Dunstan et al v. comScore, Inc.

Filing 156

DECLARATION of Jay Edelson regarding memorandum in support of motion 154 (Attachments: # 1 Exhibit A, # 2 Exhibit B, # 3 Exhibit C, # 4 Exhibit D, # 5 Exhibit E, # 6 Exhibit F, # 7 Exhibit G, # 8 Exhibit H, # 9 Exhibit I, # 10 Exhibit J, # 11 Exhibit K, # 12 Exhibit L, # 13 Exhibit M, # 14 Exhibit N, # 15 Exhibit O, # 16 Exhibit P, # 17 Exhibit Q, # 18 Exhibit R, # 19 Exhibit s, # 20 Exhibit t)(Thomassen, Benjamin)

Download PDF
EXHIBIT L HARRIS & DUSTAN v. COMSCORE, INC. September 12, 2012 YVONNE BIGBEE Page 1 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS, EASTERN DIVISION ______________________________ MIKE HARRIS and JEFF DUNSTAN, individually and on behalf of a class of similarly situated individuals, vs. Plaintiffs, x : : : : : : : : : : x COMSCORE, INC., a Delaware corporation, Case No. 1:11-5807 Hon. James F. Holderman Defendant. ______________________________ Wednesday, September 12, 2012 Reston, Virginia DEPOSITION OF: YVONNE BIGBEE, a witness, called for oral examination by counsel for plaintiffs in the above-captioned matter, pursuant to Notice and agreement of the parties as to time and date, held at the offices of ComScore, Inc., 11950 Democracy Drive, Suite 600, Reston, Virginia 20191, beginning at approximately 9:30 o'clock, a.m., before Patricia Klepp, RMR, a court reporter and Notary Public in and for the Commonwealth of Virginia, when were present on behalf of the respective parties: CAROL J. THOMAS STENOTYPE REPORTING SERVICES, INC. www.carolthomasreporting.com 800-322-9221 HARRIS & DUSTAN v. COMSCORE, INC. September 12, 2012 YVONNE BIGBEE Page 40 1 2 3 4 Q. Sure. So can you explain to me what you mean by "collection confirmation"? A. To -- they make sure that our software is collecting the data as expected -- 5 Q. Okay. 6 A. -- into our system. 7 Q. And so to the extent you know, can you explain 8 to me how they would confirm that it is collecting the 9 data it's supposed to be collecting? 10 A. They would mimic panelists' behavior. So they 11 would use a popular browser such as IE, Internet 12 Explorer, to surf to CNN.com, for example, and click on 13 a few articles to make sure that the URL is collected 14 properly. 15 Or they would conduct a mystery shop on 16 Amazon.com., for example, where they would put something 17 in the basket as a user to make sure that comScore 18 software is collecting the data properly and 19 fuzzification is in place. 20 21 22 Q. Okay. And so can you tell me what you mean by "fuzzification"? A. It's a system that we have in place to look CAROL J. THOMAS STENOTYPE REPORTING SERVICES, INC. www.carolthomasreporting.com 800-322-9221 HARRIS & DUSTAN v. COMSCORE, INC. September 12, 2012 YVONNE BIGBEE Page 41 1 for patterns in the data, to make sure that we either X 2 out or hash any data that we deem to be sensitive to the 3 user. 4 Q. Okay. Before we get too far away for it, you 5 talked about collecting information -- I know you're 6 just using an example -- on Amazon.com. 7 8 9 In that example, what sort of information would be collected by comScore software? A. Products viewed. So if I went and looked at 10 The Hunger Games book, for example, we would collect the 11 product, the book name, we would collect the items in 12 your shopping cart, so ... 13 14 Q. Do you understand the difference between page data and post data? 15 A. Yes. 16 Q. Can you explain that difference to me? 17 A. Page data is the content as it appears on the 18 page to the user, most commonly in the form of HTML. 19 Post data is when the user submits data, 20 oftentimes they enter themselves, to the destination web 21 server. 22 Q. So would that be -- in the Amazon process you CAROL J. THOMAS STENOTYPE REPORTING SERVICES, INC. www.carolthomasreporting.com 800-322-9221 HARRIS & DUSTAN v. COMSCORE, INC. September 12, 2012 YVONNE BIGBEE Page 44 1 A. 2 3 MR. SWEDLOW: Objection. BY MR. THOMASSEN: 4 5 Can you repeat the question? Q. Give me an example of HTML information that OSSProxy would not capture. 6 A. Information from dot-edu sites, university 7 sites; information from a personal Google mail contact, 8 we don't collect that. 9 10 Q. information on dot-edu sites, page data information? 11 12 Let me start over. Why would comScore not collect HTML page data information from dot-edu sites? 13 14 So the -- why would comScore not collect A. It's not part of our business model to collect activities from universities -- 15 Q. Okay. 16 A. -- student activities. 17 Q. And so then you talked about personal Google 18 mail. That's a -- that would be a dot-com site; right? 19 A. Yes. 20 Q. Why would comScore not collect all the HTML 21 22 information on a Google.com e-mail site? A. Because we don't want to collect personal CAROL J. THOMAS STENOTYPE REPORTING SERVICES, INC. www.carolthomasreporting.com 800-322-9221 HARRIS & DUSTAN v. COMSCORE, INC. September 12, 2012 YVONNE BIGBEE Page 56 1 collect it, or is it programmed to not collect it? 2 A. It's programmed not to collect it. 3 Q. I understand. How about things on -- 4 regarding the same HTTPS/HTML post data, are things like 5 user names collected by comScore software? 6 A. It's fuzzified before collection. 7 Q. So -- and we will talk more about 8 fuzzification in just a few minutes, but user names are 9 collected in some form by the software? 10 MR. SWEDLOW: 11 answered. 12 I'll object as asked and in the answer. 13 14 I ask you not to say the word fuzzified MR. THOMASSEN: I understand what she's saying. 15 MR. SWEDLOW: 16 as asked and answered. 17 Well, then I'm going to object BY MR. THOMASSEN: 18 Q. You can answer. 19 A. Can you repeat the question? 20 Q. Sure. 21 22 I asked you whether user names were collected, and you said, well, they're fuzzified. Is that fuzzified information still sent up to CAROL J. THOMAS STENOTYPE REPORTING SERVICES, INC. www.carolthomasreporting.com 800-322-9221 HARRIS & DUSTAN v. COMSCORE, INC. September 12, 2012 YVONNE BIGBEE Page 57 1 comScore server? 2 A. Yes. 3 Q. Okay. 4 How about things like passwords, same process? 5 A. Same process. 6 Q. Credit card numbers? 7 A. Fuzzification is applied. 8 Q. And then the fuzzified information -- 9 A. Fuzzified data is sent up. 10 Q. Right. 11 A. Same process. 12 And Social Security numbers? MR. THOMASSEN: Okay. This would be actually 13 a good place for me to take a break, mostly because 14 I have to use the restroom. 15 MR. SWEDLOW: 16 (Whereupon, a recess was taken.) 17 MR. THOMASSEN: 18 19 I object. Back on. BY MR. THOMASSEN: Q. Before we move on, is it accurate to say that 20 all HTTP and HTTPS page data is collected unless 21 specified by a rule file to not collect it? 22 A. No. Everything is dictated in the rules file CAROL J. THOMAS STENOTYPE REPORTING SERVICES, INC. www.carolthomasreporting.com 800-322-9221 HARRIS & DUSTAN v. COMSCORE, INC. September 12, 2012 YVONNE BIGBEE Page 59 1 look for patterns in the data that could be sensitive, 2 and we either hash the data or X out enough of the 3 string where it is no longer personally identifiable. 4 5 Q. So you talked about two things there, hashing and then X-ing out. Those are different things? 6 A. Yes. 7 Q. Can you describe what hashing is? 8 A. It is -- hashing is -- there's a mathematical 9 formula, where we take the string itself and apply this 10 algorithm to it, and then the outcome is an 18-digit 11 long string of numbers that kind of represents an 12 original string, but it's completely different. 13 14 Q. I understand. Is there one hashing formula that applies to all data that is hashed? 15 A. Yes. 16 Q. Okay. 17 18 Now, what about X-ing out; what is that? A. Where we actually take the string; instead of 19 applying the hashing algorithm, we just replace the 20 digits with X. 21 Q. Is that the same thing as zeroing? 22 A. Yes, same concept. CAROL J. THOMAS STENOTYPE REPORTING SERVICES, INC. www.carolthomasreporting.com 800-322-9221 HARRIS & DUSTAN v. COMSCORE, INC. September 12, 2012 YVONNE BIGBEE Page 60 1 2 Q. So would you say that hashing is synonymous with fuzzification? 3 A. No. 4 Q. So how is hashing different than 5 fuzzification? 6 A. Hashing is just one form of fuzzification. 7 Q. So if I were to say this string has been 8 hashed, would I also be saying that this string has been 9 fuzzified? 10 A. Yes. 11 Q. Okay. 12 And X-ing out, that is also a form of fuzzification? 13 A. Yes. 14 Q. So let's take a credit card number, for 15 example. They are 14 digits long, I think? 16 A. Sixteen. 17 Q. Sixteen digits long? 18 Are credit card numbers ever X-ed out? 19 A. Yes. 20 Q. How many of the credit card numbers would be 21 22 X-ed out? A. We -- I believe we keep the first six or CAROL J. THOMAS STENOTYPE REPORTING SERVICES, INC. www.carolthomasreporting.com 800-322-9221 HARRIS & DUSTAN v. COMSCORE, INC. September 12, 2012 YVONNE BIGBEE Page 65 1 Q. Okay. 2 A. -- that checks for fuzzification. 3 Q. Any other ways? 4 A. We have the QA test team, that every release 5 cycle, we go through a regression test script. 6 Q. Can you tell me what that means? 7 A. They -- it's a test plan that the test team 8 will execute against features of our software to make 9 sure that it's functioning properly, to make sure that 10 fuzzification is applied correctly, to make sure that 11 the upgrade mechanism is working properly. 12 13 So those would be on -- as part of the test plan. 14 Q. Okay. 15 A. Those are the two that I can think of at the 16 moment. 17 Q. Okay. Any other ways? You mentioned a while ago that comScore 18 fuzzifies what it considers to be sensitive information; 19 is that right? 20 A. Correct. 21 Q. How does comScore determine what is or is not 22 sensitive information? CAROL J. THOMAS STENOTYPE REPORTING SERVICES, INC. www.carolthomasreporting.com 800-322-9221 HARRIS & DUSTAN v. COMSCORE, INC. September 12, 2012 YVONNE BIGBEE Page 66 1 A. We look for patterns in the data. So in the 2 example of a 16-digit consecutive numeric number, we 3 assume that that's a credit card number. 4 Q. 5 Okay. Let me ask this a different way. How is the determination made at the outset 6 that information should be fuzzified? 7 comScore fuzzifies credit card numbers; at some point, 8 it was determined that credit card numbers are something 9 that should be fuzzified. 10 11 12 13 So, for example, How is that determination made? A. It is made on the user's machine, while our software is running. Q. Okay. Let me -- I'm trying to find out how 14 comScore determines that things like names, e-mails, 15 dates of birth, credit card numbers, Social Security 16 numbers are sensitive information that should be 17 fuzzified. 18 19 20 MR. SWEDLOW: And I'm going to provide you a an instruction. To the extent that comScore makes that 21 decision based upon the advice of counsel, 22 including that guy over there, who's your in-house CAROL J. THOMAS STENOTYPE REPORTING SERVICES, INC. www.carolthomasreporting.com 800-322-9221 HARRIS & DUSTAN v. COMSCORE, INC. September 12, 2012 YVONNE BIGBEE Page 67 1 counsel, I'm going to instruct you not to answer, 2 because that communication and the product of that 3 communication is protected from disclosure. 4 I want you to answer the question, but I want 5 you to understand my instruction. 6 Are you okay with what I'm saying? 7 MR. THOMASSEN: 8 9 A. I think I'm not going to answer it, based on -- 10 11 Yes. MR. SWEDLOW: A. What I just said? -- attorney-client privilege. 12 MR. SWEDLOW: 13 So I'll just make the statement that the 14 determination of what is sensitive and what isn't 15 sensitive includes the attorney advice. 16 17 18 Yes. MR. THOMASSEN: Okay. BY MR. THOMASSEN: Q. How does -- so you mentioned that the Mystery 19 Shopper program is one way that comScore determines that 20 it's properly fuzzifying information that should be 21 fuzzified; right? 22 A. Correct. CAROL J. THOMAS STENOTYPE REPORTING SERVICES, INC. www.carolthomasreporting.com 800-322-9221 HARRIS & DUSTAN v. COMSCORE, INC. September 12, 2012 YVONNE BIGBEE Page 68 1 Q. What happens when the Mystery Shopper program 2 determines that information is not properly being 3 fuzzified? 4 A. They will report the incident to the QA team 5 to reproduce. 6 make a rules change to update our fuzzification logic to 7 enhance the new pattern. Then the QA team will, when possible, 8 Q. How is fuzzification logic updated? 9 A. By a rules file. 10 Q. And those are rules files that are referenced 11 by the OSSProxy software? 12 A. Yes. 13 Q. Okay. 14 15 16 17 18 At what point is a JIRA ticket opened about a problem like we're discussing now? A. A JIRA ticket is logged when a code change is required by the development team. Q. So who would initially open a JIRA ticket, if that's the right word? 19 A. For this particular incident? 20 Q. Yes. 21 A. Most of the time, it would be done by the QA 22 team, after reproducing the problem. CAROL J. THOMAS STENOTYPE REPORTING SERVICES, INC. www.carolthomasreporting.com 800-322-9221 HARRIS & DUSTAN v. COMSCORE, INC. September 12, 2012 YVONNE BIGBEE Page 72 1 Q. 2 Good guess. Do you know what -- let me ask you this. Does 3 comScore ever fuzzify specific categories of information 4 for some panelists but not for others? 5 A. No. 6 Q. The information is either fuzzified for 7 everyone or fuzzified for no one? 8 A. I believe so. 9 Q. Okay. 10 Do you know, within this fuzzification context, what a black list is? 11 A. Yes. 12 Q. What is a black list? 13 A. The black list is the name of the rules file 14 that we just discussed, where we can upload specific 15 rules to apply new fuzzification logic. 16 17 Q. Where does the -- so does the black list reside in comScore servers? 18 A. Yes. 19 Q. Is the black list referenced every single time 20 information is collected by OSSProxy? 21 A. Yes, when it's page data and post data. 22 Q. So if I fill out a form on a website and hit CAROL J. THOMAS STENOTYPE REPORTING SERVICES, INC. www.carolthomasreporting.com 800-322-9221 HARRIS & DUSTAN v. COMSCORE, INC. September 12, 2012 YVONNE BIGBEE Page 73 1 send, and that information is transmitted to the -- I 2 don't know what to call it -- to the website, to the 3 external servers, before comScore determines whether to 4 collect the information from that page, the blacklist 5 rule is referenced? 6 A. Yes. 7 Q. Okay. 8 Is there also a copy of the black list on users' computers? 9 A. It's in memory of the user's computer. 10 Q. What do you mean, it's in memory? 11 A. When OSSProxy runs, it obtains the rules 12 files, and it holds all the rules files in its allocated 13 memory on the computer's machine. 14 15 Q. Is there ever an instance where OSSProxy would be running but using an out-of-date black list? 16 A. If you don't have access to the internet, then 17 we wouldn't be able to update a fresh, new set, but at 18 that point, you wouldn't be surfing. 19 Q. Right. 20 A. So if you have an active internet connection, 21 our software should be able to obtain the most updated 22 list. CAROL J. THOMAS STENOTYPE REPORTING SERVICES, INC. www.carolthomasreporting.com 800-322-9221

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?