Campbell et al v. Facebook Inc.

Filing 138

MOTION to Certify Class filed by Matthew Campbell, Michael Hurley. Motion Hearing set for 3/16/2016 09:00 AM in Courtroom 3, 3rd Floor, Oakland before Hon. Phyllis J. Hamilton. Responses due by 1/15/2016. Replies due by 2/19/2016. (Attachments: # 1 Declaration of Michael W. Sobol, # 2 Declaration of Hank Bates, # 3 Declaration of David T. Rudolph, # 4 Declaration of Melissa Gardner, # 5 Proposed Order)(Sobol, Michael) (Filed on 11/13/2015)

Download PDF
1 2 3 4 5 6 7 Michael W. Sobol (State Bar No. 194857) msobol@lchb.com David T. Rudolph (State Bar No. 233457) drudolph@lchb.com Melissa Gardner (State Bar No. 289096) mgardner@lchb.com LIEFF CABRASER HEIMANN & BERNSTEIN, LLP 275 Battery Street, 29th Floor San Francisco, CA 94111-3339 Telephone: 415.956.1000 Facsimile: 415.956.1008 12 Hank Bates (State Bar No. 167688) hbates@cbplaw.com Allen Carney acarney@cbplaw.com David Slade dslade@cbplaw.com CARNEY BATES & PULLIAM, PLLC 11311 Arcade Drive Little Rock, AR 72212 Telephone: 501.312.8500 Facsimile: 501.312.8505 13 Attorneys for Plaintiffs and the Proposed Class 8 9 10 11 14 UNITED STATES DISTRICT COURT 15 NORTHERN DISTRICT OF CALIFORNIA 16 OAKLAND DIVISION 17 18 19 MATTHEW CAMPBELL and MICHAEL HURLEY, on behalf of themselves and all others similarly situated, 20 Plaintiff, Case No. C 13-05996 PJH (MEJ) DECLARATION OF MELISSA GARDNER IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION 21 v. 22 FACEBOOK, INC., 23 Date: Time: Judge: Place: March 16, 2016 9:00 a.m. Hon. Phyllis J. Hamilton Courtroom 3, 3rd Floor Defendant. 24 25 26 27 28 DECLARATION OF MELISSA GARDNER IN SUPPORT OF MOTION FOR CLASS CERTIFICATION CASE NO. 13-CV-05996-PJH (MEJ) 1 I, Melissa Gardner, declare: 2 1. I am an attorney in the law firm of Lieff, Cabraser, Heimann & Bernstein, LLP, a 3 member of the State Bar of California, and am admitted to practice before the United States 4 District Court for the Northern District of California. I am one of the counsel for Plaintiffs in this 5 action. I make this declaration based on my own personal knowledge. If called upon to testify, I 6 could and would testify competently to the truth of the matters stated herein. 7 2. I submit this Declaration in support of Plaintiffs’ Motion for Class Certification. 8 3. Attached hereto as Exhibit 1 is a true and correct copy of excerpts from the 9 10 11 12 transcript of the hearing held before the Honorable Phyllis Hamilton on October 1, 2014. 4. Attached hereto as Exhibit 2 is a true and correct copy of the Expert Report of Jennifer Golbeck in Support of Plaintiffs’ Motion for Class Certification. 5. Attached hereto as Exhibit 3 is a true and correct copy of Facebook’s 13 Supplemental Responses and Objections to Plaintiffs’ First Set of Interrogatories, which was 14 served o September 8, 2015. 15 16 17 6. Attached hereto as Exhibit 4 is a true and correct copy of a document starting with Bates stamp number FB000005502-R, which Facebook produced in this action. 7. Attached hereto as Exhibit 5 are true and correct copies of excerpts from the 18 September 25, 2015 deposition of Ray He in his personal capacity and in his capacity as a 19 designee under Federal Rule of Civil Procedure 30(b)(6). 20 21 22 23 24 25 26 27 8. Attached hereto as Exhibit 6 is a true and correct copy of a document starting with Bates stamp number FB000008489, which Facebook produced in this action. 9. Attached hereto as Exhibit 7 is a true and correct copy of a document starting with Bates stamp number FB000003118, which Facebook produced in this action. 10. Attached hereto as Exhibit 8 is a true and correct copy of a document starting with Bates stamp number FB000014365, which Facebook produced in this action. 11. Attached hereto as Exhibit 9 is a true and correct copy of a document starting with Bates stamp number FB000003335, which Facebook produced in this action. 28 1 DECLARATION OF MELISSA GARDNER IN SUPPORT OF MOTION FOR CLASS CERTIFICATION CASE NO. 13-CV-05996-PJH (MEJ) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 12. Attached hereto as Exhibit 10 is a true and correct copy of a document starting with Bates stamp number FB000004996, which Facebook produced in this action. 13. Attached hereto as Exhibit 11 is a true and correct copy of a document starting with Bates stamp number FB000012539, which Facebook produced in this action. 14. Attached hereto as Exhibit 12 is a true and correct copy of a document designated FB000008268, which Facebook produced as a native file in this action. 15. Attached hereto as Exhibit 13 is a true and correct copy of a document starting with Bates stamp number FB000008722, which Facebook produced in this action. 16. Attached hereto as Exhibit 14 is a true and correct copy of a document starting with Bates stamp number FB000000594, which Facebook produced in this action. 17. Attached hereto as Exhibit 15 is a true and correct copy of a document starting with Bates stamp number FB000008304, which Facebook produced in this action. 18. Attached hereto as Exhibit 16 is a true and correct copy of a document starting with Bates stamp number FB000001265, which Facebook produced in this action. 19. Attached hereto as Exhibit 17 is a true and correct copy of a document starting with Bates stamp number FB000006429, which Facebook produced in this action. 20. Attached hereto as Exhibit 18 is a true and correct copy of a document starting with Bates stamp number FB000008271, which Facebook produced in this action. 21. Attached hereto as Exhibit 19 is a true and correct copy of a PowerPoint 20 presentation entitled Quarterly Earnings Slide Q4 2012 by Facebook, Inc., available online, at: 21 http://files.shareholder.com/downloads/AMDA-NJ5DZ/2297890522x0x631721/fc91bd68-c60f- 22 46c0-b3d4-f26455e115f7/FB_Q412_InvestorDeck.pdf. 23 22. Attached hereto as Exhibit 20 is a true and correct copy of Defendant Facebook, 24 Inc.’s Supplemental Responses and Objections to Plaintiffs’ Narrowed Second Set of 25 Interrogatories, which, as Exhibit 1 thereto attaches a chart identifying documents produced by 26 Defendant in this action associated with a selection of the private messages sent by each of the 27 proposed Class Representatives, as well as the sender, recipient, date, time, and URL associated 28 with each message. 2 DECLARATION OF MELISSA GARDNER IN SUPPORT OF MOTION FOR CLASS CERTIFICATION CASE NO. 13-CV-05996-PJH (MEJ) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 23. Attached hereto as Exhibit 21 is a true and correct copy of a document starting with Bates stamp number FB000000001, which Facebook produced in this action. 24. Attached hereto as Exhibit 22 is a true and correct copy of a document starting with Bates stamp number FB000000032, which Facebook produced in this action. 25. Attached hereto as Exhibit 23 is a true and correct copy of a document starting with Bates stamp number FB000000058, which Facebook produced in this action. 26. Attached hereto as Exhibit 24 is a true and correct copy of a document starting with Bates stamp number FB000000011, which Facebook produced in this action. 27. Attached hereto as Exhibit 25 is a true and correct copy of a document starting with Bates stamp number FB000000017, which Facebook produced in this action. 28. Attached hereto as Exhibit 26 is a true and correct copy of a document starting with Bates stamp number FB000000043, which Facebook produced in this action. 29. Attached hereto as Exhibit 27 is a true and correct copy of a document starting with Bates stamp number FB000006435, which Facebook produced in this action. 30. Attached hereto as Exhibit 28 is a true and correct copy of a document starting with Bates stamp number FB000004406, which Facebook produced in this action. 31. Attached hereto as Exhibit 29 is a true and correct copy of a document starting with Bates stamp number FB000007924, which Facebook produced in this action. 32. Attached hereto as Exhibit 30 is a true and correct copy of a document starting with Bates stamp number FB000000502, which Facebook produced in this action. 33. Attached hereto as Exhibit 31 is a true and correct copy of Plaintiffs’ First Set of Requests for Production of Documents to Defendant. 34. Attached hereto as Exhibit 32 is a true and correct copy of a letter from Facebook’s counsel Joshua Jessen to Plaintiffs’ counsel Hank Bates, dated April 10, 2015. 35. Attached hereto as Exhibit 33 is a true and correct copy of the Expert Report of Fernando Torres in Support of Plaintiffs’ Motion for Class Certification. 36. Attached hereto as Exhibit 34 is a true and correct copy of a document starting with Bates stamp number FB00000802, which Facebook produced in this action. 3 DECLARATION OF MELISSA GARDNER IN SUPPORT OF MOTION FOR CLASS CERTIFICATION CASE NO. 13-CV-05996-PJH (MEJ) 1 2 3 I declare under penalty of perjury that the foregoing is true and correct and that this Declaration was signed in San Francisco, California, on November 13, 2015. 4 5 LIEFF CABRASER HEIMANN & BERNSTEIN, LLP 6 7 By: /s/Melissa Gardner Melissa Gardner 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 4 DECLARATION OF MELISSA GARDNER IN SUPPORT OF MOTION FOR CLASS CERTIFICATION CASE NO. 13-CV-05996-PJH (MEJ) EXHIBIT 1 UNITED STATES DISTRICT COURT CERTIFIED COPY NORTHERN DISTRICT OF CALIFORNIA BEFORE THE HONORABLE PHYLLIS J. HAMILTON, JUDGE MATTHEW CAMPBELL, MICHAEL ) HURLEY, AND DAVID SHADPOUR, ) ) PLAINTIFFS, ) ) VS. ) ) FACEBOOK, INC., ) ) DEFENDANT. ) ____________________________) MOTION TO DISMISS PAGES 1 - 77 NO. C 13-05996PJH OAKLAND, CALIFORNIA WEDNESDAY, OCTOBER 1, 2014 REPORTER'S TRANSCRIPT OF PROCEEDINGS APPEARANCES: FOR PLAINTIFFS: BY: BY: LIEFF CABRASER HEIMANN & BERNSTEIN LLP 275 BATTERY STREET, 30TH FLOOR SAN FRANCISCO, CALIFORNIA 94111 MELISSA A. GARDNER, MICHAEL W. SOBOL, ATTORNEY AT LAW LIEFF CABRASER HEIMANN & BERNSTEIN LLP 780 THIRD AVENUE, 48TH FLOOR NEW YORK, NEW YORK 10017-2024 NICHOLAS R. DIAMAND, ATTORNEY AT LAW (APPEARANCES CONTINUED NEXT PAGE) REPORTED BY: RAYNEE H. MERCADO, CSR NO. 8258 PROCEEDINGS REPORTED BY ELECTRONIC/MECHANICAL STENOGRAPHY; TRANSCRIPT PRODUCED BY COMPUTER-AIDED TRANSCRIPTION. RAYNEE H. MERCADO, CSR, RMR, CRR, FCRR (510) 451-7530 5 1 2 MR. JESSEN: SURE, YOUR HONOR. IF -- IF I CAN PUT THIS CASE INTO CONTEXT, TO BEGIN WITH, 3 THIS IS A CASE -- THE CONSOLIDATED AMENDED COMPLAINT 4 CHALLENGES ROUTINE COMMERCIAL CONDUCT THAT WAS COMPLETELY 5 INNOCUOUS THAT PLAINTIFFS ADMIT CEASED OVER TWO YEARS AGO, 6 AROUND OCTOBER OF 2012. 7 THE REASON THERE WAS A 15-MONTH DELAY BETWEEN FILING OF 8 THE FIRST COMPLAINT IN THIS CASE AND THE CESSATION OF THE 9 CONDUCT WAS VERY SIMPLE. THIS IS A COPY-CAT LAWSUIT. 10 THE COURT: 11 WHAT SPECIFIC CONDUCT CEASED? 12 MR. JESSEN: WHEN YOU SAY "THE CESSATION OF CONDUCT," YEAH, WELL, THE CONDUCT THAT CEASED 13 WAS -- AND I'M HAPPY TO GET INTO THE DETAILS. 14 NUMBER OF FACTORS THAT THERE ARE -- THERE -- FACEBOOK HAS 15 SOCIAL PLUG-INS, WHICH PLAINTIFFS DISCUSS IN -- COMPLAINT, AND 16 WE DISCUSS IN OUR BRIEF. 17 THIRD-PARTY WEBSITES. 18 WE MIGHT HAVE A NEW YORK TIMES TRAVEL ARTICLE THAT HAS THE 19 PARTICULAR SOCIAL PLUG-IN. 20 AND THESE SOCIAL PLUG-INS APPEAR ON SO AN EXAMPLE WE GIVE IN OUR MOTION IS IF YOUR HONOR'S BROWSING THE -- (OFF-THE-RECORD DISCUSSION.) 21 THE COURT: 22 MR. JESSEN: 23 THERE ARE A SLOW DOWN. UNDERSTOOD. LOTS OF DIFFERENT TECHNOLOGY COMPANIES HAVE SOCIAL 24 PLUG-INS, OKAY, FACEBOOK AMONG THEM. 25 EXAMPLE, A NEW YORK TIMES TRAVEL ARTICLE, IT MIGHT HAVE THE SO IF YOU GO TO, RAYNEE H. MERCADO, CSR, RMR, CRR, FCRR (510) 451-7530 6 1 FACEBOOK SOCIAL PLUG-IN, WHICH CAN TAKE DIFFERENT FORMS, ONE 2 OF WHICH IS THE "LIKE" BUTTON. 3 PLUG-IN WILL HAVE A NUMBER NEXT TO IT, AND THAT IS THE NUMBER 4 OF PEOPLE WHO HAVE "LIKED" THIS PARTICULAR -- THIS PARTICULAR 5 WEB PAGE. OFTENTIMES, THAT SOCIAL 6 PRIOR TO OCTOBER OF 2012, ONE OF THE THINGS THAT WAS 7 INCLUDED IN THAT ANONYMOUS AGGREGATE NUMBER WAS IF A FACEBOOK 8 USER SENT A MESSAGE ON THE FACEBOOK PLATFORM TO ANOTHER 9 FACEBOOK USER AND INCLUDED A -- A URL, A LINK TO THAT WEBSITE, 10 THEN THE -- THE COUNT ON THAT WEBSITE WOULD GO UP. 11 NOW, THERE ARE OTHER THINGS, OF COURSE, THAT GO INTO THAT. 12 IF SOMEONE AFFIRMATIVELY IS ON THE SITE AND AFFIRMATIVELY 13 CLICKS "LIKE," THAT INCREASES IT. 14 WITH YOUR FRIENDS -- SO THERE WERE DIFFERENT -- THERE ARE 15 DIFFERENT FACTORS THAT -- 16 THE COURT: 17 MR. JESSEN: 18 THE COURT: 19 IF YOU SHARE THAT ON -- SO THE "LIKE" NUMBER WOULD INCREASE -CORRECT. -- ONCE IT'S SENT BY A FACEBOOK USER AND -- 20 MR. JESSEN: 21 THE COURT: CORRECT. -- TO A RECIPIENT, IT WOULD INCREASE BY 22 ONE? 23 IT, IT WOULD INCREASE BY ANOTHER? 24 25 AND THEN IF THE PERSON -- IF THE RECIPIENT CLICKED ON MR. JESSEN: I BELIEVE THAT'S CORRECT, YOUR HONOR. THERE ARE MULTIPLE THINGS THAT GO INTO IT -- NOW, THERE RAYNEE H. MERCADO, CSR, RMR, CRR, FCRR (510) 451-7530 7 1 WAS A -- THERE'S SOME DISCUSSION OF THIS IN THE COMPLAINT. 2 THERE WAS A BUG FOR A PERIOD OF TIME WHERE THE COUNT WAS 3 ACTUALLY GOING UP BY TWO, BUT -- BUT PUTTING THE BUG ASIDE, 4 YES, THAT WAS -- IF YOU INCLUDED THE URL IN THE MESSAGE, THIS 5 ANONYMOUS AGGREGATE NUMBER, WHICH IS NOT LINKED TO A PERSON AT 6 ALL, WENT UP. 7 AND THAT'S THE CONDUCT, THAT'S -- THAT STOPPED AROUND 8 OCTOBER OF 2012. 9 ABOUT. 10 NOW -- 11 12 AND THAT'S REALLY WHAT THIS -- THIS CASE IS THE COURT: MR. JESSEN: 14 THE COURT: 15 MR. JESSEN: 16 THE COURT: 20 21 22 23 THAT'S CORRECT, YOUR HONOR. OKAY. AFTER THE OCTOBER -- THAT'S CORRECT. THE NUMBER -- FACEBOOK STOPPED COUNTING THEM IN THE "LIKE" -- 18 19 THE CONDUCT THAT STOPPED IS THAT THE NUMBERS WOULDN'T GO UP. 13 17 WAIT. MR. JESSEN: MESSAGE. CORRECT. IN -- FOR -- FOR A SHARE IN A THAT'S THE CONDUCT THAT STOPPED. AND THAT'S REALLY -- MAYBE WE'LL HAVE SOME DISPUTE, BUT THAT'S REALLY WHAT'S DRIVING THIS CASE. PLAINTIFFS INITIALLY, AS YOUR HONOR -THE COURT: BUT IS IT REALLY JUST THE NUMBER THAT 24 APPEARS IN THE "LIKE" BUTTON THAT THE PLAINTIFFS ARE 25 COMPLAINING ABOUT? ISN'T IT ACTUALLY THE SCANNING -- AND I'M RAYNEE H. MERCADO, CSR, RMR, CRR, FCRR (510) 451-7530 8 1 NOT EXACTLY SURE WHAT THAT MEANS, AND I'M SURE SOMEONE WILL 2 TELL ME -- OR REVIEW OF THE ACTUAL MESSAGE THAT WAS SENT FROM 3 A FACEBOOK USER TO SOMEONE ELSE? 4 ASKED YOU WHAT CONDUCT CEASED -- 5 MR. JESSEN: 6 THE COURT: 7 YES. -- YOU'VE EXPLAINED THAT THE CONDUCT OF COUNTING THAT TRANSMISSION AS A "LIKE" CEASED. 8 MR. JESSEN: 9 THE COURT: 10 CORRECT. BUT DID THE ACTUAL CONDUCT OF SCANNING OR LOOKING AT THESE MESSAGES THAT ARE SENT STOP? 11 ANYTHING THAT'S SHARED ON -- FACEBOOK IS MR. JESSEN: 12 A PLATFORM. 13 SERVICE. 14 SO MY QUESTION IS -- WHEN I IT'S THE WORLD'S LARGEST SOCIAL NETWORKING IT HAS OVER A BILLION USERS. ANYTHING THAT IS SHARED ON THAT SITE IS BY DEFINITION 15 ANALYZED BY COMPUTERS. 16 ABOVE ALL OF WHICH ARE PROTECTING THE INTEGRITY OF THE SITE. 17 IT HAS TO BE FOR A VARIETY OF REASONS, AS YOU CAN IMAGINE, SUCH A LARGE PLATFORM IS SUBJECT TO 18 ALL KIND OF ATTEMPTS TO HACK THE SITE, SERVE SPAM TO ITS 19 USERS, MAL-WARE, SO ANY -- ANYTHING THAT'S SHARED ON THE SITE, 20 YOUR HONOR, IS GOING TO BE SUBJECT TO AUTOMATIC -- AUTOMATED 21 SYSTEMS THAT ARE DESIGNED TO FILTER SPAM, PROTECT THE 22 INTEGRITY OF THE SITE, AND EVEN VERY BASIC -- 23 THE COURT: SO THE ANSWER TO MY QUESTION IS NO, THAT 24 THAT CONDUCT -- THAT THE PROCESS STILL EVALUATES THE -- THE -- 25 WHAT'S EITHER THE CONTENT OF OR WHAT'S ATTACHED TO THE RAYNEE H. MERCADO, CSR, RMR, CRR, FCRR (510) 451-7530 9 1 MESSAGES THAT ARE SENT. 2 MR. JESSEN: THERE -- THERE IS ANALYSIS THAT'S GOING 3 ON. 4 OF THE WIRETAP ACT OR ANY OTHER CRIMINAL STATUTE. 5 AND -- WE DON'T -- WE DON'T THINK THAT THAT ANALYSIS RUNS AFOUL BUT -- 6 AND AN IMPORTANT POINT TO BEAR IN MIND, YOUR HONOR, IS 7 THEY'RE NOT CHALLENGING -- THEY'RE CHALLENGING A VERY SPECIFIC 8 THING, WHICH WAS THEY SAY, FACEBOOK, YOU WERE USING THESE 9 SHARES TO INCREASE AN -- AN ANONYMOUS NUMBER. THEY'RE NOT 10 CHALLENGING THAT VARIOUS PROCESSES HAVE TO TAKE PLACE ON 11 THE -- ON THE PLATFORM TO PREVENT SPAM, TO PREVENT THINGS LIKE 12 CHILD PORNOGRAPHY. 13 THERE ARE SYSTEMS IN PLACE TO KEEP FACEBOOK AND ITS USERS 14 SAFE AND SECURE. 15 HONOR. 16 COMPLAINING ABOUT THAT. 17 SO, OF COURSE, THAT'S STILL GOING ON, YOUR AND THEY'RE NOT -- THAT'S NOT -- THEY'RE NOT AND THIS IS, I THINK, AN IMPORTANT POINT ON REALLY THE 18 WIRETAP ACT CLAIM AND ALSO THE STATE LAW COROLLARY, WHICH IS 19 631. 20 THAT CLAIM FAILS AS A MATTER OF LAW. 21 BEAR IN MIND, I THINK, IS THESE ARE CRIMINAL STATUTES THAT 22 THEY'RE ASSERTING, PASSED IN -- INITIALLY IN (SIC) 1960'S AND 23 THEN IN THE 1980'S, YEARS BEFORE THE WORLDWIDE WEB EVEN 24 EXISTED. 25 WE'VE LAID OUT A NUMBER OF REASONS WHY WE THINK THAT ONE OVERARCHING THING TO BUT THEY'RE CRIMINAL STATUTES. AND UNDER CLEAR SUPREME COURT PRECEDENT, NINTH CIRCUIT RAYNEE H. MERCADO, CSR, RMR, CRR, FCRR (510) 451-7530 77 1 GET TO TO RESOLVE THE MOTION -- 2 THE COURT: PERHAPS. 3 MR. JESSEN: "CONSENT" I THINK CAN BE RESOLVED AND, 4 FRANKLY, "ORDINARY COURSE OF BUSINESS" BASED UPON THE LEGAL 5 STANDARD AND WHAT THEY'VE ALLEGED IN THEIR COMPLAINT AND 6 OBVIOUSLY ON THE 632 AND UCL. 7 THE COURT: 8 9 OKAY. ALL RIGHT. MATTER STANDS SUBMITTED. THANK YOU. 10 MR. SOBOL: 11 MR. JESSEN: THANK YOU FOR YOUR PATIENCE, YOUR HONOR. THANK YOU, YOUR HONOR. 12 (PROCEEDINGS WERE CONCLUDED AT 11:05 A.M.) 13 --O0O-- 14 CERTIFICATE OF REPORTER 15 16 I CERTIFY THAT THE FOREGOING IS A CORRECT TRANSCRIPT 17 FROM THE RECORD OF PROCEEDINGS IN THE ABOVE-ENTITLED MATTER. 18 I FURTHER CERTIFY THAT I AM NEITHER COUNSEL FOR, RELATED TO, 19 NOR EMPLOYED BY ANY OF THE PARTIES TO THE ACTION IN WHICH THIS 20 HEARING WAS TAKEN, AND FURTHER THAT I AM NOT FINANCIALLY NOR 21 OTHERWISE INTERESTED IN THE OUTCOME OF THE ACTION. 22 23 ___________________________________ 24 RAYNEE H. MERCADO, CSR, RMR, CRR, FCRR, CCRR 25 SATURDAY, DECEMBER 20, 2014 RAYNEE H. MERCADO, CSR, RMR, CRR, FCRR (510) 451-7530 EXHIBIT 2 1 2 3 4 5 6 7 Michael W. Sobol (State Bar No. 194857) msobol@lchb.com David T. Rudolph (State Bar No. 233457) drudolph@lchb.com Melissa Gardner (State Bar No. 289096) mgardner@lchb.com LIEFF CABRASER HEIMANN & BERNSTEIN, LLP 275 Battery Street, 29th Floor San Francisco, CA 94111-3339 Telephone: 415.956.1000 Facsimile: 415.956.1008 12 Hank Bates (State Bar No. 167688) hbates@cbplaw.com Allen Carney acarney@cbplaw.com David Slade dslade@cbplaw.com CARNEY BATES & PULLIAM, PLLC 11311 Arcade Drive Little Rock, AR 72212 Telephone: 501.312.8500 Facsimile: 501.312.8505 13 Attorneys for Plaintiffs and the Proposed Class 8 9 10 11 14 UNITED STATES DISTRICT COURT 15 NORTHERN DISTRICT OF CALIFORNIA 16 17 18 MATTHEW CAMPBELL and MICHAEL HURLEY, on behalf of themselves and all others similarly situated, 19 Plaintiffs, 20 v. 21 FACEBOOK, INC., 22 Defendant. Case No. C 13-05996 PJH (MEJ) REPORT OF DR. JENNIFER GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION HEARING Date: March 16, 2016 Time: 9:00 a.m. Place: Courtroom 3, 3rd Floor | The Honorable Phyllis J. Hamilton 23 24 25 26 27 28 REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 TABLE OF CONTENTS 2 Page 3 4 5 6 I. II. III. 7 8 9 10 IV. 11 12 V. 13 14 VI. 15 16 17 18 VII. VIII. IX. QUALIFICATIONS ............................................................................................... 1 METHODOLOGY AND SUMMARY OF CONCLUSIONS ............................... 3 FACEBOOK’S INTERCEPTION OF PRIVATE MESSAGE CONTENT........... 5 A. Facebook’s Private Message Architecture Functionality............................ 5 B. Facebook’s Interception and of Private Message Content ........... 9 C. Facebook’s Use Of Code-Based Devices To Intercept Private Message Content ....................................................................................... 14 FACEBOOK’S USES OF INTERCEPTED PRIVATE MESSAGE DATA ....... 15 A. Facebook Used Private Message Content To And Other Features ............. 15 B. Incrementing Like Counter ....................................................................... 23 FACEBOOK’S CONDUCT ........................ 26 A. Facebook Has ........................................... 26 CLASS MEMBERS ARE ASCERTAINABLE ................................................... 27 A. Class Members Can Be Identified Through . ................ 27 THE CODE FOR ANALYZING PRIVATE MESSAGES OPERATED THE SAME FOR ALL USERS ............................................................................ 29 “ORDINARY COURSE OF BUSINESS” .......................................................... 29 “IN TRANSMISSION” ........................................................................................ 32 19 20 21 22 23 24 25 26 27 28 -i- REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 2 I. QUALIFICATIONS 1. As indicated in my curriculum vitae, attached hereto as Exhibit A, I have been a 3 professor in the College of Information Studies (“The iSchool”) at the University of Maryland 4 since 2007 (assistant professor from 2007-2013, associate professor with tenure to present), 5 where I have focused my research and teaching efforts on aspects of social media and the web. 6 2. I have been doing freelance professional web design and programming since 1993. 7 I worked as a web designer for the University of Chicago from 1995-2000. I operated my own 8 web design company, Gargoyle Web Design, from 1999-2001, which I closed when I began my 9 Ph.D. work. 10 3. I have taught university level classes on the web and social media, including: 11 “Analyzing Social Networks and Social Media,” “Social Networks: Technology and Society,” 12 “Development of Internet Applications,” “Fundamentals of Human-Computer Interaction,” 13 “Information Users in Social Context,” and “Small Worlds, Social Networks, and Algorithms.” In 14 addition, I have published and presented many articles in refereed journals and conferences, and 15 over 100 of these relate to social media and the web. 16 4. I received two Bachelor’s degrees, in Computer Science and Economics, from the 17 University of Chicago in 1999, a Master’s degree in Computer Science from the University of 18 Chicago in 2001, and a Ph.D. in Computer Science from the University of Maryland in 2005. My 19 Ph.D. thesis focused on social media and was titled “Computing and Applying Trust in Web- 20 based Social Networks.” 21 5. I have been teaching at universities on issues related to computer science, the web, 22 and social media since 1999 when I was a Lecturer in the Computer Science Department at the 23 University of Chicago. Over the past fourteen years, in a variety of different capacities, I have 24 taught classes at University of Chicago, George Mason University, Johns Hopkins University, 25 Georgetown University, George Washington University, American University, and University of 26 Maryland. 27 28 6. Through my research and studies, I have won a variety of awards including the 2015 University of Maryland Research Communicator Impact Award, 2015 University of -1- REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 Maryland System Mentoring Award, Best Paper Award at the 2011 IEEE Social Computing 2 Conference, Best Paper Award at the 2009 International Semantic Web Conference, Research 3 Fellow for the Web Science Research Initiative (2008 – present), IEEE Intelligent Systems Ten to 4 Watch in May 2006, and the 2005 DARPA IPTO Young Investigator Award. 5 7. I also presented a TED talk titled “The curly fry conundrum: Why social media 6 ‘likes’ say more than you might think.”1 It received 1.7 million views and was named one of 7 TED’s “Most Powerful Talks of 2014.”2 TED (Technology, Engineering, Design) is a non-profit 8 organization that presents “Ideas Worth Spreading.” Videos of their invited presentations have 9 over half a billion total views. 10 8. I have authored over 100 scientific papers related to the web. Most recently, I have 11 authored two books on social media, entitled “Social Media Investigation” and “Analyzing the 12 Social Web.” Both books focus on various aspects of web and social media interaction, such as 13 using location-based services on mobile devices as well as interaction with friends for business 14 purposes. I have also authored other books including “Trust on the World Wide Web: A Survey” 15 and “Art Theory for Web Design.” 16 9. I have given expert testimony in the following proceedings: • Rembrandt Social Media LP v. Facebook Inc. et al, No. 13-cv-00158 U.S. District Court for the Eastern District of Virginia 2013-2014 (plaintiff) • Peter Daou and James Boyce vs. Ariana Huffington, Kenneth Lerer and Thehuffingtonpost.com, No. 651997/2010 Supreme Court of The State Of New York, County of New York 20132014 (plaintiff) • 17 Blue Calypso Inc. v. Groupon Inc., No. 12-cv-00486, U.S. District Court for the Eastern District of Texas 2014-2015 (plaintiff) 18 19 20 21 22 23 24 25 26 27 28 1 Available at https://www.ted.com/talks/jennifer_golbeck_the_curly_fry_conundrum_why_social_media_likes _say_more_than_you_might_think?language=en. 2 See http://yearinideas.ted.com/2014/. -2- REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 10. A copy of my full curriculum vitae is attached as Exhibit A to this report. I am 2 being compensated at the rate of $400 per hour for my services in this matter, and payment is not 3 contingent on the outcome of this proceeding. 4 II. 5 METHODOLOGY AND SUMMARY OF CONCLUSIONS 11. I am submitting this report on behalf of the Plaintiffs. I have been retained as a 6 technical expert to study and provide my opinions regarding the topics discussed in paragraph 16 7 below. My opinions, as well as the evidence I rely upon to support them, are set forth in detail in 8 this report. The contents of the various exhibits that I identify by name are meant to be 9 incorporated, in their entirety, by such reference. 10 12. In preparing this report, I have employed methods and analyses of a type 11 reasonably relied upon by experts in my field in forming opinions or inferences on the subject. 12 The opinions expressed are based upon a reasonable degree of computer science certainty. 13 13. Between now and such time that I may be asked to testify before the Court, I 14 expect to continue my review, evaluation, and analysis of information generated during 15 discovery, as well as of relevant evidence presented before and/or at trial. I also expect to review 16 the reports submitted by Facebook’s experts. I reserve the right to amend or supplement this 17 report, as necessary and as acceptable to the Court. I also reserve the right to develop materials 18 and exhibits as appropriate for use in helping to demonstrate and explain my opinions in the event 19 that I am asked to testify at trial. 20 14. In forming my opinions, I have reviewed source code which I understand was 21 provided by Facebook’s counsel and which was represented as containing the relevant source 22 code between some time in 2009 and December 2012. 23 15. Additionally I have reviewed numerous internal Facebook documents produced in 24 this litigation, as well as certain public materials. The list of documents I have considered in 25 forming my opinions is attached to this report as Exhibit B. 26 27 28 16. I have been asked by the Plaintiffs through their counsel to opine on the following issues: a. The structure and function of Facebook’s messaging system; -3- REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 b. 2 Facebook’s interception of Private Message content, including: i. Whether and what devices Facebook employs to intercept message 4 ii. Whether the interceptions occurred in transit; 5 iii. Whether the interception of Private Message content was necessary 3 6 content; for Facebook to deliver private messages; 7 c. Facebook’s subsequent use of that Private Message content; 8 d. Whether the class members can be readily determined based on Facebook’s 9 own records; and 10 11 12 13 14 15 16 e. Whether the Facebook’s uniformly processed Private Messages during the relevant period. 17. Based on my review and analysis of Facebook’s source code as well as internal Facebook documents and deposition testimony, I conclude the following: a. The structure and function of Facebook’s messaging system is described in detail in Section III below; b. Facebook intercepted and redirected user’s Private Message content using 17 various code-based devices while the message was in transit, and this interception was not 18 necessary for Facebook to deliver private messages; 19 c. Facebook used the intercepted Private Message content 20 21 22 23 24 as well as to increment the “Like” social plugin counter; d. The class members can be determined from Facebook’s own records using various query methods and through self-identification; and e. Facebook’s source code operated consistently during the relevant period. 25 26 27 28 -4- REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 III. 2 FACEBOOK’S INTERCEPTION OF PRIVATE MESSAGE CONTENT A. 3 Facebook’s Private Message Architecture Functionality 1. 18. 4 Overview of Facebook’s Private Message Architecture An overview of Facebook’s Private Message architecture is useful. Say Alice is 5 sending a Private Message to Bob. In order to do so, Alice opens her Facebook message window 6 and begins to compose her message. Figure 1 Message Window 7 8 9 10 11 12 13 14 15 16 17 18 19 20 19. She types her text and, if she types, pastes, or otherwise enters a URL into the body of the message, 21 3 22 23 20. Facebook describes this process in its Supplemental Responses and Objections to Plaintiffs’ First Set of Interrogatories: 24 25 26 27 28 3 Facebook’s servers are the computers on which the Facebook system operates. They store code and data, run the code, provide web content, and manage back-end functionality. Essentially, every part of Facebook other than the code that runs in the user’s browser is running on Facebook servers, and those servers provide every element of Facebook that a user interacts with. -5- REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 4 2 3 21. The vast majority of web users have JavaScript enabled. In 2010, Yahoo! 4 engineers issued a report stating that 1-2% of traffic came from users without Javascript enabled.5 5 Those numbers appear to have remained relatively stable over time. A 2013 analysis showed 6 about 1% of users were not accessing JavaScript-based content.6 Thus, 98-99% of users have 7 JavaScript active and this Facebook code would run in their browsers. 8 9 22. The URL detection process is also described by Ray He, an engineer at Facebook. In his September 25, 2015 deposition (He Depo.), Mr. He states: 10 11 12 13 23. Based on my analysis of Facebook’s source code (the “Code”), this process 14 appears in 15 16 17 18 19 20 21 22 23 24 25 26 27 28 4 Id. at 12:26 – 13:2. See https://web.archive.org/web/20101016010319/http://developer.yahoo.com/blogs/ydn/posts/2010/ 10/how-many-users-have-javascript-disabled/ 6 See https://gds.blog.gov.uk/2013/10/21/how-many-people-are-missing-out-on-javascriptenhancement/ 7 He Depo. at 187:7-11. 8 FB000027054; FB000027055. 5 -6- REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 24. After this Code 2 3 4 9 5 6 25. The process of 7 10 8 9 26. As mentioned above, 10 11 12 13 14 15 12 16 17 27. The preview then appears as part of the message that the Alice is composing 18 13 19 20 21 22 23 24 25 26 27 28 9 Facebook’s Supplemental Responses and Objections to Plaintiffs’ First Set of Interrogatories at 13:4-5. 10 The is analogous to the “web crawler” referenced in Plaintiffs’ Consolidated Amended Complaint (“CAC”). 11 API stands for “Application Program Interface.” It's a set of code one can use to interact with a system (Facebook in this case). 12 FB000027055 13 Facebook’s Supplemental Responses and Objections to Plaintiffs’ First Set of Interrogatories at 13:19-20 -7- REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 Figure 2 Message Window 2 3 4 5 6 7 8 9 10 11 12 13 28. However, this preview in Alice’s message is not the 14 . The preview returned is 15 16 14 17 29. As described in further detail below, 18 19 prior to Alice’s typing 20 the URL into her Private Message, Facebook’s 21 . 22 30. When Alice finishes the message and hits send, both the text of her message and 23 the are sent to Facebook’s servers. In a series of steps, detailed further below, 24 Facebook processes the message , ultimately delivering the message to Bob. For 25 that high level message sending to happen, there are many sub-processes that have to take place. 26 27 28 14 Facebook’s Supplemental Responses and Objections to Plaintiffs’ First Set of Interrogatories at 14:5. -8- REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 Michael Adkins, a Facebook engineer, provides a broad overview of this transmission process in 2 his October 28, 2015 deposition (Adkins Depo.): 3 4 5 6 7 8 9 10 11 12 13 31. 14 The focus of this report, which is the interception and acquisition of the in Private Messages, occurs early in the above-described transmission, 15 . 16 B. 17 Facebook’s Interception and 1. 18 32. of Private Message Content Creation of Share Objects Facebook has large and complex data behind its site. They store this in a data 19 model called TAO (The Associations and Objects).16 As the name suggests, there are two pieces 20 in this model: objects and associations. 21 33. Objects represent things on Facebook – users, pages, checkins, comments, 22 locations, etc. Associations represent relationships between objects. Those could be friendships 23 between users, a like that connects a user to a page, or a location that is tied to a user check-in. 24 34. 25 26 There are a number of objects that Facebook . Two of these are 15 objects and Adkins Depo. at 67:23-69:1. Similarly, Ray He stated in his deposition that 27 28 He Depo. at 204:21-24 See https://www.facebook.com/notes/facebook-engineering/tao-the-power-of-thegraph/10151525983993920 -9- REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 objects. The 2 , while the 3 . 4 5 35. As described in the previous section, when Facebook is generating the preview for a URL in a user’s message window, 6 7 It is information from this 8 object that is used to . If no object exists, Facebook’s 9 10 11 17 12 13 36. Based on my analysis of Facebook’s Code, this is the process for the 14 15 16 17 18 19 20 21 
 22 23 24 25 26 27 28 17 Facebook’s Supplemental Responses and Objections to Plaintiffs’ First Set of Interrogatories at 13:8-11 - 10 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 2 3 4 5 6 7 8 9 10 11 cific 12 13 39. 14 Facebook or not, When the user sends a Private Message containing a URL, whether it is new to incremented. In other words, 15 16 goes up by 1. The process for this is as follows. 17 18 40. After the user hits “send” but before the message is delivered, the Facebook Code processes information about the sent message. Specific to this litigation, the Code searches for 19 . 20 These 21 internal documentation, “ According to Facebook’s 21 22 In the case of 23 24 25 26 18 19 FB000014199. In some cases, this includes a 21 FB000014204. FB000011543. the private message as the , known in this case as . See Facebook’s Second Supplemental Responses and Objections to Plaintiffs’ Narrowed Second Set of Interrogatories at14:5-6: 27 28 - 11 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 Private Messages, while composing a private message.22 2 3 41. The creation of the in 4 the message transmission process. As discussed in greater detail in Section III.B, infra, the Code 5 in 6 7 8 9 42. Based on my analysis of Facebook’s Code and documents, in my opinion, and as discussed further below, the 10 11 constitute the interception, analysis, and use of the contents of user’s Private Message. 12 2. 13 43. of Private Message Content Once Facebook intercepts the URL contents of users’ Private 14 15 16 a. 17 44. Facebook’s Code, as well as Facebook’s internal documents, indicate that when a 18 19 . 20 45. The 21 22 With this data, Facebook can 23 in a variety of ways. The URLs people share privately may 24 25 26 46. For example, on Private Message content.23 27 28 22 An example of the data represented in is FB000005528. - 12 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 The particular Facebook functionality at issue in this document is 2 documents describe as which Facebook ”24 Ray He further explains that 3 25 4 5 47. Concerning 6 7 8 This 9 indicates if a message was 10 11 This is further corroborated by a 12 26 13 14 Messages were 15 16 48. This could only be the case if Private . Indeed, in a later communication, dated 17 27 18 19 49. In the Facebook Code base, the 20 28 21 22 50. Again, the presence of the 23 . 24 25 26 27 28 23 FB000002651. FB000003118. 25 He Depo. at 227:3-4, 11-12. 26 FB000002651. 27 FB000002843. 28 FB000014183. 24 - 13 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 51. 2 3 6 is now used to , Facebook could still use information from the Private Messages in the future since they 4 5 While the addition of the . b. 52. . In Facebook document FB000008505, Facebook employees describe the 7 8 9 10 53. In the same document describing this 54. When a URL is C. Facebook’s Use Of Code-Based Devices To Intercept Private Message Content 55. As discussed above, Facebook employs various code-based devices to intercept 11 12 13 14 15 16 17 18 Private Message content. Set forth below are the discrete components of Facebook’s Code that 19 execute the interceptions, each of which 20 21 22 23 • Processes : o After a user sends a message, the Code 24 25 26 27 28 - 14 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) • 1 2 o As described in section III.B.2 above, 3 4 5 6 • 7 8 o As described more detail in in paragraph 84 below, 9 10 11 12 13 . IV. FACEBOOK’S USES OF INTERCEPTED PRIVATE MESSAGE DATA A. Facebook Used Private Message Content To And Other Features 56. With the data Facebook collected by scanning Private Messages, Facebook 14 15 16 17 18 . 19 1. Facebook Provided 20 57. As described above, the 21 22 23 24 58. The Code for 25 this is as follows: 26 27 28 - 15 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 59. In this 2 3 4 5 6 60. 7 8 9 10 2. 11 61. 12 13 14 15 . This, along with other evidence, strongly suggests that Facebook continued to use Private Message content to 16 17 62. As discussed above, 63. In deposition, Ray He explained that 18 19 20 21 22 23 24 25 26 27 28 29 30 FB000027029. FB000027051. - 16 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 2 3 4 5 64. Mr. He provided further testimony confirming that Private Message URL sends were used in . When discussing how 6 , Ray He was asked whether he was 7 8 9 10 11 ”32 12 3. 13 65. 14 . This includes interactions that took place in private messages. 15 66. In FB000007286, Facebook describes 16 17 18 19 20 21 22 23 24 25 26 27 28 31 32 He Depo. at 234:14-25. He Depo. at 229:19-230:6. - 17 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 Figure 3 2 3 4 5 6 7 8 9 10 11 12 13 67. 14 15 16 17 18 68. Facebook document FB000006178, which has the subject 69. Section 4.2 of Facebook document FB000010688 describes 19 20 21 22 23 24 25 26 27 28 - 18 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 Figure 4 2 3 4 5 6 7 8 The document goes on to explain that the 9 10 70. As described above, 71. This indicates that 72. Facebook document FB000008722 also supports this. It describes 73. In the 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 - 19 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 74. Experiments by journalist Ashkan Soltani also suggest that Facebook was 2 3 4 5 Figure 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 4. 23 75. 24 25 The Facebook Activity Plugin allowed third parties to show recent activity in Facebook that related to their site: 33 26 27 28 33 https://web.archive.org/web/20101205130048/http://developers.facebook.com/ docs/reference/plugins/activity. - 20 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 The Activity Feed plugin displays the most interesting recent activity taking place on your site. Since the content is hosted by Facebook, the plugin can display personalized content whether or not the user has logged into your site. The activity feed displays stories both when users like content on your site and when users share content from your site back to Facebook. If a user is logged into Facebook, the plugin will be personalized to highlight content from their friends. If the user is logged out, the activity feed will show recommendations from your site, and give the user the option to log in to Facebook. 2 3 4 5 6 The plugin is filled with activity from the user’s friends. If there isn’t enough friend activity to fill the plugin, it is backfilled with recommendations. If you set the recommendations param to true, the plugin is split in half, showing friends activity in the top half, and recommendations in the bottom half. If there is not enough friends activity to fill half of the plugin, it will include more recommendations. 7 8 9 10 76. 11 12 13 14 15 16 17 77. 18 19 20 21 22 23 24 25 26 27 28 34 35 FB000002843. Id. - 21 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 78. 2 3 4 5 5. 79. Private Message data 80. Facebook document FB000008499 describes the data that can be seen from 6 7 8 9 10 11 12 13 14 15 16 : 17 Figure 6 18 19 20 21 22 23 81. 24 25 26 27 28 - 22 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 B. Incrementing Like Counter 2 82. On October 3, 2012, the Wall Street Journal reported that Facebook was scanning 3 users’ private messages.36 They detected this by observing that the like count on an external page 4 would increase by two every time the page’s URL was sent in a private message. 83. 5 They tested this by creating pages and observing the count on the external like 6 button increase by two every time the link was sent in a private message. The double counting 7 was also visible on the insights page for webmasters, which shows analytics information. 37 84. 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 36 37 http://blogs.wsj.com/digits/2012/10/03/how-private-are-your-private-messages/. https://developers.facebook.com/blog/post/476. - 23 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 85. After media reports surfaced the double-counting issue and the fact that private messages were scanned and hidden “likes” were counted as a result, Facebook 16 17 18 19 20 21 86. In Facebook document FB000002141, Facebook discusses 22 23 24 25 26 27 28 38 FB000027018. - 24 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 2 3 87. Facebook then set out to determine 4 5 .40 6 7 88. Because the magnitude of 8 9 10 11 12 13 which messages are sent or received. 14 89. Indeed, the described change to the Code simply 90. Changes in 15 16 17 18 19 do not impact the way that Facebook handles private messages in any way. The Code change that 20 21 22 23 24 91. This is further highlighted in Facebook document FB000006429. That document, which discusses 25 26 27 28 39 40 FB000002196. FB000001599. - 25 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 2 3 92. Note that in the changes discussed above, Facebook 93. This is supported in an email from 4 5 6 7 8 9 10 11 12 41 13 14 V. 15 FACEBOOK’S CONDUCT CONTINUES TO THE PRESENT A. Facebook Has 94. In addressing the issue of 16 17 18 This appears redacted in FB000001606. However, there is no evidence 19 that Facebook ever . 20 95. Instead, evidence from the Code shows that Facebook 21 (the last date 22 for which we had access to source Code). I analyzed the files 23 24 25 . There were no substantial changes to these files, and they 26 continued to until the latest date in the Code. 27 28 41 FB000000425. - 26 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 96. Further, internal Facebook documents indicate that Facebook 2 3 4 My understanding is that Facebook produced several 5 6 7 for the message’s URL.43 8 9 97. With that information available, Facebook could 10 11 12 VI. CLASS MEMBERS ARE ASCERTAINABLE 13 A. Class Members Can Be Identified Through 14 98. Each 99. In the Code, the . 15 16 17 18 19 20 21 22 23 44 24 25 26 27 28 42 FB000005827. FB000005802-R. 44 FB0000027020. 43 - 27 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 100. The creator of these private 2 3 as shown below in FB000008499: Figure 7 4 5 6 7 8 9 10 11 101. This 12 . That resolves to 13 14 15 16 17 18 102. person Facebook users located within the United States who have sent, or received from a Facebook user, private messages that included URLs in their content (and from which Facebook generated a URL attachment), from within two years of the filing of this action up through the date of class certification.” 19 20 I understand that the Plaintiffs in this case seek to certify a class of “All natural- 103. To retrieve a list of class members, the Code process should be relatively straightforward. A database query could be used 21 22 23 104. The exact code will vary based on the type of database, but example query code could roughly take this form: 24 25 26 27 Where 28 correspond to the above examples from the Code. - 28 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 2 105. If database queries were not an option, direct code could be written to access the data. For each something like the following checks would determine if it were a 3 If so, the Facebook user ID could be selected: 4 5 6 7 8 9 10 106. Users could also self-identify as class members. In anyone’s message inbox on 11 Facebook, they can go back and see their old messages. These will indicate if a URL 12 is present because it will have the URL and 13 14 15 in the message. VII. THE CODE FOR ANALYZING PRIVATE MESSAGES OPERATED THE SAME FOR ALL USERS 107. As described above, I analyzed changes in the relevant portions of the Code over 16 the time period in question. The Code for analyzing private message operated in the same 17 way for all users. If any Facebook user with a types in a URL to a 18 private message, Facebook will . If the user then sends the message, 19 Facebook’s Code would as described above. 20 21 VIII. “ORDINARY COURSE OF BUSINESS” 108. I understand that Facebook asserts that the above-described processes are 22 employed in the “ordinary course of business.” I further understand that in the context of the 23 claims that Plaintiffs assert, an electronic communications service provider such as Facebook 24 “cannot simply adopt any revenue-generating practice and deem it “ordinary” by its own 25 subjective standard.” Campbell v. Facebook Inc., 77 F. Supp. 3d 836, 844 (N.D. Cal. 2014). 26 Instead, for an interception to fall within the scope of the defense there must be “some nexus 27 between the need to engage in the alleged interception and the subscriber’s ultimate business, that 28 - 29 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 is, the ability to provide the underlying service or good.” Id. (citing In re Google Inc. Gmail 2 Litig., 2013 U.S. Dist. LEXIS 172784 (N.D. Cal. Sept. 26, 2013). 3 109. Having reviewed Facebook’s Code and the documents provided in discovery, I 4 conclude that the interception, analysis, and use of URL 5 necessary for the functionality of message sharing in Facebook. 6 7 110. in Private Messages is not Facebook itself confirms this in its Interrogatory Responses, where it notes that on some occasions a message with a URL 8 9 10 11 12 13 46 14 15 111. Facebook goes on to explain that the URL 16 17 18 19 20 21 7 22 23 112. The Code also shows that these steps are unnecessary. When a message is sent 24 with 25 the content of the message with its URL to the recipient. 26 27 28 are not necessary to deliver are 45 Facebook's Second Supplemental Response and Objections to Interrogatory No. 8 at 12:3-7 (emphasis added). 46 Id. 16:24-28 (emphasis added). 47 Facebook’s Supplemental Responses and Objections to Plaintiffs’ First Set of Interrogatories at 15:10-15. - 30 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 not used to deliver the message. The 2 process. Instead, these processes are related to the acquisition of user’s Private Message content 3 for the purposes described above, such as 4 is not part of the message delivery , and inflating engagement counts on social plugins. None of those uses fall 5 within a “nexus between the need to engage in the alleged interception and the subscriber’s 6 ultimate business, that is, the ability to provide the underlying service or good.” Campbell, 77 F. 7 Supp. 3d at 844. 8 113. Additionally, testimony by Michael Adkins demonstrates that Facebook’s 9 10 11 private message content described above. As explained by Michael Adkins, Facebook’s 12 13 14 For example, Mr. Adkins testified that Facebook’s 15 16 17 18 19 20 114. Mr. Adkins further notes that 21 22 23 24 of private message content described above. Mr. Adkins further confirms this by explaining that 25 26 27 28 48 49 Adkins Depo. at 34:17-25. Id. at 36:15-18. - 31 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 2 3 115. Similarly, Mr. Adkins testified that Facebook’s 4 5 6 7 of private 8 message content described above. 9 IX. 10 “IN TRANSMISSION” 116. I further understand that Facebook takes the position that the challenged practices 11 occurred “in storage,” as opposed to “in transmission,” and that they are therefore outside of the 12 scope of the statutes through which Plaintiffs bring their claims. My understanding is that an 13 interception must occur “contemporaneously with transmission” in order to have occurred under 14 either the Electronic Communications Privacy Act or the California Invasion of Privacy Act. In 15 re Carrier IQ, Inc., Consumer Privacy Litig., 78 F. Supp. 3d 1051, 1076 (N.D. Cal. 2015). As 16 described above, all the redirection, 17 while the Private Message is in transmission – 18 of Private Message content happens . 19 117. As the excerpt of the Adkins Deposition shows quoted in paragraph 30 above,52 20 the message is delivered when it is stored in the 21 message, and any URL 22 23 system. Until that point, the ; otherwise, it could not be in the computer at all. In the testimony above, Adkins clearly describes a process by which the message 24 25 26 50 Id. at 87:16-21 27 28 52 Id. at 89:11-90:19. Id. at 67:23-69:1. - 32 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) 1 is 2 .53 3 118. 4 senders with URLs, As described above, all the processing of the message, including and count incrementing, happens before the message is 5 delivered. Thus, in my opinion, Facebook’s interception and redirection of user’s Private 6 Message content happens while the message is in transit and not while it is in storage. 7 8 Dated: November 13, 2015 9 10 __________________ 11 Jennifer Golbeck 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 53 Ray He’s testimony also confirms this. See He Depo. at 206:4-6 28 - 33 - REPORT OF DR. GOLBECK IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION C 13-05996 PJH (MEJ) EXHIBIT A Jennifer Golbeck College of Information Studies (The iSchool) University of Maryland College Park, MD 20742, USA E-mail: jgolbeck@umd.edu Homepage: http://www.cs.umd.edu/∼golbeck/ 1 1.A Personal Information University Appointments 8/2013–present Associate Professor, College of Information Studies (100%), University of Maryland (College Park, Maryland) 8/2007–present Assistant Professor, College of Information Studies (100%), University of Maryland (College Park, Maryland) 1.B Education 8/2001–5/2005 University of Maryland (College Park, Maryland) Doctor of Philosophy in Computer Science 9/1999–6/2001 University of Chicago (Chicago, Illinois) ScientiæMagister in Computer Science 9/1995–6/1999 University of Chicago (Chicago, Illinois) Scientiæ Baccalaureus in Computer Science Artium Baccalaureus in Economics 1 1.C Academic Employment Background 6/2005–8/2007 Faculty Research Associate Institute for Advanced Computer Studies Department of Computer Science University of Maryland (College Park, Maryland) 8/2006–12/2006 Adjunct Professor Computer Science Department American University (Washington, DC) 6/2005–9/2006 Research Director Joint Institute for Knowledge Discovery (JIKD) University of Maryland (College Park, Maryland) 8/2001–5/2005 Research Assistant Department of Computer Science University of Maryland (College Park, Maryland) 8/2001–5/2005 Adjunct Lecturer Computer Science Department George Washington University (Washington, DC) 6/2001–5/2003 Adjunct Lecturer Computer Science Department Georgetown University (Washington, DC) 5/2002–8/2002 Adjunct Professor Advanced Physics Lab Johns Hopkins University (Laurel, Maryland) 8/2001–12/2001 Adjunct Lecturer Computer Science Department George Mason University (Fairfax, Virginia) 6/2000–9/2000 Visiting Graduate Mathematics and Computer Science Division Futures Laboratory Argonne National Laboratory (Argonne, Illinois) 6/1999–6/2001 Lecturer Computer Science Department University of Chicago (Chicago, Illinois) 2 2 Research, Scholarly, and Creative Activities • In all references, my name is in bold. • Unless otherwise indicated, the first author is the lead author. • Underlined names indicate students with whom I collaborated—this includes students for whom I am/was the (co-)advisor and other students where the collaboration was limited to specific projects. • For work in which a student took the lead, it is customary for the student to be first author, followed by faculty who have played an advisory or mentoring role, followed by other individuals who have contributed. In cases where a student is listed as the first author, a wavy :::: underline indicates colleagues with whom I shared this advisory or mentoring role (to the ::::::::: extent of my knowledge). • References marked with α indicate that authors are listed in alphabetical order, or that all co-authors contributed equally. 2.A 2.A.i Books Books Authored B1. Jennifer Golbeck. January 2015. Introduction to Social Media Investigation: A Hands On Approach. Syngress. B2. Jennifer Golbeck. 2013. Analyzing the Social Web. Burlington, MA: Morgan Kaufmann. B3. Jennifer Golbeck. 2008. Trust on the World Wide Web: A Survey. Hanover, MA: Now Publishers Inc. B4. Jennifer Golbeck. 2005. Art Theory for Web Design. Boston, MA: Addison–Wesley. 2.A.ii Books Edited B5. Jennifer Golbeck (ed). 2008. Computing with Social Trust, London, UK: Springer. B6. K. Aberer, K.-S.Choi, N. Noy, D. Allemang, K.-I. Lee, L. Nixon, Jennifer Golbeck, P. Mika, D. Maynard, R. Mizoguchi, G. Schreiber, P. Cudr´ -Mauroux(Eds.) The Semantic Web – 6th e International Semantic Web Conference, 2nd Asian Semantic Web Conference (proceedings), Lecture Notes in Computer Science, Vol. 4825, November 2007. 2.A.iii Chapters in Books BC1. Jennifer Golbeck. 2015. “Who Needs an Untrustworthy Doctor? Maslow’s Hierarchy of Needs” in The Walking Dead Psychology: Psych of the Living Dead, Travis Langley (ed.). Sterling. BC2. Ziegler, Cai-Nicolas, and Jennifer Golbeck. ”Models for Trust Inference in Social Networks.” Propagation Phenomena in Real World Networks. Springer International Publishing, 2015. 53-89. 3 BC3. Jennifer Golbeck, Ugur Kuter. 2008. “The Ripple Effect: Change in Trust and Its Impact over a Social Network” in Computing with Social Trust. Jennifer Golbeck (ed.). Springer. BC4. Jennifer Golbeck, Aaron Mannes, James Hendler, 2006. “Semantic Web Technologies for Terrorist Network Analysis,” in Emergent Information Technologies and Enabling Policies for Counter Terrorism. Robert Popp and John Yen (eds). Wiley-IEEE Press. BC5. Jennifer Golbeck and Paul Mutton, 2005. “Spring-embedded Graph Visualizations of Semantic Metadata and Ontologies,” in Visualizing the Semantic Web, 2nd Ed, Vladimir Geroimenko, Chaomei Chen (eds.). Springer Verlag. BC6. Jennifer Golbeck, 2004. “IRC with ChatZilla” in Paul Mutton, IRC Hacks, 2004. O’Reilly Associates: Cambridge, MA. BC7. Jennifer Golbeck, 2004. “IRC in Mac OS X” in Paul Mutton, IRC Hacks, 2004. O’Reilly Associates: Cambridge, MA. BC8. Jennifer Golbeck, 2004. “Getting Friendly with FOAFBot” in Paul Mutton, IRC Hacks, 2004. O’Reilly Associates: Cambridge, MA. BC9. Jennifer Golbeck, 2004. “Interrogate Trust Networks with TrustBot” in Paul Mutton, IRC Hacks, 2004. O’Reilly Associates: Cambridge, MA. BC10. Jennifer Golbeck, 2004. “Check the Weather” in Paul Mutton, IRC Hacks, 2004. O’Reilly Associates: Cambridge, MA. BC11. Jennifer Golbeck, 2004. “Convert Currency” in Paul Mutton, IRC Hacks, 2004. O’Reilly Associates: Cambridge, MA. BC12. Jennifer Golbeck, 2004. “Don’t Get Lost in Translation” in Paul Mutton, IRC Hacks, 2004. O’Reilly Associates: Cambridge, MA. BC13. Jennifer Golbeck, 2004. “IRC: Chatrooms for Hackers” in Rael Dornfest and James Duncan Davidson, OS X Panther Hacks, 2004. O’Reilly Associates: Cambridge, MA. BC14. Jennifer Golbeck, Amy Alford, Ron Alford, James Hendler, 2004. “Organization and Structure of Information using Semantic Web Technologies,” in Handbook of Human Factors in Web Design, Robert W. Proctor and Kim-Phuong L. Vu (eds.). Lawrence Erlbaum Associates, NJ. 2.B Articles in Refereed Journals1 J1. Jennifer Golbeck. Benford’s Law Applies to Online Social Networks. PLoS ONE. in press 3.534 J2. Irene Eleta and Jennifer Golbeck. Multilingual Use of Twitter: Social Networks at the Language Frontier. Computers in Human Behavior. December 2014 2.489 J3. Jennifer Golbeck and Derek Hansen. A Method for Computing Political Preference Among Twitter Followers. Social Networks. 36: 20 pages, 2014. 4.059 1 The right column indicates ISI Impact factors of the journal in the year of publication, or most recently available impact factor otherwise. Missing values indicate that the impact factor is not available. 4 J4. Rebecca LaPlante, Judith :::::::: Jennifer Golbeck. Subject Matter Categorization of Klavans, :::::: Tags Applied to Digital Images from Art Museums Journal of the American Society for Information Science and Technology. 23 pages, in press. 2.137 J5. Awalin Sopan, Manuel Freire, Meirav Taieb-Maimon, :::::::::::::::::: Jennifer GolCatherine Plaisant, beck, and ::::::::::::::::: Exploring Data Distributions: Visual Design and Evaluation Ben Shneiderman. International Journal of Human-Computer Interaction, 29(2), 27 pages, 2013 0.943 J6. Jennifer Golbeck, Jes Koepfler, Beth Emmerling. An Experimental Study of Social Tagging Behavior and Image Content. Journal of the American Society for Information Science and Technology, 62(9): 1750–1760, 2011. 2.137 J7. Jennifer Golbeck. The more people I meet, the more I like my dog: A study of petoriented social networks on the Web. First Monday, 16(2): 12 pages. 2011 J8. :::::: Watkins, I., Golbeck, J., & Huang, M. Understanding and changing older adults Xie, B., perceptions and learning of social media. Educational Gerontology, (38)4: 282–296, 2011. 0.550 J9. Ugur Kuter and Jennifer Golbeck.α Using Probabilistic Confidence Models for Trust Inference in Web-Based Social Networks. ACM Transactions on Internet Technology, 10, 2, Article 8 (June 2010), 23 pages, 2010. 2.080 J10. Jennifer Golbeck, Justin Grimes, Anthony Rogers Twitter Use by the US Congress. Journal of the American Society for Information Science and Technology, 61(8): 1612– 162, 2010. 2.137 J11. P. T. Jaeger, J. Golbeck, A. Druin, K. R. Fleischmann. The First Workshop on the Future of iSchool Doctoral Education: Issues, Challenges, and Aspirations. Journal of Education for Library and Information Science, 51(3):201–208, 2010. J12. Druin, A. Jaeger, P.T., Jennifer Golbeck., Fleischmann, K. R., Lin, J. Qu, Y., Wang, P. & Xie, B.. The Maryland Modular Method: An Approach to Doctoral Education in Information Studies. Journal of Education in Library and Information Science (JELIS), 50(4), 293-301, 2010. J13. Jennifer Golbeck and Christian Halaschek-Wiener. Trust-Based Revision for Expressive Web Syndication. Journal of Logic and Computation. 19, 5 (October 2009), 771-790. 0.821 J14. Jennifer Golbeck. Trust and Nuanced Profile Similarity in Online Social Networks. ACM Transactions on the Web, 3, 4, Article 12, 33 pages, 2009. 2.810 J15. Jennifer Golbeck. 2008. Weaving a Web of Trust. Science 19 September 2008: 1640– 1641. 29.78 J16. James Hendler, Jennifer Golbeck. Metcalfe’s Law Applies to Web 2.0 and the Semantic Web. Journal of Web Semantics. 6(1): 14–20, 2008. 3.410 J17. Jennifer Golbeck. The Dynamics of Web-based Social Networks: Membership, Relationships, and Change. First Monday, 12(11): 1-33, 2007. J18. Jennifer Golbeck, James Hendler. A Semantic Web and Trust Approach to the Provenance Challenge. Concurrency and Computation: Practice and Experience, 20(5): 431–439, 2007. 5 0.535 J19. L. Moreau, B. Ludascher, I. Altintas, R. S. Barga, S. Bowers, S. Callahan, G. Chin Jr., B. Clifford, S. Cohen, S. Cohen-Boulakia, S. Davidson, E. Deelman, L. Digiampietri, I. Foster, J. Freire, J. Frew, J. Futrelle, T. Gibson, Y. Gil, C. Goble, J. Golbeck, P. Groth, D. A. Holland, S. Jiang, J. Kim, D. Koop, A. Krenek, T. McPhillips, G. Mehta, S. Miles, D. Metzger, S. Munroe, J. Myers, B. Plale, N. Podhorszki, V. Ratnakar, E. Santos, C. Scheidegger, K. Schuchardt, M. Seltzer, Y. L. Simmhan, C. Silva, P. Slaughter, E. Stephan, R. Stevens, D. Turi, H. Vo, M. Wilde, J. Zhao, and Y. Zhao. The First Provenance Challenge. Concurrency and Computation: Practice and Experience, 20(5): 409–418, 2007. 0.535 J20. Cai-Nicolas Ziegler, Jennifer Golbeck. Investigating Interactions of Trust and Interest Similarity. Decision Support Systems, 43(2): 460–475, 2006. 1.190 J21. Richard J. Williams, Neo Martinez, Jennifer Golbeck. Ontologies for Ecoinformatics, Journal of Web Semantics, 4(4): 237–242, 2006. 3.410 J22. Jennifer Golbeck, James Hendler. Inferring Trust Relationships in Web-Based Social Networks, ACM Transactions on Internet Technology, 6(4): 497–529, 2006. 0.893 J23. Jennifer Golbeck, Bijan Parsia. Trust network-based filtering of aggregated claims. International Journal of Metadata, Semantics, and Ontologies, 1(1); 58–65, 2005. J24. Jennifer Golbeck. Semantic Social Networks for Email Filtering: A Prototype and Analysis, AIS SIGSEMIS Bulletin, Vol. 2, Issue (3&4) 2005: 36–40, 2005. J25. Frank W Hartel, Sherri de Coronado, Robert Dionne, Gilberto Fragoso, Jennifer Golbeck. Modeling a Description Logic Vocabulary for Cancer Research. Journal of Biomedical Informatics, 38(2): 114–129, 2005. 1.792 J26. P. Domingos, J. Golbeck, P. Mika, A. Nowak. Trends & Controversies: Social Networks and Intelligent Systems. IEEE Intelligent Systems, 20(1): 80 – 93, 2005. 1.438 J27. Staab, Steffen, Pedro Domingos, P. Mika, Jennifer Golbeck, Li Ding, Tim Finin, Anupam Joshi, Andrzej Nowak, and Robin R. Vallacher. Social networks applied. IEEE Intelligent Systems, page 80-93, 2005. J28. Aditya Kalyanpur, Jennifer Golbeck, Jay Banerjee, James Hendler. OWL: Capturing semantic information using a standardized web ontology language. Multilingual Computing & Technology, 15(7): 8 pages, 2004. J29. Leslie E. Chipman, Benjamin B. Bederson, Jennifer Golbeck. SlideBar: Analysis of a linear input device. Behaviour and Information Technology, 23(1): 1–9, 2004. 1.028 J30. Jennifer Golbeck, Gilberto Fragoso, Frank Hartel, Jim Hendler, Jim Oberthaler, Bijan Parsia. The National Cancer Institute’s Thesaurus and Ontology. Journal of Web Semantics, 1(1): 75–80, 2004. 3.410 2.C Monographs, Reports, and Extension Publications R1. Aditya Kalyanpur, James Hendler, Bijan Parsia, Jennifer Golbeck. markup, ontology, and RDF editor. 2006. SMORE-semantic R2. Jennifer Golbeck. Computing and Applying Trust in Web-based Social Networks, Ph.D. Thesis, University of Maryland, College Park, 2005. R3. Jennifer Golbeck. Genetic Algorithms for Strategic Optimization. Master’s Thesis, University of Chicago, 2001. 6 2.D Book Reviews, Other Articles, and Notes 1. “Data Meets Design: a Review of Judith Donath’s The Social Machine” Science, January 15, 2015 2. “The Live-Tweeted Prostitution Sting Was a Total Bust, and Not in a Good Way” Slate, May 7, 2014 3. “What a Toilet Hoax Can Tell Us About the Future of Surveillance, on The Atlantic” The Atlantic, April 29, 2014 4. “Google Tweaked How It Displays Search Results. Heres How to Change It Back” Slate, March 14, 2014 Slate, January 1, 2014 5. “Beacon, ShopKick: Privacy Policies for location-tracking apps arent clear enough” Slate January 28, 2014 6. “Facebook Cleansing: How to delete all of your account activity” Slate, January 1, 2014 7. “Facebook self-censorship: What happens to the posts you don’t publish” Slate, December 13, 2013 8. “Lovely Spam! Wonderful Spam! (book review of Spam A Shadow History of the Internet)” Science: Vol. 340 no. 6137 p. 1171, 7 June 2013 2.E 2.E.i Talks, Abstracts, and Other Professional Papers Presented Invited Talks: Keynote (and Similar) Addresses T1. “Privacy, Social Context, and Social Media” TEDxUMD College Park, MD (May 3, 2014) T2. “Trust and Social Media” AAAI 2013 Fall Symposium Series (Keynote) Arlington, VA (November 15-17, 2013) T3. “Hidden Information Uncovered” TEDxMidAtlantic Washington, DC (October 25, 2013) T4. “User Profiling: a two-sided argument” Conference on Social Computing and Its Applications (Keynote) Karlsruhe, Germany (October 2, 2013) T5. “Analyzing the Social Web” Baltimore Data Day, Federal Reserve Bank of Richmond (Keynote) Baltimore, MD (July 11, 2013) T6. “Uncovering Hidden Social Information” Data Science DC Washington, DC (March 28, 2013) 7 T7. “Pets on the Internet” TEDxGeorgetown Washington, DC (March 23, 2011) T8. “Tutorial on Using Social Trust for Recommender Systems” ACM Conference on Recommender Systems (RecSys ’09) New York, New York (October 22, 2009) T9. “Computing with Social Trust: Web Algorithms, Social Networks, and Recommendations” Haverford College Distinguished Visitors Program, and Fantastic Lectures in Computer Science Series Haverford, Pennsylvania (March 17, 2009) T10. “Social Recommender Systems” SONIC and NICO Lecture Series, Northwestern University Evanston, Illinois (November 12, 2008) T11. “The Dynamics of Web-based Social Networks: Membership, Relationships, and Change” International Sunbelt Social Networking Conference (Sunbelt XXVIII) St. Pete, Florida (January 22, 2008) T12. “Social Networks, the Semantic Web, and the Future of Online Scientific Collaboration” FermiLab Colloquium Lecture Batavia, Illinois (October 25 2006) T13. “Trust and Web Policy Systems” Keynote talk at the Second International Workshop on the Value of Security through Collaboration Baltimore, Maryland (September 1, 2006) 2.E.ii 2.E.ii.1 Refereed conference proceedings Papers at Top-Tier Conferences 1 C1. Kan-Leung Cheng and I Zuckerman and D Nau, and J Golbeck ”Predicting Agents Behavior by Measuring their Social Preferences.” Proceedings on the European Conference on Artificial Intelligence. (2014). C2. Tammar Shrot, Avi Rosenfeld, Jennifer Golbeck, Sarit Kraus. Timing Interruptions to Improve User Performance. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI’14). 10 pages. April 2014, Toronto, Canada 23% C3. Jennifer Golbeck, Eric Norris. Personality, Movie Preferences, and Recommendations. In Proceedings of the International Conference on Advances in Social Network Analysis and Mining, 4 pages. August 2013, Niagra Falls, Canada. 15% C4. Bert Huang, Angelika Kimmig and Lise Getoor and Jennifer Golbeck. Flexible Framework for Probabilistic Models of Social Trust. In 2013 Conference on Social Computing, Behavioral Modeling and Prediction, 9 pages. April 2013, College Park, MD 31% 1 Conferences with highly-selective acceptance rates and/or top reputations in their field. 8 C5. Carman Neustaedter and Jennifer Golbeck. Exploring pet video chat: the remote awareness and interaction needs of families with dogs and cats. In Proceedings of Computer Supported Cooperative Work (CSCW’13), in press, 6 pages. February 2013, San Antonio, TX C6. Jennifer Golbeck. The Twitter Mute Button: A Web Filtering Challenge. In Proceedings of the 30th International Conference on Human Factors in Computing Systems (CHI ’12), pages 2755–2758. May 2012, Austin, TX. 23% C7. Irene Eleta and Jennifer Golbeck. A Study of Multilingual Social Tagging of Art Images: Cultural Bridges and Diversity. In Proceedings of Computer Supported Cooperative Work (CSCW’12), pages 695–704. February 2012, Seattle, Washington 40% D., C8. Cheng, K.L., Zuckerman, I., Nau,::: and Golbeck, J. The Life Game: Cognitive Strate:::: gies for Repeated Stochastic Games. In IEEE Third International Conference on and 2011 IEEE Third International Conference on Social Computing (SocialCom), pages 495-102. October 2011, Boston, Massachusetts. 10% C9. Nicholas Violi, Jennifer Golbeck, Kan-leung Cheng, and Ugur Kuter. Caretaker: A Social Game for Studying Trust Dynamics. In IEEE Third International Conference on and 2011 IEEE Third International Conference on Social Computing (SocialCom), pages 451–456. October 2011, Boston, Massachusetts. 10% C10. J. Golbeck, C. Robles, M. Edmondson, and K. Turner. Predicting personality from twitter. In IEEE Third International Conference on and 2011 IEEE Third International Conference on Social Computing (SocialCom), pages 149–156. October 2011, Boston, Massachusetts. 10% C11. K.L. Cheng, U. Kuter, and J. Golbeck. Coevolving strategies in social-elimination games. In IEEE Third International Conference on and 2011 IEEE Third International Conference on Social Computing (SocialCom), pages 118–126. October 2011, Boston, Massachusetts. 10% C12. Thomas Dubois, Jennifer Golbeck, and ::::::::::::::::::: Network Clustering ApAravind Srinivasan. proximation Algorithm Using One Pass Black Box Sampling. In Third IEEE International Conference on Social Computing (SocialCom), pages 418–424. October 2011, Boston, Massachusetts. (Best Paper Award). 10% Aravind Srinivasan. C13. Thomas Dubois, Jennifer Golbeck, and ::::::::::::::::::: Predicting Trust and Distrust in Social Networks. In Third IEEE International Conference on Social Computing (SocialCom), pages 418–424. October 2011, Boston, Massachusetts. 10% C14. Jennifer Golbeck and Derek Hansen. Computing Political Preference Among Twitter Followers. In Proceedings of the 29th International Conference on Human Factors in Computing Systems (CHI ’11), pages 1105–1108. April 2011, Vancouver, Canada. 23% C15. Greg Walsh and Jennifer Golbeck Curator: a game with a purpose for collection recommendation. In Proceedings of the 28th international Conference on Human Factors in Computing Systems (CHI ’10), pages 2079–2082. April 2010, Atlanta, Georgia. 22% C16. Freire, M., Plaisant, C., Shneiderman, B., and Golbeck, J. ManyNets: an interface for multiple network analysis and visualization. In Proceedings of the 28th international Conference on Human Factors in Computing Systems (CHI ’10), pages 213–222. Atlanta, Georgia, USA, April 10–15, 2010. 22% 9 C17. Ugur Kuter, Jennifer Golbeckα . Semantic Web Service Composition in Social Environments. Proceedings of the International Semantic Web Conference (ISWC09), pages 344–358. November 2009, Washington, D.C. (Best Paper Award) 20% C18. Thomas DuBois, Jennifer Golbeck, ::::::::::::::::::: Rigorous Probabilistic Trust InAravind Srinivasan. ference with applications to clustering. Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence, pages 655–658. September 2009, Milan Italy. 18% C19. Derek Hansen, Jennifer Golbeck. Mixing it Up: Recommending Collections of Items. Proceedings of the Conference on Human Factors in Computing Systems (CHI’09), pages 1217–1226. April 2009, Boston, Massachusetts. 24.5% C20. Jennifer Golbeck, Matthew Rothstein. Linking Social Networks on the Web with FOAF: A Semantic Web Case Study. Proceedings of the Twenty-Third National Conference on Artificial Intelligence (AAAI-08), pages 1138–1143. July 2008, Chicago, Illinois. 24% C21. Ugur Kuter and Jennifer Golbeckα . SUNNY: A New Algorithm for Trust Inference in Social Networks, using Probabilistic Confidence Models. Proceedings of the Twenty-Second National Conference on Artificial Intelligence (AAAI-07), pages 1377–1382. July 2007, Vancouver, Canada. 27% C22. Yarden Katz and Jennifer Golbeck. Social Network-based Trust in Prioritized Default Logic. Proceedings of The Twenty-First National Conference on Artificial Intelligence (AAAI-06), pages 1345–1350. July 2006, Boston, Massachusetts. 30% C23. Jennifer Golbeck, James Hendler. Inferring reputation on the semantic web. Proceedings of the 13th International World Wide Web Conference, 8 pages. May 2004. New York, NY. 14.6% C24. Jennifer Golbeck, Michael Grove, Bijan Parsia, Aditya Kalyanpur, and James Hendler. New Tools for the Semantic Web, Proceedings of the 13th International Conference on Knowledge Engineering and Knowledge Management (EKAW 2002), pages 392–400. October 2002, Siguenza, Spain. 34% 2.E.ii.2 Papers at Other Conferences C25. Cody Buntain and Jennifer Golbeck. ”Identifying social roles in reddit using network structure.” Proceedings of the companion publication of the 23rd international conference on World wide web companion. International World Wide Web Conferences Steering Committee, 2014. C26. Greg Walsh and Jennifer Golbeck. 2014. StepCity: a preliminary investigation of a personal informatics-based social game on behavior change. In CHI ’14 Extended Abstracts on Human Factors in Computing Systems (CHI EA ’14). ACM, New York, NY, USA, 23712376. C27. Sibel Adali and Jennifer Golbeck. Predicting personality with social behavior. In 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 8 pages. August 2012, Istanbul, Turkey. C28. Buntain,Cody, Jennifer Golbeck, Dana::::::::::::::::::::::: Advice and Trust in Nau, and Sarit Kraus. ::::: Games of Choice. In Tenth Annual Conference on Privacy, Security and Trust, 2 pages. July 2012, Paris, France. 10 C29. Jennifer Golbeck, Hal Warren, and Eva Winer. Making trusted attribute assertions online with the publish trust framework. In Tenth Annual Conference on Privacy, Security and Trust, 2 pages. July 2012, Paris, France. C30. David Yates and Jennifer Golbeck. Is facebook appropriate for the classroom? a comparison of student and faculty perspectives. In Proceedings of the Euro-American Conference for Academic Disciplines and Creativity, 27 pages. June 2012, Prague, Czech Republic. (Outstanding Research Presentation). C31. Jennifer Golbeck. STEM initiatives for improved communication skills in the zombie apocalypse. In Proceedings of the 2012 ACM Conference on Human Factors in Computing Systems Extended Abstracts, pages 1425–1426. May 2012, Austin, TX. C32. Jennifer Golbeck and Carman Neustaedter. Pet video chat: monitoring and interacting with dogs over distance. In Proceedings of the 2012 ACM Conference on Human Factors in Computing Systems Extended Abstracts, pages 1425–1426. May 2012, Austin, TX. C33. Jennifer Golbeck, Cristina Robles, Karen Turner Predicting Personality with Social Media. Proceedings of alt.chi, ACM Conference on Human Factors in Computing (CHI 2011), pages 253–262. April 2011, Vancouver, Canada. C34. James Michaelis, Jennifer Golbeck, ::::::::::::::: Leveraging the Semantic Web to James Hendler Enable Content Mashup For End Users. Proceedings of HCI International 2011, 10 pages. July 2011, Orlando, Florida. C35. Jennifer Golbeck, Kenneth Fleischmann. Trust in Social Q &A: The Impact of Text and Photo Cues of Expertise. Proceedings of ASIST 2010, pages 1–10. October 2010, Pittsburgh, Pennsylvania. C36. Klavans, Judith, Jennifer Golbeck. Integrating Multiple Computational Techniques for Improving Image Access: Applications to Digital Collections. Proceedings of the 2010 Grace Hopper Conference, 5 pages. September 2010, Atalanta, Georgia. Jennifer Preece. C37. Dana Rotman, Jennifer Golbeck, ::::::::::::::: The Community is Where the Rapport Is: On Sense and Structure in the YouTube Community. 2009 Communities & Technologies Conference, pages 41–50. June, 2009. University Park, Pennsylvania. C38. Jennifer Golbeck. On the Internet, Everybody Knows You’re a Dog: The Human-Pet Relationship in Online Social Networks. ACM Conference on Human Factors in Computing Systems Extended Abstracts, pages 4495-4500. April 2009, Boston, Massachusetts. C39. Jennifer Golbeck, Michael Wasser. SocialBrowsing: Integrating Social Networks into Web Browsing. ACM Conference on Human Factors in Computing Systems Extended Abstracts, pages 2381–2386. April 2007, San Jose, California. C40. Aaron Mannes, Jennifer Golbeck. Ontology Building: A Terrorism Specialist’s Perspective. Proceedings of the IEEE Aerospace Conference, 5 pages. March 2007, Big Sky, Montana. C41. Aaron Mannes, Jennifer Golbeck. Building a Semantic Web Portal for Counterterror Analysis. Proceedings of the IEEE Aerospace Conference, 5 pages. March 2007, Big Sky, Montana. C42. Jennifer Golbeck, Computing with Trust: Definition, Properties, and Algorithms. Proceedings of International Conference on Security and Privacy in Communication Networks, pages 1-7. August 2006, Baltimore, Maryland. 11 C43. Jennifer Golbeck. Generating Predictive Movie Recommendations from Trust in Social Networks. Proceedings of the Fourth International Conference on Trust Management, pages 93–104. May 2006, Pisa, Italy. C44. Jennifer Golbeck, James Hendler. FilmTrust: Movie recommendations using trust in web-based social networks. Proceedings of the IEEE Consumer Communications and Networking Conference, pages 497–529. January 2006, Las Vegas, Nevada. C45. Jennifer Golbeck, Bernardo Cuenca Grau, Christian Halaschek-Wiener, Aditya Kalyanpur, Yarden Katz, Bijan Parsia, Andrew Schain, Evren Sirin, and James Hendler. Semantic web research trends and directions. Proceedings of the First international Conference on Pattern Recognition and Machine Intelligence, PReMI. 2005, pages 160-169. December 2005, Kolkata, India. C46. Jennifer Golbeck, James Hendler. Accuracy of Metrics for Inferring Trust and Reputation in Semantic Web-based Social Networks, Proceedings of 14th International Conference on Knowledge Engineering and Knowledge Management, pages 116–131. October 2004, Northamptonshire, UK. C47. Jennifer Golbeck, James Hendler. Reputation Network Analysis for Email Filtering. Proceedings of the First Conference on Email and Anti-Spam, pages 54–58. July 2004, MountableView, California. C48. Jennifer Golbeck, Bijan Parsia, James Hendler. Trust Networks on the Semantic Web, Proceedings of Cooperative Information Agents, pages 238–249. August 2003, Helsinki, Finland. C49. Mutton, Paul and Jennifer Golbeck. Visualization of Semantic Metadata and Ontologies, Proceedings of Information Visualization, pages 300–305. July 2003, London, UK. C50. Kalyanpur, Aditya and Jennifer Golbeck and Michael Grove and Jim Hendler. 2002. An RDF Editor and Portal for the Semantic Web, Proceedings of Semantic Authoring, Annotation & Knowledge Markup (ECAI 2002), 4 pages. July 2002, Lyon, France. C51. Jennifer Golbeck. Evolving Strategies for the Prisoner’s Dilemma, Advances in Intelligent Systems, Fuzzy Systems, and Evolutionary Computation, pages 299–306. February 2002, Interlaken, Switzerland. 2.E.iii.3 Papers at Refereed Workshops W1. Jennifer Golbeck, Thameem Khan, Nilay Sanghavi and Nishita Thakker. Multiple Personalities on the Web: A Study of Shared Mboxes in FOAF. Proceedings of the 2009 Workshop on Social Data on the Web, 12 pages. October 2009, Washington, DC. W2. Thomas DuBois, Jennifer Golbeck, John Kleint, ::::::::::::::::::: Improving RecomAravind Srinivasan. mendation Accuracy by Clustering Social Neworks with Trust. Proceedings of the ACM RecSys 2009 Workshop on Recommender Systems and the Social Web, 8 pages. October 2009, New York, New York. W3. Audun Josang, Jennifer Golbeck, Challenges for robust trust and reputation systems. Proceedings of the 5th International Workshop on Security and Trust Management. 12 pages. August, 2009, Saint Malo, France. 12 W4. Elena Zheleva, Jennifer Golbeck, Lise ::::::: Ugur Kuter. Using Friendship Ties and Getoor, :::: Family Circles for Link Prediction. SNA-KDD Workshop on Social Network Mining and Analysis, pages 97-113. August 2008, Las Vegas, Nevada. W5. V. Shiv Naga Prasad, Behjat Siddiquie, Jennifer Golbeck, and :::::::::::::: Classifying Larry S. Davis. Computer Generated Charts. In Proceedings of the Workshop on Content Based Multimedia Indexing, pages 85-92. June 2007, Bordeaux, France. W6. Jennifer Golbeck, Aaron Mannes. Using Trust and Provenance for Content Filtering on the Semantic Web. Proceedings of the Workshop on Models of Trust on the Web, 9 pages. May 2006, Edinburgh, UK. W7. Christian Halaschek-Wiener, Jennifer Golbeck, Bijan Parsia, Vladimir Kolovski, and :::: Jim Hendler. Image browsing and natural language paraphrases of semantic web annotations. ::::::: First International Workshop on Semantic Web Annotations for Multimedia (SWAMM), 12 pages. May 2006, Edinburgh, UK. W8. Christian Halaschek-Wiener, Jennifer Golbeck, Andrew Schain, Michael Grove, Bijan Parsia, and :::::::::::: Annotation and provenance tracking in semantic web photo libraries. ProJim Hendler. ceedings of the International Provenance and Annotation Workshop, pages 82–89. May 2006, Chicago, Illinois. W9. Jennifer Golbeck. Combining Provenance with Trust in Social Networks for Semantic Web Content Filtering. Proceedings of the International Provenance and Annotation Workshop, pages 101–108. May 2006, Chicago, Illinois. W10. Yarden Katz and Jennifer Golbeck. Nonmonotonic Reasoning with Web-Based Social Networks. Proceedings of the Workshop on Reasoning on the Web, pages 469–475. May 2006, Edinburgh, UK. W11. Aaron Mannes, Jennifer Golbeck, James Hendler. Semantic Web and Target-Centric Intelligence: Building Flexible Systems that Foster Collaboration. Proceedings of Workshop Intelligent User Interfaces for Intelligence Analysis, 4 pages. January 2006, Sydney, Australia. W12. Jennifer Golbeck. Semantic Web Interaction through Trust Network Recommender Systems. End User Semantic Web Interaction Workshop, pages 327–339. November 2005, Sanibel Island, Florida. W13. Jennifer Golbeck. Personalizing Applications through Integration of Inferred Trust Values in Semantic Web-Based Social Networks. Semantic Network Analysis Workshop, pages 1005– 1018. November 2005, Sanibel Island, Florida. W14. Bijan Parsia, Taowei Wang, and Jennifer Golbeck. Visualizing Web Ontologies with CropCircles. End User Semantic Web Interaction Workshop, pages 1–8. November 2005, Sanibel Island, Florida. W15. Christian Halaschek-Wiener, Andrew Schain, Jennifer Golbeck, Michael Grove, Bijan Parsia, Jim Hendler. A flexible approach for managing digital images on the semantic web. 5th International Workshop on Knowledge Markup and Semantic Annotation, pages 49–58. November 2005, Galway, Ireland. 13 W16. Kalyanpur, Aditya, Nada Hashmi, Jennifer Golbeck, Bijan Parsia. Lifecycle of a Casual Web Ontology Development Process. Proceedings of the Workshop on Application Design, Development and Implementation Issues in the Semantic Web, 8 pages. May 2004, New York, New York. W17. Jennifer Golbeck, Paul Mutton, Semantic Web Interaction on Internet Relay Chat, Proceedings of Interaction Design on the Semantic Web, 5 pages. May 2004, New York, New York. 2.E.iii.4 Refereed Posters2 P1. Irena Eleta and Jennifer Golbeck. Bridging Languages in Social Networks: How Multilingual Users of Twitter Connect Language Communities?, ASIS&T 2012 Annual Meeting, October 2012, Baltimore, Maryland. P2. Bert Huang and Angelika Kimmigand Lise Getoor and Jennifer Golbeck. Probabilistic Soft Logic for Trust Analysis in Social Networks, International Workshop on Statistical Relational AI. August 2012, Catalina Island, CA. P3. Cristina Robles, Jennifer Golbeck. Facebook Relationships in the Workplace. Proceedings of CompleNet 2012. March 2012, Marathon, Florida. P4. Judith:::::::::::: Susan Chun, Jennifer Golbeck, ::::::::::::::::: Robert Stein, Ed L. Klavans, Dagobert Soergel, :::::: Bachta, Rebecca LaPlante, Kate Mayo, John Kleint. Language and Image: T3 = Text, Tags, and Trust. 2009 Digital Humanities Conference. July 2009, College Park, Maryland. P5. Jennifer Golbeck, Jeanne Kramer-Smyth. Visualizing Archival Collections with ArchivesZ. Proceedings of the 2009 Digital Humanities Conference, July 2009, College Park, Maryland. P6. Praveen Paruchuri, Preetam Maloor, Bob Pokorny, Aaron Mannes, Jennifer Golbeck. Cultural Modeling in a Game-Theoretic Framework, AAAI Fall Symposium on Adaptive Agents in Cultural Contexts. November 2008, Washington, DC. P7. Wu, P. F., Qu, Y., Fleischmann, K., Golbeck, J., Jaeger, P., Preece, J., & Shneiderman, B. Designing a Community-Based Emergency Communication System: Requirements and Implications. Annual Meeting of the American Society for Information Science and Technology (ASIS&T 2008). October 2008, Columbus, OH. P8. Jennifer Golbeck, FilmTrust: Movie Recommendations from Semantic Web-based Social Networks. IEEE Consumer Communications and Networking Conference. January 2006, Las Vegas, Nevada. P9. Jennifer Golbeck, FilmTrust: Movie Recommendations from Semantic Web-based Social Networks. International Semantic Web Conference. November 2005, Galway, Ireland P10. Halaschek-Wiener, Christian , Jennifer Golbeck, Andrew Schain, Michael Grove, Bijan Parsia, Jim HendlerPhotostuff-an image annotation tool for the semantic web. Proceedings of the Poster Track, 4th International Semantic Web Conference. November 2005, Galway, Ireland. 2 Peer-reviewed poster presentations, typically accompanied by short descriptions in associated proceedings. 14 P11. Pin Xu, Lyubov Remennik, N. Rao Thotakura, Jennifer Golbeck, Liju Fan. Prototype development of an immunology ontology that integrates multiple biomedical ontologies. 7th International Protege Conference. July 2004, Washington, DC. P12. Jennifer Golbeck, Bijan Parsia, James Hendler. Trust Networks on the Semantic Web. Twelfth International World Wide Web Conference, May 2003, Budapest, Hungary. P13. Jennifer Golbeck, Ron Alford, Ross Baker, Mike Grove, Jim Hendler, Aditya Kalyanpur, Amy Loomis, Ron Reck. Semantic Web Tools from MINDSWAP. 1st Annual International Semantic Web Conference, June 2002, Sardinia, Italy. 2.I Fellowships, Prizes, and Awards • • • • • • • • 2.J 2.J.i 2015 University of Maryland Research Communication Award 2014 University System of Maryland Board of Regents Mentoring Award TED Most Powerful Talks of 2014 2011 IEEE Conference on Social Computing Best Paper Award 2009 International Semantic Web Conference Best Paper Award Research Fellow, Web Science Research Initiative (2008 – present) IEEE Intelligent Systems Ten to Watch3 (May 2006) 2005 DARPA IPTO Young Investigator (May 2005) Editorships, Editorial Boards, and Reviewing Activities for Journals and Other Learned Publications Editorial Boards • Editorial Board, Data Science • Editorial Committee, Journal of Web Semantics – Special Issue “Exploring New Interaction Designs Made Possible by the Semantic Web” • Guest Editor, Security & Privacy Magazine, Special Issue on “Security in Social Networks” 2.J.ii • • • • • • • • • 3 Conference Chair Positions Program Co-chair, Recsys 2015: Conference on Recommender Systems Fellowships Chair, ISWC 2012: 11th International Semantic Web Conference Fellowships Chair, ISWC 2011: 10th International Semantic Web Conference Tutorials Co-chair, Program Committee Vice Chair, ISWC 2009: 8th International Semantic Web Conference Co-organizer, SWUI 2009: Semantic Web User Interactions: Exploring HCI Challenges Workshop at ISWC09. Co-organizer, Workshop on Social Technology for Biodiversity: Motivation, Credibility & Community, 2008 Co-organizer, SWUI 2008: Semantic Web User Interactions: Exploring HCI Challenges Workshop at CHI’08 Semantic Web Challenge Co-chair, ISWC 2007: 6th International Semantic Web Conference Semantic Web Challenge Co-chair, ASWC 2007: 2nd Asian Semantic Web Conference list of top ten young AI researchers 15 • • • • Co-organizer, Helping Users Make Sense of Social Networks: A Workshop, 2007 Proceedings Chair, ISWC 2006: 5th International Semantic Web Conference Co-organizer, Workshop on Trust, Security, and Reputation on the Semantic Web, 2006 Organizer, Developers Day Trust on the Web Track, WWW 2005: 13th International World Wide Web Conference 2.J.iii Reviewing: Journals • • • • • • • • • • • • • ACM Computing Surveys: 2012 (1) ACM Transactions on Intelligent Systems: 2012 (2) ACM Transactions on Internet Technology: 2009 (1) ACM Transactions on Multimedia Computing, Communications, and Applications: 2009 (1) ACM Transactions on the Web: 2008 (2), 2009(1), 2012 (1) Behaviour and Information Technology: 2008 (1) Artificial Intelligence: 2008 (1) European Journal of Operational Research: 2007 (1) Foundations and Trends in Information Retrieval: 2015 (1) Foundations and Trends in Web Science: 2013 (1), International Journal of Human Computer Studies: 2008 (1) International Journal on Semantic Web and Information Systems: 2007 (1) Journal of the American Society for Information Science and Technology: 2010 (1), 2011 (1), 2012 (1) • Journal of Web Semantics: 2006 (1), 2007 (3), 2008 (1), 2012 (2) • Policy & Internet: 2012 (1) 2.J.iv Reviewing: Top-Tier Conferences • AAAI: AAAI Conference on Artificial Intelligence, Senior Program Committee 2011, 2012; Program Committee 2006, 2007, 2008, 2009, 2010 • RecSys: ACM Conference on Recommender Systems, Senior Program Committee 2010, 2011, 2012 • CSCW: Computer Supported Cooperative Work, Program Committee 2008, 2012, 2013 • CHI: ACM Conference on Human Factors in Computing, Program Committee 2009, 2010, 2011, 2012 • IJCAI, International Joint Conference on Artificial Intelligence, Program Committee 2009 • WWW: International World Wide Web Conference, Program Committee 2006, 2007, 2008, 2009 • ISWC: International Semantic Web Conference, Senior Program Committee 2009, 2010, 2011, 2012, Program Committee 2008 • KDD: Conference on Knowledge Discovery and Data Mining, Senior Program Committee 2010 • GROUP: Conference on Supporting Group Work, Program Committee 2009 • IJCAI: International Joint Conferences on Artificial Intelligence, Program Committee 2009 2.J.v Reviewing: Other Venues • IFIPTM: International Conference on Trust Management, Program Committee 2009, 2010, 2011, 2012 • IEA-AIE: Engineering Knowledge and Semantic Systems, Program Committee 2011 16 • SSW: AAAI Symposium on the Social Semantic Web, Program Committee: 2009 • WebSci: Web Science Conference: Society On-Line International Semantic Web Conference, Program Committee 2008 • BlogTalk: International Conference on Social Software, Program Committee 2008 • PST: Conference on Privacy, Security and Trust, Program Committee 2008 • SAC: ACM Symposium on Applied Computing, Program Committee 2008, 2005 • CoSoSo: International Conference on Social Software, Program Committee 2008 • IUI: Intelligent User Interfaces Conference, Program Committee 2008 • CEAS: Conference on Email and Anti-Spam, Program Committee 2007 • CIKM: onference on Information and Knowledge Management, Program Committee 2007 • CAT: Context Awareness and Trust, Program Committee 2007 • Policy: IEEE Policy, Program Committee 2007 • SWC: Semantic Web Challenge, Program Committee 2007 • SCCSW: Social and Collaborative Construction of Structured Knowledge Workshop, Program Committee 2007 • SWCKA: AAAI Fall Symposium on Semantic Web for Collaborative Knowledge Acquisition, Program Committee 2006 • EKAW: International Conference on Knowledge Engineering and Knowledge Management, Program Committee 2006 • SECOVAL: The Value of Security through Collaboration Workshop, Program Committee 2005, 2006. • SWUI: Semantic Web User Interaction Workshop, Program Committee 2006 • OWLED: OWL Experiences and Directions, Program Committee 2006 • SPTWS: Workshop on Security, Privacy, and Trust in Web Services, Program Committee 2006 • MTW: Models of Trust Workshop, Program Committee 2006 • OWLED: OWL: Experiences and Directions Workshop, Program Committee 2005 • FOAF: Workshop on Friend of a Friend, Social Networking, and the Semantic Web, Program Committee 2004 • SWUI: First International Workshop on Interaction Design and the Semantic Web, Program Committee 2004 • VIKE: Visualizing Information in Knowledge Engineering (VIKE), Program Committee 2003 2.K 2.K.i Other External Talks (see section 2.E.i for keynote and similar talks) • “Opportunities and risks of discovering personality traits from social media” CHI 2014 Toronto, Canada (May 29, 2014) • “Predicting User Attributes in Social Media ” Society 2013 State College, PA (May 9, 2013) • “Generational Computing and Social Media” Department of Defense Deep Dive on Obesity Portsmouth, VA (August 19, 2012) • “Information Sharing in Social Networks” FBI Lookout Group Meeting 17 Dallas, TX (August 14, 2012) • “Social Networks and HCI Research” National Reconnaissance Office Chantilly, VA (March 15, 2012) • “Information Sharing in Social Networks” Potomac Valley Chapter (PVC) of the American Society of Information Science and Technology Washington, DC (April 10, 2012) • “Computing Trust and Personality in Social Networks” Aberdeen Proving Ground Network Science Meeting Aberdeen, MD (March 5, 2012) • “Managing Content With Trust’ Professional & Scholarly Publishers 2012 Annual Conference Washington, DC (February 2, 2012) • “Information Sharing in Social Networks” FBI Lookout Group Meeting Dallas, TX (January 9, 2012) • “From Open Data to Open Worlds: The Power of the Semantic Web” World Bank Information Management Technology Group Forum Washington, DC (December 8, 2011) • “Information Sharing in Social Networks” FBI Headquarters – Counterintelligence Division All-hands Meeting Washington, DC (November 17, 2011) • “Predicting Personality from Social Media” FBI Counterintelligence Behavioral Analysis Unit Quantico, VA (November 1, 2011) • “Computing with Social Trust” Army Research Lab Seminar Series Adelphi, MD (December 8, 2010) • “Computing with Social Trust” Aberdeen Proving Ground CTA Seminar Aberdeen, MD (November 16, 2010) • “Personality Traits and Facebook Profiles” Social and Cognitive Network Academic Research Center Seminar Series Rensselaer Polytechnic Institute, Troy, NY (April 18, 2010) • “Social Recommender Systems on the Semantic Web” National Archives Semantic Web Myth and Fact Washington, DC (November 17, 2009) • “Social Software in Digital Libraries and Archives” Online Computer Library Center (OCLC) Arlington, VA (November 5, 2009) • “Recommender Systems, Social Trust, and Television Applications” StreamSage (a division of Comcast) Washington, DC (September 9, 2009) • “Social Networks on the Semantic Web” Microsoft Research Faculty Summit Redmond, Washington (July 28, 2008) • “Understanding Social Networks” 18 • • • • The 25th Annual Human-Computer Interaction Lab Symposium College Park, Maryland (May 29, 2008) “Social Networks and Intelligent Systems: Using Relationships for Information Access” University of Illinois Urbana-Champaign HCI Seminar Urbana, Illinois (February 29, 2008) “Social Networks and the Semantic Web” Invited talk at Rensselaer Polytechnic Institute Troy, New York (February 4, 2008) “Recommending Movies with Social Networks” Streamsage / Comcast Washington, DC (November 2007) “Social Information Access: Connecting Distributed Information and People on the Web” Presentations with similar titles and content given in the following venues – Northeastern University College of Computer and Information Science Boston, Massachusetts (February 2007) – University of Maryland College of Information Studies College Park, Maryland (February 2007) – Drexel College of Information Science and Technology Philadelphia, Pennsylvania (April 2007) • “Analysis and Applications of Web-based Social Networks” University of Illinois at Urbana-Champaign Age of Networks: Social, Cultural, and Technological Connections Speaker Series Urbana, Illinois (January 22 2007) • “Provenance Challenge: A Semantic Web Approach” Global Grid Forum – GGF18/GridWorld Washington, DC (September 13 2006) • “The Other Kind of Networking: Social Networks on the Web” Duke University (March 2006) • Web-based Social Network Analysis for Socially Intelligent Applications University of Illinois at Chicago (November 2005) • “Trust in Social Networks” National Security Agencys Knowledge Discovery Research Colloquium Ft. Meade, Maryland (August 2005) • “Connections, Computation, and Cinema” Presentations with similar titles and content given in the following venues – University of Georgia, March 2005. – MIT Media Lab, March 2005. • “Inferring Trust in Web-based Social Networks” National Security Agency Ft. Meade, Maryland (February 2005) • “Trust on the Semantic Web” Thirteenth Annual World Wide Web Conference Developers Day New York, New York (May 2004) • “The Semantic Web as a Complex System” International Conference on Complex Systems Boston, Massachusetts (May 2004) 19 • “Metadata Visualization Challenges” NASA Goddard Semantic Web Interest Group Greenbelt, Maryland (November 2003) • “Semantic Web: Structure and Modeling” Half-day workshop at the Howard University Washington, DC (June 2003) • “Putting Time into Cognitive Systems: From Real-Time Operating Systems to Information Dynamics” Virtual Worlds and Simulation Conference Orlando, Florida (January 2003) • “Tools on the Semantic Web” Half-day workshop at the Howard University Washington, DC (November2002) • “Small Worlds on the Semantic Web” Science on the Semantic Web (SWS) Workshop Boston, Massachusetts (October 2002) • “Evolving Strategies for the Prisoners Dilemma” 13th International Conference on Game Theory Stony Brook, New York (July 2002) • “Semantic Web Do-It-Yourself: Tools for Generating RDF Content” NASA Goddard Semantic Web Interest Group Greenbelt, Maryland (April 2002) 2.K.ii Internal Talks • “Video Chat for Pets” HCIL Symposium College Park, Maryland (May 22, 2012) • “Social Network Strategies for Surviving the Zombie Apocalypse” HCIL Symposium College Park, Maryland (May 22, 2012) • “The Twitter Mute Button” HCIL Symposium College Park, Maryland (May 22, 2012) • “Understanding Users and Relationships in Social Networks” MURI Virtual Brown Bag College Park, Maryland (April 9, 2012) • “Computing Trust in Social Networks” Guest Lecture to PSY228Q: The psychology of social networking and social computing College Park, Maryland (April 2, 2012) • “Social Computing 2” Guest Lecture to CMSC434: Intro to HCI College Park, Maryland (November 30, 2011) • “Social Computing 1” Guest Lecture to CMSC434: Intro to HCI College Park, Maryland (September 21, 2011) • “Understanding Users and Relationships in Social Networks” 20 • • • • • • • • • HCIL Symposium College Park, Maryland (May 25, 2011) “Trust, Ties, and Information Diffusion in Social Networks” Guest Lecture in INFM289j: Social Media Campaigns for the WellBeing of Humankind College Park, Maryland (November 22, 2010) “Recommender Systems, Social Networks, and Applications” Guest lecture to CPSP218J: Media, Self, and Society College Park, Maryland (September 20, 2010) “Twitter Use by the US Congress” HCIL Symposium College Park, Maryland (May 26, 2010) “Recommender Systems, Social Networks, and Applications” Guest lecture to CPSP218J: Media, Self, and Society College Park, Maryland (September 8, 2009) “Designing Systems to Help Find Experts” iSchool Colloquium College Park, Maryland (September 15, 2008) “Social Networks on the Web: Challenges and Opportunities” Smith School of Business, University of Maryland College Park, Maryland (March 14, 2008) “Social Trust for Information Access” Center for Information Policy and E-Government (CIPEG) Policy Seminar Series College Park, Maryland (February 25, 2008) “Social information access -using social networks to sort, filter, and aggregate” Human-Computer Interaction Lab (HCIL) Brown Bag Lunch College Park, Maryland (November 8, 2008) “Inferring Trust in Social Networks for Information Presentation” Computational Linguistics and Information Processing (CLIP) Lab Colloquium College Park, Maryland (October 3, 2007) 2.K.iii Panels4 • Panelist, Social Media, NewsVision (digital media conference), March 30, 2009, Washington, DC (invited) • Panelist, Data Fusion and Data Enrichment Panel, Director of National Intelligence Open Source Conference, July 2007, Washington, DC (invited) 2.K.iv Media Mentions Online and Print Media5 • Huffington Post: The Fall of Facebook - and What’s Next (June 25, 2014) • Understanding User Generated Tags for Digital Collections: An Interview with Jennifer Golbeck* (May 1, 2013) • Associated Press: What you ‘like’ on Facebook can be revealing (March 11, 2013)† • Politico: ‘Weinergate’ a cautionary tale? (May 31, 2011)† • Daily Caller: Facebook can serve as personality test (May 23, 2011) 4 5 Appearances on panels, not accompanied by papers. Refereed or invited as noted. †Denotes cases where I was interviewed. 21 • ABC News: Facebook can serve as personality test (May 13, 2011) • Jezebel: Your Facebook Is The New “Personality Test” (May 13, 2011) • Time: Put Your Best Face Forward: Facebook Deemed an Accurate Personality Test for Employers (May 10, 2011) • ABC Online: Facebook can serve as personality test (May 9, 2011) • Discovery News: Facebook can serve as personality test (May 9, 2011) • Seattle Post Intelligencer: What Facebook tells your boss about your personality (May 9, 2011) • Hindustan Times: Facebooks employee personality test (May 10, 2011) • New Scientist: Why Facebook friends are worth keeping (July 15, 2010)† • Corp Comms Magazine: Politicians Tweet Sweet Nothings (September 22, 2009) • Sacramento Bee: Tweet-tweet goes Schwarzenegger, a big Twitter user (September 22, 2009)† • Stars & Stripes (U.S. Military Newspaper) – Japan Edition (September 22, 2009)† – Mideast Edition (September 22, 2009)† – Korea Edition (September 21, 2009)† • • • • • • • • • • • • • • • • • • • • • USTINET News: Study: Congress Tweets Lack Citizen Talk (September 21, 2009) United Press International: Study: Congress Tweets lack citizen talk (September 21, 2009)† Baltimore Sun: Congressional Twitter mostly twaddle (September 21, 2009)† San Diego Union-Tribune: Politicians on Twitter have a lot to say about themselves (September 20, 2009)† Lawrence Journal World & News: Members of Congress tweet their own horns (September 20, 2009)† The Telegraph (Calcutta, India): Blowing tweet horns (September 20, 2009)† The News Journal (Wilmington, DE): For Twitter-happy politicians, the service is all about them (September 20, 2009)† Honolulu Advertiser: Politicians Tweets self-promotional (September 20, 2009)† Huffington Post: Politicians On Twitter: Tweets By Lawmakers Boastful Or Boring: Study (September 19, 2009)† Hawaii Reporter: Politicians Tweets Are Mostly Self-Promotional, Researchers Say (September 19, 2009)† Austin American Statesman: Lawmakers use Twitter for self-promotion, study finds (September 19, 2009)† The Arizona Republic: Surprise! Twitter from D.C. about self-promotion (September 18, 2009)† St. Petersburg Times: Times Wires (September 18, 2009)† The Hill: Lawmakers Tweets Largely Self-Promotional (September 18, 2009)† The Washington Post: Politicians Tweets Are Mostly Self-Promotional, Researchers Say (September 18, 2009)† Politico: Study: Congress Needs Twitter Help (September 16, 2009)† Kansas City Star: Study: Congress all a Twitter (September 15, 2009)† Ars Technica: Who do you trust 2.0: Building better preference predictions (September 21, 2008)† Delmarva Daily Times: ALL ABOUT ME: ‘25 Things’ becomes one of Facebook‘s biggest fads. (February 27, 2008)† WEYI NBC25: Facebook backs down on change (February 18, 2009)† Wired.com: Obama Supporters Act to Clear FUD. (November 12, 2007)† 22 • Physics World: Talking Physics in the Social Web (January 2007) • Salon.com: You are who you know (June 15, 2004)† Podcasts, Radio, and TV • , NPR, The Kojo Nnamdi Show, guest host (January 2014-present) • NPR, To The Point (January 3, 2014) • NPR, The Kojo Nnamdi Show, interview on “From :) to GIFS: Expressing ourselves with images online” (March 21, 2013) • Wisconsin Public Radio, The Joy Cardin Show, interview on “What your Facebook Likes say about you” (March 21, 2013) • NPR, interview on social media and the Olympics (August 1, 2012) • NPR, The Kojo Nnamdi Show, interview on “The Future Of Neighborhood Communication” (July 31, 2012) • NPR, The Kojo Nnamdi Show, interview on “Frictionless Web: Social Readers And Seamless Sharing” (June 12, 2012) • NPR, The Kojo Nnamdi Show, interview on “The Interest in Pinterest” (February 28, 2012) • NPR, The Kojo Nnamdi Show, interview on “The New Sharing Economy” (October 31, 2011) • NPR, The Kojo Nnamdi Show, interview on “Social Networking Grows Up” (March 24, 2011) • NPR, The Kojo Nnamdi Show, interview on photos and social media (February 15, 2011) • NPR, The Animal House, interview on social networks for pets (January 15, 2011) • BBC World Service Newshour, interview on Twitter use by PMs (October 21, 2009) • WHIO TV, interview on the use of Twitter by Congress (October 3, 2009) • KCSN Radio, interview on the use of Twitter by Congress (September 21, 2009) • WTOP Radio, interview on the use of Twitter by Congress (September 15, 2009) • NBC 4, TV interview on Facebook data sharing policy (February 17, 2009) • Science Podcast, interview on trust in social networks (September 18, 2008) • NBC 4, TV interview on internet predators (February 21, 2008) • The Diane Rehm Show (National Public Radio), panelist for discussion of Social Networks (July 10, 2006) 3 Teaching, Mentoring, and Advising 3.A Courses Taught in the Last Five Years • INST 775: HCI Capstone Prep – Fall 2013 (enrollment 12) • INST 631 / LBSC795: Fundamentals of HCI – Fall 2012 (enrollment 13) – Fall 2011 (enrollment 15) • INST 633 / LBSC708L: Analyzing Social Networks and Social Media – – – – – Spring 2011 (enrollment 22) Spring 2013 (enrollment 18) Summer 2013 (enrollment 19) Winter 2013 (enrollment 13) Summer 2015 enrollment 20 23 • INFM289I: Social Networks: Technology and Society – Spring 2010 (enrollment 67) – Fall 2010 (enrollment 64) – Spring 2012 (enrollment 75) • LBSC 690: Information Technology – – – – – – Summer 2012 (enrollment 18) Spring 2012 (enrollment 18) Winter 2011 (enrollment 22) Winter 2010 (enrollment 16) Spring 2009 (enrollment 26) Fall 2007 (enrollment 25) • LBSC 743: Development of Internet Applications – Spring 2010 (enrollment 32) – Fall 2009 (enrollment 27) – Spring 2009 (enrollment 36) • LBSC 888: Doctoral Seminar – Fall 2008 (enrollment 7) – Spring 2014 (enrollment 7) • INFM 220: Information Users in Social Context – Spring 2008 (enrollment 22) • CMSC 498N: Small Worlds, Social Networks, and Web Algorithms – Spring 2007 (enrollment 14) 3.B Course or Curriculum Development • Fall 2012: Development of HCI Masters capstone classes, INST 775 and 776 • Fall 2011: Redevelopment of LBSC795 / INST631 for HCI Masters program • Spring 2010: First offering of new course for undergraduate iSeries, INFM289I: Social Networks, Technology, and Society • Winter 2010. Developed online version of LBSC690: Information Technology • Spring 2009. First offering of new course. INFM 743: Development of Internet Applications • Spring 2009. Significant course revision. LBSC 690: Information Technology • Spring 2008. First offering of new course. INFM 220: Information Users in Social Context • Fall 2007. Development of new course LBSC 888: Doctoral Seminar (with Allison Druin) • Spring 2007. First offering of new course. CMSC 498N: Small Worlds, Social Networks, and Web Algorithms 3.C 3.C.i Textbooks, Manuals, Notes, Software, Web pages and Other Contributions to Teaching Textbooks • Jennifer Golbeck, Social Network and Social Media Analysis. Burlington, MA: Morgan Kaufmann, 2013. 24 3.C.ii Other Contributions to Teaching • Developed Web-accessible course material (slides, exercises, assignments, sample exams, etc.) for LBSC 690. Adapted from material by Jimmy Lin and Allison Druin. • Developed Web-accessible course material for INFM 743. • Developed Web-accessible course material for INFM 220. • Built three two-week modules (mini-courses) for LBSC 888. • Developed and implemented online module system for LBSC 888, where faculty can build and submit two-week modules for the doctoral seminar. • Developed Web-accessible course material for CMSC 498N. 3.E 3.E.i Advising: Other Than Research Direction Undergraduate • Anthony Rogers, Individual Studies Program, Fall 2007 – present • Ben Falk, Individual Studies Program, Spring 2008 – present • Ryan McCormick, Individual Studies Program, Spring 2008 – present 3.E.ii Master’s • Spring 2009: 13 advisees • Fall 2008: 13 advisees 3.F 3.F.i Advising: Research Direction Undergraduate • Danny Laurence Spring 2012 – present Research topic: Computing trust in social networks • Elaine Wang Spring 2012 – present Research topic: Multilingual Use of Twitter • Vincent Kuyatt (Undergraduate Student, Computer Science) Spring 2011 Research Topic: Real time strategy games for social strategy analysis • Michon Edmonson (Undergraduate Student, Computer Science) Spring 2011 – present Research Topic: Computing personality and trust • Wendy Mock (Undergraduate Student, Computer Science) Spring 2011 – present Research Topic: Social tagging of images • Eric Norris (Undergraduate Student, Computer Science) Summer 2010 – present Research Topic: processing social network data 25 • Nima Rad (Undergraduate Student, Computer Science) Summer 2010 – Winter 2011 Research Topic: Games for understanding social strategies • Karen Turner (Undergraduate Student, Psychology) Spring 2010 – Fall 2010 Research topic: Use of Facebook • Anthony Rogers (Undergraduate Student, Individual Studies) Spring 2008 – present Research topic: Social networks on the web • Stuart Moore (Undergraduate Student) Spring 2008, In the context of INFM 220 Research topic: Expert search • Joanne Kim (Undergraduate Student) Spring 2008, In the context of INFM 220 Research topic: Expert search • Mariya Filippova (Undergraduate Student, Computer Science) Fall 2007 – Spring 2008 Research topic: Social Applications in Facebook • Greg Phillips (Undergraduate Student, Computer Science) Spring 2008, In the context of INFM 220 Research topic: Sentiment analysis in online communities • Matthew Rothstein (Undergraduate Student, Computer Science) Spring 2007 – Summer 2008 Research topic: Merging social networks on the Semantic Web with FOAF • Michael Wasser (Undergraduate Student, Computer Science) Fall 2005 – Spring 2007 Research topic: Adding social context to web pages 3.F.ii Master’s Masters Thesis Committees • Member, Thesis Committee Kelly Hoffman (MLS student, the iSchool): Fall 2007 – Spring 2008 • Member, Thesis Committee Chris Zamerelli (MLS student, the iSchool): Fall 2007 – Spring 2008 • Member, Thesis Committee D. Adam Anderson (MLS student, the iSchool): Fall 2007 – Spring 2008 26 Other • Zahra Ashktorab (HCIM Student, the iSchool) Fall 2011 – present Research topic; Social Recommender Systems • Beth Emmerling (PhD student, the iSchool) Spring 2010 – Fall 2011 Research topic: Image tagging • Cristina Robles (MLS student, the iSchool) Spring 2010 – Spring 2011 Research topic: Use of Facebook • Alon Motro (MIM student, the iSchool) Spring 2009 – Spring 2012 Research topic: Computing trust in social networks • Jeanne Kramer-Smyth (MLS student, the iSchool) Fall 2008 – Spring 2009 In the context of NEH Digital Humanities Startup Grant Research Topic: Development of ArchivesZ visualization tool for archival collections • Rishabh Vyas (MIM student, the iSchool) Fall 2008 – Spring 2009 In the context of a Graduate Research Assistantship (GRA) Research Topic: expert search through document indexing • Manasee Mahajan (MIM student, the iSchool) Fall 2007 – Fall 2008 Research Topic: expert search through document indexing 3.F.iii Doctoral As Advisor/Co-Advisor • • • • • • Advisor, Zahra Ashktorab (Ph.D. Student, iSchool) Advisor, Cody Buntain (Ph.D. Student, Computer Science) Advisor, Irene Eleta (Ph.D. Student, iSchool) Advisor, Jes Koepfler (Ph.D. Student, iSchool) Advisor, John Kleint (Ph.D. Student, Computer Science) Co-Advisor with Don Perlis, Hamid Shahri (Ph.D Student, Computer Science) Graduated Spring 2011 First permanent position: Technology Researcher at the Mayo Clinic • Co-Advisor with Jim Hendler, Vladimir Kolovski (Ph.D. Student, Computer Science) Graduated May 2008. First permanent position: Research Scientist, Oracle (Nashua, NH) • Co-Advisor with Jim Hendler, Christian Halaschek-Weiner (Ph.D. Student, Computer Science) Graduated December 2007. First permanent position: Chief Technology Officer of Clados Management LLC. 27 Other Dissertation Committees • Member, dissertation committee Ed Condon (Ph.D. Student, Computer Engineering), Fall 2012–present • Member, dissertation committee Jared Sylvester (Ph.D. Student, Computer Science, Fall 2014 • Member, dissertation committee Megan Monroe (Ph.D. Student, Computer Science), Fall 2013–Spring 2014 • Member, dissertation committee Kan Leung Cheng (Ph.D. Student, Computer Science), Fall 2010–Summer 2013 • Member, dissertation committee Greg Walsh (Ph.D. Student, the iSchool), Fall 2010–Summer 2012 • Member, dissertation committee Bo Han (Ph.D. Student, Computer Science), Summer 2012 • Member, dissertation committee Tom Dubois (Ph.D. Student, Computer Science), Fall 2010 – Spring 2011 • Member, dissertation committee Elena Zheleva (Ph.D. Student, Computer Science), Fall 2008 – Spring 2011 • Member, dissertation committee Hamid Shahri (Ph.D. Student, Computer Science): Fall 2009 – Spring 2011 • Member, dissertation committee Chuk-Yang Seng (Ph.D. Student, Computer Science): Fall 2008 – Summer 2009 • Member, dissertation committee Adam Perer (Ph.D. Student, Computer Science): Fall 2007 – Spring 2008 Other6 • Dana Rotman (Ph.D. Student, the iSchool): Fall 2009 – present Research Topic: Community structure in YouTube • Tom DuBois (Ph.D. student, Computer Science): Spring 2009 – Spring 2011 Research Topic: Computing trust in social networks • Justin Grimes (Ph.D. Student, the iSchool): Spring 2009 Research Topic: Twitter Usage in Congress • Elena Zheleva (Ph.D. Student, Computer Science): Fall 2008 – Spring 2011 Research Topic: Link prediction in social networks • Christina Pikas (Ph.D. Student, the iSchool): Spring 2008 Research Topic: Social networks in science blogs • Philip Fei Wu (Ph.D. Student, the iSchool), Fall 2007 – Spring 2008 Research Topic: Community Response Grids 6 Students with whom I have had significant research interaction on specific projects, in a capacity other than their advisor/co-advisor. 28 4 Service 4.A 4.A.i Professional Offices and committee memberships held in professional organizations7 • World Wide Web Consortium Semantic Web Best Practices Working Group, March 2004 – October 2004 4.A.ii Reviewing activities for agencies • Review panelist, NASA Postdoctoral Fellows program Summer 2011 • Review panelist, National Science Foundation (NSF), Directorate for Computer and mation Science and Engineering (CISE), Spring 2011 • Review panelist, National Science Foundation (NSF), Directorate for Computer and mation Science and Engineering (CISE), Spring 2010 • Review panelist, National Science Foundation (NSF), Directorate for Computer and mation Science and Engineering (CISE), Fall 2009 • Review panelist, National Science Foundation (NSF), Directorate for Computer and mation Science and Engineering (CISE), Fall 2008 • Outside Reviewer, National Science Foundation (NSF), Directorate for Computer and mation Science and Engineering (CISE), Fall 2007 4.A.iii InforInforInforInforInfor- Other unpaid services to local, state, and federal agencies • Production of video campaign and social media contest for Department of Defense anti-obesity initiative, in conjunction with Deputy Assistant Secretary of Defense for Health Affairs Summer 2012 – present 4.B Campus 4.B.i College8 • • • • • • • • • • • • Program Director, HCI Masters Program, Summer 2012 – present) Director, Human-Computer Interaction Lab (Spring 2011 – present) Member, HCI Masters Committee (Fall 2009 – Spring 2012) Member, iSchool Search Committee (Fall 2011– Spring 2012) Chair, iSchool Student Awards Committee (Fall 2011 – Spring 2012) Co-Director, HCIL (Spring 2009 – Spring 2011) Chair, iSchool Undergraduate Committee (Fall 2010 – Spring 2011) Member, iSchool Search Committee (Fall 2010 – Spring 2011) Member, iSchool Search Committee (Fall 2009 – Spring 2011) Member, iSchool ad hoc Research Committee (Fall 2009 – Spring 2011) Member, iSchool Undergraduate Committee (Fall 2008 – Spring 2009) Assistant Director, Center for Information Policy and E-Government (Fall 2007 – Spring 2010) • Member, iSchool Doctoral Committee (Fall 2007 – Spring 2010) 7 Position on journal board, chairship/membership on conference program committees, and related reviewing activities already reported in Section 2.K are not repeated here. 8 Membership on dissertation/examination committees are listed in Section 3.F.iii and not duplicated here. 29 • Secretary, College Assembly (Fall 2008 – Spring 2009) 4.C University • Member, University of Maryland Provost Search Committee (Fall 2011 – Spring 2012) 30 EXHIBIT B Exhibit B: List of Materials Relied On I relied on the following documents and materials in forming my opinions: Documents from Campbell, et al. v. Facebook, Inc.: Supplemental Responses and Objections to Plaintiffs’ First Set of Interrogatories Facebook’s Second Supplemental Responses and Objections to Plaintiffs’ Narrowed Second Set of Interrogatories Deposition of Ray He (September 25, 2015) Deposition of Michael Adkins (October 28, 2015) Plaintiffs’ Consolidated Amended Complaint Exhibit F to the Declaration of Alex Himel on Behalf of Defendant Facebook, Inc. FB000011543 FB000002651 FB000003118 FB000002651 FB000002843 FB000007286 FB000006178 FB000010688 FB000008505 FB000010688 FB000008722 FB000000298 FB000008643 FB000008499 FB000002141 FB000002190 FB000002196 FB000006429 FB000000699 FB000002197 FB000001599 FB000001608-9 FB000000425 FB000005827 FB000005802-R FB000008499 Source Code Produced by Facebook Other Materials https://web.archive.org/web/20101016010319/http://developer.yahoo.com/blogs/ydn/post s/2010/10/how-many-users-have-javascript-disabled/ https://gds.blog.gov.uk/2013/10/21/how-many-people-are-missing-out-on-javascriptenhancement/ https://www.facebook.com/notes/facebook-engineering/tao-the-power-of-thegraph/10151525983993920 https://web.archive.org/web/20101205130048/http://developers.facebook.com/ docs/reference/plugins/activity http://developers.facebook.com/docs/reference/plugins/activity http://blogs.wsj.com/digits/2012/10/03/how-private-are-your-private-messages/ https://developers.facebook.com/blog/post/476 https://www.facebook.com/1556441609 https://www.facebook.com/michael.s.hurley.73 Campbell v. Facebook Inc., 77 F. Supp. 3d 836, 844 (N.D. Cal. 2014). In re Google Inc. Gmail Litig., 2013 U.S. Dist. LEXIS 172784 (N.D. Cal. Sept. 26, 2013) In re Carrier IQ, Inc., Consumer Privacy Litig., 78 F. Supp. 3d 1051, 1076 (N.D. Cal. 2015) EXHIBIT 3 FILED UNDER SEAL EXHIBIT 4 FILED UNDER SEAL EXHIBIT 5 FILED UNDER SEAL EXHIBIT 6 FILED UNDER SEAL EXHIBIT 7 FILED UNDER SEAL EXHIBIT 8 FILED UNDER SEAL EXHIBIT 9 FILED UNDER SEAL EXHIBIT 10 FILED UNDER SEAL EXHIBIT 11 FILED UNDER SEAL EXHIBIT 12 FILED UNDER SEAL EXHIBIT 13 FILED UNDER SEAL EXHIBIT 14 FILED UNDER SEAL EXHIBIT 15 FILED UNDER SEAL EXHIBIT 16 FILED UNDER SEAL EXHIBIT 17 FILED UNDER SEAL EXHIBIT 18 FILED UNDER SEAL EXHIBIT 19 Quarterly Earnings Slides Q4 2012 Safe Harbor In addition to U.S. GAAP financials, this presentation includes certain non-GAAP financial measures. These non-GAAP measures are in addition to, not a substitute for or superior to, measures of financial performance prepared in accordance with U.S. GAAP A reconciliation of non-GAAP financial measures to the corresponding . GAAP measures is provided in the appendix to this presentation. Please also see the appendix to this presentation for information concerning limitations of our key user metrics. Monthly Active Users (MAUs) Millions of MAUs Rest of World Asia Europe US & Canada 680 608 133 138 161 156 739 183 174 800 207 845 225 901 245 955 268 1,007 288 1,056 304 277 298 196 212 234 255 229 239 246 253 261 183 201 212 221 154 163 169 176 179 183 186 189 193 Q4'10 Q1'11 Q2'11 Q3'11 Q4'11 Q1'12 Q2'12 Q3'12 Q4'12 Please see Facebook's Form 10-K for the year ended December 31, 2012 for definitions of user activity used to determine the number of our MAUs, DAUs and mobile MAUs. The number of MAUs, DAUs, and mobile MAUs do not include Instagram users unless such users would otherwise qualify as MAUs, DAUs, and mobile MAUs based on activity that is shared back to Facebook. In June 2012, we discovered an error in the algorithm we used to estimate the geographic location of our users that affected our attribution of certain user locations for the first quarter of 2012. The first quarter of 2012 user metrics reflect a reclassification to more correctly attribute users by geographic region. 3 Daily Active Users (DAUs) Millions of DAUs Rest of World 526 Asia Europe 417 US & Canada 372 327 58 64 74 72 87 85 457 100 483 109 126 552 139 584 152 119 129 141 618 161 153 98 105 143 152 154 160 169 107 120 127 135 99 105 117 124 126 129 130 132 135 Q4'10 Q1'11 Q2'11 Q3'11 Q4'11 Q1'12 Q2'12 Q3'12 Q4'12 Q4'10 Q1'11 Q2'11 Q3'11 Q4'11 Q1'12 Q2'12 Q3'12 Q4'12 54% 55% 56% 57% 57% 58% 58% 58% 59% DAUs / MAUs Please see Facebook's Form 10-K for the year ended December 31, 2012 for definitions of user activity used to determine the number of our MAUs, DAUs and mobile MAUs. The number of MAUs, DAUs, and mobile MAUs do not include Instagram users unless such users would otherwise qualify as MAUs, DAUs, and mobile MAUs based on activity that is shared back to Facebook. For non-worldwide DAU user numbers presented for the periods marked March 31, 2012 and June 30, 2012, the figures represent an average of the first 25 days of the period and the last 27 days of the period, respectively, due to the algorithm error described in the MAU note on slide 3. These average numbers do not meaningfully differ from the average numbers when calculated over a full month. 4 Mobile Monthly Active Users (Mobile MAUs) Millions of Mobile MAUs 680 604 543 488 432 245 Q4'10 288 Q1'11 325 Q2'11 376 Q3'11 Q4'11 Q1'12 Q2'12 Q3'12 Q4'12 Please see Facebook's Form 10-K for the year ended December 31, 2012 for definitions of user activity used to determine the number of our MAUs, DAUs and mobile MAUs. The number of MAUs, DAUs, and mobile MAUs do not include Instagram users unless such users would otherwise qualify as MAUs, DAUs, and mobile MAUs based on activity that is shared back to Facebook. 5 Mobile Only Monthly Active Users (Mobile Only MAUs) Millions of Mobile Only MAUs 157 126 102 83 58 Q4'11 Q1'12 Q2'12 Q3'12 Q4'12 Mobile Only MAUs are mobile MAUs that accessed Facebook solely through mobile apps or our mobile website. 6 Revenue $5,089 Millions of Dollars $1,585 Payments and other fees $810 Advertising $256 $1,131 $895 $731 $731 $76 $119 $954 $188 $1,058 $3,711 $176 $1,184 $1,262 $557 $192 $186 $156 $94 $1,329 $943 $655 $776 $798 $872 $992 $1,974 $106 $1,086 $637 $4,279 $3,154 $1,868 Q4'10 Q1'11 Q2'11 Q3'11 Q4'11 Q1'12 Q2'12 Q3'12 Q4'12 Quarterly 2010 2011 2012 Annual 7 Revenue by User Geography Millions of Dollars $1,585 Rest of World Europe US & Canada $731 $47 $62 $218 $1,131 $895 $65 $82 $954 $78 $104 $1,184 $87 $1,058 $113 $115 $135 $87 $394 $275 $471 $361 $290 $482 $567 $605 $1,262 $198 $3,711 $277 $130 $154 $363 $440 $1,455 $118 $229 $412 $497 $167 Asia $731 $43 $58 $5,089 $328 $525 $346 $341 $1,974 $1,155 $101 $148 $590 $637 $780 Q4'10 Q1'11 Q2'11 Q3'11 Q4'11 Q1'12 Q2'12 Q3'12 Q4'12 $577 $2,532 $1,914 $1,146 2010 Quarterly 2011 2012 Annual Revenue by user geography is geographically apportioned based on our estimation of the geographic location of our users when they perform a revenue-generating activity. This allocation differs from our revenue by geography disclosure in our consolidated financial statements where revenue is geographically apportioned based on the location of the advertiser or developer. 8 Advertising Revenue by User Geography Millions of Dollars $1,329 Rest of World $156 Asia $1,086 Europe US & Canada $655 $41 $53 $637 $44 $56 $201 $943 $776 $61 $74 $798 $71 $88 $245 $79 $95 $245 $992 $872 $104 $79 $99 $115 $120 $168 $133 $374 $206 $359 $332 Q4'10 Q1'11 $394 $395 Q2'11 Q3'11 $306 $274 $462 $419 Q4'11 Q1'12 $294 $295 $479 $538 Q2'12 Q3'12 $631 Q4'12 Revenue by user geography is geographically apportioned based on our estimation of the geographic location of our users when they perform a revenue-generating activity. This allocation differs from our revenue by geography disclosure in our consolidated financial statements where revenue is geographically apportioned based on the location of the advertiser or developer. 9 Payments & Other Revenue by User Geography Millions of Dollars $256 $11 Rest of World Asia $30 Europe US & Canada $76 $2 $5 $17 $94 $3 $6 $23 $53 $62 Q4'10 Q1'11 $119 $4 $8 $156 $7 $16 $188 $8 $20 $186 $8 $19 $192 $9 $20 $55 $54 $52 $176 $10 $21 $66 $46 $45 $30 $149 $77 $87 Q2'11 Q3'11 $105 $106 $111 Q4'11 Q1'12 Q2'12 $99 Q3'12 Q4'12 Revenue by user geography is geographically apportioned based on our estimation of the geographic location of our users when they perform a revenue-generating activity. This allocation differs from our revenue by geography disclosure in our consolidated financial statements where revenue is geographically apportioned based on the location of the advertiser or developer. 10 Payments Revenue Recognition Timing  Payments terms and conditions provide for a 30day claim period following a Payments transaction during which the customer may dispute the transaction.  In Q3 2012 and prior due to insufficient , transaction history, Payments revenues were recognized after the claim period lapsed.  For example, transactions occurring in June were recognized as revenue 30 days later in , July, and included in Q3 2012 revenue. Therefore, Q3 2012 revenue reflects transactions that occurred during the months of June, July and August. June Jul Aug Q 3 2012 Sept Oct  As of Q4 2012, we had 24 months of historical transactional information. As a result, starting in Q4 2012 we recorded all Payments revenues in the month the transaction occurs, net of estimated refunds or chargebacks. This change resulted in a one-time increase in Payments revenue in the fourth quarter as we recognized revenue from an extra month of payments transactions (those occurring in September through December.) Nov Q 4 2012 Dec Jan Feb Mar Q1 2013 11 Average Revenue per User (ARPU) Worldwide US & Canada $1.54 $1.38 $5.02 $1.28 $1.29 $3.20 $3.20 $5.32 $3.40 $4.08 $13.58 $2.90 $11.33 $3.97 $8.34 $1.21 Q4'11 Q1'12 Q2'12 Q3'12 Q4'12 Europe $1.60 2010 2011 Q4'11 Q1'12 Q2'12 Q3'12 Q4'12 2012 Asia $1.71 $1.40 $1.43 $1.37 $5.46 2010 2011 2012 Rest of World $5.91 $2.35 $0.44 $1.84 $0.41 $1.50 $0.37 $2.05 $3.75 $0.47 $0.56 $1.49 $0.94 $0.69 $0.56 $0.53 $0.55 $0.58 Q4'11 Q1'12 Q2'12 Q3'12 Q4'12 2010 2011 2012 Q4'11 Q1'12 Q2'12 Q3'12 Q4'12 2010 2011 2012 Q4'11 Q1'12 Q2'12 Q3'12 Q4'12 2010 2011 2012 Revenue by user geography is geographically apportioned based on our estimation of the geographic location of our users when they perform a revenue-generating activity. This allocation differs from our revenue by geography disclosure in our consolidated financial statements where revenue is geographically apportioned based on the location of the advertiser or developer. The ARPU amount for US & Canada region in Q1 2012 reflects an adjustment based on the reclassification of certain users between geographical regions to more correctly attribute users by geographic region. Please see Facebook's Form 10-K for the year ended December 31, 2012 for definitions of ARPU and annual ARPU. 12 Share-Based Compensation Expense $1,106 Millions of Dollars Pre-2011 RSUs Post-2011 RSUs Options & Other $986 $64 $70 $76 $179 $28 $103 $6 $7 $58 $59 $74 $97 Q4'10 Q1'11 Q2'11 Q3'11 Q4'11 Q1'12 $184 $24 $113 $138 $137 Q2'12 Q3'12 Q4'12 Q4 2012 expenses are estimates and exclude any potential impact of future acquisitions. 13 Expenses as a % of Revenue Share-based compensation + Payroll tax related to share-based compensation Cost of Revenue Research & Development 31% 26% 26% 22% 22% Q4'11 26% 25% 25% 60% 25% 24% 19% 19% 11% Q1'12 Q2'12 Q3'12 Q4'12 Marketing & Sales 14% 14% 7% Q4'11 9% 9% 11% 10% Q1'12 Q2'12 Q3'12 Q4'12 General & Administrative 33% 11% All other expenses 39% 13% 12% 8% 9% 12% 11% 12% 10% Q4'11 Q1'12 Q2'12 Q3'12 Q4'12 7% 8% Q4'11 Q1'12 12% 11% 11% 10% 9% Q2'12 Q3'12 Q4'12 10% We have reclassified certain prior period amounts in marketing and sales to general and administrative expense to conform to our current period presentation. These reclassifications did not affect revenue, total costs and expenses, income (loss) from operations, or net (loss) income. 14 GAAP Income (Loss) from Operations & Margin Income (Loss) from Operations ($M) $437 $388 $407 $414 $548 $381 $377 $523 ($743) Q4'10 Q1'11 Q2'11 Q3'11 Q4'11 45% 43% 48% Q1'12 Q3'12 Q4'12 30% Q2'12 33% Q3'12 Q4'12 Operating Margin 60% 53% 36% (63%) Q4'10 Q1'11 Q2'11 Q3'11 Q4'11 Q1'12 Q2'12 15 Effective Tax Rate Q1 2012 (in millions) Revenue $ Q2 2012 1,058 $ 1,184 Q3 2012 $ 1,262 Q4 2012 $ 1,585 2011 $ 3,711 2012 $ 5,089 Costs and expenses: Cost of revenue Research and development Marketing and sales General and administrative Total costs and expenses Income from operations 277 153 143 104 677 381 Interest and other income (expense), net Interest expense (13) (10) (11) (16) (42) (51) Other income (expense), net Income (loss) before provision for income taxes Provision for (benefit from) income taxes Net income (loss) 14 382 177 205 (12) (765) (608) (157) 6 372 431 (59) (2) 505 441 64 (19) 1,695 695 1,000 7 494 441 53 Effective Tax Rate $ 46% 367 705 392 463 1,927 (743) $ 79% 322 244 168 151 885 377 $ 398 297 193 174 1,062 523 $ 116% 87% 860 388 393 314 1,955 1,756 $ 41% 1,364 1,399 896 892 4,551 538 $ 89% Q2 through Q4 effective tax rates were influenced by significant share-based compensation expense resulting from our initial public offering, a portion of which is not tax-deductible 16 GAAP Net Income (Loss) Millions of Dollars $302 $251 $233 $240 $227 $205 $64 ($59) ($157) Q4'10 Q1'11 Q2'11 Q3'11 Q4'11 Q1'12 Q2'12 Q3'12 Q4'12 17 Non-GAAP Net Income Millions of Dollars $1,317 $1,164 $360 $426 Q4 2011 Q4 2012 Quarterly 2011 2012 Annual Non-GAAP net income excludes share-based compensation expense, payroll tax expenses related to share-based compensation, and related income tax adjustments—see the Appendix for a reconciliation of this non-GAAP measure to GAAP net income. 18 Capital Investments Mi llions of Dollars $1,575 Property and equipment acquired $340 under capital leases Purchases of property and equipment $1,079 $473 $1,235 $510 $217 $606 $89 $56 $33 $293 2009 2010 2011 2012 Annual 19 Employees Period-end Headcount 4,619 3,200 2,127 1,218 2009 2010 2011 2012 Annual 20 Appendix Reconciliations Three Months Ended December 31, GAAP net income Share-based compensation expense Payroll tax expenses related to share-based compensation Income tax adjustments Non-GAAP net income 2011 $ 302 76 (18) $ 360 2012 $ $ 64 184 29 149 426 Year Ended December 31, 2011 $ 1,000 217 7 (60) $ 1,164 2012 $ $ 53 1,572 151 (459) 1,317 22 Limitations of Key Metrics The numbers of our monthly active users (MAUs) and daily active users (DAUs) and average revenue per user (ARPU) are calculated using internal company data based on the activity of user accounts. While these numbers are based on what we believe to be reasonable estimates of our user base for the applicable period of measurement, there are inherent challenges in measuring usage of our products across large online and mobile populations around the world. For example, there may be individuals who maintain one or more Facebook accounts in violation of our terms of service, despite our efforts to detect and suppress such behavior. We estimate, for example, that “duplicate” accounts (an account that a user maintains in addition to his or her principal account) may have represented approximately 5.0% of our worldwide MAUs as of December 31, 2012. We also seek to identify “false” accounts, which we divide into two categories: (1) user-misclassified accounts, where users have created personal profiles for a business, organization, or non-human entity such as a pet (such entities are permitted on Facebook using a Page rather than a personal profile under our terms of service); and (2) undesirable accounts, which represent user profiles that we determine are intended to be used for purposes that violate our terms of service, such as spamming. As of December 31, 2012, for example, we estimate usermisclassified accounts may have represented approximately 1.3% of our worldwide MAUs and undesirable accounts may have represented approximately 0.9% of our worldwide MAUs. We believe the percentage of accounts that are duplicate or false is meaningfully lower in developed markets such as the United States or Australia and higher in developing markets such as Indonesia and Turkey. However, these estimates are based on an internal review of a limited sample of accounts and we apply significant judgment in making this determination, such as identifying names that appear to be fake or other behavior that appears inauthentic to the reviewers. As such, our estimation of duplicate or false accounts may not accurately represent the actual number of such accounts. We are continually seeking to improve our ability to identify duplicate or false accounts and estimate the total number of such accounts, and such estimates may be affected by improvements or changes in our methodology. 23 Limitations of Key Metrics (continued) Some of our historical metrics through the second quarter of 2012 have also been affected by applications on certain mobile devices that automatically contact our servers for regular updates with no user action involved, and this activity can cause our system to count the user associated with such a device as an active user on the day such contact occurs. For example, we estimate that less than 5% of our estimated worldwide DAUs as of December 31, 2011 and 2010 resulted from this type of automatic mobile activity, and that this type of activity had a substantially smaller effect on our estimate of worldwide MAUs and mobile MAUs. The impact of this automatic activity on our metrics varies by geography because mobile usage varies in different regions of the world. In addition, our data regarding the geographic location of our users is estimated based on a number of factors, such as the user’s IP address and self-disclosed location. These factors may not always accurately reflect the user’s actual location. For example, a mobile-only user may appear to be accessing Facebook from the location of the proxy server that the user connects to rather than from the user’s actual location. The methodologies used to measure user metrics may also be susceptible to algorithm or other technical errors. For example, in early June 2012, we discovered an error in the algorithm we used to estimate the geographic location of our users that affected our attribution of certain user locations for the period ended March 31, 2012. While this issue did not affect our overall worldwide MAU number, it did affect our attribution of users to different geographic regions. We estimate that the number of MAUs as of March 31, 2012 for the United States & Canada region was overstated as a result of the error by approximately 3% and these overstatements were offset by understatements in other regions. In addition, our estimates for revenue by user location are also affected by these factors. We regularly review and may adjust our processes for calculating these metrics to improve their accuracy. In addition, our MAU and DAU estimates will differ from estimates published by third parties due to differences in methodology. For example, some third parties are not able to accurately measure mobile users or do not count mobile users for certain user groups or at all in their analyses. The number of MAUs, DAUs, mobile MAUs, and ARPU discussed in these slides do not include users of Instagram unless such users would otherwise quality as MAUs, DAUs, and mobile MAUs, respectively, based on activity that is shared back to Facebook. 24 EXHIBIT 20 REDACTED VERSION OF DOCUMENT(S) SOUGHT TO BE SEALED 1 2 3 4 5 6 7 8 9 10 11 12 13 14 GIBSON, DUNN & CRUTCHER LLP JOSHUA A. JESSEN, SBN 222831 JJessen@gibsondunn.com JEANA BISNAR MAUTE, SBN 290573 JBisnarMaute@gibsondunn.com ASHLEY M. ROGERS, SBN 286252 ARogers@gibsondunn.com 1881 Page Mill Road Palo Alto, California 94304 Telephone: (650) 849-5300 Facsimile: (650) 849-5333 GIBSON, DUNN & CRUTCHER LLP GAIL E. LEES, SBN 90363 GLees@gibsondunn.com CHRISTOPHER CHORBA, SBN 216692 CChorba@gibsondunn.com 333 South Grand Avenue Los Angeles, California 90071 Telephone: (213) 229-7000 Facsimile: (213) 229-7520 Attorneys for Defendant FACEBOOK, INC. 15 UNITED STATES DISTRICT COURT 16 NORTHERN DISTRICT OF CALIFORNIA 17 OAKLAND DIVISION 18 19 MATTHEW CAMPBELL, MICHAEL HURLEY, and DAVID SHADPOUR, Plaintiffs, 20 21 v. 22 FACEBOOK, INC., 23 Defendant. Case No. C 13-05996 PJH (MEJ) PUTATIVE CLASS ACTION DEFENDANT FACEBOOK, INC.’S SUPPLEMENTAL RESPONSES AND OBJECTIONS TO PLAINTIFFS’ NARROWED SECOND SET OF INTERROGATORIES 24 25 26 27 28 Gibson, Dunn & Crutcher LLP DEFENDANT FACEBOOK, INC.’S SUPPLEMENTAL RESPONSES AND OBJECTIONS TO PLAINTIFFS’ NARROWED SECOND SET OF INTERROGATORIES Case No. C 13-05996 PJH (MEJ) 1 Defendant Facebook, Inc. (“Defendant” or “Facebook”), by and through its attorneys, and 2 pursuant to Rules 26 and 33 of the Federal Rules of Civil Procedure, the Local Civil Rules of the U.S. 3 District Court for the Northern District of California, the Court orders in this action, and the parties’ 4 agreements, provides the following supplemental responses and objections to Plaintiffs’ Narrowed 5 Second Set of Interrogatories (the “Interrogatories”). PRELIMINARY STATEMENT 6 7 1. Facebook’s responses to the Interrogatories are made to the best of Facebook’s current 8 knowledge, information, and belief. Facebook reserves the right to supplement or amend any of its 9 responses should future investigation indicate that such supplementation or amendment is necessary. 10 2. Facebook’s responses to the Interrogatories are made solely for the purpose of and in 11 relation to this action. Each response is given subject to all appropriate objections (including, but not 12 limited to, objections concerning privilege, competency, relevancy, materiality, propriety, and 13 admissibility). All objections are reserved and may be interposed at any time. 14 15 16 3. Facebook’s responses are premised on its understanding that Plaintiffs seek only that information that is within Facebook’s possession, custody, and control. 4. Facebook incorporates by reference each and every general objection set forth below 17 into each and every specific response. From time to time, a specific response may repeat a general 18 objection for emphasis or some other reason. The failure to include any general objection in any 19 specific response shall not be interpreted as a waiver of any general objection to that response. 20 5. Nothing contained in these Reponses and Objections or provided in response to the 21 Interrogatories consists of, or should be construed as, an admission relating to the accuracy, 22 relevance, existence, or nonexistence of any alleged facts or information referenced in any 23 Interrogatory. GENERAL OBJECTIONS 24 25 1. Facebook objects to each Interrogatory, including the Definitions and Instructions, to 26 the extent that it purports to impose obligations beyond those imposed by the Federal Rules of Civil 27 Procedure, the Federal Rules of Evidence, the Local Civil Rules of the U.S. District Court for the 28 Northern District of California, and any agreements between the parties. 1 Gibson, Dunn & Crutcher LLP DEFENDANT FACEBOOK, INC.’S SUPPLEMENTAL RESPONSES AND OBJECTIONS TO PLAINTIFFS’ NARROWED SECOND SET OF INTERROGATORIES Case No. C 13-05996 PJH (MEJ) 1 2. Facebook objects to each Interrogatory to the extent that it is not limited to the 2 relevant time period, thus making the Interrogatory overly broad, unduly burdensome, and not 3 relevant to the claims or defenses in this action. Unless otherwise specified in its responses, and 4 pursuant to the agreement of the parties, Facebook’s responses will be limited to information 5 generated between April 1, 2010 and December 30, 2013. 6 3. Facebook objects to each Interrogatory to the extent that it seeks information unrelated 7 and irrelevant to the claims or defenses in this litigation and not reasonably calculated to lead to the 8 discovery of admissible evidence. 9 4. Facebook objects to each Interrogatory as overly broad and unduly burdensome, 10 particularly in view of Facebook’s disproportionate cost necessary to investigate as weighed against 11 Plaintiffs’ need for the information. The Interrogatories seek broad and vaguely defined categories of 12 materials that are not reasonably tailored to the subject matter of this action. 13 5. Facebook objects to each Interrogatory to the extent that it purports to request the 14 identification and disclosure of information or documents that were prepared in anticipation of 15 litigation, constitute attorney work product, reveal privileged attorney-client communications, or are 16 otherwise protected from disclosure under any applicable privileges, laws, or rules. Facebook hereby 17 asserts all such applicable privileges and protections, and excludes privileged and protected 18 information from its responses to each Interrogatory. See generally Fed. R. Evid. 502; Cal. Code 19 Evid. § 954. Inadvertent production of any information or documents that are privileged or otherwise 20 immune from discovery shall not constitute a waiver of any privilege or of any other ground for 21 objecting to the discovery with respect to such information or documents or the subject matter 22 thereof, or the right of Facebook to object to the use of any such information or documents or the 23 subject matter thereof during these or any other proceedings. In the event of inadvertent disclosure 24 of any information or inadvertent production or identification of documents or communications that 25 are privileged or otherwise immune from discovery, Plaintiffs will return the information and 26 documents to Facebook and will be precluded from disclosing or relying upon such information or 27 documents in any way. 28 Gibson, Dunn & Crutcher LLP 6. Facebook objects to each and every Interrogatory to the extent that the information 2 DEFENDANT FACEBOOK, INC.’S SUPPLEMENTAL RESPONSES AND OBJECTIONS TO PLAINTIFFS’ NARROWED SECOND SET OF INTERROGATORIES Case No. C 13-05996 PJH (MEJ) 1 sought by the Interrogatory is more appropriately pursued through another means of discovery, such 2 as a request for production or deposition. 3 4 5 7. Facebook objects to each and every Interrogatory, Definition, and Instruction to the extent that it seeks information outside of Facebook’s possession, custody, and control. 8. Facebook objects to each Interrogatory to the extent that it requests information 6 protected by the right of privacy of Facebook and/or third parties, or information that is confidential, 7 proprietary, or competitively sensitive. 8 9 10 11 9. Facebook objects to each Interrogatory to the extent that it seeks documents or information already in Plaintiffs’ possession or available in the public domain. Such information is equally available to Plaintiffs. 10. Facebook objects to each Interrogatory on the ground and to the extent that it exceeds 12 the bounds of Federal Rule of Civil Procedure 33(a)(1), which provides that “a party may serve on 13 any other party no more than 25 written interrogatories, including all discrete subparts.” OBJECTIONS TO DEFINITIONS 14 15 1. Facebook objects to Plaintiffs’ definition of “Association” to the extent that it is 16 vague, ambiguous, overly broad, and unduly burdensome. Facebook further objects to the definition 17 to the extent that Plaintiffs purport to use this defined term to seek materials that are not relevant to 18 the claims and defenses in this action. 19 2. Facebook objects to Plaintiffs’ definition of “Association Type” or “(atype)” to the 20 extent that it is vague, ambiguous, overly broad, and unduly burdensome. Facebook further objects 21 to the definition to the extent that Plaintiffs purport to use this defined term to seek materials that are 22 not relevant to the claims and defenses in this action. 23 3. Facebook generally objects to Plaintiffs’ definitions of “Communication,” 24 “Document(s),” “Electronic Media,” “ESI,” “Electronically Stored Information,” “Identify,” and 25 “Metadata” to the extent that Plaintiffs purport to use these defined terms to request the identification 26 and disclosure of documents that: (a) were prepared in anticipation of litigation; (b) constitute 27 attorney work product; (c) reveal privileged attorney-client communications; or (d) are otherwise 28 protected from disclosure under any applicable privileges, laws, and/or rules. Facebook further 3 Gibson, Dunn & Crutcher LLP DEFENDANT FACEBOOK, INC.’S SUPPLEMENTAL RESPONSES AND OBJECTIONS TO PLAINTIFFS’ NARROWED SECOND SET OF INTERROGATORIES Case No. C 13-05996 PJH (MEJ) 1 objects to the extent that these definitions purport to impose obligations that go beyond the 2 requirements of the Federal and Local Rules. 3 4. Facebook objects to Plaintiffs’ definition of “Destination Object” or “(id2)” to the 4 extent that it is vague, ambiguous, overly broad, and unduly burdensome. Facebook further objects 5 to the definition to the extent that Plaintiffs purport to use this defined term to seek materials that are 6 not relevant to the claims and defenses in this action. 7 5. Facebook objects to Plaintiffs’ definition of “(id)” to the extent that it is vague, 8 ambiguous, overly broad, and unduly burdensome. Facebook further objects to the definition to the 9 extent that Plaintiffs purport to use this defined term to seek materials that are not relevant to the 10 11 claims and defenses in this action. 6. Facebook objects to Plaintiffs’ definition of “Key -> Value Pair” to the extent that it is 12 vague, ambiguous, overly broad, and unduly burdensome. Facebook further objects to the definition 13 to the extent that Plaintiffs purport to use this defined term to seek materials that are not relevant to 14 the claims and defenses in this action. 15 7. Facebook objects to Plaintiffs’ definition of “Object” to the extent that it is vague, 16 ambiguous, overly broad, and unduly burdensome. Facebook further objects to the definition to the 17 extent that Plaintiffs purport to use this defined term to seek materials that are not relevant to the 18 claims and defenses in this action. 19 8. Facebook objects to Plaintiffs’ definition of “Object type” or “(otype)” to the extent 20 that it is vague, ambiguous, overly broad, and unduly burdensome. Facebook further objects to the 21 definition to the extent that Plaintiffs purport to use this defined term to seek materials that are not 22 relevant to the claims and defenses in this action. 23 9. Facebook objects to Plaintiffs’ definition and use of the term “Person” as vague, 24 ambiguous, overly broad, and unduly burdensome to the extent that Plaintiffs intend to use this term 25 to include “any natural person or any business, legal or governmental entity or association” over 26 which Facebook exercises no control. 27 28 Gibson, Dunn & Crutcher LLP 10. Facebook objects to Plaintiffs’ definition of “Process” to the extent that it is vague, ambiguous, overly broad, and unduly burdensome. Facebook further objects to the definition to the 4 DEFENDANT FACEBOOK, INC.’S SUPPLEMENTAL RESPONSES AND OBJECTIONS TO PLAINTIFFS’ NARROWED SECOND SET OF INTERROGATORIES Case No. C 13-05996 PJH (MEJ) 1 extent that Plaintiffs purport to use this defined term to seek materials that are not relevant to the 2 claims and defenses in this action. 3 11. Facebook objects to Plaintiffs’ definition of “Private Message(s)” to the extent that it 4 is vague, ambiguous, overly broad, and unduly burdensome. Facebook further objects to the 5 definition to the extent that Plaintiffs purport to use this defined term to seek materials that are not 6 relevant to the claims and defenses in this action. 7 12. Facebook objects to Plaintiffs’ definitions of “Relate(s) to,” “Related to” and 8 “Relating to” on the ground that the definitions make the Interrogatories overly broad and unduly 9 burdensome and impose obligations that go beyond the requirements of the Federal and Local Rules. 10 11 Facebook shall construe these terms as commonly and ordinarily understood. 13. Facebook objects to Plaintiffs’ definition of “Source Object” or “(id1)” to the extent 12 that it is vague, ambiguous, overly broad, and unduly burdensome. Facebook further objects to the 13 definition to the extent that Plaintiffs purport to use this defined term to seek materials that are not 14 relevant to the claims and defenses in this action. 15 14. Facebook objects to Plaintiffs’ definition and use of the terms “You,” “Your,” or 16 “Facebook” as vague, ambiguous, overly broad, and unduly burdensome to the extent the terms are 17 meant to include “directors, officers, employees, partners, members, representatives, agents 18 (including attorneys, accountants, consultants, investment advisors or bankers), and any other person 19 purporting to act on [Facebook, Inc.’s] behalf. . . . parents, subsidiaries, affiliates, predecessor 20 entities, successor entities, divisions, departments, groups, acquired entities and/or related entities or 21 any other entity acting or purporting to act on its behalf” over which Facebook exercises no control, 22 and to the extent that Plaintiffs purport to use these terms to impose obligations that go beyond the 23 requirements of the Federal and Local Rules. OBJECTIONS TO “RULES OF CONSTRUCTION” AND INSTRUCTIONS 24 25 26 27 28 Gibson, Dunn & Crutcher LLP 1. Facebook objects to Plaintiffs’ “Rules of Construction” and “Instructions” to the extent they impose obligations that go beyond the requirements of the Federal and Local Rules. 2. Facebook objects to Plaintiffs’ Instruction No. 2 to the extent that it is not limited to the relevant time period, thus making the Instruction overly broad, unduly burdensome, and not 5 DEFENDANT FACEBOOK, INC.’S SUPPLEMENTAL RESPONSES AND OBJECTIONS TO PLAINTIFFS’ NARROWED SECOND SET OF INTERROGATORIES Case No. C 13-05996 PJH (MEJ) 1 relevant to the claims or defenses in this action. Unless otherwise specified in its responses, and 2 pursuant to the agreement of the parties, Facebook’s response will be limited to information 3 generated between April 1, 2010 and December 30, 2013. 4 3. Facebook objects to Plaintiffs’ Instruction No. 6 as ambiguous and unduly 5 burdensome. Facebook further objects to the instruction to the extent it exceeds the requirements of 6 the Federal and Local Rules. 7 OBJECTION TO PURPORTED “RELEVANT TIME PERIOD” 8 Facebook objects to Plaintiffs’ proposed “Relevant Time Period” (September 26, 2006 9 through the present) because it substantially exceeds the proposed class period identified in Plaintiffs’ 10 Consolidated Amended Complaint, does not reflect the time period that is relevant to Plaintiffs’ 11 claims in this action, and renders the Interrogatories overly broad, unduly burdensome, and irrelevant. 12 Unless otherwise specified, and pursuant to the agreement of the parties, Facebook’s Responses to 13 these Interrogatories will be limited to information generated between April 1, 2010 and December 14 30, 2013. Facebook otherwise objects to the remainder of Plaintiffs’ statement regarding the 15 “Relevant Time Period” to the extent that it purports to impose obligations beyond those imposed by 16 the Federal and Local Rules. SPECIFIC RESPONSES AND OBJECTIONS 17 18 INTERROGATORY NO. 8: 19 20 Identify all facts relating to the Processing of each Private Message sent or received by Plaintiffs containing a URL1, including, for each Private Message: 21 (A) all Objects that were created during the Processing of the Private Message, including 22 the (id) and the Object Type for each Object, as well as any Key -> Value Pair(s) 23 contained in each Object; 24 25 26 27 1 Each such Private Message has been identified by each Plaintiff in Exhibit 1 to his respective Objections and Responses to Defendant’s First Set of Interrogatories. 28 6 Gibson, Dunn & Crutcher LLP DEFENDANT FACEBOOK, INC.’S SUPPLEMENTAL RESPONSES AND OBJECTIONS TO PLAINTIFFS’ NARROWED SECOND SET OF INTERROGATORIES Case No. C 13-05996 PJH (MEJ) 1 (B) all Objects that were created specifically when the embedded URL was shared, 2 including the (id) and the Object Type for each Object, as well as any Key -> Value 3 Pair(s) contained in each Object; 4 (C) all Associations related to each Private Message, identified by the Source Object, 5 Association Type, and Destination Object, as well as any Key -> Value Pair(s) 6 contained in each Association; 7 (D) the database names and table names in which each Association and Object is stored; 8 (E) each application or feature in Facebook that uses the Objects or Associations created 9 10 11 12 for each Private Message; and (F) how each Object associated with the Private Message was used by Facebook. RESPONSE TO INTERROGATORY NO. 8: Facebook restates and incorporates its Preliminary Statement, General Objections, Objections 13 to “Rules of Construction,” Instructions, and Purported “Relevant Time Period” as though fully set 14 forth in this Response. Facebook further objects to this Interrogatory on the following additional 15 grounds: 16 (A) The Interrogatory is vague and ambiguous in its use of the terms and phrases 17 “Processing”; “Private Message”; “Objects”; “(id)”; “Object Type”; “Key -> Value Pair(s)”; “Objects 18 that were created specifically when the embedded URL was shared”; “Associations”; “Source 19 Object”; “Association Type”; “Destination Object”; “database names and table names”; and 20 “application or feature.” 21 (B) The Interrogatory is compound. 22 (C) The Interrogatory seeks information that is not relevant to the claims or defenses in 23 this action to the extent it concerns practices other than those challenged in this action (the alleged 24 increase in the Facebook “Like” count on a website when the URL for that website was contained in 25 a message transmitted through Facebook’s Messages product during the class period). 26 (D) The Interrogatory is vague, unduly burdensome, and overly broad in that it purports to 27 seek “all facts relating to the Processing of each Private Message sent or received by Plaintiffs 28 containing a URL.” 7 Gibson, Dunn & Crutcher LLP DEFENDANT FACEBOOK, INC.’S SUPPLEMENTAL RESPONSES AND OBJECTIONS TO PLAINTIFFS’ NARROWED SECOND SET OF INTERROGATORIES Case No. C 13-05996 PJH (MEJ) 1 2 3 (E) The Interrogatory seeks information that reflects trade secrets, confidential, and/or proprietary company information. (F) The Interrogatory exceeds the bounds of Federal Rule of Civil Procedure 33(a)(1), 4 which provides that “a party may serve on any other party no more than 25 written interrogatories, 5 including all discrete subparts.” 6 7 Subject to and without waiving the foregoing general and specific objections, and subject to the ongoing nature of discovery in this action, Facebook responds as follows: 8 Facebook refers Plaintiffs to Facebook’s Responses and Objections to Plaintiffs’ Interrogatory 9 Nos. 2, 3, and 4. Facebook also will meet and confer with Plaintiffs’ counsel to determine the proper 10 scope of this overly broad and ambiguous Interrogatory. 11 SUPPLEMENTAL RESPONSE TO INTERROGATORY NO. 8: 12 Facebook restates and incorporates its Preliminary Statement, General Objections, Objections 13 to “Rules of Construction,” Instructions, and Purported “Relevant Time Period” as though fully set 14 forth in this Response. Facebook further objects to this Interrogatory on the following additional 15 grounds: 16 (A) The Interrogatory is vague and ambiguous in its use of the terms and phrases 17 “Processing”; “Private Message”; “Objects”; “(id)”; “Object Type”; “Key -> Value Pair(s)”; “Objects 18 that were created specifically when the embedded URL was shared”; “Associations”; “Source 19 Object”; “Association Type”; “Destination Object”; “database names and table names”; and 20 “application or feature.” 21 (B) The Interrogatory is compound. 22 (C) The Interrogatory seeks information that is not relevant to the claims or defenses in 23 this action to the extent it concerns practices other than those challenged in this action (the alleged 24 increase in the Facebook “Like” count on a website when the URL for that website was contained in 25 a message transmitted through Facebook’s Messages product during the class period). 26 (D) The Interrogatory is vague, unduly burdensome, and overly broad in that it purports to 27 seek “all facts relating to the Processing of each Private Message sent or received by Plaintiffs 28 containing a URL.” 8 Gibson, Dunn & Crutcher LLP DEFENDANT FACEBOOK, INC.’S SUPPLEMENTAL RESPONSES AND OBJECTIONS TO PLAINTIFFS’ NARROWED SECOND SET OF INTERROGATORIES Case No. C 13-05996 PJH (MEJ) 1 2 3 (E) The Interrogatory seeks information that reflects trade secrets, confidential, and/or proprietary company information. (F) The Interrogatory exceeds the bounds of Federal Rule of Civil Procedure 33(a)(1), 4 which provides that “a party may serve on any other party no more than 25 written interrogatories, 5 including all discrete subparts.” 6 7 8 9 Subject to and without waiving the foregoing general and specific objections, and subject to the ongoing nature of discovery in this action, Facebook responds as follows: Facebook refers Plaintiffs to Facebook’s Responses and Objections to Plaintiffs’ Interrogatory Nos. 2, 3, and 4. Additionally, and pursuant to Rule 33(d) of the Federal Rules of Civil Procedure, 10 Facebook refers Plaintiffs to documents bearing production numbers FB000005502 through 11 FB000006175, which contain information responsive to this Interrogatory for the messages identified 12 in Plaintiffs’ letter of July 24, 2015 that could be located after a reasonable search and diligent 13 inquiry. The chart attached as Exhibit 1 identifies the production numbers of the documents that 14 correspond to the messages identified in Plaintiffs’ July 24, 2015 letter. 15 DATED: September 1, 2015 16 17 18 GIBSON, DUNN & CRUTCHER LLP By: /s/ Joshua A. Jessen Attorneys for Defendant FACEBOOK, INC. 19 20 21 22 23 24 25 26 27 28 9 Gibson, Dunn & Crutcher LLP DEFENDANT FACEBOOK, INC.’S SUPPLEMENTAL RESPONSES AND OBJECTIONS TO PLAINTIFFS’ NARROWED SECOND SET OF INTERROGATORIES Case No. C 13-05996 PJH (MEJ) Exhibit 1 HIGHLY CONFIDENTIAL – ATTORNEYS’ EYES ONLY To From Date URL 1 Production Number(s) FB000005502-FB000005527 FB000005528-FB000005574 FB000005575-FB000005576 2 FB000005577-FB000005578 3 FB000005579-FB000005600 FB000005601-FB000005646 FB000005647-FB000005648 4 FB000005649-FB000005672 FB000005673-FB000005719 FB000005720-FB000005721 5 FB000005722-FB000005749 FB000005750-FB000005797 FB000005798-FB000005799 6 FB000005800-FB000005801 7 FB000005802-FB000005826 FB000005827-FB000005879 FB000005880-FB000005881 10 Unavailable. 68 FB000005882-FB000005883 1 HIGHLY CONFIDENTIAL – ATTORNEYS’ EYES ONLY To From Date URL 89 Production Number(s) FB000005884-FB000005886 FB000005887-FB000005932 FB000005933-FB000005934 93 FB000005935-FB000005957 FB000005958-FB000006004 FB000006005-FB000006006 99 FB000006007-FB000006008 113 FB000006009-FB000006037 FB000006038-FB000006084 FB000006085-FB000006087 115 Unavailable. 123 FB000006088-FB000006089 200 FB000006090-FB000006119 FB000006120-FB000006169 FB000006170-FB000006171 410 Unavailable. 2 HIGHLY CONFIDENTIAL – ATTORNEYS’ EYES ONLY To From Date URL Production Number(s) 654 FB000006172-FB000006173 482 FB000006174-FB000006175 3 1 PROOF OF SERVICE 2 3 4 I, Ashley M. Rogers, declare as follows: I am employed in the County of Santa Clara, State of California, I am over the age of eighteen years and am not a party to this action; my business address is 1881 Page Mill Road, Palo Alto, CA 94304-1211, in said County and State. On September 1, 2015, I served the following document(s): 5 DEFENDANT FACEBOOK, INC.’S SUPPLEMENTAL RESPONSES AND OBJECTIONS TO PLAINTIFFS’ NARROWED SECOND SET OF INTERROGATORIES 6 7 on the parties stated below, by the following means of service: 8 David F. Slade dslade@cbplaw.com James Allen Carney acarney@cbplaw.com Joseph Henry Bates, III Carney Bates & Pulliam, PLLC hbates@cbplaw.com 9 10 11 12 13 Melissa Ann Gardner mgardner@lchb.com Nicholas Diamand ndiamand@lchb.com Rachel Geman rgeman@lchb.com Michael W. Sobol Lieff Cabraser Heimann & Bernstein, LLP msobol@lchb.com 14 15 16 17 18 19  BY ELECTRONIC SERVICE: On the above-mentioned date, based on a court order or an agreement of the parties to accept service by electronic transmission, I caused the documents to be sent to the persons at the electronic notification addresses as shown above.  I am employed in the office of Joshua A. Jessen and am a member of the bar of this court.  I declare under penalty of perjury that the foregoing is true and correct. 20 21 22 23 24 Executed on September 1, 2015. 25 26 /s/ Ashley M. Rogers 27 28 Gibson, Dunn & Crutcher LLP DEFENDANT FACEBOOK, INC.’S SUPPLEMENTAL RESPONSES AND OBJECTIONS TO PLAINTIFFS’ NARROWED SECOND SET OF INTERROGATORIES Case No. C 13-05996 PJH (MEJ) EXHIBIT 21 EXHIBIT 22 EXHIBIT 23 EXHIBIT 24 EXHIBIT 25 EXHIBIT 26 EXHIBIT 27 FILED UNDER SEAL EXHIBIT 28 FILED UNDER SEAL EXHIBIT 29 FILED UNDER SEAL EXHIBIT 30 FILED UNDER SEAL EXHIBIT 31 1 2 3 4 5 6 7 8 9 10 11 Michael W. Sobol (State Bar No. 194857) msobol@lchb.com Melissa Gardner (State Bar No. 289096) mgardner@lchb.com LIEFF CABRASER HEIMANN & BERNSTEIN, LLP 275 Battery Street, 29th Floor San Francisco, CA 94111-3339 Telephone: 415.956.1000 Facsimile: 415.956.1008 Rachel Geman rgeman@lchb.com Nicholas Diamand ndiamand@lchb.com LIEFF CABRASER HEIMANN & BERNSTEIN, LLP 250 Hudson Street, 8th Floor New York, NY 10013-1413 Telephone: 212.355.9500 Facsimile: 212.355.9592 16 Patrick V. Dahlstrom pdahlstrom@pomlaw.com POMERANTZ, LLP 10 S. La Salle Street Suite 3505 Chicago, Illinois 60603 Telephone: 312.377.1181 Facsimile: 312.377.1184 Hank Bates (State Bar No. 167688) hbates@cbplaw.com Allen Carney acarney@cbplaw.com David Slade dslade@cbplaw.com CARNEY BATES & PULLIAM, PLLC 11311 Arcade Drive Little Rock, AR 72212 Telephone: 501.312.8500 Facsimile: 501.312.8505 17 Jeremy A. Lieberman Lesley F. Portnoy info@pomlaw.com POMERANTZ, LLP 600 Third Avenue, 20th Floor New York, New York 10016 Telephone: 212.661.1100 Facsimile: 212.661.8665 Attorneys Plaintiffs and the Proposed Class 12 13 14 15 18 UNITED STATES DISTRICT COURT 19 NORTHERN DISTRICT OF CALIFORNIA 20 21 22 MATTHEW CAMPBELL, MICHAEL HURLEY, and DAVID SHADPOUR, on behalf of themselves and all others similarly situated, 23 Case No. C 13-5996 PJH PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT Plaintiffs, 24 v. 25 FACEBOOK, INC., 26 Defendant. 27 28 1215231.1 PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT CASE NO. C 13-5996 PJH 1 Pursuant to Rules 26 and 34 of the Federal Rules of Civil Procedure, the Plaintiffs request 2 that Defendant Facebook respond to the following requests for the production of Documents 3 (each, a “Request,” collectively the “Requests”) within thirty (30) days of service. 4 5 DEFINITIONS (a) 6 7 Inc.; Case No. C 13-5996 PJH (N. Dist. Cal.). (b) 8 9 “Action” means the case captioned Matthew Campbell and Michael Hurley v. Facebook, “Active Likes” means any Likes that were generated by Facebook Users affirmatively clicking on a Like button Social PlugIn. (c) “Architecture” refers to each piece of Facebook infrastructure – including but not limited 10 to source code, software, applications, web crawlers, hardware, and networks – utilized to 11 implement or otherwise facilitate any of Your services. 12 (d) “Communication” means the conveyance (in the form of facts, ideas, thoughts, opinions, 13 data, inquiries or otherwise) of information and includes, without limitation, 14 correspondence, memoranda, reports, presentations, face-to-face conversations, telephone 15 conversations, text messages, instant messages, voice messages, negotiations, agreements, 16 inquiries, understandings, meetings, letters, notes, telegrams, mail, email, and postings of 17 any type. 18 (e) “Complaint” means the operative Complaint in this Action. 19 (f) “Developer(s)” means Third Parties who utilize the Facebook platform to either build 20 their own applications or to incorporate the Facebook platform into their own products 21 (e.g., incorporating Facebook’s Like Social PlugIn into a website). 22 (g) “Document(s)” means all materials within the full scope of Fed. R. Civ. P. 34 including 23 but not limited to: all writings and recordings, including the originals, drafts and all non- 24 identical copies, whether different from the original by reason of any notation made on 25 such copies or otherwise (including but without limitation to, email and attachments, 26 correspondence, memoranda, notes, diaries, statistics, letters, telegrams, minutes, 27 contracts, reports, studies, checks, statements, tags, labels, invoices, brochures, 28 periodicals, receipts, returns, summaries, pamphlets, books, interoffice and intra-office 1215231.1 -2- PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT CASE NO. C 13-5996 PJH 1 Communications, instant messages, chats, offers, notations of any sort of conversations, 2 working papers, applications, permits, file wrappers, indices, telephone calls, meetings or 3 printouts, teletypes, telefax, invoices, worksheets, and all drafts, alterations, modifications, 4 changes and amendments of any of the foregoing), graphic or aural representations of any 5 kind (including without limitation, photographs, charts, microfiche, microfilm, videotape, 6 recordings, motion pictures, plans, drawings, surveys), and electronic, mechanical, 7 magnetic, optical or electric records or representations of any kind (including without 8 limitation, computer files and programs, tapes, cassettes, discs, recordings), including 9 Metadata. 10 (h) “Electronic Media” means any magnetic, optical, or other storage media device used to 11 record or access ESI including, without limitation, computer memory, hard disks, floppy 12 disks, flash memory devices, CDs, DVDs, Blu-ray disks, cloud storage (e.g., DropBox, 13 Box, OneDrive, and SharePoint), tablet computers (e.g., iPad, Kindle, Nook, and Samsung 14 Galaxy), cellular or smart phones (e.g., BlackBerry, iPhone, Samsung Galaxy), personal 15 digital assistants, magnetic tapes of all types or any other means for digital storage and/or 16 transmittal. 17 (i) “ESI” or “Electronically Stored Information” refers to information and Documents (as 18 defined within this section) within the full scope of Fed. R. Civ. P. 34 – with all Metadata 19 intact – created, manipulated, communicated, stored, and best utilized in digital form, and 20 requiring the use of Electronic Media to access. Such information includes emails, email 21 attachments, message boards, forums, support tickets, support articles, security alerts, 22 pop-ups, videos, discussion boards, data, charts, BETA results, error messages, bug 23 reports, source code, investigative reports, monitoring reports, comments, press releases, 24 drafts, models, templates, websites, instant messages, chats, and intercompany and intra- 25 company Communications. 26 (j) “Facebook User(s)” means Persons who have established a Facebook account. 27 (k) “Facebook User Data Profile(s)” means the group of data points, collected by You from 28 any source and assigned by You to specific Facebook Users, for purposes including but 1215231.1 -3- PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT CASE NO. C 13-5996 PJH 1 not limited to “bundling characteristics” and determining the potential interests of 2 Facebook Users as described in Your Data Use Policy under the heading “How 3 Advertising and Sponsored Stories Work.” 4 (l) “Identify,” with respect to Documents, means to give, to the extent known, the (a) type 5 of Document; (b) general subject matter; (c) date of the Document; (d) author(s), (e) 6 addressee(s), and (f) recipient(s). 7 (m) “Identify,” with respect to Persons, means to give, to the extent known, the Person’s full 8 name, present or last known address, and when referring to a natural person, additionally, 9 the present or last known place of employment. Once a Person has been identified in 10 accordance with this subparagraph, only the name of that Person need be listed in 11 response to subsequent discovery requesting the identification of that Person. 12 (n) “Including” means “including but not limited to” and “including without limitation.” 13 (o) “Metadata” refers to structured information about an electronic file that is embedded in 14 15 the file, describing the characteristics, origins, usage and validity the electronic file. (p) “Meeting” means the contemporaneous presence, whether in person or through any 16 means of communication, of any natural persons, whether or not such presence was by 17 chance or prearranged, and whether or not the meeting was formal or informal, or 18 occurred in connection with some other activity. 19 (q) “Motion to Dismiss” means Your motion to dismiss filed in this Action (Docket No. 29). 20 (r) “Native Format” refers to the original file format in which a particular Document or item 21 22 of ESI was created. (s) “Passive Likes” means any Likes that were not generated by Facebook Users 23 affirmatively clicking on a Like button Social PlugIn, and were instead generated as a 24 result of Facebook scanning URLs contained within Private Message (i.e., generated 25 through the behavior described in the Wall Street Journal article “How Private Are Your 26 Private Facebook Messages”). 27 (t) 28 “Person” means any natural person or any business, legal or governmental entity or association. 1215231.1 -4- PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT CASE NO. C 13-5996 PJH 1 (u) “Plaintiff” and “Plaintiffs” refer to the named plaintiffs in this Action, and any reference 2 to “Plaintiff” or “Plaintiffs” shall be construed disjunctively or conjunctively as necessary 3 in order to bring within the scope of the request all responses which otherwise might be 4 construed to be outside its scope. 5 (v) “Private Message(s)” means the portion of Facebook’s service designed to transmit 6 private messages between users – as opposed to posts – and which process is engaged by, 7 inter alia, the “Message” button on users’ profile pages or via the Messenger app. 8 (w) 9 could in any way apprise its possessor of any substance, meaning, or purport of the Private 10 11 “Private Message Content” means any data or metadata related to a Private Message that Message. (x) “Private Message Transmission” means the act or series of acts taken by Facebook 12 during the exchange of Private Messages between Facebook Users; beginning the moment 13 a Facebook User initiates the process of composing a Private Message to at least one 14 recipient Facebook User, and ending once the recipient(s) view(s) the Private Message. 15 Such act or acts include routing, delivery, processing, scanning, anti-virus and spam 16 filtration, writing of the Private Message to any server, analysis, content extraction, 17 generation of data, and generation of metadata. 18 (y) 19 20 “Process” refers to a series of discrete steps, ordered and undertaken to achieve a specific goal or set of goals that facilitate Facebook’s operation. (z) “Relate(s) o,” “Related to” or “Relating to” shall be construed to mean referring to, 21 reflecting, concerning, pertaining to or in any manner being connected with the matter 22 discussed. 23 (aa) “Targeted Advertising” means advertising purchased by Third Parties, to be delivered 24 by You to Facebook Users based upon inferences drawn from data points within Facebook 25 Users’ Data Profiles (e.g., “location,” “demographics,” “interests,” and “behaviors,” as 26 described on Your website on the page titled “How to target Facebook Ads; 27 https://www.facebook.com/business/a/online-sales/ad-targeting-details). 28 (bb) 1215231.1 “Third Party” refers to any party other than You or Plaintiffs. -5- PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT CASE NO. C 13-5996 PJH 1 (cc) “Transmission,” “Transmit,” and “Transmitting” refer to any intentional act by one 2 party which results in the possession, by at least one other party, of a Document or item of 3 ESI. Such acts include but are not limited to mailing (via the U.S. Post Office or other 4 Third Party carriers such as FedEx or UPS), faxing, emailing, hand-delivering, and 5 causing to be delivered via courier service any Document and/or, where applicable, item 6 of ESI. 7 (dd) “You,” “Your,” and “Facebook” shall mean Facebook, Inc. and any of its directors, 8 officers, employees, partners, members, representatives, agents (including attorneys, 9 accountants, consultants, investment advisors or bankers), and any other person purporting 10 to act on its behalf. In the case of business entities, these defined terms include parents, 11 subsidiaries, affiliates, predecessor entities, successor entities, divisions, departments, 12 groups, acquired entities and/or related entities or any other entity acting or purporting to 13 act on its behalf. 14 RULES OF CONSTRUCTION 15 1. The connectives “and” and “or” shall be construed either disjunctively or 16 conjunctively as necessary to bring within the scope of the discovery request all responses that 17 might otherwise be construed to be outside of its scope. 18 2. “Any,” “all,” and “each” shall be construed as any, all and each. 19 3. The singular form of a noun or pronoun includes the plural form and vice versa. 20 4. The use of any tense of any verb shall also include within its meaning all other 21 tenses of that verb. 22 23 5. A term or word defined herein is meant to include both the lower and upper case reference to such term or word. 24 6. Any headings which appear in the Requests for Production section have been 25 inserted for the purpose of convenience and ready reference. They do not purport to, and are not 26 intended to, define, limit, or extend the scope or intent of the Requests to which they pertain. 27 28 1215231.1 -6- PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT CASE NO. C 13-5996 PJH 1 INSTRUCTIONS 1. 2 You are requested to produce all Documents and ESI in Your possession, custody, 3 or control – as well as Documents and ESI that are in the possession of Your partners, officers, 4 employees, attorneys, accountants, representatives, or agents, or that are otherwise subject to 5 Your custody or control – that are described below. 2. 6 Unless otherwise indicated, the Documents and ESI to be produced include all 7 Documents and ESI prepared, sent, dated or received, or those that otherwise came into existence 8 any time during the Relevant Time Period. 3. 9 The production by one person, party, or entity of a Document or item of ESI does 10 not relieve another person, party, or entity from the obligation to produce his, her, or its own copy 11 of that Document or ESI, even if the two are identical. 4. 12 In producing Documents and ESI, You are requested to produce a copy of each 13 original Document and ESI together with a copy of all non-identical copies and drafts of that 14 Document. If the original of any Document and ESI cannot be located, a copy shall be provided 15 in lieu thereof, and shall be legible and bound or stapled in the same manner as the original. 5. 16 Documents and ESI shall be produced as they are kept in the usual course of 17 business. All Documents and ESI shall be produced with a copy of the file folder, envelope, or 18 other container in which the Documents and ESI are kept or maintained. All Documents and ESI 19 shall be produced intact in their original files, without disturbing the organization of Documents 20 and ESI employed during the conduct of the ordinary course of business and during the 21 subsequent maintenance of the Documents and ESI. 6. 22 Documents and ESI not otherwise responsive to this discovery request shall be 23 produced if such Documents and ESI mention, discuss, refer to, or explain the Documents and 24 ESI which are called for by this discovery request, or if such Documents and ESI are attached to 25 Documents and ESI called for by this discovery request and constitute routing slips, transmittal 26 memoranda, or letters, comments, evaluations or similar materials. 7. 27 28 Each Document and item of ESI requested herein is requested to be produced in its entirety and without deletion or excisions, regardless of whether You consider the entire 1215231.1 -7- PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT CASE NO. C 13-5996 PJH 1 Document or item of ESI to be relevant or responsive to this request. If You have redacted any 2 portion of a Document or item of ESI, stamp the word “redacted” on each page of the Document 3 or item of ESI that You have redacted. 4 8. If any Document or item of ESI called for by these requests is not produced in full 5 or is redacted on the ground that it is privileged or otherwise claimed to be protected against 6 production, You are requested to provide the following information with respect to each such 7 Document or item of ESI or redaction: 8 (a) its date; 9 (b) its author(s), its signatory(s) and each and every other person who prepared 10 or participated in its preparation; 11 (c) the type of Document or item of ESI it is (e.g., letter, chart, memorandum, 13 (d) a description of its subject matter and length; 14 (e) a list of those persons and entities to whom said Document(s) or item of 12 etc.); 15 ESI was disseminated, together with their last known addresses and the date or approximate date 16 on which each such person or entity received it; 17 (f) a list of all other persons to whom the contents of the Document or item of 18 ESI have been disclosed, the date such disclosure took place, the means of such disclosure, and 19 the present location of the Document or item of ESI and all copies thereof; 20 (g) 21 of ESI and all copies thereof; and 22 (h) 23 each and every person having custody or control of the Document or item the nature of the privilege or other rule of law relied upon and any facts supporting Your position in withholding production of each such Document or item of ESI. 24 9. If You assert an objection to any request, You must nonetheless respond and 25 produce any responsive Documents and ESI that are not subject to the stated objection. If You 26 object to part of a request or category, You must specify the portion of the request to which You 27 object, and must produce Documents and ESI responsive to the remaining parts of the request. 28 1215231.1 -8- PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT CASE NO. C 13-5996 PJH 1 10. Notwithstanding a claim that a Document or item of ESI is protected from 2 disclosure, any Document or item of ESI so withheld must be produced with the portion claimed 3 to be protected redacted. 4 11. If any Document or ESI is known to have existed but no longer exists, has been 5 destroyed, or is otherwise available, You must identify the Document or ESI, the reason for its 6 loss, destruction or unavailability, the name of each person known or reasonably believed by You 7 to have present possession, custody, or control of the original and any copy thereof (if 8 applicable), and a description of the disposition of each copy of the Document or ESI. 9 12. Every Request for Production herein shall be deemed a continuing discovery 10 request, and You are to supplement information which adds to or is in any way inconsistent with 11 Your initial answers to these Requests. 12 13. Plaintiffs reserve the right to propound additional discovery requests. 13 RELEVANT TIME PERIOD 14 The relevant time period for each Document Request is for September 26, 2006 through 15 the present (the “Relevant Time Period”), unless otherwise specifically indicated, and shall 16 include all Documents, ESI, and any other information that relate to such period, even though 17 prepared or published outside of the relevant time period. If a Document or item of ESI prepared 18 before this period is necessary for a correct or complete understanding of any Document or item 19 of ESI covered by a request, You must produce the earlier or subsequent Document or item of 20 ESI as well. If any Document or item of ESI is undated and the date of its preparation cannot be 21 determined, the Document or item of ESI shall be produced if otherwise responsive to the 22 production request. 23 REQUESTS FOR PRODUCTION OF DOCUMENTS 24 A. 25 26 REQUEST FOR PRODUCTION NO. 1: 27 28 Requests Related to Facebook’s Corporate Organizational Structure and Individuals Who May Possess Relevant Information All Documents and ESI showing Facebook’s organizational structure that identify all current or former Persons at Facebook (including directors, officers, employees, or contractors) 1215231.1 -9- PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT CASE NO. C 13-5996 PJH 1 who may possess knowledge relevant to this Action. 2 REQUEST FOR PRODUCTION NO. 2: 3 Documents and ESI sufficient to identify all databases, networks, or any other repositories 4 of information under Your control that may contain Documents and ESI relevant to this Action. 5 REQUEST FOR PRODUCTION NO. 3: 6 Documents and ESI sufficient to identify all methods and media utilized by Your 7 employees for inter-office (internal) Communication in the course of their work, including but not 8 limited to inter-office mail (electronic and physical), reports (electronic and physical), chats, and 9 video chats, as well as how and where such Communications are stored. 10 11 B. Requests Related to Private Message Transmission and the Like Social PlugIn REQUEST FOR PRODUCTION NO. 4: 12 All Documents and ESI sufficient to identify each Process and/or piece of Architecture 13 involved in Private Message Transmission. 14 REQUEST FOR PRODUCTION NO. 5: 15 All Documents and ESI related to each Process and/or piece of Architecture involved in 16 the scanning of Private Message Content for purposes of creating, augmenting, or otherwise 17 maintaining Facebook User Data Profiles. 18 REQUEST FOR PRODUCTION NO. 6: 19 All Documents and ESI related to each Process and/or piece of Architecture involved in 20 the acquisition of data, metadata, or other content from Private Messages, for purposes of 21 creating, augmenting, or otherwise maintaining Facebook User Data Profiles. 22 REQUEST FOR PRODUCTION NO. 7: 23 All Documents and ESI sufficient to identify each Process and/or piece of Architecture 24 involved in spam filtering. 25 REQUEST FOR PRODUCTION NO. 8: 26 27 All Documents and ESI sufficient to identify each Process and/or piece of Architecture involved in malware filtering. 28 1215231.1 - 10 - PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT CASE NO. C 13-5996 PJH 1 REQUEST FOR PRODUCTION NO. 9: 2 All Documents and ESI sufficient to identify each Process and/or piece of Architecture 3 involved in generating thumbnail/URL previews. 4 REQUEST FOR PRODUCTION NO. 10: 5 All Documents and ESI sufficient to identify each Process and/or piece of Architecture 6 involved in storing Private Messages for Facebook Users’ future review, or for any other purpose. 7 REQUEST FOR PRODUCTION NO. 11: 8 All Documents and ESI sufficient to identify each Process and/or piece of Architecture 9 involved in “protect[ing] users, the product, and the site from threats and abusive behavior,” as 10 described on page 11 of Your Motion to Dismiss. 11 REQUEST FOR PRODUCTION NO. 12: 12 All Documents and ESI sufficient to identify each Process and/or piece of Architecture 13 related to the Like Social PlugIn. 14 REQUEST FOR PRODUCTION NO. 13: 15 All Documents and ESI relating to each Process and/or piece of Architecture involved in 16 generating Passive Likes, including all Documents and ESI related to Your cessation of the 17 practice of generating Passive Likes. 18 REQUEST FOR PRODUCTION NO. 14: 19 All Documents and ESI relating to the “bug…where at times the count for the Share or 20 Like goes up by two,” identified by You in Your statement quoted in the Wall Street Journal 21 Article titled “How Private Are Your Private Facebook Messages?” and published in 22 October, 2012. 23 REQUEST FOR PRODUCTION NO. 15: 24 All Documents and ESI sufficient to identify each Process and/or piece of Architecture 25 involved in generating Active Likes. 26 REQUEST FOR PRODUCTION NO. 16: 27 28 All Documents and ESI relating to how Third Parties acquire information related to Facebook Users from the Like Social PlugIn, including information acquired by Third Parties 1215231.1 - 11 - PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT CASE NO. C 13-5996 PJH 1 when a Facebook User engages the Like Social PlugIn either via Passive Likes or Active Likes. 2 REQUEST FOR PRODUCTION NO. 17: 3 All Documents and ESI relating to how Third Parties can use information related to 4 Facebook Users from the Like Social PlugIn, including Social Graph searches of data acquired 5 through Passive Likes or Active Likes. 6 C. 7 8 Requests Related to How Facebook User Data Profiles Are Created, Augmented, and Maintained REQUEST FOR PRODUCTION NO. 18: 9 All Documents and ESI sufficient to identify each Process and/or piece of Architecture 10 involved in the creation, augmentation, or maintenance of Facebook User Data Profiles. 11 REQUEST FOR PRODUCTION NO. 19: 12 All Documents and ESI relating to how You use any Private Message Content, including 13 for purposes related to Facebook User Profiles and/or Targeted Advertising. 14 REQUEST FOR PRODUCTION NO. 20: 15 All Documents and ESI relating to the extent to which You allow Third Parties any access 16 to any Private Message Content. 17 REQUEST FOR PRODUCTION NO. 21: 18 All Documents and ESI relating to the use of Passive Likes – or any data, metadata, or 19 other information generated therefrom – as data points in Facebook User Data Profiles. 20 REQUEST FOR PRODUCTION NO. 22: 21 All Documents and ESI relating to the use of Passive Likes – or any data, metadata, or 22 other information generated therefrom – for purposes related to Targeted Advertising. 23 REQUEST FOR PRODUCTION NO. 23: 24 All Documents and ESI relating to the use of Active Likes – or any data, metadata, or 25 other information generated therefrom – as data points in Facebook User Data Profiles. 26 REQUEST FOR PRODUCTION NO. 24: 27 28 All Documents and ESI relating to the use of Active Likes – or any data, metadata, or other information generated therefrom – for purposes related to Targeted Advertising. 1215231.1 - 12 - PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT CASE NO. C 13-5996 PJH 1 2 D. Requests Related to How Facebook Obtains Consent REQUEST FOR PRODUCTION NO. 25: All Documents and ESI used by You to establish Facebook Users’ express consent to the 3 4 practices forming the basis for Plaintiffs’ Complaint. 5 REQUEST FOR PRODUCTION NO. 26: All Documents and ESI supporting the position advanced in pages 18-19 of Your Motion 6 7 to Dismiss that Facebook Users impliedly consent to the practices forming the basis for Plaintiffs’ 8 Complaint. 9 E. Requests Related to Law Enforcement Investigations, Media Investigations, and Complaints Involving Privacy Issues 10 11 REQUEST FOR PRODUCTION NO. 27: 12 All Documents and ESI related to investigations of Facebook by any governmental 13 agency (in the United States or otherwise), regulatory agency, law enforcement agency, or 14 advisory council relating to user privacy issues, including investigations by United States Federal 15 Trade Commission and the Office of the Irish Data Protection Commissioner. 16 REQUEST FOR PRODUCTION NO. 28: All Documents and ESI related to FTC MATTER/FILE NUMBER: 092 3184, In the 17 18 Matter of Facebook, Inc., a corporation, including all Documents and ESI related to 19 implementation of the business practice changes mandated by the FTC in its July 27, 2012 20 Decision and Order (“FTC Order”), and including all Documents and ESI related to the Third 21 Party, biennial assessments and reports identified on pages 6 and 7 of the FTC Order. 22 REQUEST FOR PRODUCTION NO. 29: All Documents and ESI related to – and sufficient to identify – the “dedicated team of 23 24 privacy professionals” identified on page 8 of Your Form 10-K for fiscal year ending 25 December 31, 2013, including any involvement such Persons had in matters related to (1) 26 obtaining consent of Facebook Users for Your practices implicating privacy and data use; (2) 27 Private Messages; and (3) the acts and practices described in the Complaint. 28 1215231.1 - 13 - PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT CASE NO. C 13-5996 PJH 1 REQUEST FOR PRODUCTION NO. 30: 2 All Documents and ESI related to all audits of Facebook conducted by the Office of the 3 Irish Data Protection Commissioner. 4 REQUEST FOR PRODUCTION NO. 31: 5 All Documents and ESI related to Third Parties discussing Passive Likes, including the 6 Wall Street Journal article “How Private Are Your Private Facebook Messages,” the Digital 7 Trends article “Facebook Scans Private Messages for Brand Page Mentions, Admits a Bug is 8 Boosting Likes,” and the Hacker News post “Facebook Graph API exploit that let’s [sic] you 9 pump up to 1800 ‘Likes’ in an hour.” 10 11 F. Miscellaneous Requests REQUEST FOR PRODUCTION NO. 32: 12 All Documents and ESI that You contend evidence or substantiate Your defenses in this 13 Action. 14 REQUEST FOR PRODUCTION NO. 33: 15 All Documents and ESI related to Your policies, practices, or procedures, if any, 16 regarding the retention or destruction of Documents and files, including emails, email backup or 17 archive tapes, hard drives, and corporate storage, including, without limitation, any changes or 18 modifications in such policies or practices during the Relevant Time Period. 19 REQUEST FOR PRODUCTION NO. 34: 20 All insurance policies, including any declaration pages and riders, which could be used to 21 satisfy any claim in this action. 22 REQUEST FOR PRODUCTION NO. 35: 23 A plain-English description or glossary for any and all lists, legends, codes, abbreviations, 24 collector initials, or other non-obvious terms, words, or data contained in any of the Documents 25 or ESI produced in response to any of these Requests for Production, and to the extent applicable, 26 with any of the Interrogatories served herewith. 27 REQUEST FOR PRODUCTION NO. 36: 28 For any source code related to any of these Requests, Documents and ESI sufficient to 1215231.1 - 14 - PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT CASE NO. C 13-5996 PJH 1 identify all code repositories for such source code. 2 REQUEST FOR PRODUCTION NO. 37: 3 For any source code related to any of these Requests, check in/check out histories – 4 including timestamps, version numbers, and usernames – for such source code. 5 REQUEST FOR PRODUCTION NO. 38: 6 All Documents and ESI related to any Facebook User complaints related to the practices 7 alleged in Plaintiffs’ Complaint, as well as all responses from Facebook thereto. 8 REQUEST FOR PRODUCTION NO. 39: 9 All Documents and ESI related to Your representations to Third Parties regarding the use 10 of Active and Passive Likes in marketing and/or Targeted Advertising, including but not limited 11 to form contracts, marketing materials, and internal memoranda describing the purported benefits 12 of Active and Passive Likes to Third Parties. 13 REQUEST FOR PRODUCTION NO. 40: 14 All Documents and ESI related to each Plaintiff. 15 16 17 18 19 20 21 22 23 24 25 26 27 28 1215231.1 - 15 - PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT CASE NO. C 13-5996 PJH 1 Dated: January 26, 2015 2 Respectfully submitted, LIEFF CABRASER HEIMANN & BERNSTEIN, LLP 3 4 By: 5 Michael W. Sobol (State Bar No. 194857) msobol@lchb.com Melissa Gardner (State Bar No. 289096) mgardner@lchb.com LIEFF CABRASER HEIMANN & BERNSTEIN, LLP 275 Battery Street, 29th Floor San Francisco, CA 94111-3339 Telephone: 415.956.1000 Facsimile: 415.956.1008 6 7 8 9 10 /s/ Michael W. Sobol Rachel Geman rgeman@lchb.com Nicholas Diamand ndiamand@lchb.com LIEFF CABRASER HEIMANN & BERNSTEIN, LLP 250 Hudson Street, 8th Floor New York, NY 10013-1413 Telephone: 212.355.9500 Facsimile: 212.355.9592 11 12 13 14 15 20 Hank Bates (State Bar No. 167688) hbates@cbplaw.com Allen Carney acarney@cbplaw.com David Slade dslade@cbplaw.com CARNEY BATES & PULLIAM, PLLC 11311 Arcade Drive Little Rock, AR 72212 Telephone: 501.312.8500 Facsimile: 501.312.8505 21 Attorneys for Plaintiffs and the Proposed Class 16 17 18 19 22 23 24 25 26 27 28 1215231.1 - 16 - PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT CASE NO. C 13-5996 PJH 1 2 3 4 5 6 7 8 9 10 11 Michael W. Sobol (State Bar No. 194857) msobol@lchb.com Melissa Gardner (State Bar No. 289096) mgardner@lchb.com LIEFF CABRASER HEIMANN & BERNSTEIN, LLP 275 Battery Street, 29th Floor San Francisco, CA 94111-3339 Telephone: 415.956.1000 Facsimile: 415.956.1008 Rachel Geman rgeman@lchb.com Nicholas Diamand ndiamand@lchb.com LIEFF CABRASER HEIMANN & BERNSTEIN, LLP 250 Hudson Street, 8th Floor New York, NY 10013-1413 Telephone: 212.355.9500 Facsimile: 212.355.9592 16 Patrick V. Dahlstrom pdahlstrom@pomlaw.com POMERANTZ, LLP 10 S. La Salle Street Suite 3505 Chicago, Illinois 60603 Telephone: 312.377.1181 Facsimile: 312.377.1184 Hank Bates (State Bar No. 167688) hbates@cbplaw.com Allen Carney acarney@cbplaw.com David Slade dslade@cbplaw.com CARNEY BATES & PULLIAM, PLLC 11311 Arcade Drive Little Rock, AR 72212 Telephone: 501.312.8500 Facsimile: 501.312.8505 17 Jeremy A. Lieberman Lesley F. Portnoy info@pomlaw.com POMERANTZ, LLP 600 Third Avenue, 20th Floor New York, New York 10016 Telephone: 212.661.1100 Facsimile: 212.661.8665 Attorneys Plaintiffs and the Proposed Class 12 13 14 15 18 UNITED STATES DISTRICT COURT 19 NORTHERN DISTRICT OF CALIFORNIA 20 21 22 MATTHEW CAMPBELL, MICHAEL HURLEY, and DAVID SHADPOUR, on behalf of themselves and all others similarly situated, Case No. C 13-5996 PJH PROOF OF SERVICE BY EMAIL AND U.S. MAIL 23 Plaintiffs, 24 v. 25 FACEBOOK, INC., 26 Defendant. 27 28 1215231.1 - 17 - PROOF OF SERVICE BY EMAIL AND U.S. MAIL CASE NO. C 13-5996 PJH 1 I am a citizen of the United States and employed in San Francisco County, California. I 2 am over the age of eighteen years and not a party to the within-entitled action. My business 3 address is 275 Battery Street, 29th Floor, San Francisco, California 94111-3339. 4 I am readily familiar with Lieff, Cabraser, Heimann & Bernstein, LLP’s practice for 5 collection and processing of documents for service via email, and that practice is that the 6 documents are attached to an email and sent to the recipient’s email account. 7 I am also readily familiar with this firm’s practice for collection and processing of 8 correspondence for mailing with the United States Postal Service. Following ordinary business 9 practices, the envelope was sealed and placed for collection and mailing on this date, and would, 10 in the ordinary course of business, be deposited with the United States Postal Service on this date. 11 On January 26, 2015, I caused to be served copies of the following documents: 12 1. PLAINTIFFS’ FIRST SET OF REQUESTS FOR PRODUCTION OF DOCUMENTS TO DEFENDANT; and this 2. PROOF OF SERVICE BY EMAIL AND U.S. MAIL 13 14 15 on the following parties in this action through their respective counsel: 16 Christopher Chorba Gibson, Dunn & Crutcher LLP 333 South Grand Avenue Los Angeles, CA 90071-3197 Email: cchorba@gibsondunn.com 17 18 19 Joshua Aaron Jessen Gibson Dunn & Crutcher LLP 3161 Michelson Drive, Suite 1200 Irvine, CA 92612 Email: jjessen@gibsondunn.com 20 21 22 Executed on January 26, 2015, at San Francisco, California. 23 /s/ David T. Rudolph David T. Rudolph 24 25 26 27 28 1215231.1 - 18 - PROOF OF SERVICE BY EMAIL AND U.S. MAIL CASE NO. C 13-5996 PJH Joshua A. Jessen Direct: +1 949.451.4114 Fax: +1 949.475.4741 JJessen@gibsondunn.com Client: 30993-00028 April 10, 2015 VIA ELECTRONIC MAIL Hank Bates, Esq. Carney Bates & Pulliam, PLLC 2800 Cantrell Road, Suite 510 Little Rock, AR 72202 Re: Campbell v. Facebook, Inc., N.D. Cal. Case No. 13-cv-05996-PJH Dear Hank: Thank you for your letter of April 7, 2015, in which you indicate that Plaintiffs are willing to “table” or narrow several of their requests for production. We agree that Plaintiffs’ Request for Production Nos. 12, 15, 18, 23, and 24, which seek broad categories of documents unrelated to the practice challenged by Plaintiffs in this case, should be withdrawn. With respect to Plaintiffs’ proposed narrowed requests (Request for Production Nos. 16, 17, 27, 28, 29, and 30), we are discussing the proposal with our client and will let you know our position shortly. With respect to Request No. 29, please be advised that there is no specific list of the “dedicated team of privacy professionals” referenced in the Request, but we have already agreed to conduct a reasonable search for non-privileged documents sufficient to identify Facebook’s current and former employees who may possess knowledge relevant to the practice challenged in this action, and we also have identified witnesses with relevant knowledge in Facebook’s Initial Disclosures and responses to Plaintiffs’ Interrogatories. Finally, with respect to the “Relevant Time Period” proposed in your letter (April 1, 2010 to December 30, 2013), we also are discussing that proposal with our client. To inform our decision, it would be helpful if Plaintiffs could articulate why they believe they are entitled to documents after October 2012. Plaintiffs allege in their Complaint that “Facebook ceased [its] [allegedly] illegal practice at some point after it was exposed in October 2012.” Dkt. No. 25 ¶ 59 n.3. We understand that Plaintiffs need to confirm the October 2012 date through discovery (which Facebook will provide), but apart from that confirmation, it is unclear to us why Plaintiffs need any documents after that time period. Similarly, it would be helpful if Plaintiffs could articulate why they believe they are entitled to documents before Hank Bates, Esq. April 10, 2015 Page 2 the start of the proposed class period (December 30, 2011) and why Plaintiffs propose April 2010 as the start date. We look forward to discussing these issues with you further next week. Sincerely, Joshua A. Jessen EXHIBIT 33 1 2 3 4 5 6 7 Michael W. Sobol (State Bar No. 194857) msobol@lchb.com David T. Rudolph (State Bar No. 233457) drudolph@lchb.com Melissa Gardner (State Bar No. 289096) mgardner@lchb.com LIEFF CABRASER HEIMANN & BERNSTEIN, LLP 275 Battery Street, 29th Floor San Francisco, CA 94111-3339 Telephone: 415.956.1000 Facsimile: 415.956.1008 12 Hank Bates (State Bar No. 167688) hbates@cbplaw.com Allen Carney acarney@cbplaw.com David Slade dslade@cbplaw.com CARNEY BATES & PULLIAM, PLLC 11311 Arcade Drive Little Rock, AR 72212 Telephone: 501.312.8500 Facsimile: 501.312.8505 13 Attorneys for Plaintiffs and the Proposed Class 8 9 10 11 14 15 UNITED STATES DISTRICT COURT 16 NORTHERN DISTRICT OF CALIFORNIA 17 18 19 MATTHEW CAMPBELL and MICHAEL HURLEY, on behalf of themselves and all others similarly situated, Plaintiff, 20 Case No. C 13-05996 PJH (MEJ) REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION 21 v. Judge: Honorable Phyllis J. Hamilton 22 FACEBOOK, INC., HEARING Date: March 16, 2016 Time: 9:00 a.m. Place: Courtroom 3, 3rd Floor | The Honorable Phyllis J. Hamilton 23 24 Defendant. 25 26 27 28 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 2 I. Experience and Qualifications 1. I am a professional economist and have over 30 years’ experience in applied and 3 theoretical economics. In the course of this experience, I have been a consultant, a university 4 professor, and a business manager. Both my undergraduate and post-graduate degrees are in 5 economics, the latter with a concentration in econometrics. Econometrics is the application of 6 mathematics, statistical methods, and computer science to economic data. Since 2004, I have 7 specialized in the analysis and valuation of intellectual property and intangible assets. Currently I 8 am a member and Chief Economist of IPmetrics LLC, an intellectual property consulting firm. 9 2. During the past ten years, I have undertaken a plurality of valuation engagements 10 where I have appraised the value of a variety of intangible assets in several contexts, such as for 11 licensing and transaction rate setting, for loan collateral analysis, and generally to assist in the 12 decision making process regarding the economic role of intangible assets, including intellectual 13 property. I also regularly give presentations and write about valuation techniques as applicable to 14 intangibles, and have co-designed and taught the course “Valuing Intangible Assets for 15 Litigation” for the National Association of Valuation Analysts. 16 3. Additionally, I have served as a consultant on numerous cases involving 17 intellectual property infringement contract issues and contractual disputes. I have prepared over 18 50 expert reports and have trial, arbitration, and deposition experience as an expert witness on 19 behalf of both plaintiffs and defendants. I have experience in complex commercial litigation 20 cases nationally. I currently consult with and have consulted with clients in California, New 21 York, Texas, Colorado, and Florida. 22 4. In the course of my career, I have observed the evolution of online social networks 23 and advertising, both as a business owner and as an economist. In the vast majority of intellectual 24 property infringement cases I have worked on, online advertising and the leverage of information 25 to support such activity play a central role. I have long studied and analyzed how online 26 advertising works as well as the nature of the markets that evolve out of, and are supported by, 27 the internet. Understanding these markets has been enabled not only by my education in 28 economics, but also been informed by my knowledge of programming acquired first in college as 1 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 a tool for the analysis of economic phenomena, and later in my professional life having developed 2 a financial statement analysis and forecasting software system,1 and an inventory and billing 3 management system for an acute care hospital.2 4 5. In recent years, I have been called upon to testify in cases where the intersection of 5 social media and advertising has been alleged to have breached rights and principles of privacy, 6 publicity, trademarks, and patents. In some cases, the issues I have reported on for the courts 7 were the benefits derived by the social media/advertising platform infringing the rights of 8 publicity of a class of users,3 while in others the issue has been the economic value of social 9 media marketing in sustaining the viability of traditional media properties.4 Moreover, many 10 trademark infringement and trade secret cases also tend to involve the analysis and assessment of 11 online advertising activity.5 12 6. I am being compensated for my work in this case at the rate of $375 per hour. 13 Attached hereto as Exhibit A is a copy of my most current curriculum vitae setting forth in detail 14 my qualifications and experience. 15 II. 16 Introduction, Assignment, and Summary of Conclusions 7. The Plaintiffs’ Consolidated Amended Class Action Complaint (the “CAC”)6 17 alleges that Facebook utilizes information surreptitiously gathered from purportedly “private” 18 correspondence sent between Facebook users, and uses that information in a number of ways, 19 including: 20 21 22 23 24 25 26 27 28 1 The software system was distributed to the nearly 500 nationalized industrial companies in Mexico to coordinate budgeting and for which I received a Diploma for Public Service from the Federal Government of Mexico in 1988. 2 Developed for a private hospital in 1991 in Ensenada, Baja California, Mexico. 3 In: Fraley et al. v. Facebook, Inc., case 11-1726 before the USDC for the Northern District of California. 4 In: S. Mattocks v. Black Entertainment Television, LLC, case 13-61582 before the USDC for the Southern District of Florida. 5 In, e.g., Gen. C.E. Yeager v. Aviat Aircraft Inc. and S. Horne, case 10-CV-2055 before the USDC for the Eastern District of California; Laserfiche v. SAP A.G., case 10-7843 (USDC for the Central District of California); and Estate of Michael Jackson, et al., v. Howard Mann, et al., case 11-cv-584 (USDC for the Central District of California). 6 Consolidated Amended Class Action Complaint, filed April 25, 2014. 2 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 a. to increment the “Like” counts of third party websites that installed Facebook’s “Like” button social plug-in until, on information and belief, at least October 2012;7 2 3 b. to catalogue information about specific URLs that were shared and use that information for targeted advertising or other purposes;8 and 4 5 c. to catalogue information about Facebook users who shared such URLs and use that information for targeted advertising or other purposes.9 6 8. 7 According to the CAC, the putative Class Period began on December 30, 2011.10 8 11 9 9. 10 11 Class: 12 All natural-person Facebook users located within the United States who have sent, or received from a Facebook user, private messages that included URLs in their content , from within two years before the filing of this action up through the date of class certification. 13 14 10. 15 16 I further understand that the Plaintiffs are seeking certification of the following In this context, I have been asked to analyze the following questions with regard to the Class defined above: 17 a. Is there proof common to the proposed Class capable of showing that—and how much—Facebook profited or otherwise benefited from the Electronic Communications Privacy Act (“ECPA”) and the California Invasion of Privacy Act (“CIPA”) violations alleged in the CAC? 18 19 20 b. Is there a reliable Class-wide or formulaic method capable of quantifying the amount of such profits or value of such benefits to Facebook and of allocating those profits to the Class? 21 11. 22 Based upon my work to date, I have reached the following conclusions:12 23 24 25 26 27 28 7 Id. at §§27, 39. E.g., Id. at §86. 9 E.g., Id. at §30. 10 Id. at §59. 11 Id. at §§27, 39. 12 It is, of course, possible that with additional information, including production from Facebook, and inputs, these conclusions could be refined. The list of documents I have considered in forming my opinions is attached to this report as Exhibit B. 8 3 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 a. There is evidence common to the Class capable of showing that Facebook profited or otherwise benefited from the scanning alleged to violate ECPA and CIPA in the CAC. Specifically, as explained in the body of this report, I have concluded that the profits or other unjustly-obtained benefits may be analyzed and quantified based upon Facebook’s records without reference to individual proof with respect to any member of the Class, such Class membership being identifiable and ascertainable based upon Facebook’s records. 2 3 4 5 6 b. Class-wide evidence capable of showing profits or other benefits to Facebook falls into two categories (1) evidence concerning Facebook’s use of information derived from private messages by creating associations within Facebook’s Social Graph (described in more detail below); and (2) evidence concerning Facebook’s profits or other benefits resulting from its campaign to encourage third-party websites (“Marketers”) to install the Facebook Like button, of which, as alleged, Facebook’s unlawful scanning was an integral part. 7 8 9 10 11 c. Standard economic methods are capable of reliably quantifying the aggregate amount of profits to Facebook, and the aggregate value of other benefits to Facebook that resulted from scanning and subsequent uses or potential uses of the information derived therefrom. 12 13 14 d. The damages calculated are based on the economic benefits the Defendant received from the information intercepted from the private messages sent by the Class members. Facebook benefits from advertising revenue from adding the intercepted user-URL links into their targeting platform and from enhancing their understanding of how and what users share links to. The benefit is defined not only by the potential act of generating additional revenue from targeting ads to the senders of intercepted messages, but also by the additional use in better targeting these and similar users (in marketing terms); and the benefit is ultimately proportional to the number of URLs intercepted from private messages. 15 16 17 18 19 20 III. Case Background 21 A. Facebook, Inc. 12. Facebook operates the world’s largest social marketing and information platform. 22 23 24 25 26 27 28 The social network side of the business has over 1.5 billion users around the world.13 On August 13 Measured as monthly active users (“MAUs”), which Facebook defines as “a registered Facebook user who logged in and visited Facebook through our website or a mobile device, used our Messenger app, or took an action to share content or activity with his or her Facebook friends or connections via a third-party website or application that is integrated with Facebook, in the last 30 days as of the date of measurement” (Facebook, 2014 10-K Page 35). Current MAUs from: Facebook, Inc.’s 2015 Q3 Earnings Report (November 4, 2015) Slide 5. At http://investor.fb.com/results.cfm. 4 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 24, 2015, 1 in 7 people on Earth used Facebook,14 which is equivalent to approximately 51% of 2 all internet users worldwide.15 In the U.S. and Canada, there are currently 217 million (monthly 3 active) users16 which represent 61% of 357 million people in the region.17 Facebook’s advertising 4 network generates revenue in excess of $1.4 billion monthly,18 49.3% of which is attributable to 5 users in the U.S. and Canada.19 Furthermore, Facebook’s most recent disclosure states that, in the 6 U.S. and Canada, Facebook users performed advertising revenue-generating activities at a rate of 7 $9.86 per quarter per user.20 8 9 13. Facebook’s online social networking service allows users to communicate through the sharing of text, photograph, video, and internet content. In addition, these activities are 10 supported by a variety of Facebook applications on mobile devices, including Facebook 11 Messenger, Instagram and WhatsApp.21 While Facebook positions its business as focused on 12 “creating value for people, [M]arketers, and developers,” it generates the bulk of its revenues 13 from the latter two categories and then principally to the degree they want to reach the former. 14 14. Facebook represents a significant opportunity for Marketers due to the 15 combination of the size of the user base and the abundance of rich user data.22 Thus, access to the 16 wealth of information captured on Facebook enables advertisers to reach people across devices 17 18 19 20 21 22 23 24 25 26 27 28 14 Facebook CEO Mark Zuckerberg’s public post on Facebook.com of August 27, 2015, at: (https://www.facebook.com/zuck/posts/10102329188394581). 15 Based on the current estimate of worldwide internet users of 2.919 billion people (14.04 million in the USA) according to the Wolfram|Alpha Knowledgebase, using data from the World Bank (http://www.wolframalpha.com/ accessed 10/26/15). 16 Facebook, Inc.’s 2015 Q3 Earnings Report, Slide 5 (op cit.). 17 According to U.S. Census projections (321.37 million people in the USA in July 2015) and Statistics Canada estimates (35.85 million people in Canada in July 2015) [In: http://www.census.gov/population/projections/data/national/2014/summarytables.html, and http://www.statcan.gc.ca/pub/91-002-x/2015002/t002-eng.pdf]. 18 Facebook, Inc.’s 2015 Q3 Earnings Report, Slide 8 (op cit.), quarterly data divided by three. 19 Facebook, Inc.’s 2015 Q2 Earnings Report, Slide 10 (op cit.). 20 This is the ratio of quarterly revenue to monthly active users per Facebook, Inc.’s 2015 Q3 Earnings Report, Slide 12 (op. cit.). 21 Facebook, 2014 10-K Page 5 (User and Revenue data cited above do not include Instagram or WhatsApp users). 22 As expressed by Facebook’s Adam Isserlis, Manager, Corporate Communications, Ads/Monetization; Colleen Coulter, Product Marketing Communications Manager, in “IAB Social Media Buyers Guide” available on the Interactive Advertising Bureau website (http://www.iab.net/socialmediabuyersguide). 5 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 and, importantly, to effectively measure the impact of their advertising. In its public disclosures, 2 Facebook emphasizes that the platform creates value for Marketers by its unique combination of: 3 a. Reach, with over a billion and a half monthly active users in 2015;23 4 b. Relevance, supporting ad targeting by rich demographics and interests data plus Marketers’ and third party data cross referencing;24 5 6 c. Social Context, by providing information to leverage recommendations from friends;25 and, 7 8 d. Engagement, with ad products prompting interaction and sharing.26 9 10 15. In this report, I will refer to advertisers that use Facebook’s website and the 11 corresponding development tools to leverage the targeted access to the massive user base as 12 ‘Facebook Marketers’ or simply ‘Marketers.’ 13 16. Facebook also represents an important platform for software developers by 14 providing access to a substantial user base, a payment management mechanism, and analytical 15 information about the use of applications.27 16 17. Facebook has built a dominant position in the social networking market and, as 17 such, attracts a significant amount of consumers’ time and attention. According to the Business 18 Intelligence Report on Social Engagement, in 2013 Americans spent an average of 37 minutes 19 daily on social media, a higher time-spend than any other major internet activity, including 20 email.28 More recently, Facebook claims that “when it comes to time spent by users of the 21 platform, across Facebook, Messenger and Instagram, people are now spending more than 46 22 minutes per day on average.”29 This amount of attention is leveraged by Facebook in providing 23 23 24 25 26 27 28 Facebook, Inc.’s 2015 Q3 Earnings Report, Slide 5 (op cit.). and Facebook, Inc. Form 10K 2012, p. 7. 24 Facebook, Inc. Form 10K 2012, p. 7. 25 Id., p. 8. 26 Id. 27 Facebook for Developers website: https://developers.facebook.com/. 28 Business Insider, Business Intelligence Report on Social Engagement (http://www.businessinsider.com/social-media-engagement-statistics-2013-12). 29 Mark Zuckerberg’s remarks during the Second Quarter, 2015 Earnings Call (page 1 of the Footnote continued on next page 6 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 Marketers access to a relevant and sizable audience, and now constitutes the company’s 2 overwhelming source of revenue; currently, advertising accounts for 95.5% of Facebook’s 3 revenue.30 4 18. From an economic perspective, Facebook is thus a platform business and operates 5 a two-sided market. That is, much like broadcast television and terrestrial radio in the past,31 6 Facebook essentially sells to Marketers access to “the thoughts and emotions” of an audience 7 aggregated on the basis of providing online social media products and user-generated content to 8 “users,” rather than simply the transmission of content. In sharp contrast to broadcast media, with 9 Facebook the access is readily measurable and the advertising messages finely targeted and 10 distributed. Thus, essentially, on one side of the market Facebook accrues users providing online 11 products,32 and on the other it sells advertising placements to Marketers. Furthermore, on the 12 user acquisition side, Facebook competes with other social media offerings, such as Twitter and 13 Google+, and with other online activities (including news and video reading/watching). Further, 14 Facebook is developing the platform as a portal through which users can access news,33 discover 15 content by searching,34 and incorporate more and more online activities.35 On the advertising 16 sales side, Facebook competes with both online advertising outlets, such as Google AdWords and 17 DoubleClick,36 and off-line advertising media (including traditional broadcast TV and print 18 advertising). Facebook’s competitive advantage stems from the power of leveraging the deep 19 Footnote continued from previous page transcript) held on July 29, 2015. Available at: http://investor.fb.com/results.cfm. 30 Facebook, Inc.’s 2015 Q3 Earnings Report, Slide 8 (op cit.). 31 See, inter alia, Ch. 7-Broadcasting in: H. Vogel, Entertainment Industry Economics, Cambridge University Press, 8th Ed., 2011. 32 As a company, these products now include Instagram and WhatsApp, expanding the original Facebook and then Messenger products. Facebook, 2014 10-K, p. 5. 33 For example, with the introduction of the “Instant Articles” initiative and new deals with publishers like the Washington Post (http://media.fb.com/2015/05/12/instantarticles/). 34 E.g., with expanding the power of Facebook search (http://newsroom.fb.com/news/2015/10/search-fyi-find-what-the-world-is-saying-with-facebooksearch/). 35 Such as video, with video hosting and action tracking (http://newsroom.fb.com/news/2015/06/news-feed-fyi-taking-into-account-more-actions-onvideos/), app acquisitions like Instagram and WhatsApp, and with plugins to track activities outside of Facebook. 36 See Google Products and Advertising Platforms (www.thinkwithgoogle.com/products/). 20 21 22 23 24 25 26 27 28 7 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 targeting knowledge available from its unique access to an increasingly complete and 2 computerized social network, including by tracking users beyond the Facebook.com website. 3 Consequently, the two activities, providing online social networking services and selling 4 advertising, are inextricably connected; the profit motive permeates both sides of the operation. 5 19. Facebook competes for advertising expenditures, among other means, by 6 differentiating its platform from competitors’ as the most effective because of the unique ability 7 to leverage the Social Graph, described in more detail below. Researchers in the field of social 8 and economic networks have noted specifically that they “…find evidence that social advertising 9 is effective, and that this efficacy seems to stem mainly from the ability of targeting based on 10 social networks to uncover similarly responsive consumers.”37 In practice, the superior 11 effectiveness of advertising on this basis is demonstrated by the increasing click-through rates 12 (“CTR”) of ads placed through Facebook as opposed to ads placed through Google’s display 13 network.38 14 B. The Social Graph 15 20. The main way in which individual Facebook users knowingly connect with each 16 other is by selecting the “Friend” button to add them to their network. The main way users 17 knowingly interact with brands that have Facebook pages is to select the “Like” button so a 18 “fan”39 link is created allowing the Facebook page’s posts to appear on each fan’s home page (on 19 the “news stream” of posts from friends and liked pages). Facebook also creates connections that 20 users may not be aware of. For example, beyond the Facebook.com website or applications, users’ 21 browsing and other activities are also able to be logged using cookies,40 pixels41 and similar 22 23 24 25 26 27 28 37 C. Tucker, “Social Advertising,” February 15, 2012, SSRN (http://ssrn.com/abstract=1975897). Since mid-2014 Facebook CTRs have increased by 35% vis-à-vis a 25% increase on Google’s network, according to the latest “Digital Advertising Report Q3 2015”, Adobe Digital Index (www.cmo.com/adobe-digital-index.html), p.18. 39 In Facebook marketing, while it is natural to speak of a “Friend” of a person, the equivalent for brands is to use “Fan” instead, although they may also be used interchangeably. 40 Cookies are small files that are stored on the user’s device by the website or application being used and some ads being viewed. 41 Pixel tags in this context are also called clear GIFs, web beacons, or pixels and are small blocks of code on a webpage or application that allow them to perform actions such as read and place cookies and transmit information to Facebook or its partners. 38 8 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 internet technologies.42 The resulting information is used in delivering targeted advertising and 2 refining the information represented on the Social Graph. 3 21. Facebook’s Social Graph represents the integration of information collected by 4 Facebook about Facebook users, and encompasses their location, demographics, interests, 5 behaviors, and connections, in order to target advertising and marketing communications to 6 specific groups of users identified by these attributes.43 7 22. Figure 1 illustrates one hypothetical user on the social network (at the center), 8 technically referred to as a “node.” This user is connected to two friends by lines called “edges,” 9 has “Liked” a page (For the F8 Developers Conference, illustrated by its logo on the upper right 10 corner), is interested in cooking (link labeled “cook”), has watched a video on Netflix (bottom 11 right link), and has listened to music on Spotify (middle left link). 12 Figure 1 Facebook Social Graph Illustration44 13 14 15 16 17 18 19 20 21 22 23 24 42 25 26 27 28 See also https://www.facebook.com/help/cookies/. Although the term is borrowed from Mathematics and Sociology, it was introduced in the Facebook context by Mark Zuckerberg during the 2007 F8 Developers Conference on May 24, 2007. 44 From Business Insider (http://static3.businessinsider.com/image/4f5112e169bedd1526000061/facebook-opengraph.jpg). 43 9 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 23. Figure 1 is a partial visual representation of the Social Graph. In practice, the 2 information contained in the Social Graph is stored in a (complex and distributed) database. The 3 data model Facebook utilizes is called TAO (The Objects and Associations).45 The constituent 4 parts of this model – illustrated above – are Objects (representing the “nodes,” or data items, such 5 as a user or a location) and Associations (representing the “edges,” or relationships between 6 Objects). 7 24. Thus, as illustrated, even activities (accessing pages, clicking on Like or Share 8 buttons) performed on websites or applications outside of Facebook can, and are, represented in 9 the Social Graph. Granting controlled access and writing abilities to this wealth of information to 10 registered developers, on April 21, 2010, Facebook released the Open Graph Protocol,46 which 11 enables any web page to become a rich object in a Social Graph, and the Graph API,47 which is 12 the primary way for apps to read and write to the Facebook Social Graph.48 Facebook builds and 13 maintains full access to the full Social Graph leveraging its own record of users’ connections 14 behind-the-scenes. 15 C. The Like Button 16 25. Facebook social plugins, such as the “Like” Button, are lines of code that third- 17 party websites can integrate into their sites, which display a Facebook logo and execute the 18 programmed code when the page is accessed and/or a Facebook user clicks on it.49 Facebook first 19 implemented the Like Button in or around February 200950 and, in Facebook’s F8 conference in 20 21 22 23 24 25 26 27 28 45 See https://www.facebook.com/notes/facebook-engineering/tao-the-power-of-thegraph/10151525983993920 46 The Open Graph protocol is programming code used on Facebook to allow any web page to have the same functionality as any other object on Facebook. See Open Graph Protocol open source website (http://ogp.me/). 47 API, or “Application Programming Interface,” is the code that a third party may utilize to build software on top of Facebook’s platform. Through Facebook’s API, the third party product is able to utilize parts of Facebook’s code (and access certain tranches of Facebook’s data) for its functionality. 48 See https://developers.facebook.com/docs/graph-api. 49 Facebook SDK Documentation (https://developers.facebook.com/docs/javascript/quickstart/v2.5#plugins). 50 J. Kincaid in: TechCrunch (http://techcrunch.com/2009/02/09/facebook-activates-like-buttonfriendfeed-tires-of-sincere-flattery/). 10 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 2010, it was opened up for third party developers for marketing and application development 2 uses.51 3 26. As illustrated in Figure 1 above, a Like becomes a Social Graph connection 4 between a user and a Marketer that has installed a Facebook Social plug-in.52 Generally speaking, 5 “Liking” a “Page” means the user is connecting to that Page, and “Liking” in reference to a post 6 from a friend, which means the user is letting that friend (or friend of a friend) know that the user 7 “likes” his or her post (without leaving an explicit comment).53 The first is a link between a user 8 and a Marketer, the second is a link among users. The “Likes” recorded as a result of scanning 9 private messages addressed in this case are of the first type. 10 27. Facebook developed social plug-ins, such as the “Like” button to continue 11 expanding its network by affiliating with Marketers or third party websites. Social plug-ins 12 enable advertisers and Marketers to integrate user activity inside and outside of the Facebook 13 website. The initial performance metric for these advertising activities was the number of 14 “Likes” associated with a company within Facebook and, increasingly, outside of Facebook on 15 Marketers’ websites. 16 17 28. Figure 2 below is an illustration from Facebook materials addressed to Marketers on the benefits of using social plugins. 18 19 20 21 22 23 24 25 26 51 27 28 Facebook F8 April 21, 2010. Facebook, Social Plugins FAQs, at: https://developers.facebook.com/docs/plugins/faqs/#ref. 53 See Facebook Help Center at: https://www.facebook.com/help/228578620490361. 52 11 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 2 3 4 5 6 7 8 9 10 11 29. Facebook is well aware of the power of the Like button to generate actionable signals for advertisers.54 From its launch in April 2010, 12 .55 13 30. Facebook has promoted this social plug-in aggressively to third-party websites by, 14 for instance, taking control of News Feed content.56 In turn, Marketers that wished to maintain 15 their reach via the social network had to respond by increasing the integration of Facebook into 16 their marketing strategies and budgets.57 17 D. The Alleged Violations 18 31. Facebook published a privacy policy and posted descriptions of Facebook’s 19 private messaging service claiming it would provide a way to communicate privately and that the 20 messages would be private.58 21 22 54 According to internal communications produced in discovery, for example, Facebook personnel sought 23 24 25 26 27 28 (FB000011746). 55 According to Defendant’s internal communications (FB000011715-6). 56 See Facebook Media, “An Update to News Feed: What it Means for Businesses” (https://www.facebook.com/business/news/update-to-facebook-news-feed) and “News Feed FYI: Balancing Content from Friends and Pages” (http://media.fb.com/2015/04/21/news-feed-fyibalancing-content-from-friends-and-pages/). 57 See, e.g., MarketingLand (http://marketingland.com/facebooks-latest-tweaks-favor-friendscould-hurt-page-reach-125931). 58 CAC, at §§21-24. 12 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 32. The CAC alleges that Facebook actually scanned the content of private messages 2 and used information concerning any URLs contained within the messages to artificially increase 3 the appearance of user engagement with third-party websites by increasing the count on such 4 sites’ Like buttons, as well as for other, undisclosed, purposes.59 5 33. Additionally, 6 7 .60 8 9 34. Consequently, in the context addressed in the background section, the following 10 methodological discussion addresses two distinct aspects of how Facebook benefited from the 11 accused actions: 12 a. Benefits from the additional information that enhances the Social Graph as a means to increase advertising revenue and profits; and, 13 14 b. Benefits from artificially increasing the “Like Count” on third party websites using Facebook social plugins,61 because it enhances clients’ impression of how effective Facebook Marketing is and incentivizes Marketers’ willingness to invest in Facebook Marketing. 15 16 17 18 19 20 21 22 23 24 25 26 27 28 59 URL stands for Uniform Resource Locator, the unique identifier of each document on the internet. Defined initially by Tim Berners-Lee in: “Uniform Resource Locators (URL): A Syntax for the Expression of Access Information of Objects on the Network” (March 1994) in: http://www.w3.org/Addressing/URL/url-spec.txt. 60 CAC at §§25-26. 61 At least up to the end of 2012. 13 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 IV. The Measure of Damages 2 A. Benefits Resulting from Enhancing the Social Graph by Incorporating Intercepted Data. 35. As discussed below, the incremental value of Facebook’s benefits from enhancing 3 4 5 the Social Graph by including data intercepted in private messages can be calculated on a per 6 URL link basis. This incremental profit from Facebook’s accused behavior can be calculated by 7 utilizing the corresponding inputs and the algorithm discussed in this section. 8 9 36. It is not disputed that Facebook’s Social Graph is a valuable asset. The value fundamentally arises from the aggregation of the collected information from all users in general, 10 as well as from the information intercepted from the Class members’ private messages. By its 11 actions, Facebook has denied Class members the ability to restrict access to elements of 12 information about them (URL links) and is profitably utilizing the information by enhancing the 13 value of its own social media advertising platform, which helps Facebook maintain and grow its 14 market share in the face of competition. Thus, by gathering data from Class members as alleged 15 by Plaintiffs, Facebook directly benefits by enhancing the informational content and targeting 16 power of their key revenue-generating asset: the Social Graph. 17 37. The more nuanced the data and the inferences that can be drawn from it, the more 18 effective Facebook marketing becomes and the greater the share of advertising revenue that the 19 Company can extract. For example, in a recent Earnings Call Facebook’s Chief Operating 20 Officer, Sheryl Sandberg, highlighted an advertising campaign on Facebook in which the fast 21 food chain Wendy’s wanted to reach a very specific target group for the launch of a new product 22 (“Jalapeño Fresco Spicy Chicken”): “millennials that are spicy food lovers”. Wendy’s worked 23 with Facebook to create a campaign with five video ads specifically targeted at Facebook users 24 that fit that socio-demographic (millennials) and affinities (spicy food lovers) profile. The 25 targeting of the campaign, based on the information in the Social Graph, was successful in 26 exceeding goals in terms of: (a) the impact of the ads, as significantly more consumers recalled 27 seeing the ads; and (b) in terms of sales, with a significant increase in purchases among the target 28 14 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 segment.62 The more precise the socio-demographic and affinities profile, the more successful 2 and, therefore, profitable, an advertising campaign can be. The value of the Social Graph asset is 3 significant. Working off of publicly-available information, this value can be ascertained as 4 follows, applying the generally recognized Income Approach to Valuation.63 5 38. Under the Income Approach, the value of an asset is measured by the net present 6 value of the net economic benefit to be received over its economically useful life.64 The three 7 essential factors of this measurement of value are: (1) the value of the net income stream 8 (revenue minus expenses) that can be generated by the asset; (2) an assumption as to the duration 9 of the net income stream; and (3) an assumption as to the risk associated with the realization of 10 the anticipated net income.65 These factors can be determined mainly based on Facebook’s 11 financials. 12 39. Focusing on the Social Graph delimited as far as possible to the U.S., Facebook 13 has stated that, as of June 30, 2015, advertising revenue from the U.S. is in the order of $1,593 14 million per quarter.66 This is revenue attributable to the Social Graph because it enables the 15 unique selling proposition of targeted advertising on Facebook. Furthermore, according to 16 Facebook, the average cost of revenue, marketing and sales, and general and administrative 17 expenses during the same period was 40.75% as a percentage of revenue.67 Thus, a profit of 18 $3,776 million per year is attributable to the U.S. portion of the Social Graph asset.68 19 62 20 21 22 23 24 25 26 27 28 Example discussed by Sheryl Sandberg (Facebook COO) during the 2015 Q2 earnings call held on July 29, 2015. Available at: http://investor.fb.com/results.cfm. 63 See, inter alia, G.V. Smith and R.L. Parr, Valuation of Intellectual Property and Intangible Assets, John Wiley & Sons, 2000; R. F. Reilly and R.P. Schweihs, Valuing Intangible Assets, McGraw Hill, 1999. 64 See, e.g.: Smith and Parr (2000), p. 164. 65 Ibid, p. 169. 66 This is the average of the quarterly advertising revenue from the activities of users located in the U.S. and Canada during the four quarters between April 2014 through June 2015, $1,771 million, as disclosed in: Facebook, Inc.’s 2015 Q2 Earnings Report (July 29, 2015) Slide 9 (op cit.). A further adjustment is made to exclude data for Canada, multiplying by the ratio of the size of the U.S. Population to the total of the two countries (89.96% = 321.37 / (321.37+35.85) per official U.S. Census and Statistics Canada sources (op. cit.). 67 Facebook, Inc.’s 2015 Q2 Earnings Report (July 29, 2015) Slide 13 (op cit.). Per accepted valuation standards, Research and Development expenses are not includable in this valuation because, by definition, their effects are in the future, not as of the valuation date (June 30, 2015). 68 The result of multiplying the quarterly revenue times four quarters and deducting 40.75% for Footnote continued on next page 15 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 40. The economically useful life of the asset in question, that is, the usefulness of the 2 information represented in the Social Graph, is not immutable; people’s locations, friends, 3 affinities, and interests change over time. While the Social Graph contains a varied spectrum of 4 information, as a proxy for the likely obsolescence of the information embodied in the Social 5 Graph, the most significant indicator, in my opinion, is geographical mobility. One of the 6 primary selection criteria in defining a target market is location; there is generally no point in 7 advertising to users in locations where sales cannot be made, while other primary attributes tend 8 not to change as often.69 9 41. Geographical mobility is periodically measured by the U.S. Census. On average, 10 in the span of five years, 35.4% of the population moves.70 This represents an exponential 11 decline in the accuracy of address information of 8.37% per year.71 At this rate, 50% of people 12 will have moved in about eight years.72 In addition, considering the broader context of the 13 valuation of comparable intangible assets for financial reporting, a marketing asset frequently 14 identified in business mergers and acquisitions is the Customer List. The median remaining 15 economic life of Customer Lists among publicly traded U.S. companies is also eight years.73 16 Thus, while it is likely that a lot of the information on the Social Graph will still be current after 17 eight years, a primary attribute and targeting selector (location) will not be accurate for the 18 majority of people. Based on these considerations, I have concluded that a reasonably reliable 19 remaining useful life for valuing the Social Graph asset is eight years.74 20 Footnote continued from previous page expenses. 69 These would be parameters such as age, gender, household income, which change predictably, slowly, sporadically, or not at all. 70 U.S. Census Bureau, Geographical Mobility: 2005 to 2010 (December 2012), Table 2, Page 5 (http://www.census.gov/prod/2012pubs/p20-567.pdf). 71 This equivalent annual rate is calculated algebraically solving the equation expressing the Census fact that the ratio of the population in year 5 relative to the population in year 0 is 64.6% (100% - 35.4%) and this is equal to (1 + annual rate)5. 72 Technically, in 7.9 years, calculating: log(0.50) / log(1–0.0837). 73 Data from: Business Valuation Resources, “Benchmarking Identifiable Intangibles and Their Useful Lives in Business Combinations” BVR 2012, p. 66 (www.bvresources.com). 74 This is a conservative position since, in reality, Facebook users tend to maintain their information current as part of the normal use of the network. The asset is being valued “as is” in mid-2015, without considering continued updating. 21 22 23 24 25 26 27 28 16 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 42. A reasonable estimate of the corresponding market discount rate for this asset can 2 be based on the most current assessment of the risk factors recommended by the most reputable 3 industry sources.75 The discount rate is made up of a series of components reflecting the time- 4 value of money (the so-called Risk Free rate76), the general additional risk of equity returns 5 (known as the Equity Risk Premium77), the additional variations of net income in the relevant 6 industry (the Industry Risk Premium), and the incremental risks unique to the asset class. Thus I 7 considered the risk-free rate of 4.0%,78 a market equity risk premium of 5.0%,79 as well as an 8 advertising industry risk premium of 3.66% based on generally accepted data sources.80 In 9 addition, I considered a risk premium reflecting the incremental risks associated with intangible 10 assets relative to financial and tangible business assets of 6.0%.81 Adding together these various 11 components, I thus arrived at the discount rate for the Social Graph asset of 18.66%.82 12 43. Consequently, applying the aforementioned method and inputs, which are the type 13 of methods and parameters applied by valuation professionals like myself, the (U.S.) Social 14 Graph asset relating to the U.S.is valued at approximately $15 billion, as illustrated in the 15 following table: 16 75 17 18 19 20 21 22 23 24 25 26 27 28 Duff & Phelps, 2015 Valuation Handbook: Guide to the Cost of Capital, John Wiley & Sons, 2015 76 In valuation theory, this rate is the return available on a security that the market generally regards as free of the risk of default. In practice, in the U.S., this is the yield on government securities, adjusted (or normalized) to remove the distortion of the artificially depressed, unsustainable rates during the 2008 financial crisis. [Duff & Phelps (2015), Ch. 3]. 77 Conceptually, this premium is defined as the extra return, over the expected yield of risk-free securities, which investors expect to receive from an investment in the market portfolio of common stocks (Duff & Phelps 2015, pp. 3-17). 78 Technically, this rate is the normalized 20-year U.S. Treasury yield [Duff & Phelps (2015), Ch. 3]. 79 This is the considered forward equity risk premium recommended by Duff & Phelps. 80 See, Duff & Phelps (2015), pp 3-35 and 5-21 (The industry risk premium corresponds to a Beta of 1.73). In addition, some valuation models consider a specific “Size Premium” which, in this case, is not necessary since the Facebook Social Graph is evidently the largest marketing database in the economy. 81 As recommended by IPmetrics for intellectual property (IP) valuation analyses based on market interest rate spreads for IP-backed securities (See, e.g., M. Loumioti, “The use of intangible assets as loan collateral” Harvard Business School, 2011 Available at the Social Science Research Network: http://ssrn.com/abstract=1748675). 82 This is the result of adding the risk-free rate and the three identified risk premiums corresponding to equity, industry, and asset considerations (18.66 = 4 + 5 + 3.66 + 6). 17 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 Table 1 U.S. Social Graph Valuation 2 (As of 2015 Q2) 3 Year 4 Annual Profit ($ millions) Discount Factor (at 18.66%) Discounted Value ($ millions) 1 0.71022 2,682 3,776 0.59853 2,260 3,776 0.50441 1,905 3,776 0.42509 1,605 6 3,776 0.35824 1,353 7 3,776 0.30190 1,140 8 9 3,776 5 8 $ 3,182 4 7 0.84274 3 6 $ 3,776 2 5 3,776 0.25443 961 Total Value: 10 $ 15,087 11 44. 12 Since Facebook already has the infrastructure and software development platform 13 in place to develop and grow the Social Graph, as well as access to the marketing clients that fund 14 the advertising campaigns, the additional information collected through the accused activities has 15 arguably zero incremental cost. Therefore, from an economic perspective, virtually all of the 16 incremental advertising revenue generated from the enhancement can justifiably be considered 17 incremental profit to Facebook. Therefore, the impact of additional information intercepted from 18 private messages on Facebook’s revenue flows directly to the bottom line (profits). 45. 19 With the relevant quantitative information, I would estimate the value of the 20 enhancement to the Social Graph as commensurate with the ratio of (1) intercepted URLs in 21 private messages during the Class period to (2) the total number of links on the Social Graph. 46. 22 Absent specific Facebook network data,83 from public information it can be 23 ascertained that during 2010, Facebook had an average of 127.1 million monthly active users in 24 the U.S.84 On average, within Facebook as a whole, the average monthly active user sent nearly 25 83 26 27 28 84 According to Facebook Inc.’s Form 10-K Disclosures, The four quarters of 2010 in the U.S. & Canada had MAUs of 130,137,144, and 154 million respectively. The average cited is adjusted to exclude users in Canada. 18 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 43 messages per month.85 Thus, in 2010, I estimate that the U.S. user base sent approximately 2 65.4 billion messages.86 The following Table shows the results of these estimates on an annual 3 basis. 4 Table 2 U.S. Messaging Activity 5 (2010 – 2015) 6 Monthly Average Users Estimated Messages (millions) (millions) 2010 127 65,353 2011 155 79,464 10 2012 169 86,867 11 2013 178 91,725 2014 184 94,848 2015H1 190 97,855 7 Year 8 9 12 13 14 47. Since user engagement has increased over the Class Period,87 the estimates on Table 2 may well understate the amount of messaging activity on the network. 15 48. The relative impact of this additional, but allegedly wrongfully obtained 16 information, on the value of the Social Graph can in principle be ascertained as the addition of 17 information to the Social Graph. In the absence of detailed information about it, I have relied on 18 public information to approximate the optimal analysis. 19 20 49. Facebook researchers have published results of the formal characterization of the entire social network of active members88 of Facebook in May 2011, comprising 721 million 21 85 22 23 24 25 26 27 28 Considering Facebook’s disclosure in connection with the redesign of the Messenger platform, stating that 350 million MAUs sent 15 billion messages per month, or an average of 42.857 messages per MAU/month, at: https://www.facebook.com/notes/facebook-engineering/theunderlying-technology-of-messages/454991608919. 86 This is the result of multiplying 42.857 messages/user/month times the 127.07 million users, times 12 months. 87 According to Facebook, between August 2012 and May 2013 user engagement, as illustrated in the number of likes generated per day, increased from 2.7 Billion to 4.5 billion on average (https://www.facebook.com/photo.php?fbid=10151908376831729&set=a.10151908376636729.1 073741825.20531316728&type=1&theater). 88 Defined for analysis as “the number of members that logged into the site in the 28 days before the May 2011 date of the study and had, at least, one Facebook friend.” See, e.g.: J. Ugander, B. Karrer, L. Backstrom, C. Marlow, “The Anatomy of the Facebook Social Graph”, White Paper, Footnote continued on next page 19 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 active users.89 From this universe, 149 million are U.S. Facebook users.90 Among these U.S. 2 social network users, there were 15.9 billion friendship links or graph “edges,” and the average 3 U.S. user had around 214 Facebook friends.91 The graph is highly connected, in the sense that 4 typical Facebook members are linked (as “friends” and “friends of friends”) in such a way with 5 the rest of the network as to be able to reach the vast majority of individuals with only a few 6 “hops” or jumps from one friend to another. Specifically, in the U.S. network the average 7 distance between people was found to be 4.3 friends and, furthermore, 96% of all Facebook 8 members were within 5 degrees of separation.92 9 50. This high degree of “connectedness” is one aspect of the Social Graph that makes 10 it attractive for advertisers and why recommendations from Facebook Friends can be so effective; 11 properly targeted, relatively few recommendations can reach virtually the whole potential market. 12 Moreover, with interests, brand pages, and other actions, the Social Graph now includes more 13 data points (“nodes”) and links (“edges”) than just Facebook Friends. It is the targeting, and 14 specifically the granularity and breath of the targeting information that is enhanced by additional 15 user–URL links, which Facebook gathered unlawfully from intercepting and scanning private 16 messages. 17 51. Therefore, the economic value of the benefits Facebook derives from the 18 unlawfully gathered user–URL links is proportional to the impact of this additional information 19 on the total information on the Social Graph. In principle, the benefit to Facebook in this respect 20 would be measured by attributing the corresponding portion of the incremental value of the Social 21 Graph to the accretion of the unlawfully gathered links. 22 52. In other words, at a point in time (t), the value of the Social Graph to Facebook can 23 be expressed as the product of the number of links (L) in the Graph times the value, or worth, of a 24 link (w): 25 Footnote continued from previous page 18 Nov. 2011, Cornell University (http://arxiv.org/abs/1111.4503v1), p. 2. 89 Id. at p. 14. 90 This is nearly 60% of the eligible U.S. population at the time, see Ugander, et al. (2011) p. 2. 91 Ugander, et al. (2011) p. 2. 92 Ugander, et al. (2011) p. 5. 26 27 28 20 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) Vt = Lt × wt 1 2 At the next period (t+1), the value is: Vt+1 = Lt+1 × wt+1 3 4 The change in value to Facebook, the incremental benefit, is then: ΔV = Vt+1 – Vt = Lt+1 × wt+1 – Lt × wt . 5 6 7 53. Adding and subtracting the value of today’s links at yesterday’s unit value (Lt+1 × wt): 8 ΔV = Lt+1 × wt+1 – Lt × wt + Lt+1 × wt – Lt+1 × wt 9 and re-grouping the components of this equation, we have: ΔV = Lt+1 (wt+1 – wt ) + (Lt+1 – Lt ) wt 10 11 54. Thus, this equation can be interpreted as stating that: The incremental benefit to 12 Facebook is the sum of the effect of the change in the value of a link, plus the effect of the change 13 in the number of links. Only the second component is directly attributable the capture of 14 additional links, so that the measure of damages (D), with full information, would be calculated 15 as follows, considering only the unlawfully gathered additional links: 16 17 18 19 D = (Lt+1 – Lt ) wt 55. The calculation of the total value is straightforward; multiplying the corresponding link value to obtain the incremental benefit to Facebook. 56. The economic benefit to Facebook from the intercepted links can then be 20 estimated applying the per link values, i.e. wt, to the incremental number of links attributable to 21 the intercepted messages, i.e. (Lt+1 – Lt ). 22 23 24 57. With the input of the number of intercepted URLs, this value per link estimate can be applied to determine the total benefit to the defendant. 58. All Class members are subject to the accused scanning and, in this sense, are 25 injured in the same manner, while Facebook benefits from the aggregate information intercepted 26 out of all the messages. 27 28 59. Facebook benefits from advertising revenue from adding the user-URL links into their targeting platform and from enhancing their understanding of how and what users share 21 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 links to. The benefit is defined not only by the potential act of generating additional revenue 2 from targeting ads to the senders of intercepted messages, but also by the additional use in better 3 targeting these and similar users (in marketing terms); and the benefit is ultimately proportional to 4 the amount of information intercepted from private messages. 5 60. Therefore, it is my opinion that a proper attribution of damages among Plaintiff 6 Class Members, calculated as benefits received by the Defendant, should be based on the number 7 of links (URLs) intercepted. 8 B. Benefits from Inflating the Like Count on Third Party Websites 9 61. According to the CAC, Facebook also benefits from using the information 10 obtained from the intercepted messages by increasing the counter associated with the “Like” 11 button on third party websites.93 Independently of the actual advertising revenue as analyzed in 12 the previous section, Facebook benefits by providing additional perceived value to all Marketers 13 using these counters to evaluate the effectiveness of Facebook marketing. Due to the wrongful 14 capture of links, and exacerbated by the double counting, Facebook marketing appeared more 15 effective to Marketers and, in turn, Facebook’s clients were induced to extend their relationship 16 with Facebook, not simply by increasing advertising budgets, but at least in part by investing 17 more in building Facebook Pages and installing a variety of plugins feeding additional 18 information for Facebook’s targeting and marketing purposes. 19 62. As explained in this section, the economic benefit derived by Facebook 20 attributable to one specific way in which it has used the information obtained from the Class 21 Members messages to increase the “Like” count on its clients’ websites lies between two bounds: 22 a higher bound represented by the cost that client websites saved by not having to acquire 23 additional “Likes” calculated at a dollar amount “Y” per “Like”; and a lower bound determined 24 by the market value of artificially acquired “Likes” for pages made possible by manipulating the 25 counting system, of a different dollar amount “Z” per “Like.” This amount represents a cost 26 savings or benefit Facebook was able to provide to its clients directly as a result of the breach of 27 privacy of messages and identifying URLs of Facebook Marketers. Facebook thus benefits from 28 93 CAC at §27 and 39. 22 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 the higher usage rates from Marketers incentivized by the higher Return of Investment (ROI) of 2 the advertising expenditures through the Facebook platform. 3 63. Marketers are interested in increasing the number of “Likes” associated with their 4 use of the social plugins on their websites outside of Facebook, not simply in growing the number 5 of “Likes” on their Facebook pages. 6 64. The importance of Marketers’ website counters being affected by the alleged 7 unlawful actions in this case resides in the fact that, during the Class period, it was a key 8 performance indicator of the marketing function for Facebook’s clients: the Marketers or 9 advertisers on whose websites it was shown. Advertisers, as businesses, are interested in the 10 return on their expenditures in advertising; the conventional ROI which compares gains from 11 advertisements with their cost. While the cost is relatively straightforward to ascertain, in the 12 digital advertising environment, gains from advertising are susceptible to estimation in a variety 13 of ways, such as by the number of visitors to a web page, the number of incoming links, the 14 activity on social networks (e.g., followers, comments, “retweets” or “shares,” references in 15 relevant blogs, views on social media web sites, RSS feed subscribers, among others).94 In the 16 Facebook environment, the number of Likes measured is typically interpreted as an indicator of 17 the reach of an advertising strategy and, given the particular brand/product combination, as a 18 factor in generating sales.95 19 65. For this analysis, the general principles applied in identifying market valuations of 20 the economic worth of “acquiring” or “attracting” Facebook users to express their affinity for a 21 brand are consistent with the general Cost Approach to valuation; the measurement of value by 22 reference to the amount of money that would be required to replace the functionality of the 23 24 25 26 27 28 94 See, for example, Perdue, D. J. (2010). Social media marketing: Gaining a competitive advantage by reaching the masses. Social Media Marketing, pp. 1, 3–36. 95 By definition, Sales can be seen as the product of marketing reach, times the impact of the ad (leads per ad), times the yield (sales per lead). Thus, with a given degree of impact and yield, a higher reach, measured by the Like count for example, generates higher sales. See, e.g.: D. Buhalis and E. Mamalakis, “Social Media Return on Investment and Performance Evaluation in the Hotel Industry Context,” in: I. Tussyadiah, A. Inversini (eds.), Information and Communication Technologies in Tourism 2015, DOI 10.1007/978-3-319-14343-9_18, pp. 241253. 23 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 subject asset (the Like).96 Ultimately, the realized value of a specific set of “Likes” would 2 generally exceed the cost, to a degree depending on the effectiveness of the specific marketing 3 strategies implemented to leverage them in practice. 4 66. The effectiveness of the then-novel social network advertising campaigns was 5 typically measured by the number of Likes.97 Knowledge of the mechanics of this “Like” counter 6 obviously led to manipulations, such the “purchase” of spurious “likes,”98 which, at least in one 7 instance, had a market value as low as $0.075 per “like” and even deceptive campaigns that 8 encouraged people to copy and paste in their public Facebook posts certain texts with the 9 appropriate URLs embedded in them, so the Facebook mechanism would reward the intended 10 website with a viral increase of “Likes.”99 11 67. Ultimately, the meaning of the counter became so diluted by 2013 that both 12 analytics firms and Facebook changed their assessment of the counter as well as the need for the 13 button graphic, developing the Facebook pixel and other hidden plug-ins, and began 14 supplementing these performance measures with other factors.100 15 16 17 18 19 20 21 22 23 24 25 26 27 28 96 The underlying assumption is that the price of new assets (i.e., Likes) is commensurate with the economic value of service that the property can provide during its life. See: G.V. Smith and R.L. Parr, Valuation of Intellectual Property and Intangible Assets, John Wiley & Sons, 2000, p. 164. 97 Advertising generally strives for the general notion of Reach (“the number or percentage of target audience members exposed at least once to media carrying an advertising message”). In the online environment, user activity can be measured in great detail and the number of clicks on a specifically-designed button, or other specific user action (including a link or URL), as reflected in the Like count provide that measurement. 98 See, e.g., National Public Radio, Planet Money “For $75, This Guy Will Sell You 1,000 Facebook 'Likes'” originally broadcast on May 16, 2012(http://www.npr.org/sections/money/2012/05/16/152736671/this-guy-will-sell-you-sell-you1-000-facebook-likes). 99 Some hoaxes that repeatedly play out in the Facebook context are similar to a “chain letter” model where users are encouraged to “copy and post” texts such as bogus “copyright” notifications and spurious claims of privacy claims based on international law. See, e.g., W. Oremus, “That Facebook Copyright Notice Is Still a Hoax” November 26, 2012, Slate (http://www.slate.com/blogs/future_tense/2012/11/26/facebook_copyright_notice_berner_conven tion_status_update_still_a_hoax.html). 100 Nielsen, the company behind the Ratings system, now emphasizes the notion of ‘Brand Lift’ to measure the effectiveness of online marketing and, specifically, through Facebook (Nielsen “Quickly and Accurately Measure the Effectiveness of Your Online Ad Campaigns” available as: www.nielsen.com/content/dam/nielsen/en_us/documents/pdf/Fact%20Sheets/Nielsen%20BrandL ift.pdf). 24 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 68. Therefore, Facebook benefited from the accused practice of using the results of 2 scanning supposedly private messages for URLs and affecting Like counts because this practice 3 gave its clients, Marketers, an incremental impression of effectiveness of their Facebook 4 marketing campaigns. Marketers perceiving an incremental return of their spending on Facebook 5 campaigns were undoubtedly encouraged to allocate additional funds to these campaigns. 6 69. Due to the success of social online networking, acquiring Likes on Facebook pages 7 and outside websites has become a fundamental goal for brands in all Business-to-Consumer 8 markets over the past decade. In studies aimed at estimating the costs of acquiring fans, 9 advertising industry experts have based their analysis on the average of paid advertising needed, 10 on average, to acquire a Facebook page “Like” and convert them into paying customers. In 2011, 11 a study quoted in the well-known trade publication Advertising Age,101 considered 5 million 12 Facebook ads placed by over 50 companies, the acquisition cost of “Fans,”102 calculated by 13 dividing the total cost of clicks by the total number of actions, was found to be $9.56 less than the 14 cost to acquire the same level of sales from non-Fans.103 This is an average of the sampled 15 companies from mostly the consumer packaged goods, auto and finance. Necessarily, the cost 16 per acquisition varies by industry, by product, as well as by the desired behavior from potential 17 customers when visiting the Facebook page. Table 3 shows the average effect summarizing the 18 findings, comparing the cost of attracting a variety of actions (called “conversion” events) 19 between Facebook users that previously “Liked” the corresponding brand, i.e., Fans, and visitors 20 that had not, i.e., Non-Fans. 21 22 23 24 101 25 26 27 28 Advertising Age, Nov. 22, 2011. “Fans” standing for Facebook Friends on Brand Pages, is the term typically used in advertising industry. See, inter alia, Peter Elbaor, “The Interconnection of Facebook Fan Pages” October 28, 2011, ComScore Insights Blog, (http://www.comscore.com/Insights/Blog/The-Interconnectionof-Facebook-Fan-Pages). 103 Study by SocialCode, LLC reported in trade publication Advertising Age (adage.com/print/231128). 102 25 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) 1 Table 3 Cost per Acquisition (CPA) on Facebook Source: SocialCode, LLC (May-Sept 2011) 2 3 Conversion Type 4 Non-Fan CPA Fan CPA Difference App Install 5 $8.49 $ 2.61 $5.88 Contest Submission 76.25 17.21 59.04 6 Contest Voting 21.09 3.26 17.83 7 Fan Acquisition 5.17 3.39 1.78 Program Sign-Up 75.90 41.25 34.65 Purchase 43.86 12.88 30.98 Sweepstakes Entry 5.81 2.57 3.24 $ 14.93 $ 5.37 $9.56 8 9 TOTAL 10 11 70. Since Likes can be profitable, as a result of those cost savings, a large number of 12 companies implement marketing strategies to acquire them. Another study found that the average 13 cost of advertising on Facebook to encourage a user to become a Fan – “Like” the advertiser’s 14 Facebook page – was $1.07.104 This cost also varies across sectors and over time. In 2012, the 15 cost per acquired Fan (i.e., cost per click in Fan acquisition campaigns) averaged $0.55.105 These 16 costs are leveraged through targeting via the Social Graph as brands can gain seven times greater 17 CTR by targeting Fans with ads which keeps cost per click at a minimum.106 18 71. Therefore, the direct incremental impact of the accused practice on Facebook is to 19 increase advertising revenue, in the form of cost savings to advertisers from the accrual of Likes 20 from the intercepted private messages. 21 22 23 24 25 26 27 28 104 Webtrends, White Paper, 2011. Reported in The Wall Street Journal, “How Much Does a Facebook Fan Cost?” February 1, 2011. 105 Based on data in WebTrends®, “Ads for Fans”, 2012, p. 4. 106 Ibid, p. 2. 26 REPORT OF FERNANDO TORRES IN SUPPORT OF PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION; C 13-05996 PJH (MEJ) EXHIBIT A FERNANDO TORRES, MSc CHIEF ECONOMIST Fernando Torres is an intellectual property economist with nearly 30 years of work experience in economics, financial analysis, and business management in the U.S. and Mexico. He is a member and Chief Economist at IPmetrics LLC, an IP consulting firm specializing in the strategic analysis, valuation, and expert witness assessment of the full spectrum of intangible assets. Since 2004, Mr. Torres has applied his economics, finance and business experience, as well as skills in quantitative techniques, to the analysis and valuation of intangible assets, including valuation for transactional and litigation purposes (bankruptcy and infringement cases). Prior to joining IPmetrics, Mr. Torres served as Senior Economist at CONSOR® Intellectual Asset Management. During recent years, Mr. Torres has undertaken projects involving the valuation and/or the assessment of infringement damages regarding copyrights, trademarks, patents, trade secrets, rights of publicity, and other intellectual assets in such industries as commercial agriculture, auto parts, apparel and footwear, retail, pharmaceuticals, entertainment, telecommunications, social media, as well as non-profit organizations, among others. Mr. Torres regularly presents on topics related to intangible asset valuation in a variety of venues, many of which qualify for CLE credit. During the past few years, Mr. Torres has been an instructor for the course “Valuing Intangible Assets for Litigation,” which is part of the requirements of the Certified Forensic Financial Analyst designation issued by the National Association of Certified Valuation Analysts (NACVA). Mr. Torres has been active in the area of the copyrights, privacy and rights of publicity infringement issues, encompassing from the unlicensed use of celebrity images to class action lawsuits involving the major social networking and web services companies. Mr. Torres is also the editor and author of the online “Patent Value Guide” and his perspectives on the value of patents and other intellectual property assets have been cited in the media, including Managing Intellectual Property, The New York Times, Forbes.com, Business News Network, Business Valuation Resources, and The Democrat & Chronicle. Mr. Torres is a member of the National Association of Forensic Economics, and of the Western Economics Association International, among others. His career has spanned from academia, to branches of government, to private industry and consulting. He first earned a B.A. in Economics from the Metropolitan University in Mexico City (1980), and went on to earn a Graduate Diploma in Economics from the University of East Anglia (U. K., 1981), and a Master of Science Degree specializing in Econometrics from the University of London, England (1982). ftorres@ipmetrics.com www.ipmetrics.com Fernando Torres Qualifications and Experience Page 2 Prior to specializing in IP, his career centered on financial analysis and management in the private sector, having been both a brand development consultant and an entrepreneur in several business ventures, mainly in the software development and health care industries. During the 1980s, Mr. Torres was Professor of Economics at the Metropolitan University in Mexico City, teaching Economic Policy, Economic Growth, Microeconomics, and Quantitative Methods. Mr. Torres was later a financial consultant (NASD Series 7, 63, 65) for half a dozen years with AXA Advisors LLC. PROFESSIONAL ASSOCIATIONS     National Association of Forensic Economics Western Economics Association International American Economic Association International Trademark Association PUBLICATIONS  “Why only some patents are valuable” in: IPmetrics Blog, (May 13, 2015).  “General Principle I – Lack of Intrinsic Value” in: PatentValueGuide.com, (February 11, 2013).  “General Principle II – Patent Use is Key to Value” in: PatentValueGuide.com, (February 8, 2013).  “Conceptual Patent Value Framework” in: PatentValueGuide.com, (January 31, 2013).  “The Impact of Reorganization on Trademark Values,” in: IP Management and Valuation Reporter, March 2012, BVR, Portland, OR.  “Fundamental Principles of Patent Value,” in: IP Management and Valuation Reporter, January 2012, BVR, Portland, OR.  “Key Factors of Infringement Damages Apportionment in the Java & Android Case” in: IPmetrics Blog, (December 8, 2011).  Book Chapter: “Valuation, Monetization, and Disposition in Bankruptcy” in IP Operations and Implementation for the 21st Century Corporation, John Wiley and Sons, Inc. (November, 2011).  “Have Patent Litigation Damages Awards Been Worth It?” in: IPmetrics Blog, (April 29, 2011).  “Celebrity Advertising and Endorsement” in: IPmetrics Blog, (March 2, 2011).  “The Patent to Trademark Value Transition: Nespresso” IPmetrics Blog, (February 3, 2011). ftorres@ipmetrics.com www.ipmetrics.com Fernando Torres Qualifications and Experience Page 3  “The Liquidation Value of IP” in: IPmetrics Blog, (January 26, 2011).  “An Econometric Model of Trademark Values” in: IPmetrics Blog, (January 25, 2011).  Chapter 15: “Copyrights” in Wiley Guide to Fair Value Under IFRS, John Wiley and Sons, Inc. (May, 2010).  “The Road to Asia,” Feature Article (co-author) in: World Trademark Review, No. 23, February/March 2010, pp. 19-22.  "Trademark Values in Corporate Restructuring" (July, 2007). Social Sciences Research Network: http://ssrn.com/abstract=1014741  “Establishing Licensing Rates Through Options” (September, 2006) Social Sciences Research Network: http://ssrn.com/abstract=1014743 and in: http://formulatorres.blogspot.com/2006_05_01_archive.html  Book Chapter: “Ch. 9: Recent developments in Patent Valuation” in: Practicing Law Institute, Patent Law Institute 2007: the Impact of Recent Developments on Your Practice, PLI Course Handbook (March 19, 2007).  “Establishing Licensing Rates through Options,” in: ipFrontline, September 12, 2006 (http://www.ipfrontline.com/depts/article.asp?id=12586&deptid=3). COURSES AND PRESENTATIONS  “What is a Brand Worth?” MCLE webinar, The State Bar of California, Trademark Interest Group, March 2015.  “Intellectual Property Valuation Techniques,” MCLE presentation for Pillsbury Winthrop Shaw Pittman, San Diego, CA, August 2014.  “10 Common Mistakes in IP Valuation/Damages”, CLE presentation to Jeffer Mangels Butler & Mitchell LLP, Los Angeles, CA, July 2014.  “Intellectual Property Valuation Techniques,” MCLE presentation, San Diego, CA, April 2013  “Intellectual Property Valuation and Monetization,” a seminar for the Special American Business Internship Training (SABIT) Intellectual Property Rights program, U.S. Department of Commerce. March, 2013.  “Valuing IP in the Context of Bankruptcy,” webinar for the Certified Patent Valuation Analyst curriculum, Business Development Academy. October, 2011.  “Recent Developments in Intellectual Property Economic Damages,” Presentation at the Annual Conference of the National Association of Forensic Economics. June, 2011.  “Valuing the Intangible: Where to Start?” CLE presentation to Sheppard Mullin Richter & Hampton, LLP. December, 2009. ftorres@ipmetrics.com www.ipmetrics.com Fernando Torres Qualifications and Experience Page 4  “Defending and Enforcing Your Technology.” Panelist at: Foley’s Emerging Technologies Conference: Navigating a New World – San Diego, CA (Foley & Lardner LLP); September 2009.  ”Intellectual Property Valuation, Monetization and Disposition in Bankruptcy” – CLE presentation at the Spring Trademark Program of the NY Intellectual Property Law Association – New York, NY; June 2009.  “Damages Valuation and Expert Witnesses” (co-presenter) – CLE presentations to: • • • Gibson, Dunn & Crutcher LLP – Irvine, CA (June, 2008) Arent Fox, LLP — Washington, DC (April, 2008) Finnegan, Henderson, Farabow, Garrett & Dunner, L.L.P. Washington, DC (April, 2008) –  “Valuing Intangible Assets for Litigation” (Instructor) – National Association of Certified Valuation Analysts (NACVA) – Fort Lauderdale, FL; December 2007  “Valuing Intangible Assets for Litigation” (Instructor) – National Association of Certified Valuation Analysts (NACVA) – Philadelphia, PA; October 2007  “Trademark Values in Corporate Restructuring” – Western Economics Association International 82nd Annual Conference – Seattle, WA; July, 2007  “Entrepreneurship and Innovation” (Session Chair) – Western Economics Association International 82nd Annual Conference – Seattle, WA; July, 2007  “Alternative Focuses for ‘But For’ Scenario Specification in Commercial Litigation” (Discussant) – National Association of Forensic Economics, Western Conference – Seattle, WA; June, 2007  “Patent Values in the Evolving I.P. Market” – Practicing Law Institute – Hot Topic Briefing Teleconference; May 2007 (CLE Presentation)  “Key Issues in Intellectual Property Due Diligence” – Due Diligence Symposium 2007 – ACG – Iselin, NJ; April 2007  “Life Sciences IP Due Diligence” – American Conference Institute – San Francisco, CA; January 2007  “Developments in Patent Valuation” – Practicing Law Institute – San Francisco, CA; January 2007 (CLE Presentation)  “Collins & Aikman Europe and Other Cross-Border Asset Sales: A Tale of Two Venues” – American Bankruptcy Institute, Winter Leadership Meeting – Phoenix, AZ; December 2006  “Valuing Intangible Assets for Litigation” (Instructor) – National Association of Certified Valuation Analysts (NACVA) – San Diego, CA; December 2006. ftorres@ipmetrics.com www.ipmetrics.com Fernando Torres Qualifications and Experience Page 5 LITIGATION-RELATED EXPERIENCE (Last Four Years) Date Range February 2012 March 2012 Parties Case No. Court Status The Int’l. Aloe Science Council Inc. V. Fruit of the Earth, Inc. 11-CV-2255 United States Settled District Court A. Fraley, et al v. Facebook, Inc. 11-CV-1726 United States Settled District Court District of Maryland Nature Hired by Involvement Trademark Infringement. Kane Kessler, P.C. Expert Rebuttal Report on Damages, Depositions Rights of Publicity The Arns Law Firm Expert Declarations in Support of Motion for Class Certification, Value of Injunctive Relief, Deposition Northern District of California Class Action Superior Closed Court of the State of California (Los Angeles) Rights of Publicity Wilson Elser Moskowitz Edelman & Dicker LLP Preliminary Expert Damages Report, Arbitration Contract, Database Neymaster Goode, PC Expert Damages Rebuttal Report, Deposition, Arbitration Copyright & Trademark Infringement Ezra Brutzkus Gubner LLP Expert Damages Report, Deposition Intangible Asset Fair Market Value Tripp Scott PA Declaration, Expert Damages Report, Deposition Patent Infringement Ferraiuoli, LLC Expert Damages Report, Deposition Contract, Software IP value Kalbian Hagerty LLP Expert Rebuttal Reports, Depositions, Trial testimony August 2013 Jude Law v. Paloform Inc. SC120354 September November 2013 Scidera, Inc. v. Newsham Choice Genetics, LLC American AAA 16174-00582- Arbitration Association 12 February 2014 Lambert Corp. v. LBJC, Inc.et al. 13-CV-0778 United States Settled District Court S. Mattocks v. Black Entertainment Television LLC 13-CV61582 April 2014 July – Aug. 2014 Aug. 2014Aug. 2015 Tierra Intelectual Borinquen, Inc. v. Toshiba Corporation. S. Abu-Lughod v. S. Calis, Tocali, Inc., ASCII Media, Inc., et al. ftorres@ipmetrics.com Closed Central District of California United States Closed District Court Southern District of Florida 13-cv-47 United States Settled District Court Eastern District of Texas 13-cv-2792 United States Closed District Court Central District of California www.ipmetrics.com Fernando Torres Qualifications and Experience Page 6 Date Range Feb – Mar 2015 Jan. - May 2015 Parties Case No. Court Status Nature Hired by Involvement S. Nerayoff vs. L. Rokhsar 2031572012 Supreme Closed Court Of The State Of New York Value of Patent Assets Baker & Hostetler LLP Expert Declaration on Patent Value, Trial testimony In Re Google, Inc., Privacy Policy Litigation. 12-cv-1382 United States Closed District Court Breach of Contract Class Action Grant & Eisenhofer P.A. Expert Report on Privacy Damages, Deposition ftorres@ipmetrics.com Northern District of California www.ipmetrics.com EXHIBIT B Exhibit B - List of Materials Relied On: I relied on the following documents and materials in forming my opinions: Academic Literature 1. Vogel, Harold L. Entertainment Industry Economics. Cambridge University Press, 2011.. 2. Smith, Gordon V., and Russell L. Parr. Valuation of intellectual property and intangible assets. Vol. 13. Wiley, 2000. 3. Reilly, Robert F., and Robert P. Schweihs. Valuing intangible assets. McGraw Hill Professional, 1998. 4. Business Valuation Resources, “Benchmarking Identifiable Intangibles and Their Useful Lives in Business Combinations” 2012, p. 66 (www.bvresources.com). 5. Duff & Phelps, 2015 Valuation Handbook: Guide to the Cost of Capital, John Wiley & Sons, 2015 6. Loumioti, Maria. "The use of intangible assets as loan collateral." Harvard Business School Job Market Paper (2011)., (http://ssrn.com/abstract=1748675) 7. Ugander, Johan, Brian Karrer, Lars Backstrom, and Cameron Marlow. "The anatomy of the facebook social graph." arXiv preprint arXiv:1111.4503 (2011). (http://arxiv.org/abs/1111.4503v1) 8. Perdue, David J. "Social media marketing: Gaining a competitive advantage by reaching the masses." Senior Honors Papers (2010): 127. 9. Buhalis, Dimitrios, and Emmanouil Mamalakis. "Social media return on investment and performance evaluation in the hotel industry context." In Information and Communication Technologies in Tourism 2015, pp. 241253. Springer International Publishing, 2015. 10. Goldfarb, Avi, and Catherine Tucker. "Shifts in privacy concerns." Available at SSRN 1976321 (2011). (http://ssrn.com/abstract=1976321) 11. Tucker, Catherine. "Social advertising." Available at SSRN 1975897 (2012). (http://ssrn.com/abstract=1975897) 12. Tucker, Social Networks, Personalized Advertising, and Perceptions of Privacy Control, Time Warner Research Program on Digital Communications, Summer 2011 (http://209.59.135.49/pdf/TWC_Tucker_v3a.pdf). Articles and Other Online Sources 1. Business Insider, Business Intelligence Report on Social Engagement (http://www.businessinsider.com/social-media-engagement-statistics2013-12). 2. Business Insider Depiction of Social Graph (http://static3.businessinsider.com/image/4f5112e169bedd1526000061 /facebook-open-graph.jpg). 3. MarketingLand (http://marketingland.com/facebooks-latest-tweaks-favorfriends-could-hurt-page-reach-125931). 4. W. Oremus, “That Facebook Copyright Notice Is Still a Hoax” November 26, 2012, Slate (http://www.slate.com/blogs/future_tense/2012/11/26/facebook_copyright _notice_berner_convention_status_update_still_a_hoax.html) 5. Trade publication, Advertising Age, Nov. 22, 2011, (adage.com/print/231128). 6. Peter Elbaor, “The Interconnection of Facebook Fan Pages” October 28, 2011, ComScore Insights Blog, (http://www.comscore.com/Insights/Blog/The-Interconnection-ofFacebook-Fan-Pages). 7. Webtrends, white paper, 2011. Reported in The Wall Street Journal, “How Much Does a Facebook Fan cost?” February 1, 2011. Based on data in WebTrends®, “Ads for Fans”, 2012, p. 4. 8. Facebook CEO Mark Zuckerberg’s public post on Facebook.com of August 27, 2015, at: (https://www.facebook.com/zuck/posts/10102329188394581) 9. Wolfram|Alpha Knowledgebase, using data from the World Bank (http://www.wolframalpha.com/ accessed 10/26/15). 10. US Census projections and Statistics Canada estimates [In: http://www.census.gov/population/projections/data/national/2014/summar ytables.html, and http://www.statcan.gc.ca/pub/91-002-x/2015002/t002eng.pdf] 11. “IAB Social Media Buyers Guide” by Facebook’s Adam Isserlis, Manager, Corporate Communications, Ads/Monetization; Colleen Coulter, Product Marketing Communications Manager available on the Interactive Advertising Bureau website (http://www.iab.net/socialmediabuyersguide). 12. Facebook for Developers website: https://developers.facebook.com/. 13. “Instant Articles” initiative and new deals with publishers like the Washington Post (http://media.fb.com/2015/05/12/instantarticles/). 14. Expanding the power of Facebook search (http://newsroom.fb.com/news/2015/10 /search-fyi-find-what-the-worldis-saying-with-facebook-search/). 15. Video, with video hosting and action tracking (http://newsroom.fb.com/news/2015 /06/news-feed-fyi-taking-intoaccount-more-actions-on-videos/), app acquisitions like Instagram and WhatsApp, and with plugins to track activities outside of Facebook 16. Google Products and Advertising Platforms (www.thinkwithgoogle.com/products/) 17. “Digital Advertising Report Q3 2015,” Adobe Digital Index (www.cmo.com/adobe-digital-index.html), p.18, 24. 18. Open Graph protocol, this is used on Facebook to allow any web page to have the same functionality as any other object on Facebook. See: http://ogp.me/. 19. https://developers.facebook.com/docs/graph-api 20. Facebook SDK Documentation (https://developers.facebook.com/docs/javascript/quickstart/v2.5#plugins). 21. J. Kincaid in: TechCrunch (http://techcrunch.com/2009/02/09/facebookactivates-like-button-friendfeed-tires-of-sincere-flattery/). 22. Facebook Help Center (Each Facebook account has a unique username. On a user’s timeline page, their username will appear at the top of the browser and look something like www.facebook.com/[username]). https://www.facebook.com/help/228578620490361. 23. Facebook, Social Plugins FAQs, at: https://developers.facebook.com/docs/plugins/faqs/#ref. 24. Facebook for Business post on November 14, 2014 (https://www.facebook.com/business/news/update-to-facebook-newsfeed). 25. Facebook Media, “An Update to News Feed: What it Means for Businesses” (https://www.facebook.com/business/news/update-tofacebook-news-feed) 26. “News Feed FYI: Balancing Content from Friends and Pages” (http://media.fb.com/2015/04/21/news-feed-fyi-balancing-content-fromfriends-and-pages/). 27. Facebook’s disclosure in connection with the redesign of the Messenger platform, at: https://www.facebook.com/notes/facebook-engineering/theunderlying-technology-of-messages/454991608919 28. Facebook, between August 2012 and May 2013 user engagement, as illustrated in the number of likes generated per day, increased from 2.7 Billion to 4.5 billion on average (https://www.facebook.com/photo.php?fbid=10151908376831729&set=a. 10151908376636729.1073741825.20531316728&type=1&theater). 29. Nielsen “Quickly and Accurately Measure the Effectiveness of Your Online Ad Campaigns” available as: www.nielsen.com/content/dam/nielsen/en_us/documents/pdf/Fact%20She ets/Nielsen%20BrandLift.pdf. 30. National Public Radio, Planet Money “For $75, This Guy Will Sell You 1,000 Facebook 'Likes'” originally broadcast on May 16, 2012 (http://www.npr.org/sections/money/2012/05/16/152736671/this-guy-willsell-you-sell-you-1-000-facebook-likes). 31. https://www.facebook.com/notes/facebook-engineering/tao-the-power-ofthe-graph/10151525983993920 32. “Uniform Resource Locators (URL): A Syntax for the Expression of Access Information of Objects on the Network” by Tim Berners-Lee (March 1994) in: http://www.w3.org/Addressing/URL/url-spec.txt. 33. US Census Bureau, Geographical Mobility: 2005 to 2010 (December 2012), Table 2, Page 5 (http://www.census.gov/prod/2012pubs/p20567.pdf). 34. https://www.facebook.com/help/cookies/ Document produced by Defendant in Campbell et al. v. Facebook, Inc. 1. 2. 3. 4. 5. 6. 7. FB000012475 FB000015766 FB000026790 FB000026793 FB000011745 FB000011715 FB000008271 Other Information 1. Plaintiffs’ Consolidated Amended Complaint filed on April 25, 2014 2. Facebook, Inc. 2014 10-K 3. Facebook, Inc.’s 2015 Q3 Earnings Report (November 4, 2015) At: http://investor.fb.com/results.cfm 4. Facebook, Inc.’s 2015 Q2 Earnings Report, July 29, 2015 5. Facebook, Inc. 2012 10-K 6. Second Quarter, 2015 Earnings Call held on July 29, 2015. Available at: http://investor.fb.com/results.cfm. 7. Facebook securities registration statement (SEC Form S-1/A May 16, 2012 p 2). 8. Facebook F8 Developer Conference, April 21, 2010. 9. Facebook, Inc. 2010 10-K Disclosures EXHIBIT 34 FILED UNDER SEAL EXHIBIT 35 FILED UNDER SEAL

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?