Dunstan et al v. comScore, Inc.

Filing 329

RULE 56 L.R. 56.1(a) Statement by Jeff Dunstan, Mike Harris regarding motion for partial summary judgment 321 (Balabanian, Rafey)

Download PDF
IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS, EASTERN DIVISION MIKE HARRIS and JEFF DUNSTAN, individually and on behalf of a class of similarly situated individuals, Case No. 1:11-cv-5807 Plaintiffs, Hon. James F. Holderman v. Magistrate Judge Young B. Kim COMSCORE, INC., a Delaware corporation, Defendant. PLAINTIFFS JEFF DUNSTAN’S AND MIKE HARRIS’S LOCAL RULE 56.1 STATEMENT OF UNDISPUTED MATERIAL FACTS IN SUPPORT OF THEIR MOTION FOR PARTIAL SUMMARY JUDGMENT Pursuant to Rule 56.1(a) of the Local Rules of the Northern District of Illinois and in support of their Motion for Partial Summary Judgment, Plaintiffs Jeff Dunstan and Mike Harris (“Plaintiffs”) submit this statement of undisputed material facts: Parties, Jurisdiction, and Venue 1. comScore, Inc. (“comScore”) is a Delaware corporation with its headquarters located in Reston, Virginia. (Dkt. 180 at ¶ 21.) 2. Plaintiff Jeff Dunstan is a citizen of California. (Dkt. 169 at ¶ 20.) 3. Plaintiff Mike Harris is a citizen of Illinois. (Dkt. 169 at ¶ 19.) 4. Through their Second Amended Complaint, Plaintiffs allege violations of three federal statutes: the Stored Communications Act, 18 U.S.C. §§ 2701, et seq., the Electronic Communications Privacy Act, 18 U.S.C. § 2510–22, and the Computer Fraud and Abuse Act, 18 U.S.C. § 1030. (Dkt. 169 at ¶¶ 81–110.) 1 5. comScore transacts business in the Northern District of Illinois and throughout the United States. (Dkt. 180 at ¶¶ 21, 23.) comScore and its Panelist Software, OSSProxy 6. comScore is an Internet market research company that designs and distributes software to measure the online activity of Internet users. comScore refers to Internet users that have its software installed on their computers as “panelists,” who together comprise comScore’s “panel.” (Dkt. 180 at ¶ 1; Dkt. 14 at ¶ 3; Transcript of November 21, 2013 Deposition of John O’Toole (“O’Toole Nov. 21, 2013 Dep. Tr.”), Ex. 12 at 7:14–17; Transcript of November 20, 2013 Deposition of Yvonne Bigbee (“Bigbee Nov. 20, 2013 Dep. Tr.”), Ex. 2 at 9:11–16.) 7. comScore refers to its panelist software as “OSSProxy,” but publicly distributes it using “brand” names, including RelevantKnowledge and PremierOpinion. (Transcript of August 15, 2012 Rule 30(b)(6) Deposition of Michael Brown (“Brown Aug. 15, 2012 R. 30(b)(6) Dep. Tr.”), Ex. 3 at 9:8–15; Dkt. 180 at ¶¶ 4, 34.) 8. All “brands” of OSSProxy are functionally identical. (Brown Aug. 15, 2012 R. 30(b)(6) Dep. Tr. at 91:3–92:8.) 9. TMRG, Inc. (“TMRG”) is a Delaware corporation with its “Privacy Office” located in Reston, Virginia. TMRG is the “program sponsor” for the RelevantKnowledge brand of OSSProxy. (Ex. 4 at 7–8.). 10. VoiceFive Networks, Inc. (“VoiceFive”) is a Delaware corporation with its “Privacy Office” located in Reston, Virginia. VoiceFive is the “program sponsor” for the PremierOpinion brand of OSSProxy. (Ex. 5 at 8.) 2 All references to Exhibits (“Ex.”) refer to Exhibits attached to the Declaration of Benjamin S. Thomassen, filed concurrently with the filing of this Statement of Facts. 2 11. comScore generates revenue by selling different product lines—such as Media Metrix, Plan Metrix, and QSearch—that utilize panelist data collected through OSSProxy. (Transcript of January 24, 2012 Rule 30(b)(6) Deposition of Scott Mitchell (“Mitchell R. 30(b)(6) Dep. Tr.”), Ex. 6 at 22:6–25:5, 26:19–27:12, 40:14–42:15; Dkt. 180 at ¶¶ 2–3, 5; Brown Aug. 15, 2012 R. 30(b)(6) Dep. Tr. at 63:22–66:7.) 12. comScore currently measures the online behavior of over two million people worldwide and, through its website, claims to capture “well over 1.5 trillion interactions” on a monthly basis, equal to almost forty percent of the monthly page views of the entire Internet. (Dkt. 176-1 at 2; accord Dkt. 180 at ¶¶ 25, 30.) comScore’s Online Recruitment of Panelists 13. comScore recruits panelists using two different methods: (i) its “affiliate program,” where users can download OSSProxy directly through a comScore-controlled website (e.g., PermissionResearch.com or OpinionSquare.com) and (ii) its “Third-Party Application Provider Program” (the “TAP Program”), where users can download OSSProxy from a third party application provider (a “TAP partner”) as a part of a software “bundle.” (Transcript of January 24, 2014 Rule 30(b)(6) Deposition of John O’Toole (“O’Toole Jan. 24, 2014 R. 30(b)(6) Dep. Tr.”), Ex. 7 at 9:8–10:10; Dkt. 14 at ¶ 4; CS0081903_Confidential--Attorney’s Eyes Only.pptx, Ex. 8 at 15.) 14. Through the affiliate program, comScore recruits panelists by partnering with a network of “small-audience web entities” to host banner advertisements that, once clicked on, direct users to a comScore-controlled website (e.g., www.permissionresearch.com) where OSSProxy can be installed after a user (i) agrees to a ULA; (ii) creates a membership profile by entering certain information into website text fields (first and last name, address, email, gender, 3 birthdate, etc.); (iii) sets up a household profile (providing information about household members’ gender, “head of household” status, employment, along with the user’s household’s race and annual income, etc.); and (iv) downloads the installer package for OSSProxy. (O’Toole Jan. 24, 2014 R. 30(b)(6) Dep. Tr. at 10:15–11:1, 25:4–27:13; CS0081903_Confidential – Attorney’s Eyes Only.pptx at 15; Thomassen Decl. at ¶¶ 11-15.) 15. Panelists recruited through the TAP program, on the other hand, are recruited exclusively through third party software developers that “bundle” OSSProxy with their own freeware’s installer package, such that the installation process for the downloaded freeware will also prompt the user to install OSSProxy. (Dkt. 180 at ¶¶ 12, 32; CS0081903_Confidential – Attorney’s Eyes Only.pptx at 15.) 16. comScore pays third party application developers to offer OSSProxy with their applications (Dkt. 180 at ¶ 53; O’Toole Nov. 21, 2013 Dep. Tr. at 77:11–19; O’Toole Jan. 24, 2014 R. 30(b)(6) Dep. Tr. at 71:5–72:16; (Transcript of December 13, 2013 Deposition of Joshua Chasin (“Chasin Dep. Tr.”), Ex. 9 at 87:6–13.) 17. . (Chasin Dep. Tr. at 39:7–13; O’Toole Jan. 24, 2014 R. 30(b)(6) Dep. Tr. at 12:2–13:13.) 18. 4 (O’Toole Jan. 24, 2014 R. 30(b)(6) Dep. Tr. at 49:9–16.) 19. . (O’Toole Jan. 24, 2014 R. 30(b)(6) Dep. Tr. at 44:9–16; Chasin Dep. Tr. at 51:6– 17.) The TAP Installation Process 20. RelevantKnowledge and PremierOpinion (Transcript of September 12, 2012 Deposition of Yvonne Bigbee (“Bigbee Sept. 12, 2012 Dep. Tr.”), Ex. 10 at 50:14–51:20.) 21. The installation process for OSSProxy is materially identical for every Panelist recruited through comScore’s TAP program. (See Dkt. 40 at ¶ 14; Expert Witness Report of Colin O’Malley (“O’Malley Rpt.”), Ex. 11 at 6.) 22. The TAP installation process for OSSProxy begins when an Internet user finds a website that offers a TAP partner’s bundled freeware (a free software application such as a screensaver, game, CD copying software, greeting card template, etc., that has been bundled with OSSProxy) and elects to download the bundled installer package. (See O’Malley Rpt. at 6; Dkt. 180 at ¶ 32; Dkt. 158 at ¶ 2.) 23. TAP partners are not required to disclose that the bundled freeware they offer has been bundled with OSSProxy—i.e., in most instances, before downloading the freeware, a user would be unaware that by downloading the freeware installer package, they are also downloading the installation files for OSSProxy. comScore’s own expert, Colin O’Malley, 5 testified that he would be “surprised to see” a reference to OSSProxy on the third party application developer websites that offer bundled freeware. (See O’Malley Rpt. at 6; Transcript of December 13, 2012 Deposition of Colin O’Malley (“O’Malley Dep. Tr.”), Ex. 12 at 125:10– 126:1.) 24. For those TAP panelists that downloaded and installed OSSProxy, each was presented with a “Downloading Statement”—a dialog window displaying an abbreviated statement relating to a particular “brand” of OSSProxy. (Dkt. 14 at ¶¶ 4, 6; O’Malley Rpt. at 9– 10; Transcript of December 3, 2013 Deposition of Richard Weaver (“Weaver Dep. Tr.”), Ex. 13 at 14:7–15:7; Dkt. 156-5.) Over the course of the bundled freeware’s installation process, the Downloading Statement is the first explicit indication that OSSProxy may be installed along with the TAP partner’s freeware. (See O’Malley Rpt. at 6–9.) 25. For a user to successfully install OSSProxy through the TAP method, the user must initialize the bundled freeware’s installation process and then click past the installation windows until OSSProxy’s Downloading Statement is displayed. (O’Malley Rpt. at 9–10; Dkt. 40 at ¶ 6, 14(b); Dkt. 14 at ¶ 4.) 26. Unlike the affiliate program, which requires that users provide personal and other demographic information before downloading OSSProxy, see supra ¶ 14, Panelists recruited through the TAP program are not required to provide any personal or demographic information to either comScore, the sponsor, or the TAP partner before or following the installation of OSSProxy. (O’Toole Jan. 24, 2014 R. 30(b)(6) Dep. Tr. at 45:8–22, 67:10–20.) 27. Each of the Downloading Statements identified the brand of OSSProxy being offered for installation (e.g., RelevantKnowledge), explained that the branded OSSProxy was included in the software package “in order to provide this free download,” and represented that 6 OSSProxy was “provided by” a named program sponsor (i.e., either TMRG or VoiceFive). (Dkt. 156-5; Dkt. 156-7 at 7; O’Malley Rpt. at 9–10.) 28. The Downloading Statement does not explain that most users were not required to install OSSProxy in order to install and use the freeware provided by the TAP partner. (See Dkt. 156-5; O’Malley Rpt. at 10 (“If the consumer elects to decline, RelevantKnowledge will not be installed, and MP3 Cutter will remain on their machine. They are not forced to agree to RelevantKnowledge terms to obtain MP3 Cutter.”); CS0081903_Confidential--Attorney’s Eyes Only.pptx at 15; Weaver Dep Tr. at 213:4–19, 217:2–218:17 29. Each Downloading Statement asked users to acknowledge that they have “read, agreed to, and have obtained the consent of all . . . users to the terms and conditions of the Privacy Statement and User License Agreement,” and then provided most users (with the exception of Subclass members) with a functional hyperlink to the relevant sponsor’s User License Agreement and Privacy Statement (“ULA”). (Dkt. 14 at ¶¶ 4, 6; O’Malley Rpt. at 10; Dkt. 40 at 3 n.1; Weaver Dep. Tr. at 17:7–12, 19:14–20.) 30. When clicked on, the hyperlink presented in the Downloading Statement directs users to a comScore-controlled website that contains the ULA in its entirety. (Dkt. 14 at ¶ 6, Dkt. 40 at 3 n.1.) 31. Before clicking past the Downloading Statement, users are required to acknowledge—by filling in a radio button or some equivalent activity—that they had “read [and] 7 installing our application, you must review and agree to the terms and conditions below and provide and obtain consent to this agreement from anyone who will be using the computers on which you install this application.” (Ex. 4 at 2.) The ULA does not reference “terms and conditions” before this sentence, or before the “PRIVACY POLICY & USER LICENSE AGREEMENT” header. 38. In the short portion of the ULA appearing before the “terms and conditions below” language, the ULA references entities other than the program sponsor: [T]he data collected is used as part of anonymous market research reports that help shape the future of the Internet. The information you contribute is used by comScore, Inc., a U.S.-based market research company that is a nationallyrecognized authority on Internet and general economic trends, whose data are routinely cited by major media outlets such as the New York Times, the Wall Street Journal, and CNBC, and is extensively used by the largest Internet service companies and scores of Fortune 500 companies. None of these entities are mentioned after the “terms and conditions below” language, and none are referenced by the ULA using a personal pronoun (i.e., each is identified either by name or group). (Ex. 4 at 2 (emphasis added).) 39. In a section labeled “What information is collected?” the ULA outlines the types of information OSSProxy collects, and states that: [W]e make commercially viable efforts to automatically filter confidential personally identifiable information such as UserID, password, credit card numbers, and account numbers. Inadvertently, we may collect such information about our panelists; and when this happens, we make commercially viable efforts to purge our database of such information. (Ex. 4 at 2–3.) The terms “confidential personally identifiable information” and “automatically filter” are not otherwise defined by the ULA, but do appear one additional time under the header “How is the collected information used?” after the ULA explains that “[f]or certain commercial customers, we may provide individual-level information.” (Ex. 4 at 4.) 9 40. Under other headings, the ULA generally discusses (i) what information is collected by “our application,” (ii) how the information is collected, (iii) how the collected information is used, (iv) how the collected information is secured, (v) the participants (i.e., panelists’) obligations, (vi) the program sponsor’s commitment to participants, (vii) other legal terms and conditions, and (viii) who to contact with additional questions. (Ex. 4.) 41. Nowhere in the ULA is the “software” or “application” referred to or identified as belonging to or being operated by comScore. Instead, throughout the ULA, the software or application is referred to as “our software,” “the software,” “our application,” or “the application.” (Ex. 4.) 42. The only point of contact provided for users and/or panelists (i.e., “[i]f [they had] any questions about the above Privacy Statement & User License Agreement, our practices, [their] interactions with this site and this program,” or “support issues”) is the program sponsor’s “Privacy Office,” for which the ULA provides mailing and email addresses (e.g., “Privacy Office, 11950 Democracy Drive, Suite 600, Reston, VA 20910;” and “privacy@tmrginc.com” / “support@tmrginc.com”). (Ex. 4.) 43. The ULA’s terms and conditions provide that “[the] Agreement constitutes the entire agreement between sponsor and you with respect to the subject matter contained in the Agreement,” and explains that “[the] agreement shall not create any rights or remedies in any parties other than the parties to the agreement and no person shall assert any rights as a third party beneficiary under this agreement.” (Ex. 4 at 7.) Panelist Data Collected by OSSProxy 10 44. OSSProxy collects data from panelists’ computers and transmits the data to comScore’s servers. (Dkt. 180 at ¶¶ 5, 25; Brown Aug. 15, 2012 R. 30(b)(6) Dep. Tr. at 153:10– 14, 195:3–14.) 45. The data collected from panelists’ computers by OSSProxy includes, but is not limited to: POST data (i.e., information typed into an input form by a panelist on a website); PAGE data (i.e., information displayed on a website viewed by a panelist, especially during “secure” sessions); other aspects of a panelist’s online activity, such as what advertisements they click on and how long they are online; data concerning the files stored on, software installed on, and the configuration of panelists’ computers. (Dkt. 180 at ¶¶ 7, 9, 43; Bigbee Nov. 20, 2013 Dep. Tr. at 53:5–14, 64:18–65:17; Transcript of November 14, 2013 Deposition of Glenn Marchione (“Marchione Dep. Tr.”), Ex. 14 at 28:1–24.) 46. comScore established a panel in order to collect behavior data about Macintosh users (the “Mac Panel”), and developed Macintosh-compatible software specifically for that purpose. The Mac Panel software was publicly available beginning on September 29, 2009. (Dkt. 180 at ¶ 10.) Filtering versus Fuzzification 47. comScore programmed OSSProxy with the ability to (i) collect data in raw, plaintext form; (ii) filter data from OSSProxy’s collection, and (iii) obfuscate (i.e., “fuzzify”) data collected by OSSProxy. (See infra, ¶¶ 48-62.) 48. By using technology comScore refers to as 11 (See Marchione Dep Tr. at 74:11–75:12; CS0035637_Confidential--Attorney’s Eyes Only.htm, Ex. 15.) 49. Using similar technology, comScore programmed OSSProxy to exclude certain categories of websites from OSSProxy’s collection. (Bigbee Sept. 12, 2012 Dep. Tr. at 44:4– 46:17 (“Q: Give me an example of HTML information that OSSProxy would not capture. A: Information from dot-edu sites, university sites; information from a personal Google mail contact, we don’t collect that.”).) 50. comScore also utilizes “fuzzification”—a proprietary method of (i) identifying certain panelist-inputted data, (ii) “obfuscating”/“fuzzifying” it, and then (iii) delivering the obfuscated/fuzzified value to comScore’s servers. (Brown Aug. 15, 2012 R. 30(b)(6) Dep. Tr. at 147:16–148:2; Bigbee Sept. 12, 2012 Dep. Tr. at 40:20–41:3 (“[Fuzzification is] a system that we have in place to look for patterns in the data, to make sure that we either X out or hash any data that we deem to be sensitive to the user.”); Transcript of December 14, 2012 Deposition of Roberto Tamassia (“Tamassia Dep Tr.”), Ex. 16 at 51:14–52:4 (“Q: When you write in your report that sensitive data is transformed through the obfuscation process, what do you mean by transformed? A: What I mean is that there is a matter that takes as input data and could use as output some other data; that is the transformation process . . . The software tries to identify the presence of various types of sensitive data including Social Security numbers and credit card numbers. And once they are discovered, the software either removes completely the data or transforms it so that the new output data cannot be used to reconstruct the original data.”).) 51. comScore considers OSSProxy’s “filtering” and “fuzzification” as separate and distinct processes, and uses each to accomplish different goals. (Brown Aug. 15, 2012 R. 12 30(b)(6) Dep. Tr. at 219:13–16 (“Q: Filtering and fuzzifying are two different things? A: In my opinion, filtering and fuzzifying are two different things.”), 214:9–19 Bigbee Nov. 20, 2013 Dep. Tr. at 54:5–21 .”); 66:12–23 ) (emphasis added).) 52. comScore uses OSSProxy’s “filtering” programming to identify and then exclude data from OSSProxy’s collection that it doesn’t want to collect, such as in cases where the filtered data is not a part of comScore’s business model. (Bigbee Sept. 12, 2012 Dep Tr. at 44:4– 14 (“Q: . . . Why would comScore not collect HTML page data information from dot-edu sites? A: It’s not part of our business model to collect activities from universities . . . .”) 13 53. comScore uses OSSProxy’s “fuzzification” programming to identify, obfuscate, and then include data in OSSProxy’s collection that it does want to collect, such as in cases where the identified data is part of comScore’ business model. (Brown Aug. 15, 2012 Dep. Tr. at 218:22–219:12 (“A: We collect fuzzified data because we don’t want to collect data that would be harmful or identify who that panelist is, you know. The last thing we want to have is a list of credit card numbers from panelists. That’s an exposure for the panelist and exposure for us. Q: It’s important to filter the information? A: In this case, we’re not talking about filtering the information, we’re talking about changing the information. . . we’re changing the information in a one-way manner that’s not reversible; that is the goal of fuzzification.”); Tamassia Dep Tr. at 52:24–53:14 (“Q: My understanding of the way the comScore software works is that it uses regular expressions to detect some certain information like a credit card or Social Security number? A: Yes. Q: Then it collects that information and transforms it; those are your words? A: Yes.), 53:5–54:3 (“. . . My understanding of the comScore business is that they’re the one to provide aggregate statistical data to their customers about, for example, the use of certain credit cards for transactions. So that’s one of the reasons that they will track credit card usage across the economy, across the users of the software.”).) Transcript of October 25, 2012 Deposition of Don Waldhalm (“Waldhalm Dep. Tr.”), Ex. 17 at 92:23–93:12 ) 54. 14 Marchione Dep. Tr. at 30:24–31:19 ”); Bigbee Nov. 20, 2013 Dep. Tr. at 118:24– 119:10 55. (Bigbee Nov. 20, 2013 Dep. Tr. at 121:3–122:1; CS0017688_Confidential--Attorney’s Eyes Only.pdf, Ex. 18; CS0076561_Confidential-Attorney’s Eyes Only.htm, Ex. 19.) 56. ). (Marchione Dep Tr. at 43:14–48:23 ); Bigbee Sept. 12, 2012 Dep. Tr. at 110:12–111:18 15 ”).) 57. (Bigbee Nov. 20, 2013 Dep. Tr. at 121:3–122:1 .”).) 58. (CS0081698_Confidential.htm, Ex. 20; CS0081713_Confidential.htm, Ex. 21.) 59. 16 (CS0081698_Confidential.htm.) 60. . (CS0081698_Confidential.htm.) 61. (See CS0081698 Confidential.htm; Thomassen Decl. at ¶¶ 3-9.) 62. (CS0081698_Confidential.htm; Thomassen Decl. at ¶¶ 7-9.) Deleting/Modifying Personally Identifiable Profile Information 63. Transcript of November 22, 2013 Deposition of Latoya Peterson-Renfrow 17 (“Renfrow Dep. Tr.”), Ex. 22 at 101:3–17; O’Toole Jan. 24, 2014 R. 30(b)(6) Dep. Tr. 123:21– 124:9 ).) Adherence to comScore’s Disclosed PII Practices 64. comScore’s Director of Software Engineering, Steven Chase testified that, Transcript of November 13, 2013 Deposition of Steven Chase (“Chase Dep. Tr.”), Ex. 23 at 90:18–20 96:18–23 ).) 65. Michael Brown, comScore’s Chief Technology Officer, responsible for the source code and technology that allows for fuzzification and testifying for comScore pursuant to Rule 30(b)(6), . (Transcript of January 23, 2014 Rule 30(b)(6) Deposition of Michael Brown (“Brown Jan. 23, 2014 R. 30(b)(6) Dep. Tr.”), Ex. 24 at 80:5–81:5.) 66. Regarding the promise to “purge our database of [inadvertently collected personally identifiable information],” see supra ¶ 39, comScore’s Deputy Privacy Officer testified that ,” (Weaver Dep. Tr. at 273:17–24), and several of comScore’s employees, including its Vice President of Panel Operations, its Chief Research Officer, and its Senior Vice President of Technology, testified that 18 . (O’Toole Nov. 21, 2013 Dep. Tr. at 118:12–23 .”); Chasin Dep. Tr. at 70:11–16, 86:4–9 (“Q: . . . .”); Bigbee Nov. 20, 2013 Dep. Tr. at 27:22–28:1 (“Q .”).) comScore Alone Designed, Deployed, Maintained, and Operated OSSProxy 67. comScore alone designed OSSProxy—neither TMRG, nor VoiceFive, nor any of comScore’s subsidiaries, had any involvement in OSSProxy’s design or development. (Brown Aug. 15, 2012 R. (30)(b)(6) Dep. Tr. at 71:21–74:22.) 68. comScore’s subsidiaries have no ability to modify OSSProxy in any way, nor do they have the ability to update OSSProxy. All updates of OSSProxy are designed and deployed by comScore. (Id. at 112:9–114:12.) 69. comScore alone deploys OSSProxy directly to panelists, regulates the downloading of OSSProxy, validates that the terms of service have been accepted (i.e., after users click past the Downloading Statement over the course of a bundle’s installation), installs the software onto panelists’ computers, configures the software to operate properly on panelists’ computers, and maintains OSSProxy. (Id. at 77:13–79:10.) 70. comScore directly monitors and collects information from its panelists— information about panelists’ web browsing history and other Internet behavior is transmitted to comScore’s servers, not to comScore’s subsidiaries. (Id. at 152:25–153:14.) 19 71. Neither TMRG nor VoiceFive receive any panelist data from OSSProxy. (Id. at 75:25–76:12.) 72. . (Id. at 157:8–12; Weaver Dep. Tr. 41:17– 23, 44:16–47:18.) Panelists’ Relationship with Sponsors 73. Emails sent to the email addresses presented in the ULA (i.e. support@tmrginc.com or privacy@tmrginc.com), . (Weaver Dep. Tr. 247:7–17 (“ 249:11–15 O’Toole Nov. 21, 2013 Dep. Tr. 104:10 – 106:3.) 74. comScore has (O’Toole Nov. 21, 2013 Dep. Tr. at 104:6–106:4 .”); O’Toole Jan. 24, 2014 R. 30(b)(6) Dep. Tr. at 60:13–61:3 20 CS0042536_Confidential--Attorney's Eyes Only.htm, Ex. 25 emphasis in original).) 75. (CS0071631_Confidential--Attorney’s Eyes Only.htm, Ex. 26 Plaintiffs’ Experience with OSSProxy 76. Plaintiff Mike Harris downloaded and installed a free software application that was bundled with OSSProxy (branded as “PremierOpinion”) onto his Macintosh computer in March of 2010. (Dkt. 169 at ¶ 64; Transcript of July 13, 2012 Deposition of Mike Harris (“Harris July 13, 2012 Dep. Tr.”), Ex. 27 at 35:6–8, 41:9–14, 43:7–11.) 77. Plaintiff Jeff Dunstan downloaded and installed freeware that was bundled with OSSProxy (branded as “RelevantKnowledge”) in September of 2010, and paid $39.99 for a program called PC Doctor to remove RelevantKnowledge from his computer. (Dkt. 169 at ¶ 67; Transcript of November 19, 2013 Deposition of Jeff Dunstan (“Dunstan Nov. 19, 2013 Dep. Tr.”), Ex. 28 at 14:21–25, 20:17–21:10.) 21 CERTIFICATE OF SERVICE I, Rafey S. Balabanian, an attorney, hereby certify that on February 21, 2014, I served the above and foregoing Plaintiffs Jeff Dunstan’s and Mike Harris’s Local Rule 56.1 Statement of Undisputed Material Facts in Support of their Motion for Partial Summary Judgment by causing true and accurate copies of such paper to be filed and transmitted to all counsel of record via the Court’s CM/ECF electronic filing system. s/ Rafey S. Balabanian 23

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?