless.
5~.
Native Security Software was provided to Plaintiff and Class Members within
their Co nputing Devices when purchased for use on a trial basis, with generally an average sixtv
(60) day trial period. Common Native Security Software is a Norton or McAfee product. Once
21
the trial Jeriod expired, the Plaintiff and Class Members downloaded software or purchased such
22
23
at an ele tronics retailer. Security Software costs average approximately seventy five dollars
24
($75.00) to one hundred and fifty dollars ($150.00) per Computing Device to provide continued
25
security !Protection. Such Security Software purchased was rendered worthless due to
26
Defend~:~ts' activities made the basis of this action.
27
28
CLASS ACTION COMPLAINT
19
Defendants' harm to Plaintiff and Class Members involves a loss that includes the
1
2
purchase fan HDD, transferring of files, and re-installation of an operating system. Hidden file
3
actually store data long after deleted and can be recovered by experts. As an
4
to clearing all cache and cookies, a user would need to purchase a brand new HDD,
5
indows, and have their authorized data from the hard drive transferred to a new HDD.
6
reinstall
7
A retail p ice for this would average one hundred dollars ($1 00.00) for the HDD and
8
approxim tely $150-$250 for the operation oftransferring the files, installing Windows, etc., or
9
about $3 0-$350 total at a market price.
10
Defendants' harm to Plaintiff and Class Members involves paying a computer
11
12
technici
13
to spend hours and hours reading every single cookie file, cache file, etc., though this
efficient. Regardless, a technician could spend approximately ten ( 10) to twenty (20)
14
g through each and every cookie file. If a Computing Device has 18,000,000 cookies,
15
ke substantial time on a Computing Device that has a lot of cookies to view each one
16
17
individua ly. A technician shall have to indiscriminately read every line of every file of cache
18
and anal
19
e it, and delete Defendants' tracking files.
Plaintiff and Class Members that have their HDD/cache removed, but want to stil
20
use the i ected hard drive must extract all the authorized data, and that would require additional
21
22
costs for hat process. Data transfer could be as much as $250. Plaintiff and Class Members mus
23
purchase brand new HDD and all of their data (music, documents, etc.) must be transferred to
24
the new DD. Plaintiffs and Class Members' loss includes a cost of about $350 for the HDD
25
and the s rvice. However, programs cannot be transferred. For example, if Microsoft Office is
26
installed n the old HDD, it has to be manually re-installed on the new HDD. This applies to all
27
28
applicati ns. Typically, that is the user's responsibility. Most computer technicians will notre-
CLASS ACTION COMPLAINT
20
1
2
install all of the programs for the user. It would be plausible to say that re-installing an average
user's apJlications would take another three to four hours and thus cost an extra $400. Market
3
cost to buy a new HDD and have all of a user's program and files transferred to it, so that they
4
5
6
were made whole and in the same shape that they were in before, would cost approximately
$750.
7
8
6 .
The issue is not that the cost is higher to delete the hidden files than the cost of a
total replc cement, i.e. buying a brand new computer; it's that a person's data is invaluable to
9
them. lnd viduals have years' worth of research, bookmarks, and cache on their hard drive; thus
10
11
user data s invaluable if lost.
12
C.
13
U tauthorized Use of Bandwidth ("Bandwidth Ho2s")
6~.
Defendants' activities of circumventing Plaintiffs and Class Members'
14
Computir g Devices and using such to conduct tracking required bandwidth. The problem is that
15
16
17
18
19
the bandv idth used to complete Defendants' objectives had not been purchased by Defendants,
but rather by the Plaintiff and Class Members.
6:;.
Defendants caused an economic harm to the Plaintiff and Class Members that is
actual, no r1-speculative, sum certain, tangible, and scientifically documented, and that was
20
incurred l y the unauthorized use of their Computing Devices' bandwidth; in that:
21
22
a.
Plaintiff and Class Members purchased a monthly limited bandwidth
23
data plan for their Computing Device from their provider.
24
b.
25
Plaintiff and Class Members then accessed websites, "expecting" and
agreeing to limited bandwidth consumption required and necessary to
26
27
in eract with the websites.
28
CLASS ACTION COMPLAINT
21
1
c.
2
However, Defendants then redirected Plaintiffs and Class Members'
Computing Devices to access their tracking mechanism and had HTTP
3
c okies set after they have been deleted, and such was not "expected"
4
5
the user, not required to interact with the website, not agreed upon
6
the user, and not necessary to operate the Computing Devices.
7
d.
Defendants then made "calls" directing Plaintiffs and Class Members'
8
Computing Devices to third parties for marketing purposes, thereby
9
d pleting the purchased and linked bandwidth data plans of the
10
11
P aintiff and Class Members, and such was not "expected" by the user,
12
n t required to interact with the website, not agreed upon by the user,
13
d not necessary to operate the Computing Devices.
14
Bandwidth is the amount of data that can be transmitted across a channel in a set
15
16
amount
time. Any transmission of information on the internet includes bandwidth. Similar to
17
panies, such as power or water, the "pipeline" is a substantial capital expenditure, an
18
usage controls the pricing model. Hosting providers charge users for bandwidth
19
eir upstream provider charges them and so forth until it reaches the "back bone
20
provider ." Retail providers purchase it from wholesalers to sell to its consumers.
21
Bandwidth to the Computing Device is like gasoline to a motor vehicle. Without
22
23
it, the de ice is inoperable. Defendants require bandwidth to conduct their tracking activities
24
made the basis of this action. However, the bandwidth used is that of the Plaintiff and Class
25
Member . Like an individual that fills up their car's gas tank to find it empty because their
26
27
neighbor drove their car without permission, Plaintiff and Class Members pay monthly
28
CLAS
ACTION COMPLAINT
22
1
2
3
bandwidt use fees for their own use and not by Defendants to conduct their tracking business.
efendants' perspective, reducing their own bandwidth usages reduces their own costs
Defendants' unauthorized interception and use of Plaintiffs and Class Members'
4
5
electroni communications, include, but are not limited to, the following:
6
a.
7
communications after Plaintiff and Class Members visited the websites
8
Interception of the Plaintiffs and Class Members' electronic
a d then used their Computing Devices to limit access for tracking;
9
i eluding, but not limited to, deleting cookies and implementing
10
11
echanisms to limit re-spawning made the basis of this action;
Use of the Plaintiffs and Class Members' bandwidth by Defendants to
12
b.
13
install their tracking mechanisms within their Computing Devices;
14
c.
Use of the Plaintiffs and Class Members' bandwidth by Defendants to
15
activate, use, and monitor their online activities;
16
Use of the Plaintiffs and Class Members' bandwidth by Defendants to
17
d.
18
add tracking mechanisms;
19
e.
20
Use of the Plaintiffs and Class Members' bandwidth by Defendants to
provide access to, and use by Google affiliates of their Computing
21
22
evices;
Use of the Plaintiffs and Class Members' bandwidth by Defendants to
23
f.
24
conduct advertising procedures, including, but not limited to, "calls" to
25
t ird party web analytic vendors, advertising networks, and their
26
ffiliates.
27
28
CLASS ACTION COMPLAINT
23
1
2
6~.
The technology behind the World Wide Web is the Hypertext Transfer Protocol
(HTTP) ahd it does not make any distinction as to the types of links; thus, all links are
3
functiona ly equal. Resources may be located on any server at any location. When a website is
4
5
visited, tl e browser first downloads the textual content in the form of an HTML document. The
6
downloac ed HTML document may call for other HTML files, images, scripts and/or style sheet
7
files to b processed. These files may contain tags which supply the URLs that allow images to
8
display on the page. The HTML code generally does not specify a server, meaning that the web
9
10
browser hould use the same server as the parent code. It also permits absolute URLs that refer t
11
images hosted on other servers. Once the application has stored the data, it will attempt to send
12
informat on back to affiliated servers. In most cases this is done every time a user opens and
13
closes a Jrowser. The data is continually tracked. A website that enables tracking does not take
14
just one :sample; it will record every use of the website for the life of that website on a user's
15
16
17
18
19
computer and the user's information is sent automatically at a user's bandwidth expense.
~
0.
Ads consume vast amounts of bandwidth, which results in slowing a user's
internet connection by using their bandwidth and diminishing the Computing Devices' battery
life in o der to retrieve advertisements. Web analytics devour more bandwidth than ads by
20
accessir g bandwidth to download and run ad script; thus Plaintiff and Class Members that did
21
22
23
24
25
not access ads on a website still had the Defendants use their bandwidth for its tracking:
When you're probing, you're using a user's battery and data when
they don't know about it, but it's a faster way to build up data
cause you're not waiting for the user to check in a few times a day.
You're pinging in 100 times a day ....
26
27
28
Yarrow Jay "Everything You Need to Know About How Phones are Stalking You Everywher "
(last ac essed February 21, 2012) available online at: http://www.businessinsider.com/skvhoo~
ceo-20 l-4#ixzz1PTSN01oa
CLA S ACTION COMPLAINT
24
1
2
71.
Advertisers are now using the Internet as their primary ad-delivery pipe,
continual y uploading and downloading data from networks, causing substantial bandwidth use.
3
Ads that
ere hidden in content or bundled used substantial bandwidth, as did updates. Web
4
5
analytics ctivities delayed Plaintiffs and Class Members' movement on websites, and used
6
their ban width to carry out Defendants' activities.
7
7 .
Web analytic vendor and ad networks use ad content, such as streaming video an
8
audio, th t requires excessive use of Plaintiffs and Class Members' bandwidth. This is due in
9
10
part tot
fact that there was no incentive to reduce the ad size used because they could directly
11
pass cos s for bandwidth and ad delivery content to Plaintiff and Class Members, without the
12
Plaintiff nd Class Members having any notice. For example, while Plaintiff and Class Member
13
were br wsing a website, at the same time web analytic vendors and ad networks were silently
14
harvesti g personal data and sending it to remote servers using Plaintiffs and Class Members'
15
16
17
18
19
Defendants' use of Plaintiffs and Class Members' bandwidth for their data
mining ctivities is similar in nature to a practice called "hot linking," wherein one server uses
erver's bandwidth to send data. While it slows down the server, it also allows
20
bandwi th costs to be transferred to another server. Defendants' data mining activities produce
21
22
similar nauthorized bandwidth use. While only tech savvy individuals are aware that their
23
Compu ing Devices are used as a server without their knowledge or consent, fewer individuals
24
are aw e of the extent that web analytic vendors and ad networks make "calls" to third parties
25
and of e amount of user's bandwidth used when a user merely accesses a site.
26
27
28
Excluding the amount of bandwidth that the Plaintiff and Class Members use,
amoun necessary to operate their computer, the amount expected by the user's interaction wit
CL SS ACTION COMPLAINT
25
e
1
2
the websi e, and that of which was agreed upon by the user, Defendants' unauthorized data
mining activities caused substantial bandwidth use to the Plaintiff and Class Members that
3
resulted i ~ actual out of pocket expenditures. Defendants' activities include, but are not limited
4
5
to, the fol owing:
6
a.
7
websites and tracking mechanisms set on their Computing Devices;
8
b.
Transmittal of and access to Plaintiffs and Class Members' accessed
Loading of ads first before content, bundling ads, and ads with
9
excessive bandwidth;
10
Use of Software Development Kits ("SDKs"), and their functions
11
c.
12
within Plaintiffs and Class Members' Computing Devices';
13
d.
Harvesting of Plaintiffs and Class Members' Computing Devices'
e.
Harvesting of Plaintiffs and Class Members' PI, PII, and SII;
17
f.
"Background" activities including "data mining";
18
g.
"Push notifications" of content to user's Computing Devices; and
h.
Re-direction of Plaintiffs and Class Members' Computing Devices to
14
d~ta;
15
16
19
20
make "calls" to Defendants and Google Affiliates for marketing
21
22
1 urposes.
23
' 5.
24
25
The amount of bandwidth use on Computing Devices can be measured directly l y
analyzir g the logged traffic use, which varies generally between 0 bytes and about 500k bytes
per sess on. The traffic use, whether expected by the user or not, is part of the normal operation
26
of the Computing Device. Website traffic analysis shows the majority of the traffic is tracking
27
28
code in ~gration and the directing of traffic to third party servers. The traffic to third parties for
CLA S ACTION COMPLAINT
26
1
2
marketin~ purposes is not required nor authorized by the user; moreover, the user is never
prompte1 to allow it or notified that it has occurred.
3
7fJ.
The basic nature of HTTP is a challenge-response protocol. For each request,
4
5
6
there is r ecessarily a response. Conventional technical usage would refer to the challengeresponse pair as a single "call".
7~.
7
8
In HTTP/1.0, an HTTP request requires a new TCP/IP connection to be initiated
and then tom down after the response. This causes a significant amount of bandwidth to be
9
wasted coing the "bookkeeping" for each TCP/IP session. The excessive bandwidth use is
10
11
related t l defining how to issue multiple requests and receive responses using a single TCP/IP
12
connecti~m. Websites must be able to open essentially only a limited amount of connections,
13
whateve the designated "simultaneous network connections" setting is to the server for the
14
entire
se~sion.
15
'8.
16
Although memory is technically any form of electronic storage, it is used most
17
often to 'dentify fast, temporary forms of storage. If a user'sComputing Device's CPU had to
18
constan y access the HDD to retrieve every piece of data it needs, it would operate very slowly.
19
'9.
The cache increases transfer performance. A part of the increase similarly come!
20
from th< possibility that multiple small transfers will combine into one large block. The main
21
22
perform~nce gain occurs because the same datum will be read from cache multiple times, or th1 t
23
written ~ata will soon be read. A cache's sole purpose is to reduce accesses to the underlying
24
slower ~to rage.
25
0.
CPUs need quick and easy access to large amounts of data in order to maximize
26
their pe formance. If the CPU cannot get to the data it needs, it literally stops and waits for the
27
28
data to
~e
processed.
CLA: S ACTION COMPLAINT
27
1
81.
2
Defendants' services must interface with, and draw bandwidth from, Plaintiff's
and Class Members' Computing Devices' limited bandwidth data plan in order to complete its
3
tracking ractices. Like a "bad" neighbor that sneaks over in the dead of night to plug in an
4
extensior cord into their neighbor's electrical outlet to "suck out" kilowatts, Defendants were
5
6
"hogging' the Plaintiff's and Class Members' purchased and limited bandwidth plan, and not
7
reimburs ng Plaintiff and Class Members for using their limited data plan. The economic harm i
8
actual, n n-speculative, out of pocket, sum certain, and scientifically documented:
9
"If consumers perceive that rich media ads and other marketing
activities affecting their consumption of bandwidth, and that they
are paying to watch ads, it could [] affect mobile advertising."
10
11
12
13
Chantal ~"'ode, "T-Mobile's new pricing reflects concern over growing bandwidth use" (last
accessed February 21, 2012) available online at:http://mobilemarketer.com/cms/news/carrier-
14
15
network /10014.html
v.
16
Plaintiff brings this action pursuant to Fed. R. Civ. P. 23(a), and (b)(1), (b)(2)
17
18
CLASS ALLEGATIONS
and/or ( J )(3) on behalf of herself and the following class:
19
All persons residing in the United States who possessed a
20
Computing Device which had a Safari or IE browser that had
21
22
Defendants circumvent their Computing Devices' privacy
23
preferences ("Class").
24
B.
The Class Period is defined as the time period applicable under the claims to be
25
26
certifie .
27
28
CLFSS ACTION COMPLAINT
28
1
2
Excluded from the Class are Defendants, their assigns, and successors, legal
84.
representa ives, and any entity in which Defendants have a controlling interest. Also excluded is
3
the judge t whom this case is assigned and the judge's immediate family.
4
5
6
7
8
Plaintiff reserves the right to revise this definition of the Class based on facts
85.
learned as litigation progresses.
The Class consists of millions of individual and other entities, making joinder
86
impractic 1.
9
87
The claims of Plaintiff are typical of the claims of all other members of the Class.
88
Plaintiff will fairly and adequately represent the interests of the Class. Plaintiff
10
11
12
has retain d counsel with substantial experience in prosecuting complex litigation and class
13
actions, i eluding privacy cases. Plaintiff and her counsel are committed to vigorously
14
g this action on behalf of the Class and have the financial resources to do so. Neither
15
Plaintiff
r her counsel any interests adverse to those of the Class.
16
Absent a class action, most Class Members would find the cost of litigating their
17
18
claims to e prohibitive and would have no effective remedy. The class treatment of common
19
questions of law and fact is also superior to multiple individual actions or piecemeal litigation in
20
serves the resources of the courts and the litigants and promotes consistency and
21
22
efficienc of adjudication.
Defendants have acted and failed to act on grounds generally applicable to
23
24
25
Plaintiff nd the Class, requiring the Court's imposition of uniform relief to ensure compatible
standards of conduct toward the Class.
26
9 .
The factual and legal bases of Defendants' liability to Plaintiff and to the other
27
28
Class Me hers are the same, resulting in injury to Plaintiff and all of the other Class Members.
CLASS ACTION COMPLAINT
29
1
2
Plaintiff ar d the other Class Members have all suffered harm and damages as a result of the
Defendant ' wrongful conduct.
3
92.
There are many questions of law and fact common to Plaintiff and the Class, and
4
5
6
those ques ions predominate over any questions that may affect only individual Class Members.
Common , nd predominant questions for the Class include, but are not limited to, the following:
a. What was the extent of Defendants' business practice of circumventin~
7
8
users' Computing Device security settings to transmit, access, collect
9
monitor, and remotely store users' data?
10
11
b. What information did Defendants collect from their business practices o
12
circumventing users' Computing Device security settings to transmit
13
access, collect, monitor, and remotely store users' data, and what did the)
14
do with that information?
15
c. Whether users, by virtue of visiting websites with Defendants' trackin~
16
17
mechanisms, had pre-consented to the operation of Defendants' busines
18
practices of circumventing users' Computing Device security settings t<
19
transmit, access, collect, monitor, and remotely store users' data;
20
d. Was there adequate notice, or any notice, of the operation of Defendants
21
business practices of circumventing users' Computing Device securit
22
23
settings to transmit, access, collect, monitor, and remotely store users' dat
24
provided to Plaintiff and Class Members?
25
e. Was there reasonable opportunity to decline the operation of Defendant: '
26
business practices of circumventing users' Computing Device securi
27
28
CLAS
ACTION COMPLAINT
30
1
settings to transmit, access, collect, monitor, and remotely store users' dat
2
provided to Plaintiff and Class Members?
3
f.
Did Defendants' business practices of circumventing users' Computin
4
Device security settings to transmit, access, collect, monitor, and remotel
5
store users' data disclose, intercept, and transmit PI, PII or SII?
6
7
g. Whether Defendants' devised and deployed a scheme or artifice to de frau
8
or conceal from Plaintiff and the Class Members Defendants' ability to
9
and practice of, circumventing users' Computing Device security setting
10
to transmit, access, collect, monitor, and remotely store users' data, fo
11
12
their own benefit, personal information, and tracking data from Plaintiff
13
and the Class members' personal Computing Devices via the ability t
14
track their data on their Computing Device;
15
h. Whether Defendants engaged in the deceptive acts and practices i
16
connection with their undisclosed and systemic practice of circumventin
17
18
users' Computing Device security settings to transmit, access, collect
19
monitor, and remotely store users' data on Plaintiffs and the Clas
20
Members' personal Computing Devices and using that data to track an
21
profile Plaintiffs and the Class Members' Internet activities and persona
22
habits, proclivities.
23
24
25
1.
Did
the
implementation
of Defendants'
business
practices
o
circumventing users' Computing Device security settings to transmit
26
access, collect, monitor, and remotely store users' data violate th
27
28
Computer Fraud and Abuse Act, 18 U.S.C. § 1030?
CLASS ACTION COMPLAINT
31
1
2
J.
Did
the
implementation
of Defendants'
business
practices
oJ
circumventing users' Computing Device security settings to transmit
3
access, collect, monitor, and remotely store users' data violate the
4
5
6
7
8
Electronic Communications Privacy Act, 18 U.S.C. § 2510 et seq.
k. Did
the
implementation
of
Defendants'
business
practices
o1
circumventing users' Computing Device security settings to transmit
access, collect, monitor, and remotely store users' data violate
th~
9
California's Computer Crime Law, Penal Code§ 502?
10
11
1. Did
the
implementation
of Defendants'
business
practices
o
12
circumventing users' Computing Device security settings to transmit
13
access, collect, monitor, and remotely store users' data violate
th~
14
California Invasion ofPrivacy Act, Penal Code§ 630 et seq.?
15
16
m. Did
the
implementation
of
Defendants'
business
practices
o
17
circumventing users' Computing Device security settings to transmit
18
access, collect, monitor, and remotely store users' data violate the
19
Consumers Legal Remedies Act, ("CLRA") California Civil Code § 175C
20
et seq.?
21
22
n. Did
the
implementation
of
Defendants'
business
practices
o
23
circumventing users' Computing Device security settings to transmit
24
access, collect, monitor, and remotely store users' data violate the Unfai
25
Competition, California Business and Professions Code§ 17200 et seq.?
26
o. Did
the
implementation
of
Defendants'
business
practices
o
27
28
circumventing users' Computing Device security settings to transmit
CLASS ACTION COMPLAINT
32
1
access, collect, monitor, and remotely store users' data violate th
2
California Customer Records Act, Cal. Civ. Code§ 1798.80 et seq.?
3
p. Did
the
implementation
of
Defendants'
business
practices
o
4
circumventing users' Computing Device security settings to transmit
5
6
access, collect, monitor, and remotely store users' data involve
7
Conversion?
8
q. Did
the
implementation
of
Defendants'
business
practices
9
circumventing users' Computing Device security settings to transmit
10
11
access, collect, monitor, and remotely store users' data involve a Trespas
12
to Personal Property I Chattels?
13
r.
14
Did
the
implementation
of
Defendants'
business
practices
o
circumventing users' Computing Device security settings to transmit
15
access, collect, monitor, and remotely store users' data result in Unjus
16
Enrichment?
17
18
s. Are any of the Defendants liable under a theory of aiding and abetting on
19
or more of the remaining Defendants for violations of the statutes liste
20
herein?
21
t.
22
Are the Defendants liable under a theory of civil conspiracy for violation
of the statutes listed herein?
23
24
u. Are the Defendants liable under a theory of unjust enrichment fo
25
violations of the statutes listed herein?
26
v. Whether Defendants participated in and/or committed or are responsibl
27
for violation oflaw(s) complained ofherein;
28
CLASS
CTION COMPLAINT
33
w. Are Class Members entitled to damages as a result of the implementatio
1
of Defendants' conduct, and, if so, what is the measure of those damages?
2
3
x. Whether Plaintiff and Class Members have sustained damages as a resul
4
of Defendants' conduct, and, if so, what is the appropriate measure o
5
damages;
6
y. Whether Plaintiff and Class members are entitled to declaratory andlo
7
injunctive relief to enjoin the unlawful conduct alleged herein; and
8
9
z. Whether Plaintiff and Class Members are entitled to punitive damages
10
and, if so, in what amount?
11
The questions of law and fact common to the Class predominate over any
12
9
13
question
14
methods or the fair and efficient adjudication of this controversy.
affecting only individual members and a class action is superior to all other available
15
16
17
9 .
Based on the foregoing allegations, Plaintiffs legal theories for relief include
those set forth below.
VI.
18
19
CAUSES OF ACTION
FIRST CAUSE OF ACTION
(Violations of the Computer Fraud and Abuse Act, 18 U.S.C. § 1030)
20
21
5.
Plaintiff incorporates by reference and realleges all paragraphs previously allege
22
23
24
25
26
27
28
herein.
6.
Plaintiffs and the Class Members' Computing Devices are computers used in
affectin interstate commerce and communication and are therefore "protected computers" as
defined in the Computer Fraud and Abuse Act (the "CFAA"), 18 U.S.C. § 1030(e)(2).
97.
Defendants violated the CFAA, 18 U.S.C. § 1030(a)(4) in that they knowingly
and wi h intent to defraud, accessed the protected Computing Devices of Plaintiff and the Clas
34
CL SS ACTION COMPLAINT
1
2
Members
ithout authorization, or exceeding authorized access, and by means of such conduct,
furthered t e intended fraud and obtained things of value.
3
As described above, Defendants published an invalid P3P Compact Policy to
98.
4
5
transmit fa se information to Plaintiffs and Class Members' browsers and to thereby
6
surreptitio sly gain access to and place persistent cookies onto their Computing Devices.
7
8
Defendants acted without authorization or exceeding authorization in that Plaintif
and the Cl ss Members did not give Defendants permission or consent to place persistent cookie
9
on their C mputing Devices. In fact, they reasonably believed that Safari and IE would block
10
11
such cooki s from being placed on their Computing Devices or downgrade such cookies to the
12
status of se sion cookies.
13
10 .
Defendants' conduct was done knowingly and with intent to defraud in that
14
Defendant created and used an invalid P3P Compact Policy for the purpose of circumventing
15
16
17
18
19
the cookie- lltering functions of Plaintiffs and the Class Members' browsers and because they
had no legi imate purpose for using an invalid P3P Compact Policy.
101.
Through Defendants' conduct it was able to further their intended fraud of placing
persistent ookies on Plaintiffs and Class Members' Computing Devices and using such cookies
20
to collect
d maintain Plaintiffs and Class Members' PI, PII and SII, and to share that
21
22
informatio with third parties without the knowledge, consent, or authorization of Plaintiff and
23
Class Me bers.
24
25
As a direct and proximate result of Defendants' conduct, Plaintiff and Class
Members ave suffered harms and losses that include those described above.
26
27
28
CLASS
CTION COMPLAINT
35
103.
1
2
Defendants' unlawful access to Plaintiffs and Class Members' Computing
Devices t ough the use of invalid P3P Compact Policies constituted a single act that resulted in
3
an aggrega ed loss to Plaintiff and the Class Members of at least $5,000 within a one-year period.
4
Therefore, Plaintiff and the Class Members are entitled to compensatory damages.
5
In addition, Defendants' unlawful access to Plaintiffs and Class Members'
6
7
Computin Devices has caused Plaintiff and Class Members irreparable injury.
8
Unless restrained and enjoined, Defendant will continue to commit such acts.
9
10
Plaintiffs nd Class Members' remedy at law is not adequate to compensate them for these
11
inflicted, i minent, threatened, and continuing injuries, entitling Plaintiff and the Class
12
Members t remedies including injunctive relief as provided by 18 U.S.C. § 1030(g).
13
SECOND CAUSE OF ACTION
(Violation of the Electronic Communications Privacy Act
18 U.S.C. § et seq.)
14
15
10
17
18
Plaintiff incorporates by reference and realleges all paragraphs previously alleged
10
16
Plaintiff asserts this claim against each and every Defendant named herein in this
herein.
19
complaint n behalf of herself and the Class.
20
21
10
The Electronic Communications Privacy Act of 1986, 18 U.S.C. § 2510 et seq.,
22
("ECP A") regulates wire and electronic communications interception and interception of oral
23
communic tions, and makes it unlawful for a person to "willfully intercept, endeavor to
24
intercept, r procure any other person to intercept or endeavor to intercept, any wire, oral, or
25
electronic ommunication," within the meaning of 18 U.S.C. § 2511(1).
26
27
28
CLASS ACTION COMPLAINT
36
1
Defendants violated 18 U.S.C. § 2511 by intentionally acquiring and/or
2
g, by device or otherwise, Plaintiffs and Class Members' electronic communications,
3
without
owledge, consent or authorization.
4
111.
5
At all relevant times, Defendants engaged in business practices of intercepting the
6
Plaintiffs and Class Members' electronic communications, which included endeavoring to
7
intercept
8
e transmission of a user's Computing Devices' activities and interactions between the
user and i s contact online from within their Computing Devices. Once the Defendants obtained
9
the data, t ey used such to aggregate Computing Device data of the Plaintiff and Class Members
10
11
as they us d their Computing Devices.
The contents of data transmissions from and to Plaintiffs and Class Members'
12
13
Computi g Devices constitute "electronic communications" within the meaning of 18 U.S.C. §
14
2510.
15
11 3.
16
Plaintiff and Class Members are "person[s] whose ... electronic communication i
17
intercepte ... or intentionally used in violation of this chapter" within the meaning of 18 U.S.C.
18
§ 2520.
19
Defendants violated 18 U.S.C. § 2511(1)(a) by intentionally intercepting,
20
g to intercept, or procuring any other person to intercept or endeavor to intercept
21
22
23
24
25
Plaintiff and Class Members' electronic communications.
Defendants violated 18 U.S.C. § 2511(a)(c) by intentionally disclosing, or
endeavori g to disclose, to any other person the contents of Plaintiffs and Class Members'
electronic communications, knowing or having reason to know that the information was obtaine
26
through t e interception of Plaintiffs and Class Members' electronic communications.
27
28
CLASS ACTION COMPLAINT
37
1
2
Defendants violated 18 U.S.C. § 2511(1)(d) by intentionally using, or
116
endeavorin to use, the contents of Plaintiffs and Class Members' electronic communications,
3
knowing o having reason to know that the information was obtained through the interception of
4
5
6
7
Plaintiffs nd Class Members' electronic communications.
11
Defendants' intentional interception of these electronic communications without
Plaintiffs r Class Members' knowledge, consent, or authorization was undertaken without a
8
facially va id court order or certification.
9
10
11
Defendants intentionally used such electronic communications, with knowledge,
11
or having
12
interceptio , for an unlawful purpose.
13
ason to know, that the electronic communications were obtained through
11 .
Defendants unlawfully accessed and used, and voluntarily disclosed, the contents
14
of the inte cepted communications to enhance their profitability and revenue through advertising.
15
16
17
18
19
This disci sure was not necessary for the operation of Defendants' system or to protect
Defendant ' rights or property.
12 .
ECPA, 18 U.S.C. § 2520(a) provides a civil cause of action to "any person whose
wire, oral, or electronic communication is intercepted, disclosed, or intentionally used" in
20
violation f the ECP A.
21
Defendants are liable directly and/or vicariously for this cause of action. Plaintiff
22
23
and Class
embers therefore seek remedy as provided for by 18 U.S.C. § 2520, including such
24
prelimina
and other equitable or declaratory relief as may be appropriate, damages consistent
25
with subs ction (c) of that section to be proven at trial, punitive damages to be proven at trial,
26
27
and reaso able attorneys' fees and other litigation costs reasonably incurred.
28
CLASS ACTION COMPLAINT
38
12 .
1
2
Plaintiff and Class Members have additionally suffered loss by reason of these
violations, including, without limitation, violation of the right of privacy.
3
12 .
Plaintiff and the Class Members, pursuant to 18 U.S.C. § 2520, are entitled to
4
5
preliminar , equitable, and declaratory relief, in addition to statutory damages of the greater of
6
$10,000 o $100 a day for each day of violation, actual and punitive damages, reasonable
7
attorneys' ees, and Defendants' profits obtained from the above-described violations. Unless
8
nd enjoined, Defendants will continue to commit such acts. Plaintiffs remedy at law
9
is not ade uate to compensate for these inflicted and threatened injuries, entitling Plaintiff to
10
11
remedies i eluding injunctive relief as provided by 18 U.S.C. 2510.
THIRD CAUSE OF ACTION
(Violations of Cal. Penal Code 502
The California Computer Crime Law ("CCCL"))
12
13
14
12
16
17
18
Plaintiff incorporates by reference and realleges all paragraphs previously alleged
12
15
Defendants violated Cal. Penal Code § 502(c)(2) by knowingly and without
herein.
permissio accessing, taking, and using Plaintiffs and the Class Members' Computing Devices.
19
Defendants accessed, copied, used, made use of, interfered with, and/or altered,
20
21
data belo
ing to Plaintiff and Class Members: ( 1) in and from the state of California; (2) in the
22
home stat s of the Plaintiff and the Class Members; and (3) in the states in which the servers that
23
provided ervices and communication links between Plaintiff and Class Members and the
24
websites
ith which they interacted were located.
25
Cal. Penal Code § 5020) states: "For purposes of bringing a civil or a criminal
26
27
28
action un er this section, a person who causes, by any means, the access of a computer,
computer ystem, or computer network in one jurisdiction from another jurisdiction is deemed to
CLASS ACTION COMPLAINT
39
1
2
have pen onally accessed the computer, computer system, or computer network in each
j urisdicti tm."
3
1 8.
Defendants have violated California Penal Code§ 502(c)(l) by knowingly and
4
5
6
7
8
without J ermission altering, accessing, and making use of Plaintiffs and Class Members'
Computi g Devices and using the data in order to execute a scheme to defraud consumers.
1~9.
Defendants have violated California Penal Code§ 502 (c)(6) by knowingly and
without 1 ermission providing, or assisting in providing, a means of accessing Plaintiffs and
9
Class M~ mbers' Computing Devices, computer system and/or computer network.
10
11
150.
Defendants have violated California Penal Code§ 502(c)(7) by knowingly and
12
without ermission accessing, or causing to be accessed, Plaintiffs and Class Members'
13
compute system, and/or computer network.
14
1~ 1.
Pursuant to California Penal Code § 502(b )(1 0) a "Computer contaminant" mean~
15
16
"any set pf computer instructions that are designed to ... record, or transmit information within
17
compute , computer system, or computer network without the intent or permission of the owner
18
of the in ormation."
19
132.
Defendant have violated California Penal Code§ 502(c)(8) by knowingly and
20
without bermission introducing a computer contaminant into the transactions between Plaintiff
21
22
23
24
25
and the lr.lass Members and websites; specifically, web page interactions that propagate a
harvesti g software placed there by Defendants.
133.
As a direct and proximate result of Defendants' unlawful conduct within the
meaning of California Penal Code § 502, Defendants have caused loss to Plaintiff and the Class
26
Membe s in an amount to be proven at trial. Plaintiff and the Class Members are also entitled tc
27
28
recover heir reasonable attorneys' fees pursuant to California Penal Code§ 502(e).
CLAS~ ACTION COMPLAINT
40
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?