Dunstan et al v. comScore, Inc.
Filing
180
ANSWER to amended complaint by comScore, Inc.(Stack, Paul)
IN THE UNITED STATES DISTRICT COURT
FOR THE NORTHERN DISTRICT OF ILLINOIS
EASTERN DIVISION
MIKE HARRIS and JEFF DUNSTAN,
individually and on behalf of a class of similarly
situated individuals,
)
)
)
)
)
)
)
)
)
)
)
)
Plaintiffs,
v.
COMSCORE, INC., a Delaware corporation,
Defendant.
No. 11 C 5807
Judge Holderman
Magistrate Judge Kim
ANSWER TO SECOND AMENDED COMPLAINT
Now comes COMSCORE, INC. (“comScore”), defendant herein, by its attorneys, and for
its Answer to the Second Amended Complaint, states as follows:
1.
comScore designs, distributes, and deploys its data collection software in a deceptive
and calculated fashion to unlawfully monitor the most personal online movements of millions of
consumers without their knowledge.
ANSWER:
comScore denies the allegations contained in paragraph 1 of the Complaint
and each of them. Answering further, comScore affirmatively states that it is a leading Internet
market research company that designs and distributes software to measure the online activity of
Internet users (“Panelists”) who volunteer to join a comScore market research panel in exchange for
various benefits. comScore specifically denies that its business practices are “deceptive” or are
implemented “without the[] knowledge” of its Panelists, for the reasons set forth in response to
Paragraph 12 of the Complaint, below.
2.
comScore provides high profile clients such as the Wall Street Journal, the New York
Times, and Fox News with detailed data that it collects from millions of consumers online
(hereinafter referred to as “monitored consumers”). These clients pay enormous fees for access to
comScore’s highly valuable and comprehensive store of information about consumers.
1
ANSWER:
comScore admits that it measures certain online activity of its Panelists.
comScore further admits that its clients have included companies like the Wall Street Journal, the
New York Times, and Fox News, which use the information for their ordinary business purposes.
comScore denies that any client of comScore’s syndicated services, like the clients called out in this
paragraph, was provided with any detailed data that comScore had collected from its Panelists, as
those clients are only provided aggregated data (i.e., comScore would disclose, for example, that in
December, four million people went to www.anydomain.com, and has never and would never
disclose that on December 18, a specific Panelist went to www.anydomain.com). Except as expressly
admitted herein, comScore denies the remaining allegations of paragraph 2 of the Complaint and
each of them.
3.
comScore asserts that its data provides insight into the purchasing habits, market
trends, and other online behavior of consumers. In order to gather such extensive data, comScore
relies upon a large pool of consumers with comScore’s software operating on their computers:
“[C]entral to most comScore services is the comScore panel, the largest continuously measured
consumer panel of its kind. With approximately 2 million worldwide consumers under continuous
measurement, the comScore panel utilizes a sophisticated methodology that is designed to accurately
measure people and their behavior in the digital environment.”
ANSWER:
comScore admits that its data provides insight into the purchasing habits,
market trends, and other online behavior of Panelists. comScore further admits that in order to
gather such data, comScore relies on a pool of Internet users who voluntarily install comScore’s
software on their computers and thereby become Panelists. comScore further admits that the quoted
text within the second sentence appeared on certain comScore web pages at certain times.
Answering further, plaintiffs set forth various statements in footnotes to their Complaint contrary to
Rule 10(b) of the Federal Rules of Civil Procedure which requires that “all averments of claim . . .
shall be made in numbered paragraphs . . . .” (Emphasis added). Since the statements in the
footnotes do not appear in numbered paragraphs, they are mere surplusage and should be stricken.
2
4.
As one of the biggest players in the Internet research industry, statistics gleaned from
comScore’s consumer data are featured in major media outlets on a daily basis. However, what lies
beneath comScore’s data gathering techniques is far more sinister and shocking to all but the few
who fully understand its business practices. Namely, comScore has developed highly intrusive and
robust data collection software known by such names as RelevantKnowledge, OpinionSpy, Premier
Opinion, OpinionSquare, PermissionResearch, and MarketScore (hereinafter collectively referred to
in the singular as “Surveillance Software”) to surreptitiously siphon exorbitant amounts of sensitive
and personal data from consumers’ computers. Through subsidiaries bearing innocuous names,
comScore uses deceitful tactics to disseminate its software and thereby gain constant monitoring
access to millions of hapless consumers’ computers and networks.
ANSWER:
comScore admits that the media has featured some of its reports, which are
based on data gathered from Panelists that have been weighted and aggregated to form a releasable
product. comScore further admits that it has developed software which has been branded with
names including RelevantKnowledge, Premier Opinion, OpinionSquare, PermissionResearch, and
MarketScore (although not all of these brands currently exist), each of which is designed to collect
information about the online activity of Internet users who volunteer to be Panelists. comScore
denies that its software has been designed to collect sensitive or personal data, as the current
software has actually been designed to automatically filter out these types of data (including credit
card numbers, social security numbers, account numbers, User IDs, and passwords), so that such
information is not transmitted to comScore. comScore admits that it does have subsidiaries, but
denies the use of deceitful tactics to disseminate its software. Plaintiffs use the term “Surveillance
Software” to describe comScore’s proprietary software. comScore affirmatively states that this term
is both pejorative and false and comScore denies the accuracy of the term when it appears in passim
in the Complaint. Except as expressly admitted herein, comScore denies the allegations of paragraph
4 of the Complaint and each of them.
3
5.
comScore’s sophisticated computer applications monitor every action conducted by
users. This data is sent to comScore’s servers, and then organized and sold to its clients.
ANSWER:
comScore denies the allegations of paragraph 5 of the Complaint and each of
them. comScore affirmatively states that its software measures certain limited information regarding
the online activity of its Panelists. comScore further acknowledges that some of this limited
information is sent to comScore’s servers and is then aggregated for analysis. comScore admits that
its syndicated clients pay for access to this aggregated data. comScore specifically denies that it
monitors “every action” conducted by its Panelists.
6.
To extract this data, comScore’s Surveillance Software injects code into the user’s
web browser to monitor everything viewed, clicked, or inputted online. In addition, the software
opens ports, modifies the consumer’s firewall, and places “root certificates” on the affected
computer to ensure unimpeded access.
ANSWER:
comScore admits that when a Panelist voluntarily installs the comScore
software, it works with the Panelist’s web browser (e.g., Internet Explorer, Firefox) to measure
certain of the Panelist’s online activity. comScore admits that certain versions of its software can
make modifications to the Windows Firewall that was introduced with XP Service Pack 2, and
further states that any such modifications are done in accordance with publically available Windows
documentation and, to comScore’s knowledge, comply with the purpose of, or are consistent with,
this feature as provided by the Windows operating system. comScore admits that its software, like
any other Internet enabled software, connects to a port on a web server. comScore specifically
denies that its software monitors “everything viewed, clicked, or inputted online.” comScore also
specifically denies that its software currently installs “root certificates.” Except as expressly admitted
herein, comScore denies the allegations of paragraph 6 of the Complaint and each of them.
7.
The scope and breadth of data that comScore collects from unsuspecting consumers
is terrifying. By way of illustration, comScore’s Surveillance Software constantly collects and
transmits the following data, among others, from a consumer’s computer to comScore’s servers:
4
a)
the monitored consumer’s usernames and passwords;
b)
queries on search engines like Google;
c)
the website(s) the monitored consumer is currently viewing;
d)
credit card numbers and any financial or otherwise sensitive information
inputted into any website the monitored consumer views;
e)
the goods purchased online by the monitored consumer, the price paid by
the monitored consumer for the goods, and amount of time the monitored
consumer views the goods before purchase; and
f)
ANSWER:
specific advertisements clicked by the monitored consumer.
Except as expressly stated herein, comScore denies the allegations of
paragraph 7 of the Complaint and each of them. comScore affirmatively states that its software
collects certain data from Panelists, including queries on search engines; what websites are viewed by
Panelists; what goods are purchased by Panelists; what advertisements are clicked by Panelists; the
length of time a Panelist is online; and how much a Panelists pays for items in online transactions.
comScore specifically denies that its software “constantly collects and transmits” items like credit
card numbers, social security numbers, account numbers, user IDs, or passwords; instead, comScore
affirmatively states that its software is designed to identify these types of data so that it can
irreversibly mask that information or otherwise prevent its transmission to comScore.
8.
After the Surveillance Software is installed on a monitored consumer’s computer,
information concerning all Internet traffic from the consumer’s computer is transmitted to
comScore servers.
ANSWER:
comScore denies the allegations of paragraph 8 of the Complaint and each of
them. comScore specifically denies that any Internet traffic from a panelist’s computer is rerouted
through comScore servers.
9.
Furthermore, comScore’s Surveillance Software seeks out and scans every file on the
monitored consumer’s computer (including word processing documents, emails, PDFs, image files,
5
spreadsheets, etc.), and sends information resulting from examination of those files to comScore’s
servers.
ANSWER:
Except as expressly stated herein, comScore denies the allegations of
paragraph 9 of the Complaint and each of them. comScore affirmatively states that its software
collects statistics on the number of files installed on a Panelist’s computer (such as the number of
PDF or Microsoft Word files). comScore further admits that its software collects statistics on the
versions and types of installed software on a Panelist’s machine (e.g., whether a Panelist’s machine
has Microsoft Word installed). comScore denies that it scans every file on a Panelist’s computer.
10.
Although comScore claims that its software only mines data from the individual
consumer’s computer, it designed its Surveillance Software to scan files located on any network the
host computer is connected to, and sends data about those files back to comScore’s servers. In this
way, every available file housed on the monitored consumer’s local network is accessed by comScore
without authorization.
ANSWER:
Except as expressly stated herein, comScore denies the allegations of
paragraph 10 of the Complaint and each of them. comScore affirmatively states that, for a limited
period of time, it experimented with establishing a panel for Macintosh users (“Mac Panel”), and
developed Macintosh-compatible software specifically for that purpose. comScore admits that the
Mac Panel software was publically available as a limited release beginning on September 29, 2009.
comScore further admits that a bug in the Macintosh version of its software potentially allowed the
software to count the number of specific types of files located on networks to which Panelists’
Macintosh computers were connected, and that this bug was corrected in June 2010. comScore
terminated the Mac Panel on or around September 25, 2010. None of the data collected through the
Mac Panel was ever shared with, or sold to, a third party.
11.
Because of Defendant’s covert methods for deploying its software, millions of
monitored consumers remain wholly unaware that their every online movement is under constant
surveillance by comScore.
6
ANSWER:
comScore denies the allegations of paragraph 11 of the Complaint and each
of them. comScore denies that it employs “covert methods for deploying its software.” To the
contrary, comScore’s software is designed so that comScore’s Terms of Service (“TOS”) are
presented directly to prospective Panelists prior to completion of the installation process. The TOS
disclose the types of information that comScore collects and the methods by which it is collected.
Prospective Panelists must click to indicate they have read and agreed to the TOS or comScore’s
software will not install. Moreover, in Fall 2007, comScore implemented its “Watchdog” or “RK
Verify” program, a computer program that ensures the TOS is shown to users during the installation
process. comScore’s software will not install unless the “Watchdog” or “RK Verify” program
verifies that the TOS was shown to, and accepted by, the user. comScore further notes that, in early
2008, it introduced an icon that appears on a Panelist’s “system tray” any time that comScore
software is running, which conspicuously discloses the presence of the software to Panelists. The
icon is also displayed in Windows’ “All Programs” menu. In addition, comScore continually delivers
messages to Panelists after they join. These messages include a Welcome message sent after
installation that thanks Panelists for joining the Panel and provides a link to comScore’s Privacy
Policy and to an FAQ that discusses, among other things, how to uninstall comScore’s software.
These messages also include invitations to participate in surveys, clearly branded with the name of
the panel of which the user is a member. Panelists may also receive benefits that remind them of
their participation, including rewards programs that allow them to collect points for doing things like
participating in surveys - the collected points can then be redeemed for a variety of items including
gift cards or household items. Finally, comScore’s privacy policy and practices have been vetted by a
number of third party auditors including TRUSTe, Grant Thornton, and Ernst and Young,.
comScore has received certificates of approval for its privacy policy and practices (including for the
manner in which it discloses its software) from WebTrust, Better Business Bureau, VeriSign Trusted,
Trust Guard, and Network Solutions (among others).
7
12.
To induce individuals to download and install its software, comScore “bundles” its
Surveillance Software with software developed by third parties. The third-party software is generally
offered at no cost, and includes popular items such as free screensavers and games, and functional
applications such as music-copying programs, or greeting-card templates. comScore pays the thirdparty every time a consumer downloads the bundled software.
ANSWER:
comScore admits that it recruits Panelists through a variety of online
methods, including through third-parties that offer comScore’s software during the installation
process of their own software applications. comScore further admits that third parties may offer this
third-party software at no cost to prospective Panelists. comScore further admits that it compensates
its third party partners that offer the comScore software during the installation process of their own
software. Except as expressly admitted herein, comScore denies the allegations of paragraph 12 of
the Complaint and each of them.
13.
In many cases, comScore provides no method for the monitored consumer to
uninstall its software, and often deceives the consumer into thinking that all of comScore’s nefarious
software has been removed. Moreover, comScore designed its computer applications to resist
attempts to uninstall the Surveillance Software. For example, when a consumer uninstalls the thirdparty freeware program, comScore’s Surveillance Software will not be removed.
ANSWER:
comScore denies the allegations of paragraph 13 of the Complaint and each
of them. comScore’s software is designed so that it can be permanently and easily uninstalled using
the standard Windows “Add or Remove Programs” utility. Moreover, when the software has been
installed, an icon appears in the Panelist’s system tray to conspicuously disclose the software’s
presence, thereby signaling to the user whether the software is currently installed. The icon
disappears when the software has been uninstalled. comScore affirmatively states that it is inaccurate
to refer to the relationship between comScore and its third party distribution partners as involving a
“bundle.” In fact, once installed, the comScore software is independent of the software provided by
the third party, precisely so that an individual may remove the comScore software at any time and
8
independent of the other software installed on this individuals’ computer. comScore admits that to
remove comScore’s software, a Panelist must uninstall the comScore software, but the converse is
also true: the removal of comScore’s software does not also remove the third party software. In this
instance, the comScore software is simply a separate offer made as part of the third party provider’s
installation process; it is not a “bundle.”
14.
comScore designed its Surveillance Software to be highly persistent. User attempts to
disable comScore’s applications are wholly ineffectual, as the software automatically re-starts itself
when deactivated. As a result, it is impossible to “turn off” comScore’s 24/7 monitoring.
ANSWER:
comScore denies the allegations of paragraph 14 of the Complaint and each
of them. comScore affirmatively states that its software can be permanently uninstalled using the
Windows “Add or Remove Programs” utility. After a Panelist properly uninstalls the comScore
software, the software does not automatically restart itself.
15.
Even if a monitored consumer can manage to manually uninstall the Surveillance
Software, Defendant programmed its applications to secretly leave behind a comScore root
certificate. As discussed in more detail in Section VII, infra, leaving an untrusted root certificate on a
user’s computer exposes that individual to attacks by hackers, and allows comScore to re-monitor
the consumer’s computer in the future.
ANSWER:
comScore denies that it “programmed its applications to secretly leave
behind a comScore root certificate.” comScore made use of root certificates with an early version of
its software, but no current version of its software has employed root certificates since April 2005.
comScore further denies that the installation of a root certificate exposes users to harm from
hacking or that it allows comScore to “re-monitor the consumer’s computer.” comScore believes
that installation of a root certificate in and of itself does not expose users to harm from hacking, as
no alternative use may be made of this certificate without possession of a master certificate, to
comScore’s knowledge. comScore has strictly limited internal access to the certificate authority and
is not aware of any instances in which third parties have had access to the certificate authority. A
9
root certificate does not create “back door” access to a consumer’s computer, so comScore is
incapable of “re-monitoring the consumer’s computer” with the existence of a root certificate by
itself. Except as expressly admitted herein, comScore denies the allegations of paragraph 15 of the
Complaint and each of them.
16.
Defendant’s Terms of Service (“TOS”) do not reveal the extensive and highly
intrusive amount of data collected by comScore from consumers’ computers.
ANSWER:
comScore denies the allegations of paragraph 16 of the Complaint and each
of them. comScore’s TOS discloses to all prospective Panelists what types of information comScore
collects and how the information is collected.
17.
On information and belief, comScore has intentionally designed its Surveillance
Software and business practices to surreptitiously maximize both the number of consumers
monitored by Defendant, as well as the breadth of information collected.
ANSWER:
comScore denies the allegations of paragraph 17 of the Complaint and each
of them.
18.
comScore’s nefarious tactics drive its bottom line by enabling the company to sell
valuable consumer information to clients for enormous fees. While highly lucrative to the company,
comScore’s methods demonstrate a wholesale disregard for consumer privacy rights and violate
numerous federal laws.
ANSWER:
comScore denies the allegations of paragraph 18 of the Complaint and each
of them.
19.
Plaintiff Mike Harris is a natural person and citizen of the State of Illinois.
ANSWER:
comScore lacks knowledge or information sufficient to form a belief as to
the truth of the allegations in paragraph 19, and on that basis, denies them.
20.
Plaintiff Jeff Dunstan is a natural person and citizen of the State of California.
ANSWER:
comScore lacks knowledge or information sufficient to form a belief as to
the truth of the allegations in paragraph 20, and on that basis, denies them.
10
21.
Defendant comScore, Inc. is a Delaware corporation with its headquarters located at
11950 Democracy Drive, Suite 600, Reston, Virginia 20190. Defendant does business throughout
the State of Illinois and the United States.
ANSWER:
22.
comScore admits the allegations set forth in paragraph 21 of the Complaint.
This Court has jurisdiction over the subject matter of this action pursuant to 28
U.S.C. § 1331. This Court has jurisdiction over Defendant because it conducts business in Illinois
and/or because the improper conduct alleged in the Complaint occurred in, was directed from,
and/or emanated or exported from Illinois.
ANSWER:
The allegations of paragraph 22 are legal conclusions to which no response is
required. To the extent a response is required, comScore denies that subject matter jurisdiction
exists.
23.
Venue is proper in this District under 28 U.S.C. § 1391(a) because the injury arose in
this District. Venue is additionally proper because Defendant transacts significant business in this
District, including entering into consumer transactions, and because Plaintiff Mike Harris is a
resident of Illinois.
ANSWER:
The allegations of paragraph 23 are legal conclusions to which no response is
required. To the extent a response is required, comScore admits that it transacts business in this
District.
24.
comScore is an Internet research corporation that provides marketing data to a wide
variety of clients, generally in the form of aggregated reports about online consumer behavior. To
collect the data necessary for its reports, comScore monitors consumers’ actions using Surveillance
Software operating on users’ computers.
ANSWER:
comScore admits that it measures the online activity of Internet users who
volunteer to become Panelists, using proprietary software that Panelists voluntarily install on their
computers, and that it provides market research data to its clients. Except as expressly admitted
herein, comScore denies the allegations of paragraph 24 of the Complaint and each of them.
11
25.
The data collected about monitored consumers by the Surveillance Software is
transmitted, often in real-time, to comScore’s servers. This information is aggregated and organized
for Defendant’s marketing reports, which are then sold to its clients. comScore currently monitors at
least two million computers worldwide.
ANSWER:
comScore admits that the data collected from Panelists through comScore’s
software is transmitted to comScore’s servers. comScore further admits that it provides certain
syndicated clients with access to reports after the information is aggregated (e.g., comScore would
disclose, for example, that in December, four million people went to www.anydomain.com, and has
never and would never disclose that on December 18, a specific panelist went to
www.anydomain.com). comScore admits that there are currently over two million people under
measurement worldwide. Except as expressly admitted herein, comScore denies the allegations of
paragraph 25 of the Complaint and each of them.
26.
comScore’s clients vary widely by industry and size, and include high-profile
companies such as the New York Times, the Wall Street Journal, Procter and Gamble, and Eli Lilly
and Company. These companies use comScore’s reports for, among other things, statistics for news
articles and gauging consumer interest in products and services.
ANSWER:
comScore admits that its clients vary by industry and size, and include
companies such as the New York Times, the Wall Street Journal, Proctor and Gamble, and Eli Lilly
and Company, who use comScore’s data as part of their ordinary business practices. Except as
expressly admitted herein, comScore lacks information sufficient to form a belief as to the truth of
the remaining allegations in paragraph 26 of the Complaint, and on that basis, denies them.
27.
comScore is capable of parsing enormous amounts of information and extrapolating
narrowly defined trends and statistics, as evidenced by the following quote from the New York
Times: “ComScore found a decline of 10 percent in time spent on Web-based email among 18- to
24-year-olds, about the same as it found for people up to the age of 54.”
12
ANSWER:
comScore admits that its data can be used to identify certain trends and
statistics. Except as expressly admitted herein, comScore lacks information sufficient to form a
belief as to the truth of the remaining allegations in paragraph 27 of the Complaint, and on that
basis, denies them.
28.
To provide the highly targeted research data noted above, comScore—through its
Surveillance Software—constantly collects, monitors, and analyzes every online move, no matter
how private, of over two million people.
ANSWER:
comScore admits that its software obtains limited information about the
online activity of Internet users who volunteer to become Panelists. comScore denies that it
“collects, monitors, and analyzes every online move” of its Panelists, and offers as an example that
comScore’s software is specifically designed not to collect text messages or the text of emails, and
that this is just one example of the many areas not monitored by comScore’s software. comScore
denies the remaining allegations of paragraph 28 of the Complaint and each of them.
29.
Unfortunately, most, if not all monitored consumers are not aware of the depth of
data comScore mines from their computers every day. In many cases, consumers are not even aware
of the Surveillance Software’s very existence.
ANSWER:
comScore incorporates its response to paragraph 11. Except as expressly
admitted therein, comScore denies the allegations of paragraph 29 of the Complaint and each of
them.
30.
As stated in Section I, supra, comScore tracks the online behavior of over two
million (2,000,000) consumers worldwide. To accomplish this, comScore has developed proprietary
software that monitors every action conducted on an individual’s computer. comScore deploys this
software primarily by two methods: 1) online respondent acquisition and 2) a third-party application
provider program.
ANSWER:
comScore admits that its worldwide Panel consists of around two million
Internet users. comScore further admits that it has developed proprietary software that Panelists
13
voluntarily download and install, which measures the Panelists’ online activity. comScore further
admits that its software is distributed through multiple methods. comScore denies that its software
monitors every action conducted on an individual’s computer. comScore denies the remaining
allegations of paragraph 30 of the Complaint and each of them.
31.
Online respondent acquisition simply refers to comScore’s method of paying affiliate
partners to post comScore’s advertisements on their websites in an effort to solicit consumers to
download comScore’s Surveillance Software. To entice consumers to download the Surveillance
Software, comScore offers sweepstakes enrollments and prizes in exchange for membership in its
“program.” Potential members are also offered software, such as computer games, for free.
ANSWER:
comScore admits that it recruits Panelists through a variety of online
methods, which include the use of banner advertisements on third party websites. comScore admits
that it pays third parties to post comScore’s advertisements on their websites. comScore further
admits that in exchange for volunteering to become a member of a panel, Panelists may be offered
various benefits including planting of trees in their name, sweepstakes enrollments, prizes, points, or
free software. Except as expressly admitted herein, comScore denies the allegations of paragraph 31
of the Complaint and each of them.
32.
The second and more devious method that comScore uses to induce consumers to
install its Surveillance Software is through its third-party application provider program. This method
involves comScore paying developers to bundle the Surveillance Software with the third-party
application provider’s software. The third-party computer application included in the bundled
software may be a free screensaver, game, CD burning software, greeting card template, or any other
type of “freeware.” In many cases, the existence of the Surveillance Software bundled with the
freeware is only disclosed, in an inconspicuous fashion, after the installation process has already
begun.
ANSWER:
comScore admits that it recruits Panelists through a variety of online
methods, which include partnering with third party software developers that offer comScore’s
14
software during the installation of their own software. comScore further admits that the third-party
software may consist of free screensavers, games, CD burning software, greeting card templates, or
other types of “freeware.” comScore denies that the incorporation of its software with the thirdparty software is done “in an inconspicuous fashion” and incorporates by reference its response to
paragraph 11 regarding comScore’s various methods of disclosure. Except as expressly admitted
herein, comScore denies the allegations of paragraph 32 of the Complaint and each of them.
33.
For example, if a consumer downloads a free screensaver bundled with comScore’s
Surveillance Software, the third-party developer of the screensaver is then paid by comScore for the
download of the bundled software.
ANSWER:
comScore admits that it compensates the third-parties who provide an offer
for comScore’s software as part of the third parties’ software applications. Except as expressly
admitted herein, comScore denies the allegations of paragraph 33 of the Complaint and each of
them.
34.
comScore’s monitoring software is marketed through subsidiaries bearing names
such as TMRG, Inc. and VoiceFive, Inc., with varying names for its Surveillance Software, such as
RelevantKnowledge, OpinionSpy, Premier Opinion, OpinionSquare, PermissionResearch, and
MarketScore.
ANSWER:
comScore admits that its software is marketed through subsidiaries, including
but not limited to, TMRG, Inc. and VoiceFive, Inc. comScore further admits that its subsidiaries
have used varying names for comScore’s software over time, such as RelevantKnowledge, Premier
Opinion, OpinionSquare, PermissionResearch, and MarketScore. Except as expressly admitted
herein, comScore denies the allegations of paragraph 34 of the Complaint and each of them.
35.
As discussed herein, comScore’s intrusive methods for collecting highly sensitive
information from consumers’ computers are staggering. However, comScore’s Terms of Service
(“TOS”) presented (or not presented) to the user paint a far different picture than reality.
15
ANSWER:
comScore denies the allegations of paragraph 35 of the Complaint and each
of them.
36.
comScore’s full Privacy Policy and Terms of Service fail to disclose the following
facts regarding Surveillance Software operations performed on a consumer’s computer:
(a)
the Surveillance Software scans files on both local and network volumes;
(b)
the Surveillance Software has full rights to access and change any file on
the consumer’s computer;
(c)
the Surveillance Software opens an HTTP “backdoor” to transmit data;
(d)
the Surveillance Software has no user interface from which a consumer
can turn off the software, modify the settings, or otherwise determine what
information the software is collecting;
(e)
the Surveillance Software implants a “root certificate” that modifies the
consumer’s computer security settings, and the “root certificate” remains
on a consumer’s system even after the Surveillance Software is removed;
(f)
the Surveillance Software modifies a computer’s firewall settings;
(g)
the Surveillance Software transmits information concerning all of a consumer’s
internet traffic to comScore’s servers;
(h)
the Surveillance Software injects code without user intervention into
various web browsers and instant messaging applications;
(i)
the Surveillance Software can be upgraded, modified, and controlled
remotely, without consumer intervention or permission;
(j)
the Surveillance Software will not be deleted if a consumer deletes the free
application (e.g., free screensaver) with which the Surveillance Software
was bundled.
ANSWER:
comScore denies the allegations of paragraph 36 of the Complaint and each
of them, as well as Plaintiffs’ characterization of the TOS, which is a document that speaks for itself.
16
comScore affirmatively states that its proprietary software operates in a manner consistent with its
Privacy Policy and Terms of Service. comScore also affirmatively states that it has already denied
many of the so called “facts” upon which Paragraph 36 of the Complaint expressly relies.
37.
Often, comScore’s TOS do not display any actual reference to Defendant’s full
license agreement whatsoever. (See Exhibit A, attached hereto as a true and accurate copy of
comScore’s Premier Opinion Surveillance Software Terms of Service bundled with a screensaver.).
ANSWER:
Except as expressly set forth herein, comScore denies the allegations of
paragraph 37 of the Complaint and each of them. comScore affirmatively states that for a limited
period one third party partner failed to include a link to comScore’s full Privacy Policy and User
License Agreement, however, in these cases, the consumer was presented with comScore’s TOS and
was required to accept the terms of this TOS. However, this situation was quickly corrected and
affected a very small portion of Mac Panel users only. These Mac Panel users’data was never used in
any comScore reports, and thus was never provided, even in aggregate form, to anyone outside of
comScore. Moreover, the full terms of the Privacy Policy and User License Agreement were
available at all times to those Panelists through links installed in the Windows Start Menu, or
through an icon on a Mac. In the vast majority of cases, comScore’s TOS is presented directly to
prospective Panelists within a dialog box that pops up during the installation process. This dialog
box contains a link to comScore’s full User License Agreement and Privacy Policy (“ULA”), as
reflected in Exhibit A of the Complaint. comScore denies the remaining allegations of paragraph 37
of the Complaint, and each of them.
38.
In many instances, when a consumer installs third-party applications bundled with
comScore’s Surveillance Software, the graphical display shown to the user makes it appear that only
one piece of software is being installed. For example, if a person installs a free screensaver bundled
with Defendant’s RelevantKnowledge Surveillance Software, a screen will appear during, and not
before, the installation process displaying a brief description of comScore’s product. Importantly,
however, the screen is presented seamlessly with the rest of the installation.
17
ANSWER:
comScore admits that, when a prospective Panelist installs a free screensaver
that includes an offer for comScore’s RelevantKnowledge software, a dialog box appears during the
installation process containing comScore’s TOS, which discloses what type of information will be
collected and references comScore’s full ULA. Except as expressly admitted herein, comScore
denies the allegations of paragraph 38 of the Complaint and each of them.
39.
Other comScore TOS display screens are presented to the user during the bundled
software installation process in such a way that the average, non-expert consumer would not notice
the hyperlink to Defendant’s full agreement. Examples of these inadequacies include comScore
designing its TOS without a functioning link to the full terms, or wedging the link within a sentence,
only offset by color.
ANSWER:
comScore denies the allegations of paragraph 39 of the Complaint and each
of them.
40.
Once installed, comScore’s Surveillance Software continuously transmits the
monitored consumer’s online actions back to its servers, including information concerning virtually
all of the consumer’s Internet traffic.
ANSWER:
comScore admits that, once installed, its software collects and transmits
certain aspects of a Panelist’s online activity back to comScore’s servers. comScore denies that any
Internet traffic from a Panelist’s computer is sent through comScore’s servers before reaching a
destination website. Except as expressly admitted herein, comScore denies the allegations of
paragraph 40 of the Complaint and each of them.
41.
In order to collect information about a monitored consumer, comScore designed its
Surveillance Software to scan and examine a wide variety of items on the consumer’s computer.
Through its Surveillance Software, comScore injects code into the monitored consumer’s web
browser (i.e., Internet Explorer, Safari, Firefox) to monitor everything viewed, clicked, or typed into
the browser.
18
ANSWER:
comScore admits that when a Panelist downloads the comScore software,
computer code is installed that works with the Panelist’s web browser (e.g., Internet Explorer,
Chrome, Firefox) to measure the Panelist’s online activity. Except as expressly admitted herein,
comScore denies the allegations of paragraph 41 of the Complaint and each of them.
42.
Additionally, to facilitate its monitoring, comScore’s Surveillance Software adds an
exception to a the computer’s firewall, allowing it unfettered access. Because certain consumers’
firewalls are stricter than others, such an attempt to modify the firewall settings, or the subsequent
redirection of Internet traffic resulting from the firewall modification, often causes the firewall to
lockdown or “freeze” the computer to prevent further harm.
ANSWER: comScore admits that certain versions of its software make modifications to the
Windows Firewall that was introduced with XP Service Pack 2, and incorporates its response to
paragraph 6 of the Answer, as though fully set forth herein. comScore lacks knowledge and
information sufficient to form a belief as to the truth of the remaining allegations in paragraph 42 of
the Complaint, and on that basis, denies them.
43.
In addition to identifying the specific webpage that the monitored consumer is
viewing, the Surveillance Software also transmits information to comScore revealing how much the
individual pays for items in online transactions,1 how long the individual views items before
purchase, and much more. For example, comScore’s Surveillance Software observes and reports
where the monitored individual’s mouse is moving, such as whether or not the monitored consumer
is hovering over an advertisement.
ANSWER:
comScore admits that its software is able to identify the web pages that a
Panelist is viewing, and the length of time a Panelist is online. comScore denies that it has ever
1
In the aggregate, this information is used to provide insight into customer spending
habits, as evidenced by the following quote from Reuters: “U.S. consumers spent more than $35
billion online this holiday season, up 15 percent from the same period last year, comScore Inc
(SCOR.O) estimated on Tuesday.” Alistair Barr, Online holiday spending rises 15 percent:
comScore, Reuters (Dec. 27, 2011), available at http://www.reuters.com/article/2011/12/27/uscomscore-online-spending-idUSTRE7BQ1CO20111227.
19
measured the location or movement of the mouse. Except as expressly admitted herein, comScore
denies the remaining allegations of paragraph 43 of the Complaint.
44.
Perhaps more striking, the Surveillance Software is indiscriminate about the
information gathered and sent to comScore’s servers. Therefore, names, addresses, credit card
numbers, Social Security Numbers, and search terms on search engines are all siphoned and
transmitted to comScore.
ANSWER:
comScore denies the allegations of paragraph 44 of the Complaint and each
of them, and incorporates its response to paragraphs 4 and 7 of the Answer, as though fully set forth
herein.
45.
Because comScore requires precise demographic information to create its marketing
reports, the Surveillance Software must distinguish which user is currently using the computer at
what time. In other words, comScore must know whether or not a father (male, age 45) or his
daughter (female, age 14) is using the computer, as that information is necessary to produce accurate
demographic marketing reports. To that end, comScore has developed a patented procedure known
as “User Demographic Reporting” for creating biometric signatures of consumers by tracking
mouse movements and keystrokes. In this way, each time an individual uses the computer,
comScore’s Surveillance Software tracks his or her keystrokes and mouse movements until it
identifies the user as the 14-year-old daughter or 45-year-old father in the household.
ANSWER:
comScore admits that it developed “User Demographic Reporting”
(“UDR”), a proprietary technology designed to identify a particular Panelist in a household. Except
as expressly admitted herein, comScore denies the allegations of paragraph 45 of the Complaint and
each of them.
46.
comScore’s software is highly persistent and constantly runs in the background
during all computer activities, yet provides no mechanism to turn it off. If, for any reason, the
software stops running (including manual user attempts to stop it), it automatically restarts.
20
Accordingly, it is nearly impossible for a consumer to disable the Surveillance Software to avoid
spying on certain users of the computer system.
ANSWER:
comScore denies the allegations of paragraph 46 of Complaint and each of
them. comScore’s software is designed so that it can be permanently uninstalled using the standard
Windows “Add or Remove Programs” utility and so it is not “impossible” to “turn off” the
software. For those Panelists who do not uninstall the software, comScore admits that its software
runs in the background during a Panelist’s computer activities.
47.
By definition, comScore’s Surveillance Software is “spyware,” meaning it is designed
to gather data from a consumer’s computer without consent and transfer it to a third party. Because
of this characterization, scores of anti-virus and anti-spyware websites identify comScore
applications as “severe” or “high risk” spyware or adware. For example, Microsoft’s Malware
Protection Center has singled out several comScore applications as problematic. In the same vein,
numerous U.S. colleges and universities warn students of the dangers of running comScore’s
software and ban Internet traffic to Defendant’s servers.
ANSWER:
comScore denies that its software constitutes “spyware,” or that it is designed
to gather data from a consumer’s computer without consent. comScore affirmatively states that antivirus offerings from companies including Microsoft, AVG and McAfee categorize comScore’s
software as clean, and do not classify it as spyware. comScore lacks knowledge and information
sufficient to form a belief as to the truth of the remaining allegations in paragraph 47 of the
Complaint, and on that basis, denies each of them.
48.
comScore’s TOS indicate that the application will only monitor and collect data
about the computer on which it is installed. (See Exhibit A, and Section III, supra).
ANSWER:
comScore denies the characterization in Paragraph 48 of the Complaint of
comScore’s TOS, which speaks for itself.
21
49.
Defendant’s TOS are devoid of any mention that all files on that individual’s
computer will be scanned—and that information about those files will be sent to comScore’s
servers.
ANSWER:
comScore denies the characterization in Paragraph 49 of comScore’s Terms
of Service, which is a document that speaks for itself. comScore notes that its TOS informs users
that its software monitors and collects “certain hardware, software, computer configuration and
application usage information,” as depicted in Exhibit A to the Complaint. Further, comScore
denies the premise upon which paragraph 49 is based – that comScore’s software causes “all files on
that individual’s computer [to] be scanned.”
50.
In clear contrast to comScore’s TOS, its Surveillance Software additionally scans and
sends information about available files located on the local network—not just the individual
consumer’s computer—to Defendant’s servers.
ANSWER:
comScore incorporates its response to paragraph 10 of the Answer. Except
as expressly admitted herein, comScore denies the allegations of paragraph 50 of the Complaint.
51.
Put another way, if a monitored consumer uses a local network to store and access
files—a nearly ubiquitous practice among modern organizations—then the Surveillance Software
also scans all accessible files on the network and sends information about the data to comScore’s
servers. Depending on the network, these files may include confidential business files, financial
documents, trade secrets, or classified government documents.
ANSWER: comScore incorporates its response to paragraph 50 of the Complaint. Except
as expressly admitted therein, comScore denies the allegations of paragraph 51 of Complaint and
each of them.
52.
comScore’s Surveillance Software has no user interface from which a consumer can
turn off or uninstall the software, modify the settings, or otherwise control what information the
software is collecting.
22
ANSWER: comScore denies the allegations of paragraph 52 of the Complaint and each of
them. comScore’s software is designed so that it can be uninstalled using a Windows user’s “Add or
Remove Programs” utility.
53.
As discussed in Section II, supra, comScore pays third-party developers to bundle
Surveillance Software with their applications.
ANSWER: comScore admits that it pays third-party developers to offer comScore’s
software with their applications. Except as expressly admitted herein, comScore denies the
allegations of paragraph 53 of Complaint and each of them.
54.
Even assuming that an individual recognizes the implications of installing
comScore’s Surveillance Software in tandem with software such as a free screensaver, or later
determines that the free screensaver was the source of the comScore software, a reasonable
consumer would believe that once the screensaver was uninstalled, comScore’s software would be
uninstalled as well. That is not the case.
ANSWER: comScore denies Plaintiffs’ characterizations regarding what a “reasonable
consumer would believe,” and on that basis denies the allegations of paragraph 54 of the Complaint
and each of them. comScore’s software is designed so that it can be permanently uninstalled using
the standard Windows “Add or Remove Programs” utility. Any time comScore software is running,
an icon appears in the Panelists’ system tray to conspicuously disclose the software’s presence,
thereby signaling to the user whether or not the software has been uninstalled. Moreover, the
presence of comScore’s software is made known to Panelists in numerous other ways, as described
in comScore’s response in paragraph 11 of the Answer.
55.
When a monitored consumer uninstalls bundled software, comScore’s Surveillance
Software remains active on that monitored consumer’s computer. As a result, comScore continues
to collect information about the monitored consumer, even though the individual believes
comScore’s Surveillance Software was uninstalled. Indeed, the only way to remove comScore’s
Surveillance Software is by manually locating and removing it from the system.
23
ANSWER: comScore admits that, to remove comScore’s software, a Panelist must uninstall
comScore’s software and not the separate third-party freeware program, and incorporates its
response in paragraph 13 of the Answer as if fully set forth herein. comScore lacks knowledge and
information sufficient to form a belief as to the truth of the remaining allegations in paragraph 55
regarding the purported beliefs of consumers as characterized by Plaintiffs, and on that basis, denies
them. comScore notes, however, that its software can be uninstalled using a Windows user’s “Add
or Remove Programs” utility. Moreover, any time comScore software is running, an icon appears in
the Panelists’ system tray to conspicuously disclose the software’s presence, thereby signaling to the
user whether or not the software has been uninstalled.
56.
Because many consumers lack the requisite technical expertise to manually remove
comScore’s software, these users remain unwitting members of Defendant’s monitoring program. In
many cases, consumers are forced to purchase automated spyware removal software to fully
eliminate any traces of Defendant’s software.
ANSWER: comScore lacks knowledge and information sufficient to form a belief as to the
truth of the allegations in paragraph 56 of the Complaint and each of them, which reflects Plaintiffs’
characterizations of the “technical expertise” of consumers, and on that basis, denies them.
57.
If a monitored consumer manages to manually uninstall comScore’s Surveillance
Software, Defendant still leaves its own “root certificate” on the user’s computer.
ANSWER: comScore denies the allegations of paragraph 57 of Complaint and each of
them. comScore’s software stopped installing “root certificates” in April 2005.
A.
What is a Root Certificate?
58.
In very basic terms, a root certificate is part of an intricate system that helps ensure
that websites on the Internet are secure. Web browsers, such as Microsoft’s Internet Explorer, come
pre-packaged with a store of root certificates issued by trustworthy Certificate Authorities such as
VeriSign.2 A Certificate Authority, such as VeriSign, distributes certificates to trustworthy
2
VeriSign is a company that specializes in, among other things, online security and digital
certificates. To date, VeriSign is the largest provider of digital certificates.
24
companies like Amazon.com. When an individual browses Amazon.com, the user’s web browser
identifies a certificate that was “signed” by VeriSign, and the individual is given assurance that the
website is secure. Without this system, it would be extremely difficult, if not impossible, for users to
verify which websites were secure and thus safe to transmit sensitive information to, i.e. credit card
numbers and Social Security Numbers.
ANSWER: Paragraph 58 reflects Plaintiffs’ characterizations of general industry
information and does not require a response. To the extent a response is required, comScore lacks
information sufficient to form a belief as to the truth of the allegations in paragraph 58 of the
Complaint, and on that basis, denies them.
59.
A Certificate Authority, such as VeriSign, must follow stringent regulations in order
to have its root certificate included in a popular web browser. For example, Microsoft requires
entities applying for root certificates to comply with rigorous guidelines delineated by the WebTrust
for Certification Authorities program sponsored by the American Institute for Certified Public
Accountants (AICPA).
ANSWER: Paragraph 59 reflects Plaintiffs’ characterizations of general industry
information and does not require a response. To the extent a response is required, comScore lacks
information sufficient to form a belief as to the truth of the allegations in paragraph 59 of the
Complaint, and on that basis, denies them. comScore notes, however, its Panels are certified by
WebTrust, the very “certification authority” identified in this paragraph of the Complaint.
comScore’s Panels are also certified by, among others, the Better Business Bureau, VeriSign Trusted,
Trust Guard, and Network Solutions.
60.
To average users, the significance of a root certificate is most readily manifested by
the small lock in the top left of a web browser that appears when conducting secure transactions
over the Internet. This image provides the individual with peace of mind that sensitive information
can be transmitted to the website without interception by nefarious actors.
25
ANSWER: Paragraph 60 reflects Plaintiffs’ characterizations of the expectations of “average
users” and does not require a response. To the extent a response is required, comScore lacks
information sufficient to form a belief as to the truth of the allegations in paragraph 60 of the
Complaint, and on that basis, denies them.
B.
comScore Installs its Own Root Certificate Through its Surveillance
Software
61.
Included in the installation of the Surveillance Software is a comScore root
certificate. This root certificate allows comScore to collect information transmitted through the
user’s browser, regardless of whether or not the transaction is secure. In other words, because
comScore has installed its own root certificate, when a monitored consumer is viewing a website—
such as Amazon.com—and thinks that the transaction is free from interception by third-parties
because of the image of a small lock in the top left of the browser, that information is still captured
by Defendant.
ANSWER: comScore denies the allegations of paragraph 61 of the Complaint and each of
them. comScore’s software stopped installing “root certificates” in April 2005. comScore further
denies Plaintiffs’ characterizations of what “a monitored consumer” might believe with respect to
the monitoring of online activity.
62.
If a monitored consumer uninstalls the Surveillance Software, comScore has
designed its software to leave behind the root certificate.
ANSWER: comScore denies the allegations of paragraph 62 of the Complaint and each of
them. comScore’s software stopped installing “root certificates” in April 2005.
63.
The risks caused by untrusted root certificates are well documented and Defendant’s
actions pose serious risks to monitored consumers’ computer systems.3
3
Hackers use untrusted root certificates such as comScore’s to intercept personal data from
users without detection. Because the consumer mistakenly believes that the transaction is secure,
he or she assumes that it is safe to input sensitive financial or other information. Armed with
comScore’s root certificate, a hacker can create the faux appearance of a secure transaction.
Accordingly, the prospect that comScore may attempt to utilize the root certificates it has
intentionally left behind on monitored consumers’ computers is a very real threat.
26
ANSWER: comScore is not aware of any instances in which any consumers have been
harmed by the presence of a root certificate installed by the comScore software and, on that basis,
denies the allegations of paragraph 63 of the Complaint. Moreover, comScore stopped installing
“root certificates” in April 2005.
FACTS RELATING TO PLAINTIFFS
64.
In or around March of 2010, Plaintiff Mike Harris downloaded and installed a free
screensaver secretly bundled with comScore’s Surveillance Software onto his Macintosh computer.
The computer Plaintiff used was connected to a local wireless network.
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 64 of the Complaint, and on that basis, denies them.
65.
After discovering that he had inadvertently installed this software, he searched the
World Wide Web to determine how to get rid of the application. Harris attempted to uninstall the
screensaver, however the Surveillance Software continued operating. Plaintiff Harris has a high level
knowledge of information technology, and was still only able to uninstall the software after
conducting hours of diligent research.
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 65 of the Complaint, and on that basis, denies them.
66.
Plaintiff Harris did not agree to comScore’s Terms of Service and did not know that
he was installing Surveillance Software when he installed the free software.
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 66 of the Complaint, and on that basis, denies them. comScore notes,
however, that Plaintiff Harris would not have been able to install comScore’s software unless he
affirmatively clicked to agree to comScore’s Terms of Service, which expressly informs users of the
presence of comScore’s software. Assuming Plaintiff Harris installed comScore’s software, he would
have also been presented with a “welcome” pop up, after installation, thanking him for joining the
27
Panel and providing a link to comScore’s Privacy Policy and to an FAQ that discusses, among other
things, how to uninstall comScore’s software.
67.
In or around September of 2010, Plaintiff Jeff Dunstan downloaded and installed
free greeting card template software secretly bundled with comScore’s Surveillance Software onto
his personal computer running the Microsoft Windows operating system.
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 67 of the Complaint, and on that basis, denies them.
68.
After installation, Dunstan’s firewall detected the re-routing of his Internet traffic to
comScore servers, and in response, effectively disabled his computer from accessing the Internet. In
fact, Plaintiff Dunstan’s computer became entirely debilitated in reaction to the Surveillance
Software operating on his computer.
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 68 of the Complaint, and on that basis, denies them.
69.
Plaintiff Dunstan spent approximately ten hours investigating and researching how
comScore’s software became installed on his computer and how to remove it.
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 69 of the Complaint, and on that basis, denies them.
70.
Eventually, Plaintiff Dunstan had to pay forty dollars ($40) for third-party anti-virus
software to entirely remove the software from his computer and restore it to a functioning state.
Plaintiff Dunstan did not agree to comScore’s Terms of Service and did not know that he was
installing Surveillance Software when he installed the free software.
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 70 of the Complaint, and on that basis, denies them. comScore notes,
however, that Plaintiff Dunstan would not have been able to install comScore’s software unless he
affirmatively clicked to agree to comScore’s Terms of Service, which expressly informs users of the
presence of comScore’s software. Assuming Plaintiff Dunstan installed comScore’s software, he
28
would have also been presented with a “welcome” pop up, after installation, thanking him for
joining the Panel and providing a link to comScore’s Privacy Policy and to an FAQ that discusses,
among other things, how to uninstall comScore’s software. comScore further denies that Dunstan
“had to” purchase third-party anti-virus software to remove the comScore software, since the
software can be removed using a standard Windows utility.
CLASS ALLEGATIONS
71.
Plaintiffs Mike Harris and Jeff Dunstan bring this action pursuant to Fed. R. Civ. P.
23(b)(2) and (3) on behalf of themselves and the following Class and Subclass (together “the Class”):
Class: All individuals who have had, at any time since 2005, downloaded and installed
comScore’s tracking software onto their computers via one of comScore’s third party
bundling partners.
Subclass: All Class members not presented with a functional hyperlink to an end user
license agreement (“ULA”) before installing comScore’s tracking software onto their
computers.
ANSWER: Paragraph 71 of the Complaint reflects Plaintiffs’ characterization of their own
complaint and proposed classes and does not require a response. To the extent a response is
required, this allegation is denied.
72.
Excluded from the Class are Defendant, its legal representatives, assigns and
successors, and any entity in which Defendant has a controlling interest. Also excluded is the judge
to whom this case is assigned and the judge’s immediate family, as well as any individual who
contributed to the design and deployment of Defendant’s software products.
ANSWER: Paragraph 72 of the Complaint reflects Plaintiffs’ characterization of their own
complaint and proposed classes and does not require a response, and denies that this action can be
maintained as a class action. To the extent a response is required, this allegation is denied.
73.
The Class consist of hundreds of thousands, if not millions, of individuals and other
entities, making joinder impractical. On information and belief, Defendant has deceived millions of
consumers who fall into the definition set forth in the Class.
29
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 73 of the Complaint, and on that basis, denies them. comScore denies that it
has “deceived millions of consumers,” and denies that this action can be maintained as a class
action.
74.
Plaintiffs’ claims are typical of the claims of all other members of the Class, as
Plaintiffs and other members sustained damages arising out of the wrongful conduct of Defendant,
based upon the same actions of the software products which were made uniformly to Plaintiffs and
the Class.
ANSWER: The allegations set forth in paragraph 74 of the Complaint assert conclusions of
law to which no response is required. To the extent paragraph 74 may purport to assert allegations
of fact to which a response may be required, comScore denies each and every allegation contained in
this paragraph, and denies that this action can be maintained as a class action.
75.
Plaintiffs will fairly and adequately represent and protect the interests of the other
members of the Class. Plaintiffs have retained counsel with substantial experience in prosecuting
complex litigation and class actions. Plaintiffs and their counsel are committed to vigorously
prosecuting this action on behalf of the members of the Class, and have the financial resources to
do so. Neither Plaintiffs nor their counsel have any interest adverse to those of the other members
of the Class.
ANSWER: The allegations set forth in paragraph 75 of the Complaint assert conclusions of
law to which no response is required. To the extent paragraph 75 may purport to assert allegations
of fact to which a response may be required, comScore denies those allegations and denies that this
action can be maintained as a class action. comScore lacks knowledge or information sufficient to
form a belief as to the truth of the allegations in paragraph 78 regarding the motivations of Plaintiffs
and their counsel, or their financial wherewithal, and on that basis, denies them.
76.
Absent a class action, most members of the Class would find the cost of litigating
their claims to be prohibitive and will have no effective remedy. The class treatment of common
30
questions of law and fact is also superior to multiple individual actions or piecemeal litigation in that
it conserves the resources of the courts and the litigants, and promotes consistency and efficiency of
adjudication.
ANSWER: The allegations set forth in paragraph 76 of the Complaint assert conclusions of
law to which no response is required. To the extent paragraph 76 may purport to assert allegations
of fact to which a response may be required, comScore denies those allegations, and denies that this
action can be maintained as a class action.
77.
Defendant has acted and failed to act on grounds generally applicable to Plaintiffs
and the other members of the Class, requiring the Court’s imposition of uniform relief to ensure
compatible standards of conduct toward the members of the Class.
ANSWER: The allegations set forth in paragraph 77 of the Complaint assert conclusions of
law to which no response is required. To the extent paragraph 77 may purport to assert allegations
of fact to which a response may be required, comScore denies those allegations, and denies that this
action can be maintained as a class action.
78.
The factual and legal bases of Defendant’s liability to Plaintiffs and to the other
members of the Class are the same, and resulted in injury to Plaintiffs and all of the other members
of the Class. Plaintiffs and the other members of the Class have all suffered harm as a result of
Defendant’s wrongful conduct.
ANSWER: The allegations set forth in paragraph 78 of the Complaint assert conclusions of
law to which no response is required. To the extent paragraph 78 may purport to assert allegations
of fact to which a response may be required, comScore denies those allegations, and denies that this
action can be maintained as a class action
79.
There are many questions of law and fact common to the claims of Plaintiffs and the
other members of the Class, and those questions predominate over any questions that may affect
individual members of the Class. Common questions for the Class include but are not limited to the
following:
31
(a)
whether comScore intentionally designed its software to scan files located on
a monitored consumer’s local network;
(b)
whether comScore intentionally designed its software and/or business model
with third-party application providers to avoid uninstallation when the third-party
application was uninstalled, thus thwarting user attempts to remove the software;
(c)
whether comScore intentionally designed its Terms of Service to exclude the
true functionality of its Surveillance Software;
(d)
whether comScore’s conduct described herein violated the Stored
Communications Act (18 U.S.C. §§ 2701, et seq.);
(e)
whether comScore’s conduct described herein violated the Electronic
Communications Privacy Act (18 U.S.C. §§ 2510, et seq.);
(f)
whether comScore’s conduct described herein violated the Computer Fraud
& Abuse Act (18 U.S.C. § 1030);
(g)
whether comScore has been unjustly enriched at the expense of Plaintiffs and
the Class.
ANSWER: The allegations set forth in paragraph 79 of the Complaint assert conclusions of
law to which no response is required. To the extent paragraph 79 may purport to assert allegations
of fact to which a response may be required, comScore denies those allegations, and denies that this
action can be maintained as a class action.
80.
Plaintiffs reserve the right to revise these definitions based on facts learned in
discovery.
ANSWER: Paragraph 80 of the Complaint reflects Plaintiffs effort to reserve certain rights
and does not require a response.
FIRST CAUSE OF ACTION
Violations of the Stored Communications Act
(18 U.S.C. §§ 2701, et seq.)
(On Behalf of Plaintiffs and the Class)
81.
Plaintiffs incorporate the foregoing allegations as if fully set forth herein.
32
ANSWER: comScore hereby incorporates as though fully set forth herein its answers to
paragraphs 1 through 80.
82.
The Electronic Communications Privacy Act, 18 U.S.C. §§ 2510, et seq. (the
“ECPA”) broadly defines an “electronic communication” as “any transfer of signs, signals, writing,
images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio,
electromagnetic, photoelectronic or photooptical system that affects interstate or foreign
commerce. . . .” 18 U.S.C. § 2510(12). The Stored Communications Act incorporates this definition.
ANSWER: The allegations set forth in paragraph 82 assert conclusions of law to which no
response is required. To the extent paragraph 82 may purport to assert allegations of fact to which a
response may be required, comScore states that the statutes cited by Plaintiffs speak for themselves,
and comScore denies any characterization of the laws applicable to this case that is inconsistent with
their language. Except as specifically admitted, comScore denies each and every allegation contained
in this paragraph.
83.
Pursuant to the ECPA and Stored Communications Act (“SCA”), “electronic
storage” means any “temporary storage of a wire or electronic communication incidental to the
electronic transmission thereof.” 18 U.S.C. § 2510(17)(A). This type of electronic storage includes
communications in intermediate electronic storage that have not yet been delivered to their intended
recipient.
ANSWER: The allegations set forth in paragraph 83 assert conclusions of law to which no
response is required. To the extent paragraph 83 may purport to assert allegations of fact to which a
response may be required, comScore states that the statutes cited by Plaintiffs speak for themselves,
and comScore denies any characterization of the laws applicable to this case that is inconsistent with
their language. Except as specifically admitted, comScore denies each and every allegation contained
in this paragraph.
33
84.
The SCA mandates, among other things, that it is unlawful for a person to obtain
access to stored communications on another’s computer system without authorization. 18 U.S.C. §
2701.
ANSWER: The allegations set forth in paragraph 84 assert conclusions of law to which no
response is required. To the extent paragraph 84 may purport to assert allegations of fact to which a
response may be required, comScore states that the statutes cited by Plaintiffs speak for themselves,
and comScore denies any characterization of the laws applicable to this case that is inconsistent with
their language. Except as specifically admitted, comScore denies each and every allegation contained
in this paragraph.
85.
Congress expressly included provisions in the SCA to address this issue so as to
prevent “unauthorized persons deliberately gaining access to, and sometimes tampering with,
electronic or wire communications that are not intended to be available to the public.” S. Rep. No.
99–541, 35, 1986 U.S.C.C.A.N. 3555, 3589.
ANSWER: The allegations set forth in paragraph 85 assert conclusions of law to which no
response is required. To the extent paragraph 85 may purport to assert allegations of fact to which a
response may be required, comScore states that the statutes cited by Plaintiffs speak for themselves,
and comScore denies any characterization of the laws applicable to this case that is inconsistent with
their language. Except as specifically admitted, comScore denies each and every allegation contained
in this paragraph.
86.
comScore has violated 18 U.S.C. § 2701(a)(1) because it intentionally accessed
consumers’ communications without authorization and obtained, altered, or prevented authorized
access to a wire or electronic communication while in electronic storage by continuing to operate
after the user uninstalled bundled software. comScore had actual knowledge of, and benefited from,
this practice.
ANSWER: The allegations set forth in paragraph 86 assert conclusions of law to which no
response is required. To the extent paragraph 86 may purport to assert allegations of fact to which a
34
response may be required, comScore states that the statutes cited by Plaintiffs speak for themselves,
and comScore denies any characterization of the laws applicable to this case that is inconsistent with
their language. Except as specifically admitted, comScore denies each and every allegation contained
in this paragraph.
87.
Additionally, comScore has violated 18 U.S.C. § 2701(a)(2) because it intentionally
exceeded authorization to access consumers’ communications and obtained, altered, or prevented
authorized access to a wire or electronic communication while in electronic storage by continuing to
operate after the user uninstalled bundled software. Defendant had actual knowledge of, and
benefited from, this practice.
ANSWER: The allegations set forth in paragraph 87 assert conclusions of law to which no
response is required. To the extent paragraph 87 may purport to assert allegations of fact to which a
response may be required, comScore states that the statutes cited by Plaintiffs speak for themselves,
and comScore denies any characterization of the laws applicable to this case that is inconsistent with
their language. Except as specifically admitted, comScore denies each and every allegation contained
in this paragraph.
88.
comScore has also violated 18 U.S.C. § 2701(a)(2) because it intentionally exceeded
authorization to access consumers’ communications and obtained, altered, or prevented authorized
access to a wire or electronic communication while in electronic storage by accessing files on the
Plaintiffs’ and the Class’s local networks without permission.
ANSWER: The allegations set forth in paragraph 88 assert conclusions of law to which no
response is required. To the extent paragraph 88 may purport to assert allegations of fact to which a
response may be required, comScore states that the statutes cited by Plaintiffs speak for themselves,
and comScore denies any characterization of the laws applicable to this case that is inconsistent with
their language. Except as specifically admitted, comScore denies each and every allegation contained
in this paragraph.
35
89.
As a result of Defendant’s conduct described herein and its violation of § 2701,
Plaintiffs and the Class have suffered injuries to their privacy rights, and economic harm due to
comScore’s unjust enrichment at their expense. Plaintiffs, on behalf of themselves and the Class,
seek an order enjoining Defendant’s conduct described herein and awarding themselves and the
Class the maximum statutory and punitive damages available under 18 U.S.C. § 2707.
ANSWER: comScore admits that Plaintiffs purport seek the relief requested in paragraph
89. Except as otherwise expressly admitted herein, comScore denies the allegations of paragraph 89.
SECOND CAUSE OF ACTION
Violations of the Electronic Communications Privacy Act
(18 U.S.C. §§ 2510, et seq.)
(On Behalf of Plaintiffs and the Class)
90.
Plaintiffs incorporate the forgoing allegations as if fully set forth herein.
ANSWER: comScore hereby incorporates as though fully set forth herein its answers to
paragraphs 1 through 89.
91.
The Electronic Communications Privacy Act, 18 U.S.C. §§ 2510, et seq. (the
“ECPA”) broadly defines an “electronic communication” as “any transfer of signs, signals, writing,
images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio,
electromagnetic, photoelectronic or photooptical system that affects interstate or foreign
commerce. . . .” 18 U.S.C. § 2510(12).
ANSWER: The allegations set forth in paragraph 91 assert conclusions of law to which no
response is required. To the extent paragraph 91 may purport to assert allegations of fact to which a
response may be required, comScore states that the statutes cited by Plaintiffs speak for themselves,
and comScore denies any characterization of the laws applicable to this case that is inconsistent with
their language. Except as specifically admitted, comScore denies each and every allegation contained
in this paragraph.
92.
The ECPA defines “electronic communications system” as any wire, radio,
electromagnetic, photooptical or photoelectronic facilities for the transmission of wire or electronic
36
communications, and any computer facilities or related electronic equipment for the electronic
storage of such communications. 18 U.S.C. § 2510(14).
ANSWER: The allegations set forth in paragraph 92 assert conclusions of law to which no
response is required. To the extent paragraph 92 may purport to assert allegations of fact to which a
response may be required, comScore states that the statutes cited by Plaintiffs speak for themselves,
and comScore denies any characterization of the laws applicable to this case that is inconsistent with
their language. Except as specifically admitted, comScore denies each and every allegation contained
in this paragraph.
93.
The ECPA broadly defines the contents of a communication. Pursuant to the
ECPA, “contents” of a communication, when used with respect to any wire, oral, or electronic
communications, include any information concerning the substance, purport, or meaning of that
communication. 18 U.S.C. § 2510(8). The definition thus includes all aspects of the communication
itself. The privacy of the communication to be protected is intended to be comprehensive.
ANSWER: The allegations set forth in paragraph 93 assert conclusions of law to which no
response is required. To the extent paragraph 93 may purport to assert allegations of fact to which a
response may be required, comScore states that the statutes cited by Plaintiffs speak for themselves,
and comScore denies any characterization of the laws applicable to this case that is inconsistent with
their language. Except as specifically admitted, comScore denies each and every allegation contained
in this paragraph.
94.
Plaintiffs’ and Class Members’ personal computers and computer networks
constitute “electronic computer systems.” Plaintiffs and Class members transmit “electronic
communications” by and through their computers and computer networks in the form of, among
others, emails, sending requests to visit websites, online chats, file transfers, file uploads, and file
downloads.
ANSWER: The allegations set forth in paragraph 94 assert conclusions of law to which no
response is required. To the extent paragraph 94 may purport to assert allegations of fact to which a
37
response may be required, comScore states that the statutes cited by Plaintiffs speak for themselves,
and comScore denies any characterization of the laws applicable to this case that is inconsistent with
their language. Except as specifically admitted, comScore denies each and every allegation contained
in this paragraph.
95.
comScore’s conduct violated 18 U.S.C. § 2511(1)(a) because it intentionally
intercepted and endeavored to intercept Plaintiffs’ and Class Members’ electronic communications
to, from, and within their computers and computer networks.
ANSWER: The allegations set forth in paragraph 95 assert conclusions of law to which no
response is required. To the extent paragraph 95 may purport to assert allegations of fact to which a
response may be required, comScore states that the statutes cited by Plaintiffs speak for themselves,
and comScore denies any characterization of the laws applicable to this case that is inconsistent with
their language. Except as specifically admitted, comScore denies each and every allegation contained
in this paragraph.
96.
comScore’s conduct violated 18 U.S.C. § 2511(1)(d) because it used and endeavored
to use the contents of Plaintiffs’ and Class Members’ electronic communications to profit from its
unauthorized collection and sale, knowing and having reason to know that the information was
obtained through interception in violation of 18 U.S.C. § 2511(1).
ANSWER: The allegations set forth in paragraph 96 assert conclusions of law to which no
response is required. To the extent paragraph 96 may purport to assert allegations of fact to which a
response may be required, comScore states that the statutes cited by Plaintiffs speak for themselves,
and comScore denies any characterization of the laws applicable to this case that is inconsistent with
their language. Except as specifically admitted, comScore denies each and every allegation contained
in this paragraph.
97.
comScore intentionally obtained and/or intercepted, by device or otherwise, these
electronic communications, without the knowledge, consent or authorization of Plaintiffs or the
Class.
38
ANSWER: The allegations set forth in paragraph 97 assert conclusions of law to which no
response is required. To the extent paragraph 97 may purport to assert allegations of fact to which a
response may be required, comScore states that the statutes cited by Plaintiffs speak for themselves,
and comScore denies any characterization of the laws applicable to this case that is inconsistent with
their language. Except as specifically admitted, comScore denies each and every allegation contained
in this paragraph.
98.
Plaintiffs and the Class suffered harm as a result of comScore’s violations of the
ECPA, and therefore seek (a) preliminary, equitable and declaratory relief as may be appropriate, (b)
the sum of the actual damages suffered and the profits obtained by Defendant as a result of their
unlawful conduct, or statutory damages as authorized by 18 U.S.C. § 2520(2)(B), whichever is
greater, (c) punitive damages, and (d) reasonable costs and attorneys’ fees.
ANSWER: comScore admits that Plaintiffs purport seek the relief requested in paragraph
98. Except as otherwise expressly admitted herein, comScore denies the allegations of paragraph 98.
THIRD CAUSE OF ACTION
Violation of the Computer Fraud and Abuse Act (“CFAA”)
(18 U.S.C. § 1030)
(On Behalf of Plaintiffs and the Class)
99.
Plaintiffs incorporate the foregoing allegations as if fully set forth herein.
ANSWER: comScore hereby incorporates as though fully set forth herein its answers to
paragraphs 1 through 98.
100.
comScore intentionally accessed a computer without authorization and/or exceeded
any authorized access and in so doing intentionally breached its own Terms of Service and Privacy
Policy.
ANSWER: The allegations set forth in paragraph 100 assert conclusions of law to which no
response is required. To the extent paragraph 100 may purport to assert allegations of fact to which
a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
39
inconsistent with their language. Except as specifically admitted, comScore denies each and every
allegation contained in this paragraph.
101.
Defendant illegally obtained this information from a protected computer involved in
interstate or foreign communication.
ANSWER: The allegations set forth in paragraph 101 assert conclusions of law to which no
response is required. To the extent paragraph 101 may purport to assert allegations of fact to which
a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with their language. Except as specifically admitted, comScore denies each and every
allegation contained in this paragraph.
102.
By scanning and removing information from local and network files, monitoring
internet behavior, including keystroke logging consumer input, and injecting code and data onto
Plaintiffs’ computers, comScore accessed Plaintiffs’ computers, in the course of interstate commerce
and/or communication, in excess of the authorization provided by Plaintiffs as descried in 18 U.S.C.
§ 1030(a)(2)(C).
ANSWER: The allegations set forth in paragraph 102 assert conclusions of law to which no
response is required. To the extent paragraph 102 may purport to assert allegations of fact to which
a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with their language. Except as specifically admitted, comScore denies each and every
allegation contained in this paragraph.
103.
comScore violated 18 U.S.C. § 1030(a)(2)(C) by intentionally accessing Plaintiffs’ and
Class Members’ computers and computer networks without authorization and/or by exceeding the
scope of that authorization.
ANSWER: The allegations set forth in paragraph 103 assert conclusions of law to which no
response is required. To the extent paragraph 103 may purport to assert allegations of fact to which
40
a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with their language. Except as specifically admitted, comScore denies each and every
allegation contained in this paragraph.
104.
Plaintiffs’ computers, and those belonging to Class Members, are protected
computers pursuant to 18 U.S.C. § 1030(e)(2)(B) because they are used in interstate commerce
and/or communication. Specifically, Plaintiff Dunstan spent $40 to purchase a spyware removal
program to fully remove the program and restore his computer to a functioning state.
ANSWER: The allegations set forth in paragraph 104 assert conclusions of law to which no
response is required. To the extent paragraph 104 may purport to assert allegations of fact to which
a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with their language. Except as specifically admitted, comScore denies each and every
allegation contained in this paragraph.
105.
By accessing, collecting, and transmitting Plaintiffs and Class Members’ computer
data without authorization, comScore intentionally caused damage to those computers by impairing
the integrity of information and/or data.
ANSWER: The allegations set forth in paragraph 105 assert conclusions of law to which no
response is required. To the extent paragraph 105 may purport to assert allegations of fact to which
a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with their language. Except as specifically admitted, comScore denies each and every
allegation contained in this paragraph.
106.
Through the conduct described herein, comScore has violated 18 U.S.C.
§ 1030(a)(5)(A)(iii).
41
ANSWER: The allegations set forth in paragraph 106 assert conclusions of law to which no
response is required. To the extent paragraph 106 may purport to assert allegations of fact to which
a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with their language. Except as specifically admitted, comScore denies each and every
allegation contained in this paragraph.
107.
As a result, comScore’s conduct has caused a loss to one or more persons during any
one-year period aggregating at least $5,000 in value in real economic damages.
ANSWER: The allegations set forth in paragraph 107 assert conclusions of law to which no
response is required. To the extent paragraph 107 may purport to assert allegations of fact to which
a response may be required, comScore states that it lacks knowledge or information sufficient to
form a belief as to the truth of the allegations of paragraph 110, and on that basis, denies them.
108.
Plaintiffs and the Class expended time, money and resources to investigate and
remove comScore’s tracking software from his computer.
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 108, and on that basis, denies them.
109.
Plaintiffs and Class members have additionally suffered loss by reason of these
violations, including, without limitation, violation of the right of privacy.
ANSWER: The allegations set forth in paragraph 109 assert conclusions of law to which no
response is required. To the extent paragraph 109 may purport to assert allegations of fact to which
a response may be required, comScore states that it lacks knowledge or information sufficient to
form a belief as to the truth of the allegations of paragraph 109, and on that basis, denies them.
110.
comScore’s actions were knowing and/or reckless and caused harm to Plaintiffs and
members of the Class.
42
ANSWER: The allegations set forth in paragraph 110 assert conclusions of law to which no
response is required. To the extent paragraph 110 may purport to assert allegations of fact to which
a response may be required, comScore denies those allegations.
FOURTH CAUSE OF ACTION
Unjust Enrichment
(On Behalf of Plaintiffs and the Class)
111.
Plaintiffs incorporate the foregoing allegations as if fully set forth herein.
ANSWER: comScore hereby incorporates as though fully set forth herein its answers to
paragraphs 1 through 110.
112.
Plaintiffs and members of the Class conferred a monetary benefit on comScore.
Defendant received and retained money by selling data collected from Plaintiffs and the Class
through its Surveillance Software to its clients. Much of this information was collected from
Plaintiffs and the Class without authorization and through deceptive business practices.
ANSWER: comScore denies the allegations of paragraph 112.
113.
comScore appreciates or has knowledge of such benefit, as demonstrated by its
public representations regarding its sales of reports regarding online consumer activity.
ANSWER: comScore denies the allegations of paragraph 113.
114.
Under principles of equity and good conscience, comScore should not be permitted
to retain the money obtained by selling information about Plaintiffs and members of the Class,
which comScore has unjustly obtained as a result of its unlawful actions.
ANSWER: The allegations set forth in paragraph 114 assert conclusions of law to which no
response is required. To the extent paragraph 114 may purport to assert allegations of fact to which
a response may be required, comScore states that the legal principles cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with those principles. Except as specifically admitted, comScore denies each and every
allegation contained in this paragraph.
115.
Accordingly, Plaintiffs and the Class seek full disgorgement and restitution of any
43
money comScore has retained as a result of the unlawful and/or wrongful conduct alleged herein.
ANSWER: comScore admits that Plaintiffs purport to seek the relief requested in paragraph
115. Except as otherwise expressly admitted herein, comScore denies the allegations of paragraph
115.
PRAYER FOR RELIEF
WHEREFORE, Plaintiffs, individually and on behalf of the Class, pray for the following
relief:
A.
Certify this case as a class action on behalf of the Class defined above, appoint Mike
Harris and Jeff Dunstan as class representatives, and appoint their counsel as class counsel;
B.
Declare that comScore’s actions, as described herein, violate the Stored
Communications Act (18 U.S.C. §§ 2701, et seq.), the Electronic Communications Privacy Act (18
U.S.C. §§ 2510, et seq.), and the Computer Fraud and Abuse Act (18 U.S.C. § 1030);
C.
Award injunctive and other equitable relief as is necessary to protect the interests of
the Plaintiffs and the Class, including, inter alia: (i) an order prohibiting comScore from engaging in
the wrongful and unlawful acts described herein; (ii) requiring comScore to refrain from accessing
files attached to consumers’ local networks; (iii) requiring comScore to delete its root certificate
when the Surveillance Software is removed; (iv) requiring comScore to conspicuously and truthfully
display the manner in which it collects data about monitored consumers in its Terms of Service; and
(v) requiring comScore to uninstall its Surveillance Software when bundled software is uninstalled.
D.
Award damages, including statutory damages of $1,000 per violation under the
Stored Communications Act, 18 U.S.C. § 2707(c), and the Electronic Communications Privacy Act,
18 U.S.C. § 2520, and punitive damages where applicable, to Plaintiffs and the Class in an amount to
be determined at trial;
E.
Award Plaintiffs and the Class their reasonable litigation expenses and attorneys’
fees;
44
F.
Award Plaintiffs and the Class pre- and post-judgment interest, to the extent
allowable; and
G.
Award such other and further relief as equity and justice may require.
ANSWER: comScore denies that Plaintiffs are entitled to a judgment or to any other relief
as requested in their “PRAYER FOR RELIEF.”
SEPARATE AND ADDITIONAL DEFENSES
comScore asserts the following separate and additional defenses to Plaintiffs’ Second
Amended Complaint, without assuming the burden of proof on such defenses that would otherwise
fall on Plaintiffs. comScore reserves the right to supplement or amend these defenses as discovery is
conducted, and does not knowingly or intentionally waive any applicable separate and additional
defense. comScore reserves all other affirmative defenses pursuant to Rule 8(c) of the Federal Rules
of Civil Procedure, the Patent Laws of the United States, and any other defenses, at law or in equity,
that now exist or in the future may be available based on discovery and further factual investigation
in this case.
First Separate and Additional Defense
(Venue)
1.
Plaintiff entered into an agreement with comScore that contains a binding forum
selection clause providing for exclusive venue in Virginia state court or the Eastern District of
Virginia.
Second Separate and Additional Defense
(Waiver)
2.
The Complaint and the claims asserted therein are barred by the doctrine of waiver.
Third Separate and Additional Defense
(Failure to Mitigate Damages)
3.
Plaintiffs failed to properly mitigate their alleged damages by, among other things: (1)
failing to remove comScore’s software through the Windows Add/Remove programs utility, which
45
is the industry standard, rather than purchasing unnecessary antivirus software; (2) failing to review
comScore’s FAQ and Privacy Policy, which would have quickly and expressly informed them how
to remove comScore’s software; and (3) objectively manifesting their assent to the installation of
comScore’s software, and to comScore’s TOS and Privacy Policy, when that was apparently not their
intention.
Fourth Separate and Additional Defense
(Statute of Limitations and Laches)
4.
Plaintiffs define the putative class to include individuals that fall outside the
applicable statute of limitations and/or whose claims are barred by the doctrine of laches.
ADDITIONAL DEFENSES
1.
The complaint fails to state a claim upon which relief can be granted.
2.
The Second Count of the complaint does not allege the requisite jurisdictional
amount and therefore this Honorable Court lacks jurisdiction over the subject matter of such Count.
PRAYER FOR RELIEF
Wherefore, comScore prays for relief and judgment as follows:
1.
That the Court deny Plaintiffs’ prayer for relief in its entirety and that the Court
dismiss the Complaint with prejudice and enter judgment in comScore’s favor and against Plaintiffs;
2.
That the Court award comScore its costs and expenses that it incurs in this action
and attorneys’ fees as permitted by law; and
3.
That the Court award comScore such other and further relief that it deems
appropriate.
Jury Demand
Defendant demands a jury trial of all issues so triable.
46
Dated: February 28, 2013
Respectfully Submitted,
By: /s/ Paul F. Stack_
Paul F. Stack
pstack@stacklaw.com
Mark William Wallin
mwallin@stacklaw.com
STACK & O'CONNOR CHARTERED
140 South Dearborn Street
Suite 411
Chicago, Illinois 60603
Telephone:
(312) 782-0690
Facsimile:
(312) 782-0936
Andrew Schapiro
Email: andrewschapiro@quinnemanuel.com
Stephen Swedlow
Email: stephenswedlow@quinnemanuel.com
Robyn Bowland
robynbowland@quinnemanuel.com
QUINN EMANUEL URQUHART & SULLIVAN, LLP
500 West Madison Street, Suite 2450
Chicago, Illinois 60661
Telephone:
(312) 705-7400
Facsimile:
(312) 705-7499
47
_____
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?