Dunstan et al v. comScore, Inc.
Filing
1
COMPLAINT filed by Jeff Dunstan, Mike Harris; Jury Demand. Filing fee $ 350, receipt number 0752-6308203. (Attachments: # 1 Exhibit A, # 2 Civil Cover Sheet)(Scharg, Ari)
IN THE UNITED STATES DISTRICT COURT
NORTHERN DISTRICT OF ILLINOIS, EASTERN DIVISION
MIKE HARRIS and JEFF DUNSTAN,
individually and on behalf of a class of similarly
situated individuals,
)
)
)
)
Plaintiffs,
)
)
v.
)
)
COMSCORE, INC., a Delaware corporation,
)
)
)
Defendant.
)
__________________________________________)
Case No. 1:11-5807
CLASS ACTION COMPLAINT
Plaintiffs Mike Harris and Jeff Dunstan bring this Class Action Complaint against
Defendant comScore, Inc. (“comScore”) for its unauthorized infiltration of millions of
unsuspecting consumer’s personal computers, as well as other deceptive and unfair business
practices perpetrated in conjunction with its data collection software. Plaintiffs, for their Class
Action Complaint, allege as follows upon personal knowledge as to themselves and their own
acts and experiences and, as to all other matters, upon information and belief, including
investigation conducted by their own attorneys.
INTRODUCTION
1.
comScore designs, distributes, and deploys its data collection software in a
deceptive and calculated fashion to unlawfully monitor the most personal online movements of
millions of consumers without their knowledge.
2.
comScore provides high profile clients such as the Wall Street Journal, the New
York Times, and Fox News with detailed data that it collects from millions of consumers online
(hereinafter referred to as “monitored consumers”). These clients pay enormous fees for access
to comScore’s highly valuable and comprehensive store of information about consumers.
3.
comScore asserts that its data provides insight into the purchasing habits, market
trends, and other online behavior of consumers. In order to gather such extensive data,
comScore relies upon a large pool of consumers with comScore’s software operating on their
computers: “[C]entral to most comScore services is the comScore panel, the largest
continuously measured consumer panel of its kind. With approximately 2 million worldwide
consumers under continuous measurement, the comScore panel utilizes a sophisticated
methodology that is designed to accurately measure people and their behavior in the digital
environment.”1
4.
As one of the biggest players in the Internet research industry, statistics gleaned
from comScore’s consumer data are featured in major media outlets on a daily basis. However,
what lies beneath comScore’s data gathering techniques is far more sinister and shocking to all
but the few who fully understand its business practices. Namely, comScore has developed
highly intrusive and robust data collection software known by such names as
RelevantKnowledge, OpinionSpy, Premier Opinion, OpinionSquare, PermissionResearch, and
MarketScore (hereinafter collectively referred to in the singular as “Surveillance Software”) to
surreptitiously siphon exorbitant amounts of sensitive and personal data from consumers’
computers. Through subsidiaries bearing innocuous names, comScore uses deceitful tactics to
disseminate its software and thereby gain constant monitoring access to millions of hapless
consumers’ computers and networks.
5.
comScore’s sophisticated computer applications monitor every action conducted
by users. This data is sent to comScore’s servers, and then organized and sold to Defendant’s
clients.2
1
comScore Methodology, http://www.comscore.com/About_comScore/Methodology (last
visited August 17, 2011).
2
To accommodate this wealth of information, comScore maintains two of the largest data
warehouses in the world. These data storage facilities are comprised of more than five hundred
(500) servers, with combined storage accommodation for two-hundred and eighty (280)
terabytes, or two-hundred and eighty thousand (280,000) gigabytes of data.
2
6.
To extract this data, comScore’s Surveillance Software injects code into the user’s
web browser to monitor everything viewed, clicked, or inputted online. In addition, the software
opens ports,3 modifies the consumer’s firewall, and places “root certificates”4 on the affected
computer to ensure unimpeded access.
7.
The scope and breadth of data that comScore collects from unsuspecting
consumers is terrifying. By way of illustration, comScore’s Surveillance Software constantly
collects and transmits the following data, among others, from a consumer’s computer to
comScore’s servers:
a)
the monitored consumer’s usernames and passwords;
b)
queries on search engines like Google;
c)
the website(s) the monitored consumer is currently viewing;
d)
credit card numbers and any financial or otherwise sensitive information
inputted into any website the monitored views;
e)
the goods purchased online by the monitored consumer, the price paid by
the monitored consumer for the goods, and amount of time the monitored
consumer views the goods before purchase;
f)
8.
specific advertisements clicked by the monitored consumer.
After the Surveillance Software is installed on a monitored consumer’s computer,
all Internet traffic from the consumer’s computer is re-routed through comScore servers before
reaching a destination website.
9.
Furthermore, comScore’s Surveillance Software seeks out and scans every file on
the monitored consumer’s computer (including word processing documents, emails, PDFs,
image files, spreadsheets, etc.), and sends information resulting from examination of those files
to comScore’s servers.
3
In this context, “ports” are incoming and outgoing portals on a system which facilitate
communications between computers over the Internet.
4
“Root certificates” are more fully explained in ¶¶ 60-66 of this Complaint.
3
10.
Although comScore claims that its software only mines data from the individual
consumer’s computer, it designed its Surveillance Software to scan files located on any network
the host computer is connected to, and sends data about those files back to comScore’s servers.
In this way, every available file housed on the monitored consumer’s local network is accessed
by comScore without authorization.
11.
In addition, comScore designed its software to intercept packets traversing local
wireless networks. Consequently, any monitored consumer running the Surveillance Software
inadvertently exposes every nearby user on his or her network to comScore’s interception of
private data.
12.
Because of Defendant’s covert methods for deploying its software, millions of
monitored consumers remain wholly unaware that their every movement online is under constant
surveillance by comScore.
13.
To induce individuals to download and install its software, comScore “bundles”
its Surveillance Software with software developed by third parties. The third-party software is
generally offered at no cost, and includes popular items such as free screensavers and games, and
functional applications such as music-copying programs, or greeting-card templates. comScore
pays the third-party every time a consumer downloads the bundled software.
14.
In many cases, comScore provides no method for the monitored consumer to
uninstall its software, and often deceives the consumer into thinking that all of comScore’s
nefarious software has been removed. Moreover, comScore designed its computer applications
to resist attempts to uninstall the Surveillance Software. For example, when a consumer
uninstalls the third-party freeware program, comScore’s Surveillance Software will not be
removed.
15.
comScore designed its Surveillance Software to be highly persistent. User
attempts to disable comScore’s applications are wholly ineffectual, as the software automatically
4
re-starts itself when deactivated. As a result, it is impossible to “turn off” comScore’s 24/7
monitoring.
16.
Even if a monitored consumer can manage to manually uninstall the Surveillance
Software, Defendant programmed its applications to secretly leave behind a comScore root
certificate. As discussed in more detail in Section VII infra, leaving an untrusted root certificate
on a user’s computer exposes that individual to attacks by hackers, and allows comScore to remonitor the consumer’s computer in the future.
17.
Defendant’s Terms of Service (“TOS”) do not reveal the extensive and highly
intrusive amount of data collected by comScore from consumers’ computers.
18.
On information and belief, comScore has intentionally designed its Surveillance
Software and business practices to surreptitiously maximize both the number of consumers
monitored by Defendant, as well as the breadth of information collected.
19.
comScore’s nefarious tactics drive Defendant’s bottom line by enabling the
company to sell valuable consumer information to clients for enormous fees. While highly
lucrative to the company, comScore’s methods demonstrate a wholesale disregard for consumer
privacy rights and violate numerous state and federal laws.
PARTIES
20.
Plaintiff Mike Harris is a natural person and citizen of the State of Illinois.
21.
Plaintiff Jeff Dunstan is a natural person and citizen of the State of California.
22.
Defendant comScore, Inc. is a Delaware corporation with its headquarters located
at 11950 Democracy Drive, Suite 600, Reston, Virginia 20190. Defendant does business
throughout the State of Illinois and the United States.
JURISDICTION AND VENUE
23.
This Court has jurisdiction over the subject matter of this action pursuant to 28
U.S.C. § 1331. This Court has jurisdiction over Defendant because it conducts business in
Illinois and/or because the improper conduct alleged in the Complaint occurred in, was directed
5
from, and/or emanated or exported from Illinois. Personal jurisdiction is additionally proper
because Plaintiff Mike Harris is a resident of Illinois.
24.
Venue is proper in this District under 28 U.S.C. § 1391(a) because the injury
arose in this District. Venue is additionally proper because Defendant transacts significant
business in this District, including entering into consumer transactions.
FACTUAL BACKGROUND
I.
About comScore
25.
comScore is an Internet research corporation that provides marketing data to a
wide variety of clients, generally in the form of aggregated reports about online consumer
behavior. To collect the data necessary for its reports, comScore monitors consumers’ actions
using proprietary software (“Surveillance Software”) operating on users’ computers.
26.
The data collected about monitored consumers by the Surveillance Software is
transmitted, often in real-time, to comScore’s servers. This information is aggregated and
organized for Defendant’s marketing reports, which are then sold to its clients. comScore
currently monitors at least two million computers worldwide.5
27.
comScore’s clients vary widely by industry and size, and include high-profile
companies such as the New York Times, the Wall Street Journal, Proctor and Gamble, and Eli
Lilly and Company. These companies use comScore’s reports for, among other things, statistics
for news articles and gauging consumer interest in products and services.
28.
comScore is capable of parsing enormous amounts of information and
extrapolating narrowly defined trends and statistics, as evidenced by the following quote from
the New York Times: “ComScore found a decline of 10 percent in time spent on Web-based
email among 18- to 24-year-olds, about the same as it found for people up to the age of 54.”6
5
comScore Quarterly Report - November 9, 2010,
http://ir.comscore.com/secfiling.cfm?filingID=950123-10-103289 (last visited January 1, 2011).
6
E-Mail’s Big Demographic Split, http://bits.blogs.nytimes.com/2010/12/21/e-mails-bigdemographic-split/ (last visited January 2, 2011).
6
29.
To provide the highly targeted research data noted above, comScore—through its
Surveillance Software—constantly collects, monitors, and analyzes every online move, no matter
how private, of over two million persons.
30.
Unfortunately, most, if not all monitored consumers are not aware of the depth of
data comScore mines from their computers everyday. In many cases, consumers are not even
aware of the Surveillance Software’s very existence.
II.
comScore’s Methods for Recruiting and Retaining Individuals to Use Its Monitoring
Software
31.
As stated in Section I supra, comScore tracks the online behavior of over two
million (2,000,000) consumers worldwide. To accomplish this, comScore has developed
proprietary software that monitors every action conducted on an individual’s computer.
comScore deploys this software primarily by two methods: 1) online respondent acquisition and
2) a third-party application provider program.7
32.
Online respondent acquisition simply refers to comScore’s method of paying
affiliate partners to post comScore’s advertisements on their websites in an effort to solicit
consumers to download comScore’s Surveillance Software. To entice consumers to download
the Surveillance Software, comScore offers sweepstakes enrollments and prizes in exchange for
membership in its “program.”8 Potential members are also offered software, such as computer
games, for free.9
33.
The second and more devious method that comScore uses to induce consumers to
install its Surveillance Software is through its third-party application provider program. This
method involves comScore paying developers to bundle the Surveillance Software with the third7
comScore Media Matrix U.S. Methodology (hereinafter “comScore report”),
http://thearf-org-aux-assets.s3.amazonaws.com/downloads/research/comScore-RReview.pdf, pg.
9 (last visited January 1, 2011).
8
About RelevantKnowledge, http://www.relevantknowledge.com/about.aspx (last visited
January 2, 2011).
9
Member Benefits, http://www.permissionresearch.com/Benefits.aspx (last visited
January 1, 2011).
7
party application provider’s software. The third-party computer application included in the
bundled software may be a free screensaver, game, CD burning software, greeting card template,
or any other type of “freeware.” In many cases, the existence of the Surveillance Software
bundled with the freeware is only disclosed, in an inconspicuous fashion, after the installation
process has already begun.
34.
For example, if a consumer downloads a free screensaver bundled with
comScore’s Surveillance Software, the third-party developer of the screensaver is then paid by
comScore for the download of the bundled software.
35.
comScore’s monitoring software is marketed through subsidiaries bearing names
such as TMRG, Inc. and VoiceFive, Inc., with varying names for its Surveillance Software, such
as RelevantKnowledge, OpinionSpy, Premier Opinion, OpinionSquare, PermissionResearch, and
MarketScore.
III.
Consumers are Not Informed About the Information Collected by ComScore’s
Surveillance Software
36.
As discussed herein, comScore’s intrusive methods for collecting highly sensitive
information from consumers’ computers are staggering. However, comScore’s Terms of Service
(“TOS”) presented (or not presented) to the user paint a far different picture than reality.
37.
comScore’s full Privacy Policy and Terms of Service fail to disclose the following
facts regarding Surveillance Software operations performed on a consumer’s computer:
(a)
the Surveillance Software scans files on both local and network volumes;
(b)
the Surveillance Software has full rights to access and change any file on
the consumer’s computer;
(c)
the Surveillance Software opens an HTTP “backdoor” to transmit data;
(d)
the Surveillance Software analyzes packets of data as they enter and leave
a consumer’s computer over a local network, and data as they are
transferred to and from other computers on the consumer’s network.
(e)
the Surveillance Software has no user interface from which a consumer
8
can turn off the software, modify the settings, or otherwise determine what
information the software is collecting;
(f)
the Surveillance Software implants a “root certificate” that modifies the
consumer’s computer security settings, and the “root certificate” remains
on a consumer’s system even after the Surveillance Software is removed;
(g)
the Surveillance Software modifies a computer’s firewall settings;
(h)
the Surveillance Software redirects all internet traffic through comScore’s
servers before routing it to the consumer’s intended website;
(i)
the Surveillance Software injects code without user intervention into
various web browsers and instant messaging applications;
(j)
the Surveillance Software can be upgraded, modified, and controlled
remotely, without consumer intervention or permission;
(k)
the Surveillance Software will not be deleted if a consumer deletes the free
application (e.g. free screensaver) with which the Surveillance Software
was bundled;
(l)
the Surveillance Software will interact with, scan, and monitor networked
computers beyond simply the original user’s computer.
38.
Often, comScore’s TOS do not display any actual reference to Defendant’s full
license agreement whatsoever. (See Exhibit A, attached hereto as a true and accurate copy of
comScore’s Premier Opinion Surveillance Software Terms of Service bundled with a
screensaver.) Most
39.
In many instances, when a consumer installs third-party applications bundled with
comScore’s Surveillance Software, the graphical display shown to the user makes it appear that
only one piece of software is being installed. For example, if a person installs a free screensaver
bundled with Defendant’s RelevantKnowledge Surveillance Software, a screen will appear
during, and not before, the installation process displaying a brief description of comScore’s
9
product. Importantly, however, the screen is presented seamlessly with the rest of the
installation.
40.
Other comScore TOS display screens are presented to the user during the bundled
software installation process in such a way that the average, non-expert consumer would not
notice the hyperlink to Defendant’s full agreement. Examples of these inadequacies include
comScore designing its TOS without a functioning link to the full terms, or wedging the link
within a sentence, only offset by color.
IV.
comScore’s Surveillance Software is Constantly Monitoring The Consumer and
Transmitting Data to Its Servers
A.
comScore Infiltrates Existing Software on the User’s Computer
41.
Once installed, comScore’s Surveillance Software continuously transmits the
monitored consumer’s online actions back to its servers. In fact, all Internet traffic from the
consumer’s computer is sent through comScore servers before reaching a destination website.
42.
In order to collect information about a monitored consumer, comScore designed
its Surveillance Software to scan and examine a wide variety of items on the consumer’s
computer. Through its Surveillance Software, comScore injects code into the monitored
consumer’s web browser, i.e. Internet Explorer, Safari, Firefox, to monitor everything viewed,
clicked, or typed into the browser.
43.
Additionally, to facilitate its monitoring, comScore’s Surveillance Software adds
an exception to a the computer’s firewall, allowing it unfettered access. Because certain
consumers’ firewalls are stricter than others, such an attempt to modify the firewall settings, or
the subsequent redirection of Internet traffic resulting from the firewall modification, often
causes the firewall to lockdown or “freeze” the computer to prevent further harm.
B.
comScore Transmits Users’ Internet Activity to Its Servers
44.
In addition to identifying the specific webpage that the monitored consumer is
viewing, the Surveillance Software also transmits information to comScore revealing how much
10
the individual pays for items in online transactions,10 how long the individual views items before
purchase, and much more. For example, comScore’s Surveillance Software observes and reports
where the monitored individual’s mouse is moving, such as whether or not the monitored
consumer is hovering over an advertisement.
45.
Perhaps more striking, the Surveillance Software is indiscriminate about the
information gathered and sent to comScore’s servers. Therefore, names, addresses, credit card
numbers, Social Security Numbers, and search terms on search engines are all siphoned and
transmitted to comScore.
C.
comScore’s Software Identifies Individual Users, and Cannot be Turned Off
by the User
46.
Because comScore requires precise demographic information to create its
marketing reports, the Surveillance Software must distinguish which user is currently using the
computer at what time. In other words, comScore must know whether or not a father (male, age
45) or his daughter (female, age 14) is using the computer, as that information is necessary to
produce accurate demographic marketing reports. To that end, comScore has developed a
patented procedure known as “User Demographic Reporting” for creating biometric signatures
of consumers by tracking mouse movements and keystrokes. In this way, each time an
individual uses the computer, comScore’s Surveillance Software tracks his or her keystrokes and
mouse movements until it identifies the user as the 14-year-old daughter or 45-year-old father in
the household.
47.
comScore’s software is highly persistent and constantly runs in the background
during all computer activities, yet provides no mechanism to turn it off. If, for any reason, the
software stops running (including manual user attempts to stop it), it automatically restarts.
10
In the aggregate, this information is used to provide insight into customer spending
habits, as evidenced by the following quote from the Wall Street Journal: “From Nov. 1 through
Sunday, online consumer spending totaled $17.55 billion, according to comScore Inc. (SCOR).
Thanksgiving Day sales jumped 28% from year-earlier levels.” Online Holiday Spending Up
12% From 2009 Levels, http://online.wsj.com/article/BT-CO-20101208-710098.html (last
visited January 2, 2011).
11
Accordingly, it is nearly impossible for a consumer to disable the Surveillance Software to avoid
spying on certain users of the computer system.
48.
By definition, comScore’s Surveillance Software is “spyware,” meaning it is
designed to gather data from a consumer’s computer without consent and transfer it to a third
party. Because of this characterization, scores of anti-virus and anti-spyware websites identify
comScore applications as “severe” or “high risk” spyware or adware. For example, Microsoft’s
Malware Protection Center has singled out several comScore applications as problematic. In the
same vein, numerous U.S. colleges and universities warn students of the dangers of running
comScore’s software and ban Internet traffic to Defendant’s servers.
V.
comScore Siphons Data From the Monitored Consumer’s Computer and Local
Network Without Authorization
49.
comScore’s TOS indicate that the application will only monitor and collect data
about the computer on which it is installed. (See Exhibit A & B and supra Section III).
50.
Defendant’s TOS are devoid of any mention that all files on that individual’s
computer will be scanned—and that information about those files will be sent to comScore’s
servers.
A.
51.
comScore Scans All Available Files on the Local Network Attached to the
Consumer’s Computer
In clear contrast to comScore’s TOS, its Surveillance Software additionally scans
and sends information about available files located on the local network—not just the individual
consumer’s computer—to Defendant’s servers.
52.
Put another way, if a monitored consumer uses a local network to store and access
files—a nearly ubiquitous practice among modern organizations—then the Surveillance
Software also scans all accessible files on the network and sends information about the data to
comScore’s servers. Depending on the network, these files may include confidential business
files, financial documents, trade secrets, or classified government documents.
B.
comScore’s Surveillance Software Intercepts Data Traveling Over the
Monitored Consumer’s Local Network
12
53.
comScore’s Surveillance Software also monitors and analyzes “packets” of
information entering and leaving the monitored consumer’s computer.
54.
Worse still, comScore’s Surveillance Software intercepts wireless packets
traversing the local network. Accordingly, a monitored consumer using a computer on a local
wireless network also subjects other nearby computers on the network to data collection by the
Surveillance Software.
VI.
To Avoid Disruption to its Data Collection, comScore Designed Its Surveillance
Software to Continue to Operate After the Consumer Attempts to Stop It
55.
comScore’s Surveillance Software has no user interface from which a consumer
can turn off or uninstall the software, modify the settings, or otherwise control what information
the software is collecting.
56.
As discussed in Section II supra, comScore pays third-party developers to bundle
Surveillance Software with their applications.
57.
Even assuming that an individual recognizes the implications of installing
comScore’s Surveillance Software in tandem with software such as a free screensaver, or later
determines that the free screensaver was the source of the comScore software, a reasonable
consumer would believe that once the screensaver was uninstalled, comScore’s software would
be uninstalled as well. That is not the case.
58.
When a monitored consumer uninstalls bundled software, comScore’s
Surveillance Software remains active on that monitored consumer’s computer. As a result,
comScore continues to collect information about the monitored consumer, even though the
individual believes comScore’s Surveillance Software was uninstalled. Indeed, the only way to
remove comScore’s Surveillance Software is by manually locating and removing it from the
system.
59.
Because many consumers lack the requisite technical expertise to manually
remove comScore’s software, these users remain unwitting members of Defendant’s monitoring
13
program. In many cases, consumers are forced to purchase automated spyware removal software
to fully eliminate any traces of Defendant’s software.
VII.
comScore Endangers Consumers by Failing to Remove its Root Certificate During
the Uninstall Process for of its Surveillance Software
60.
If a monitored consumer manages to manually uninstall comScore’s Surveillance
Software, Defendant still leaves its own “root certificate” on the user’s computer.
A.
What is a Root Certificate?
61.
In very basic terms, a root certificate is part of an intricate system that helps
ensure that websites on the Internet are secure. Web browsers, such as Microsoft’s Internet
Explorer, come pre-packaged with a store of root certificates issued by trustworthy Certificate
Authorities such as VeriSign.11 A Certificate Authority, such as VeriSign, distributes certificates
to trustworthy companies like Amazon.com. When an individual browses Amazon.com, the
user’s web browser identifies a certificate that was “signed” by VeriSign, and the individual is
given assurance that the website is secure. Without this system, it would be extremely difficult,
if not impossible, for users to verify which websites were secure and thus safe to transmit
sensitive information to, i.e. credit card numbers and Social Security Numbers.
62.
A Certificate Authority, such as VeriSign, must follow stringent regulations in
order to have its root certificate included in a popular web browser. For example, Microsoft
requires entities applying for root certificates to comply with rigorous guidelines delineated by
the WebTrust for Certification Authorities program sponsored by the American Institute for
Certified Public Accountants (AICPA).
63.
To average users, the significance of a root certificate is most readily manifested
by the small lock in the top left of a web browser that appears when conducting secure
transactions over the Internet. This image provides the individual with peace of mind that
sensitive information can be transmitted to the website without interception by nefarious actors.
11
VeriSign is a company that specializes in, among other things, online security and digital
certificates. To date, VeriSign is the largest provider of digital certificates.
14
B.
comScore Installs its Own Root Certificate Through its Surveillance
Software
64.
Included in the installation of the Surveillance Software is a comScore root
certificate. This root certificate allows comScore to collect information transmitted through the
user’s browser, regardless of whether or not the transaction is secure. In other words, because
comScore has installed its own root certificate, when a monitored consumer is viewing a
website—such as Amazon.com—and thinks that the transaction is free from interception by
third-parties because of the image of a small lock in the top left of the browser, that information
is still captured by Defendant.
65.
If a monitored consumer uninstalls the Surveillance Software, comScore has
designed its software to leave behind the root certificate.
66.
The risks caused by untrusted root certificates are well documented and
Defendant’s actions pose serious risks to monitored consumers’ computer systems.12
FACTS RELATING TO PLAINTIFFS
67.
In or around March of 2010, Plaintiff Mike Harris downloaded and installed a free
screensaver secretly bundled with comScore’s Surveillance Software onto his Macintosh
computer. The computer Plaintiff used was connected to a local wireless network.
68.
After discovering that he had inadvertently installed this software, he searched the
World Wide Web to determine how to get rid of the application. Harris attempted to uninstall
the screensaver, however the Surveillance Software continued operating. Plaintiff Harris has a
high level knowledge of information technology, and was still only able to uninstall the software
after conducting hours of diligent research.
12
Hackers use untrusted root certificates such as comScore’s to intercept personal data from
users without detection. Because the consumer mistakenly believes that the transaction is secure,
he or she assumes that it is safe to input sensitive financial or other information. Armed with
comScore’s root certificate, a hacker can create the faux appearance of a secure transaction.
Accordingly, the prospect that comScore may attempt to utilize the root certificates it has
intentionally left behind on monitored consumers’ computers is a very real threat.
15
69.
Plaintiff Harris did not agree to comScore’s Terms of Service and did not know
that he was installing Surveillance Software when he installed the free software.
70.
In or around September of 2010, Plaintiff Jeff Dunstan downloaded and installed
free greeting card template software secretly bundled with comScore’s Surveillance Software
onto his personal computer running the Microsoft Windows operating system.
71.
After installation, Dunstan’s firewall detected the re-routing of his Internet traffic
to comScore servers, and in response, effectively disabled his computer from accessing the
Internet. In fact, Plaintiff Dunstan’s computer became entirely debilitated in reaction to the
Surveillance Software operating on his computer.
72.
Plaintiff Dunstan spent approximately ten hours investigating and researching
how comScore’s software became installed on his computer and how to remove it.
73.
Eventually, Plaintiff Dunstan had to pay forty dollars ($40) for third-party anti-
virus software to entirely remove the software from his computer and restore it to a functioning
state. Plaintiff Dunstan did not agree to comScore’s Terms of Service and did not know that he
was installing Surveillance Software when he installed the free software.
CLASS ALLEGATIONS
74.
Plaintiffs Mike Harris and Jeff Dunstan bring this action pursuant to Fed. R. Civ.
P. 23(b)(2) and (3) on behalf of themselves and the following two classes:
The Surveillance Software Class: All individuals and entities in the United States that have
had comScore’s Surveillance Software installed on their computer(s).
The Dunstan Subclass: All individuals and entities in the United States that have incurred
costs in removing the Surveillance Software.
The Surveillance Software and the Dunstan Subclass are collectively referred to throughout this
Complaint as “the Classes.”
75.
Excluded from the Classes are Defendant, its legal representatives, assigns and
successors, and any entity in which Defendant has a controlling interest. Also excluded is the
16
judge to whom this case is assigned and the judge’s immediate family, as well as any individual
who contributed to the design and deployment of Defendant’s software products.
76.
The Classes consist of hundreds of thousands, if not millions, of individuals and
other entities, making joinder impractical. On information and belief, Defendant has deceived
millions of consumers who fall into the definition set forth in the Classes.
77.
Plaintiffs’ claims are typical of the claims of all other members of the Classes, as
Plaintiffs and other members sustained damages arising out of the wrongful conduct of
Defendant, based upon the same actions of the software products which were made uniformly to
Plaintiffs and the Classes.
78.
Plaintiffs will fairly and adequately represent and protect the interests of the other
members of the Classes. Plaintiffs have retained counsel with substantial experience in
prosecuting complex litigation and class actions. Plaintiffs and their counsel are committed to
vigorously prosecuting this action on behalf of the members of the Classes, and have the
financial resources to do so. Neither Plaintiffs nor their counsel have any interest adverse to
those of the other members of the Classes.
79.
Absent a class action, most members of the Classes would find the cost of
litigating their claims to be prohibitive and will have no effective remedy. The class treatment of
common questions of law and fact is also superior to multiple individual actions or piecemeal
litigation in that it conserves the resources of the courts and the litigants, and promotes
consistency and efficiency of adjudication.
80.
Defendant has acted and failed to act on grounds generally applicable to Plaintiffs
and the other members of the Classes, requiring the Court’s imposition of uniform relief to
ensure compatible standards of conduct toward the members of the Classes.
81.
The factual and legal bases of comScore’s liability to Plaintiffs and to the other
members of the Classes are the same, and resulted in injury to Plaintiffs and all of the other
17
members of the Classes. Plaintiffs and the other members of the Classes have all suffered harm
as a result of comScore’s wrongful conduct.
82.
There are many questions of law and fact common to the claims of Plaintiffs and
the other members of the Classes, and those questions predominate over any questions that may
affect individual members of the Classes. Common questions for the Classes include but are not
limited to the following:
(a)
whether comScore’s intentionally designed its software to scan files
located on a monitored consumer’s local network;
(b)
whether comScore intentionally designed its software to intercept packets
on wireless networks;
(c)
whether comScore intentionally designed its software and/or business
model with third-party application providers to avoid uninstallation when the
third-party application was uninstalled, thus thwarting user attempts to remove the
software;
(d)
whether comScore intentionally designed its Terms of Service to exclude
the true functionality of its Surveillance Software;
(e)
whether comScore’s conduct described herein violated the Stored
Communications Act (18 U.S.C. §§ 2701, et seq.);
(f)
whether comScore’s conduct described herein violated the Electronic
Communications Privacy Act (18 U.S.C. §§ 2510, et seq.);
(g)
whether comScore’s conduct described herein violated the Computer
Fraud & Abuse Act (18 U.S.C. §§ 1030, et seq.);
(h)
whether comScore’s conduct described herein violated the Illinois
Consumer Fraud and Deceptive Practices Act (815 ILCS 505/1 et seq.);
(i)
whether comScore has been unjustly enriched by Plaintiffs and the
Classes.
18
83.
Plaintiffs reserve the right to revise these definitions based on facts learned in
discovery.
FIRST CAUSE OF ACTION
Violations of the Stored Communications Act
(18 U.S.C. §§ 2701, et seq.)
(On Behalf of Plaintiffs and the Classes)
84.
Plaintiffs incorporate the foregoing allegations as if fully set forth herein.
85.
The Electronic Communications Privacy Act, 18 U.S.C. §§ 2510 et seq. (the
“ECPA”) broadly defines an “electronic communication” as “any transfer of signs, signals,
writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a
wire, radio, electromagnetic, photoelectronic or photooptical system that affects interstate or
foreign commerce…” 18 U.S.C. § 2510(12). The Stored Communications Act incorporates this
definition.
86.
Pursuant to the ECPA and Stored Communications Act (“SCA”), “electronic
storage” means any “temporary storage of a wire or electronic communication incidental to the
electronic transmission thereof.” 18 U.S.C. § 2510(17)(A). This type of electronic storage
includes communications in intermediate electronic storage that have not yet been delivered to
their intended recipient.
87.
The SCA mandates, among other things, that it is unlawful for a person to obtain
access to stored communications on another’s computer system without authorization. 18 U.S.C.
§ 2701.
88.
Congress expressly included provisions in the SCA to address this issue so as to
prevent “unauthorized persons deliberately gaining access to, and sometimes tampering with,
electronic or wire communications that are not intended to be available to the public.” Senate
Report No. 99–541, S. REP. 99-541, 35, 1986 U.S.C.C.A.N. 3555, 3589.
89.
comScore has violated 18 U.S.C. § 2701(a)(1) because it intentionally accessed
consumers’ communications without authorization and obtained, altered, or prevented authorized
access to a wire or electronic communication while in electronic storage by continuing to operate
19
after the user uninstalled bundled software. Defendant had actual knowledge of, and benefited
from, this practice.
90.
Additionally, Defendant has violated 18 U.S.C. § 2701(a)(2) because it
intentionally exceeded authorization to access consumers’ communications and obtained, altered,
or prevented authorized access to a wire or electronic communication while in electronic storage
by continuing to operate after the user uninstalled bundled software. Defendant had actual
knowledge of, and benefited from, this practice.
91.
comScore has also violated 18 U.S.C. § 2701(a)(2) because it intentionally
exceeded authorization to access consumers’ communications and obtained, altered, or prevented
authorized access to a wire or electronic communication while in electronic storage by accessing
files on the Plaintiffs’ and the Classes’ local networks without permission.
92.
As a result of Defendant’s conduct described herein and its violation of § 2701,
Plaintiffs and the Classes have suffered injuries. Plaintiffs, on their own behalves and on behalf
of the Classes, seeks an order enjoining Defendant’s conduct described herein and awarding
themselves and the Classes the maximum statutory and punitive damages available under 18
U.S.C. § 2707.
SECOND CAUSE OF ACTION
Violations of the Electronic Communications Privacy Act
(18 U.S.C. §§ 2510, et seq.)
(On Behalf of Plaintiffs and the Classes)
93.
Plaintiffs incorporate the forgoing allegations as if fully set forth herein.
94.
The Electronic Communications Privacy Act, 18 U.S.C. §§ 2510, et seq. (the
“ECPA”) broadly defines an “electronic communication” as “any transfer of signs, signals,
writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a
wire, radio, electromagnetic, photoelectronic or photooptical system that affects interstate or
foreign commerce…” 18 U.S.C. § 2510(12).
95.
The ECPA defines “electronic communications system” as any wire, radio,
electromagnetic, photooptical or photoelectronic facilities for the transmission of wire or
20
electronic communications, and any computer facilities or related electronic equipment for the
electronic storage of such communications. 18 U.S.C. § 2510(14).
96.
The ECPA broadly defines the contents of a communication. Pursuant to the
ECPA, “contents” of a communication, when used with respect to any wire, oral, or electronic
communications, include any information concerning the substance, purport, or meaning of that
communication. 18 U.S.C. § 2510(8). “Contents,” when used with respect to any wire or oral
communication, includes any information concerning the identity of the parties to such
communication or the existence, substance, purport, or meaning of that communication. The
definition thus includes all aspects of the communication itself. No aspect, including the identity
of the parties, the substance of the communication between them, or the fact of the
communication itself, is excluded. The privacy of the communication to be protected is intended
to be comprehensive.
97.
Plaintiffs’ and Classes Members’ personal computers and computer networks
constitute “electronic computer systems.” Plaintiffs and Classes members transmit “electronic
communications” by and through their computers and computer networks in the form of, among
others, emails, sending requests to visit websites, online chats, file transfers, file uploads, and file
downloads.
98.
Defendant’s conduct violated 18 U.S.C. § 2511(1)(a) because Defendant
intentionally intercepted and endeavored to intercept Plaintiffs’ and Classes Members’ electronic
communications to, from, and within their computers and computer networks.
99.
Defendant’s conduct violated 18 U.S.C. § 2511(1)(d) because Defendant used and
endeavored to use the contents of Plaintiffs’ and Classes Members’ electronic communications to
profit from its unauthorized collection and sale, knowing and having reason to know that the
information was obtained through interception in violation of 18 U.S.C. § 2511(1).
21
100.
Defendant intentionally obtained and/or intercepted, by device or otherwise, these
electronic communications, without the knowledge, consent or authorization of Plaintiffs or the
Classes.
101.
Plaintiffs and the Classes suffered harm as a result of Defendant’s violations of
the ECPA, and therefore seek (a) preliminary, equitable and declaratory relief as may be
appropriate, (b) the sum of the actual damages suffered and the profits obtained by Defendant as
a result of their unlawful conduct, or statutory damages as authorized by 18 U.S.C. § 2520(2)(B),
whichever is greater, (c) punitive damages, and (d) reasonable costs and attorneys’ fees.
THIRD CAUSE OF ACTION
Violation of the Computer Fraud and Abuse Act (“CFAA”)
(18 U.S.C. §§ 1030, et seq.)
(On Behalf of Plaintiffs and the Classes)
102.
Plaintiffs incorporate the foregoing allegations as if fully set forth herein.
103.
Defendant intentionally accessed a computer without authorization and/or
exceeded any authorized access and in so doing intentionally breached its own Terms of Service
and Privacy Policy.
104.
Defendant illegally obtained this information from a protected computer involved
in interstate or foreign communication.
105.
By scanning and removing information from local and network files, monitoring
internet behavior, including keystroke logging consumer input, and injecting code and data onto
Plaintiffs’ computers, Defendant accessed Plaintiffs’ computers, in the course of interstate
commerce and/or communication, in excess of the authorization provided by Plaintiffs as
descried in 18 U.S.C. § 1030(a)(2)(C).
106.
Defendant violated 18 U.S.C. § 1030(a)(2)(C) by intentionally accessing
Plaintiffs’ and Classes Members’ computers and computer networks without authorization and/or
by exceeding the scope of that authorization.
107.
Plaintiffs’ computer, and those belonging to Class Members, are protected
computers pursuant to 18 U.S.C. § 1030(e)(2)(B) because they are used in interstate commerce
22
and/or communication. Specifically, Plaintiff Dunstan spent $40 to purchase a spyware removal
program to fully remove the program and restore his computer to a functioning state.
108.
By accessing, collecting, and transmitting Plaintiffs and Classes Members’
computer data without authorization, Defendant intentionally caused damage to those computers
by impairing the integrity of information and/or data.
109.
Through the conduct described herein, Defendant has violated 18 U.S.C.
§ 1030(a)(5)(A)(iii).
110.
As a result, Defendant’s conduct has caused a loss to one or more persons during
any one-year period aggregating at least $5,000 in value in real economic damages.
111.
Plaintiffs and the Classes expended time, money and resources to investigate and
remove comScore’s tracking software from his computer.
112.
Plaintiffs and Classes members have additionally suffered loss by reason of these
violations, including, without limitation, violation of the right of privacy.
113.
Defendant’s actions were knowing and/or reckless and caused harm to Plaintiffs
and members of the Classes.
FOURTH CAUSE OF ACTION
Violation of the Illinois Consumer Fraud and Deceptive Practices Act
(815 ILCS 505/1 et seq.)
(On Behalf of Plaintiff Dunstan and the Dunstan Subclass)
114.
Plaintiff incorporates the foregoing allegations as if fully set forth herein.
115.
The Illinois Consumer Fraud and Deceptive Practices Act, 815 ILCS 505/1 et seq.
(“ICFA”), protects both consumers and competitors by promoting fair competition in
commercial markets for goods and services.
116.
The ICFA prohibits any unlawful, unfair or fraudulent business acts or practices
including the employment of any deception, fraud, false pretense, false promise,
23
misrepresentation, or the concealment, suppression, or omission of any material fact. 815 ILCS
505/2.
117.
Defendant has engaged in deceptive and fraudulent business practices, as defined
by the ICFA, by intentionally concealing the fact that its software was included in supposed
“freeware.” comScore has further violated the ICFA by fraudulently designing its software to be
highly resistant to uninstallation by the user. In addition, comScore has omitted material facts
about the true nature of its software products in its Terms of Service. Defendant’s practice of
profiting from information deceptively gathered from unwitting consumers also constitutes a
violation of the ICFA.
118.
Plaintiff Dunstan and the Subclass have suffered harm as a proximate result of the
violations of law and wrongful conduct of Defendant in the form of actual monetary damages
and violations of their privacy rights. Specifically, Plaintiff’s computer was debilitated by the
surreptitiously installed Surveillance Software and he was forced to spend $40 on third party
software to remove comScore’s Surveillance Software.
119.
Plaintiff seeks an order (1) permanently enjoining Defendants from continuing to
engage in unfair and unlawful conduct; (2) requiring Defendants to pay actual and compensatory
damages; (3) requiring Defendants to make full restitution of all funds wrongfully obtained; and
(4) requiring Defendants to pay interest, attorneys’ fees, and costs pursuant to 815 ILCS
505/10a(c).
FIFTH CAUSE OF ACTION
Unjust Enrichment
(On Behalf of Plaintiffs and the Classes)
120.
Plaintiffs incorporate the foregoing allegations as if fully set forth herein.
121.
Plaintiffs and members of the Classes conferred a monetary benefit on Defendant.
Defendant received and retained money by selling data to its clients that was collected about
24
Plaintiffs and the Classes through its Surveillance Software. Much of this information was
collected from Plaintiffs and the Classes without authorization and through deceptive business
practices.
122.
Defendant appreciates or has knowledge of such benefit
123.
Under principles of equity and good conscience, Defendant should not be
permitted to retain the money obtained by selling information about Plaintiffs and members of
the Classes, which Defendant has unjustly received as a result of its unlawful actions.
124.
Accordingly, Plaintiffs and the Classes seek full disgorgement and restitution of
any amounts comScore has retained as a result of the unlawful and/or wrongful conduct alleged
herein.
PRAYER FOR RELIEF
WHEREFORE, Plaintiffs, individually and on behalf of the Classes, pray for the
following relief:
A.
Certify this case as a class action on behalf of the Classes defined above, appoint
Mike Harris and Jeff Dunstan as class representatives, and appoint their counsel as class counsel;
B.
Declare that comScore’s actions, as described herein, violate the Stored
Communications Act (18 U.S.C. §§ 2701, et seq.), the Electronic Communications Privacy Act
(18 U.S.C. §§ 2510, et seq.), the Computer Fraud and Abuse Act (18 U.S.C. §§ 2510, et seq.),
and Illinois Consumer Fraud and Deceptive Practices Act (815 ILCS 505/1 et seq.);
C.
Award injunctive and other equitable relief as is necessary to protect the interests
of the Plaintiffs and the Classes, including, inter alia: (i) an order prohibiting comScore from
engaging in the wrongful and unlawful acts described herein; and (ii) requiring comScore to
refrain from accessing files attached to consumers’ local networks; and (iii) requiring comScore
to delete its root certificate when the Surveillance Software is removed; and (iv) requiring
comScore to conspicuously and truthfully display the manner in which it collects data about
monitored consumers in its Terms of Service; and (v) requiring comScore to uninstall its
25
Surveillance Software when bundled software is uninstalled; and (vi) requiring comScore to
refrain from intercepting wireless network traffic without authorization.
D.
Award damages, including statutory damages of $1,000 per violation under the
Stored Communications Act, 18 U.S.C. § 2707(c), and the Electronic Communications Privacy
Act, 18 U.S.C. § 2520, and punitive damages where applicable, to Plaintiffs and the Classes in an
amount to be determined at trial;
E.
Award Plaintiffs and the Classes their reasonable litigation expenses and
attorneys’ fees;
F.
Award Plaintiffs and the Classes pre- and post-judgment interest, to the extent
allowable; and
G. Award such other and further relief as equity and justice may require.
JURY TRIAL
Plaintiffs demand a trial by jury for all issues so triable.
26
Dated: August 23, 2011
RESPECTFULLY SUBMITTED,
MIKE HARRIS AND JEFF DUNSTAN,
INDIVIDUALLY AND ON BEHALF OF A CLASS OF
SIMILARLY SITUATED INDIVIDUALS,
By: /s/ Ari J. Scharg
One of Plaintiffs’ Attorneys
Jay Edelson
William C. Gray
Ari J. Scharg
Christopher L. Dore
EDELSON MCGUIRE, LLC
350 North LaSalle, Suite 1300
Chicago, Illinois 60654
Telephone: (312) 589-6370
jedelson@edelson.com
wgray@edelson.com
ascharg@edelson.com
cdore@edelson.com
27
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?