Dunstan et al v. comScore, Inc.
Filing
268
MOTION by Plaintiffs Jeff Dunstan, Mike Harris for protective order Plaintiffs Motion to Exclude Disputed Data (Thomassen, Benjamin)
IN THE UNITED STATES DISTRICT COURT
FOR THE NORTHERN DISTRICT OF ILLINOIS, EASTERN DIVISION
MIKE HARRIS and JEFF DUNSTAN,
individually and on behalf of a class of
similarly situated individuals,
Case No. 1:11-cv-5807
Plaintiffs,
Hon. James F. Holderman
v.
Magistrate Judge Young B. Kim
COMSCORE, INC., a Delaware corporation,
Defendant.
PLAINTIFFS’ MOTION TO EXCLUDE DISPUTED DATA
Pursuant to the Protective Order Governing Production of Plaintiff Jeff Dunstan’s Hard
Drive entered by this Court on October 23, 2013, (Dkt. 240) (the “Protective Order”), Plaintiffs
Mike Harris and Jeff Dunstan (“Plaintiffs”), by and through their undersigned counsel,
respectfully request that certain data be excluded from production to Defendant comScore, Inc.
(“comScore”). Specifically, Plaintiffs seek to exclude from production the entire listing of files
and Internet browsing history from Jeff Dunstan’s (“Dunstan”) imaged hard drive outside the
time period between January 1, 2010 and September 30, 2010 (the “2010 Time Period”)1 because
such data is irrelevant to the claims asserted in this case, and the potential privacy concerns for
Dunstan vastly outweigh any possible benefit that comScore could derive from the information.
In further support of this motion, Plaintiffs state as follows:
1
As explained further infra, on November 6, 2013, Plaintiffs suggested this timeframe to
ensure that comScore obtained files from Dunstan’s hard drive leading up to (8 months
preceding) and immediately after OSSProxy’s installation (September 25, 2010). Plaintiffs
believe in good-faith that this period allows comScore to meaningfully evaluate the condition of
Dunstan’s computer. (Declaration of Chandler Givens (“Givens Decl.”), a copy of which was
filed contemporaneously with this motion, at ¶ 8.)
1
1.
The Protective Order required comScore to designate an expert to perform a
search and examination of an imaged copy of Mr. Dunstan’s hard drive, and then retrieve certain
data from it. (Protective Order at ¶ 3–4.) The expert then had to provide a copy of that data (the
“Retrieved Data”) to Plaintiffs’ counsel, without comScore or its counsel seeing it. (Id. at ¶ 4–5.)
After reviewing the Retrieved Data, the Parties were required to meet and confer to attempt to
resolve any potential objections that Plaintiffs’ counsel had about producing the Retrieved Data.
(Id. at 6.) In the event that the Parties couldn’t resolve such issues, the Protective Order provided
that Plaintiffs could file a motion to exclude information in dispute. (Id.)
2.
comScore designated Michael Perry (“Mr. Perry”) of Elysium Digital, LLC to
search and retrieve data from Dunstan’s hard drive pursuant to comScore’s requests. Mr. Perry
extracted files from the hard drive2 and provided a copy of the Retrieved Data to Plaintiffs’
counsel along with a summary report explaining what information had been collected. (Givens
Decl., ¶ 2.) The summary says that the Retrieved Data falls into seven categories: (1) File
Listings (which is divided into e-mail listings, (i.e., the subject line and to/from lines from all emails), and a list of every file on Dunstan’s hard drive), (2) Windows Registry, (3) Windows
Registry – Extracted Data, (4) Event Logs, (5) Event Logs – Extracted Data, (6) Internet History,
and (7) Log Files (which also includes a log file generated by anti-virus/malware software run by
Mr. Perry). (Perry Report at 2–4.) None of the categories of Retrieved Data were limited in any
respect (e.g., by date range).
2
The Protective Order required comScore’s expert to conduct a “search,” (Dkt. 240 at ¶ 3,)
and an “examination,” (id. at ¶ 5,) of Dunstan’s hard drive. However, it appears that Mr. Perry
didn’t “search” for anything, and instead extracted without limitation “all email files,” “all files,”
and “[a]ll Windows event logs.” (Initial Report of Michael Perry (“Perry Report”), at 2–3, a copy
of which is attached to the Givens Decl. as Exhibit A.)
2
3.
The Parties met and conferred via telephone on November 5th. (Givens Decl., ¶
5.) During the call, Plaintiffs explained that Dunstan’s File Listings and Internet History outside
the 2010 Time Period weren’t relevant to this case because they had no bearing on his claims
whatsoever, given that comScore’s software was installed in late September 2010. (Id. at ¶ 6.) In
addition, while Plaintiffs agreed that, in principle, Windows Registry, Event Logs, and Log Files
might be relevant to develop an understanding of the operations of Dunstan’s computer, data
outside of the 2010 Time Period had no relevance because Dunstan only had comScore’s
software installed in late September 2010, and he removed the software using an anti-virus
program before the end of the month. (Id.)
4.
Notwithstanding their objections, and in an effort to be reasonable, Plaintiffs
agreed to provide data from five of the seven categories without any date restrictions: Windows
Registry, Windows Registry—Extracted Data, Event Logs, Event Logs—Extracted Data, and
Log Files (“Uncontested Data”). (Id. at ¶ 9.) And, per the Protective Order, Plaintiffs’ counsel
produced the Uncontested Data to comScore.3 (Id. at ¶ 12.)
5.
Regarding the e-mail listings (i.e., part of the larger category of File Listings), and
pursuant to Plaintiffs’ request, comScore agreed to have Mr. Perry re-examine the hard drive and
only extract e-mail listings from the 2010 Time Period, and then re-send that extracted data to
Plaintiffs’ counsel. (Id. at ¶ 11.) Plaintiffs have yet to receive the newly extracted e-mail listings,
and the Parties have agreed that once that revised data is produced, Plaintiffs’ counsel will
review them for potentially sensitive or privileged information and provide it to comScore (with
redactions and a privilege log, if necessary) within a few days following their receipt of it. (Id.)
3
Because several of these files also include information revealing Dunstan’s Internet
browsing history outside of the 2010 Time Period, those files are being withheld pending the
Court’s ruling on this Motion. (Id.)
3
6.
With respect to the File Listings and Internet History, Plaintiffs don’t object to
producing information from within the 2010 Time Period subject to a review for potentially
sensitive or privileged information. Thus, the only portion of the Retrieved Data in dispute is the
non-e-mail File Listings and Internet History outside of the 2010 Time Period (the “Disputed
Data”).
7.
The Disputed Data isn’t discoverable for at least two reasons. First, the files aren’t
relevant to this case, and comScore can’t explain why they would be. Second, the burden on
Dunstan’s privacy that would result from producing the Disputed Data vastly outweighs any
possible benefit of such discovery for comScore.
8.
In terms of relevance, and pursuant to Fed. R. Civ. P. 26(b)(1), parties may obtain
discovery only of information that is “relevant to any party’s claim or defense.” comScore stated
in its Motion to Compel (“comScore’s Motion”), that it needed to inspect Dunstan’s hard drive to
verify that he downloaded OSSProxy, whether OSSProxy (rather than something else on his
computer) caused the problems of which he complains, whether those problems occurred, and
whether anti-virus software was used to remove the software. (Dkt. 226 at 2.) But because
Dunstan’s downloading of OSSProxy, resulting computer problems, and use of the third-party
anti-virus software all occurred in and were limited to September 2010, the Disputed Data—all
of which falls outside the 2010 Time Period—is simply not relevant to his claims. (Givens Decl.,
¶ 6.)
9.
On November 8, 2013, comScore offered a new but wholly unpersuasive
explanation for wanting information outside the 2010 Time Period. In an e-mail, comScore
claimed that “post-September 2010 activity may have affected the pre-September 2010 files and
information collected, and therefore the post-September 2010 activity is necessary for
4
understanding the functionality of the computer in September 2010.” (Nov. 8, 2013 e-mail from
Ms. Bowland, a true and accurate copy is attached to the Givens Decl. as Exhibit D.) Plaintiffs
believe that comScore’s position is untenable for at least two reasons:
a.
First, with respect to Dunstan’s Internet History files, comScore already
conceded that his “pre- and post-September 2010 activity” was not relevant to his claims.
As such, comScore previously indicated that it only needed Dunstan’s “browsing history
just before, during, and just after the removal of comScore’s software [because such
information] is relevant to Plaintiffs’ claims, in that some of them depend on a panelist’s
activities online.” (Exhibit D to the Givens Decl.) (emphasis added).) Plaintiffs agree—to
the extent any Disputed Data could possibly be relevant, it would be Internet activity
“just before, during, and just after” OSSProxy’s activation, i.e., the 2010 Time Period.
(Givens Decl., ¶ 8.) comScore’s new explanation does not account for its sudden change
in position, and Plaintiffs fail to understand how Dunstan’s other online activity (i.e., well
before and after his installation of OSSProxy) has any bearing on his claims. The reality
is that it has none and comScore certainly hasn’t explained the rationale.
b.
Second, comScore’s abstract statement that post September 2010 files may
have affected the computer’s pre September 2010 functionality is nonsensical. Even
assuming comScore can conjure up a justification for that statement (Plaintiffs fail to
even understand it), then it should be required to articulate a way to limit its request to
files relevant to showing the computer’s functionality—rather than plucking all of
Dunstan’s Internet browsing history from his hard drive. Furthermore, comScore has
repeatedly stated during meet and confers that its primary focus in assessing Dunstan’s
Internet history is to search for the existence of unidentified “viruses.” (Givens Decl., ¶
5
7.) To that end, Mr. Perry already conducted a scan of Dunstan’s hard drive for viruses
and malware, and produced a report showing the same.5 Thus, and as before, Plaintiffs
fail to understand what else comScore could possibly glean from these files.
10.
In terms of Dunstan’s privacy, and even if the Disputed Data were relevant to any
present claims or defenses, under Fed. R. Civ. P. 26(b)(2)(C), this Court may limit the extent of
discovery where “the burden . . . of the proposed discovery outweighs its likely benefit . . . .” As
indicated in their Response in Opposition to comScore’s Motion to Compel, (Dkt. 233),
Plaintiffs have serious privacy concerns about permitting comScore to comb unrestricted through
Dunstan’s Internet browsing history spanning several years6—indeed, protecting Dunstan from
that kind of invasive access is exactly what this case is about. And this Court already recognized
the validity of those concerns. (October 16, 2013 Transcript, a copy of which is attached to the
Givens Decl. as Exhibit G, at 7:9–25 (“I think the more persuasive argument is that we need to
somehow protect the privacy interests of Mr. Dunstan. While he has made some claims about the
software damaging or harming his computer and harming his right to privacy, you know, it
doesn’t mean that the entire hard drive should be exposed to the world, so to speak.”).) As far as
Plaintiffs are concerned, there is no probative value to Dunstan’s Internet and/or e-mail history
outside of the 2010 Time Period, and any use comScore might extract from it (i.e., to harass or
embarrass him) is outweighed by the high costs to his privacy.
5
Mr. Perry’s anti-virus/malware search of Dunstan’s hard drive did turn up traces of
malware. (MBAM-log-2013-10-30 (09-25-44).txt, a true and accurate copy is attached as Exhibit
F to the Givens Decl.). Not surprisingly—at least from Plaintiffs’ perspective—one of the files
detected was the same photo editing software that Dunstan originally downloaded
(PhotoCutterSetup.exe) and was bundled with comScore’s software, which was reported as
harmful “Adware.” (Id.)
6
For example, Mr. Perry’s extraction yielded over 2,400 Internet search queries performed
by Mr. Dunstan. (Givens Decl., at ¶ 4.)
6
11.
The remaining Disputed Data is comprised of a listing of every single file on
Plaintiffs’ hard drive. This data includes things like the names of documents, photos, images
downloaded from the Internet, and files that also reveal Dunstan’s Internet browsing history.
(Givens Decl., at ¶ 4.) For the same reasons listed above, Plaintiffs shouldn’t have to produce
such data from outside of the 2010 Time Period. It is not relevant to Dunstan’s claims and would
only invade his privacy only for the sake of doing so.
WHEREFORE, Plaintiffs respectfully request that this Court enter an order (1) excluding
from production to comScore file listings and Internet browsing history from Dunstan’s hard
drive dated outside the 2010 Time Period, and (2) for such further relief as this Court deems just
and proper.
Respectfully submitted,
MIKE HARRIS and JEFF DUNSTAN,
individually and on behalf of a class of
similarly situated individuals,
Dated: November 11, 2013
By: s/ Benjamin S. Thomassen
One of Plaintiffs’ Attorneys
Jay Edelson
Rafey S. Balabanian
Chandler R. Givens
Benjamin S. Thomassen
EDELSON LLC
350 North LaSalle, Suite 1300
Chicago, Illinois 60654
Telephone: (312) 589-6370
Facsimile: (312) 589-6378
jedelson@edelson.com
rbalabanian@edelson.com
cgivens@edelson.com
bthomassen@edelson.com
7
CERTIFICATE OF SERVICE
I, Benjamin S. Thomassen, an attorney, hereby certify that on November 11, 2013, I
served the above and foregoing Plaintiffs’ Motion to Exclude Disputed Data, by causing true
and accurate copies of such paper to be filed and transmitted to all counsel of record via the
Court’s CM/ECF electronic filing system, on this 11th day of November 2013.
s/ Benjamin S. Thomassen
8
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?