Dunstan et al v. comScore, Inc.
Filing
59
ANSWER to Complaint with Jury Demand by comScore, Inc.(Stack, Paul)
In the United States District Court
for the Northern District of Illinois
Eastern Division
MIKE HARRIS and JEFF DUNSTAN,
individually and on behalf of a class of similarly
Situated individuals,
Plaintiffs,
v.
comScore, INC., a Delaware corporation,
Defendant.
)
)
)
)
)
)
)
)
)
)
)
)
)
No. 11 C 5807
Judge James F. Holderman
Magistrate Judge Nan Nolan
ANSWER AND JURY DEMAND
Now comes comScore, Inc., Defendant herein (“comScore”), by its attorneys MICHAEL
G. RHODES and PAUL F. STACK, and in answer to the Complaint herein, states as follows:
INTRODUCTION
1.
comScore designs, distributes, and deploys its data collection software in a
deceptive and calculated fashion to unlawfully monitor the most personal online movements of
millions of consumers without their knowledge.
ANSWER: comScore denies the allegations contained in paragraph 1 of the Complaint
and each of them. Answering further, comScore affirmatively states that it is a leading Internet
market research company that designs and distributes software to measure the online activity of
Internet users (“Panelists”) who volunteer to join a comScore market research panel in exchange
for various benefits. comScore specifically denies that its business practices are “deceptive” or
are implemented “without the[] knowledge” of its Panelists, for the reasons set forth in response
to Paragraph 12 of the Complaint, below.
1
2.
comScore provides high profile clients such as the Wall Street Journal, the New York
Times, and Fox News with detailed data that it collects from millions of consumers online
(hereinafter referred to as "monitored consumers"). These clients pay enormous fees for access to
comScore's highly valuable and comprehensive store of information about consumers.
ANSWER: comScore admits that it measures certain online activity of its Panelists.
comScore further admits that its clients have included companies like the Wall Street Journal, the
New York Times, and Fox News, which use the information for their ordinary business
purposes. comScore denies that any client of comScore’s syndicated services, like the clients
called out in this paragraph, was provided with any detailed data that comScore had collected
from its Panelists, as those clients are only provided aggregated data (i.e., comScore would
disclose, for example, that in December, four million people went to www.anydomain.com, and
has never and would never disclose that on December 18, a specific Panelist went to
www.anydomain.com). Except as expressly admitted herein, comScore denies the remaining
allegations of paragraph 2 of the Complaint and each of them.
3.
comScore asserts that its data provides insight into the purchasing habits, market trends,
and other online behavior of consumers. In order to gather such extensive data, comScore relies
upon a large pool of consumers with comScore's software operating on their computers:
"[C]entral to most comScore services is the comScore panel, the largest continuously measured
consumer panel of its kind. With approximately 2 million worldwide consumers under
continuous measurement, the comScore panel utilizes a sophisticated methodology that is
designed to accurately measure people and their behavior in the digital environment."
ANSWER: comScore admits that its data provides insight into the purchasing habits,
market trends, and other online behavior of Panelists. comScore further admits that in order to
gather such data, comScore relies on a pool of Internet users who voluntarily install comScore’s
software on their computers and thereby become Panelists. comScore further admits that the
quoted text within the second sentence appeared on certain comScore web pages at certain times.
2
Answering further, plaintiffs set forth various statements in footnotes to their Complaint contrary
to Rule 10(b) of the Federal Rules of Civil Procedure which requires that “all averments of claim
. . . shall be made in numbered paragraphs . . . .” (Emphasis added). Since the statements in the
footnotes do not appear in numbered paragraphs, they are mere surplusage and should be
stricken.
4.
As one of the biggest players in the Internet research industry, statistics gleaned from
comScore's consumer data are featured in major media outlets on a daily basis. However, what
lies beneath comScore's data gathering techniques is far more sinister and shocking to all but the
few who fully understand its business practices. Namely, comScore has developed highly
intrusive and robust data collection software known by such names as RelevantKnowledge,
OpinionSpy, Premier Opinion, OpinionSquare, PermissionResearch, and MarketScore
(hereinafter collectively referred to in the singular as "Surveillance Software") to surreptitiously
siphon exorbitant amounts of sensitive and personal data from consumers' computers. Through
subsidiaries bearing innocuous names, comScore uses deceitful tactics to disseminate its
software and thereby gain constant monitoring access to millions of hapless consumers'
computers and networks.
ANSWER: comScore admits that the media has featured some of its reports, which are
based on data gathered from Panelists that have been weighted and aggregated to form a
releasable product. comScore further admits that it has developed software which has been
branded with names including RelevantKnowledge, Premier Opinion, OpinionSquare,
PermissionResearch, and MarketScore (although not all of these brands currently exist), each of
which is designed to collect information about the online activity of Internet users who volunteer
to be Panelists. comScore denies that its software has been designed to collect sensitive or
personal data, as the current software has actually been designed to automatically filter out these
types of data (including credit card numbers, social security numbers, account numbers, User
IDs, and passwords), so that such information is not transmitted to comScore. comScore admits
3
that it does have subsidiaries, but denies the use of deceitful tactics to disseminate its software.
Plaintiffs use the term “Surveillance Software” to describe comScore’s proprietary software.
comScore affirmatively states that this term is both pejorative and false and comScore denies the
accuracy of the term when it appears in passim in the Complaint. Except as expressly admitted
herein, comScore denies the allegations of paragraph 4 of the Complaint and each of them.
5.
comScore's sophisticated computer applications monitor every action conducted by users.
This data is sent to comScore's servers, and then organized and sold to Defendant's clients.
ANSWER: comScore denies the allegations of paragraph 5 of the Complaint and each
of them. comScore affirmatively states that its software measures certain limited information
regarding the online activity of its Panelists. comScore further acknowledges that some of this
limited information is sent to comScore’s servers and is then aggregated for analysis. comScore
admits that its syndicated clients pay for access to this aggregated data. comScore specifically
denies that it monitors “every action” conducted by its Panelists.
6.
To extract this data, comScore's Surveillance Software injects code into the user's web
browser to monitor everything viewed, clicked, or inputted online. In addition, the software
opens ports, modifies the consumer's firewall, and places "root certificates” on the affected
computer to ensure unimpeded access.
ANSWER: comScore admits that when a Panelist voluntarily installs the comScore
software, it works with the Panelist’s web browser (e.g., Internet Explorer, Firefox) to measure
certain of the Panelist’s online activity. comScore admits that certain versions of its software can
make modifications to the Windows Firewall that was introduced with XP Service Pack 2, and
further states that any such modifications are done in accordance with publically available
Windows documentation and, to comScore’s knowledge, comply with the purpose of, or are
consistent with, this feature as provided by the Windows operating system. comScore admits
that its software, like any other Internet enabled software, connects to a port on a web server.
comScore specifically denies that its software monitors “everything viewed, clicked, or inputted
4
online.” comScore also specifically denies that its software currently installs “root certificates.”
Except as expressly admitted herein, comScore denies the allegations of paragraph 6 of the
Complaint and each of them.
7.
The scope and breadth of data that comScore collects from unsuspecting consumers is
terrifying. By way of illustration, comScore's Surveillance Software constantly collects and
transmits the following data, among others, from a consumer's computer to comScore's servers:
a) the monitored consumer's usernames and passwords;
b) queries on search engines like Google;
c) the website(s) the monitored consumer is currently viewing;
d) credit card numbers and any financial or otherwise sensitive information inputted into
any website the monitored views;
e) the goods purchased online by the monitored consumer, the price paid by the
monitored consumer for the goods, and amount of time the monitored consumer views
the goods before purchase;
f) specific advertisements clicked by the monitored consumer.
ANSWER: Except as expressly stated herein, comScore denies the allegations of
paragraph 7 of the Complaint and each of them. comScore affirmatively states that its software
collects certain data from Panelists, including queries on search engines; what websites are
viewed by Panelists; what goods are purchased by Panelists; what advertisements are clicked by
Panelists; the length of time a Panelist is online; and how much a Panelists pays for items in
online transactions. comScore specifically denies that its software “constantly collects and
transmits” items like credit card numbers, social security numbers, account numbers, user IDs, or
passwords; instead, comScore affirmatively states that its software is designed to identify these
types of data so that it can irreversibly mask that information or otherwise prevent its
transmission to comScore.
5
8.
After the Surveillance Software is installed on a monitored consumer’s computer, all
Internet traffic from the consumer's computer is re-routed through comScore servers before
reaching a destination website.
ANSWER: comScore denies the allegations of paragraph 8 of the Complaint and each
of them. comScore specifically denies that any Internet traffic from a panelist’s computer is
rerouted through comScore servers.
9.
Furthermore, comScore's Surveillance Software seeks out and scans every file on the
monitored consumer's computer (including word processing documents, emails, PDFs, image
files, spreadsheets, etc.), and sends information resulting from examination of those files to
comScore's servers.
ANSWER: Except as expressly stated herein, comScore denies the allegations of
paragraph 9 of the Complaint and each of them. comScore affirmatively states that its software
collects statistics on the number of files installed on a Panelist’s computer (such as the number of
PDF or Microsoft Word files). comScore further admits that its software collects statistics on the
versions and types of installed software on a Panelist’s machine (e.g., whether a Panelist’s
machine has Microsoft Word installed). comScore denies that it scans every file on a Panelist’s
computer.
10.
Although comScore claims that its software only mines data from the individual
consumer's computer, it designed its Surveillance Software to scan files located on any network
the host computer is connected to, and sends data about those files back to comScore's servers. In
this way, every available file housed on the monitored consumer's local network is accessed by
comScore without authorization.
ANSWER: Except as expressly stated herein, comScore denies the allegations of
paragraph 10 of the Complaint and each of them. comScore affirmatively states that, for a
limited period of time, it experimented with establishing a panel for Macintosh users (“Mac
Panel”), and developed Macintosh-compatible software specifically for that purpose. comScore
6
admits that the Mac Panel software was publically available as a limited release beginning on
September 29, 2009. comScore further admits that a bug in the Macintosh version of its software
potentially allowed the software to count the number of specific types of files located on
networks to which Panelists’ Macintosh computers were connected, and that this bug was
corrected in June 2010. comScore terminated the Mac Panel on or around September 25, 2010.
None of the data collected through the Mac Panel was ever shared with, or sold to, a third party.
11.
In addition, comScore designed its software to intercept packets traversing local wireless
networks. Consequently, any monitored consumer running the Surveillance Software
inadvertently exposes every nearby user on his or her network to comScore's interception of
private data.
ANSWER: comScore denies that any non-Panelist user of a local network was ever
exposed to the collection of private data as any packets monitored by comScore would only have
contained network address information. comScore denies the remaining allegations of paragraph
11 of the Complaint and each of them.
12.
Because of Defendant's covert methods for deploying its software, millions of monitored
consumers remain wholly unaware that their every movement online is under constant
surveillance by comScore.
ANSWER: comScore denies the allegations of paragraph 12 of the Complaint and each
of them. comScore denies that it employs “covert methods for deploying its software.” To the
contrary, comScore’s software is designed so that comScore’s Terms of Service (“TOS”) are
presented directly to prospective Panelists prior to completion of the installation process. The
TOS disclose the types of information that comScore collects and the methods by which it is
collected. Prospective Panelists must click to indicate they have read and agreed to the TOS or
comScore’s software will not install. Moreover, in Fall 2007, comScore implemented its
“Watchdog” or “RK Verify” program, a computer program that ensures the TOS is shown to
users during the installation process. comScore’s software will not install unless the “Watchdog”
7
or “RK Verify” program verifies that the TOS was shown to, and accepted by, the user.
comScore further notes that, in early 2008, it introduced an icon that appears on a Panelist’s
“system tray” any time that comScore software is running, which conspicuously discloses the
presence of the software to Panelists. The icon is also displayed in Windows’ “All Programs”
menu. In addition, comScore continually delivers messages to Panelists after they join. These
messages include a Welcome message sent after installation that thanks Panelists for joining the
Panel and provides a link to comScore’s Privacy Policy and to an FAQ that discusses, among
other things, how to uninstall comScore’s software. These messages also include invitations to
participate in surveys, clearly branded with the name of the panel of which the user is a member.
Panelists may also receive benefits that remind them of their participation, including rewards
programs that allow them to collect points for doing things like participating in surveys - the
collected points can then be redeemed for a variety of items including gift cards or household
items. Finally, comScore’s privacy policy and practices have been vetted by a number of third
party auditors including TRUSTe, Grant Thornton, and Ernst and Young,. comScore has
received certificates of approval for its privacy policy and practices (including for the manner in
which it discloses its software) from WebTrust, Better Business Bureau, VeriSign Trusted, Trust
Guard, and Network Solutions (among others).
13.
To induce individuals to download and install its software, comScore "bundles" its
Surveillance Software with software developed by third parties. The third-party software is
generally offered at no cost, and includes popular items such as free screens avers and games,
and functional applications such as music-copying programs, or greeting-card templates.
comScore pays the third-party every time a consumer downloads the bundled software.
ANSWER: comScore admits that it recruits Panelists through a variety of online
methods, including through third-parties that offer comScore’s software during the installation
process of their own software applications. comScore further admits that third parties may offer
this third-party software at no cost to prospective Panelists. comScore further admits that it
8
compensates its third party partners that offer the comScore software during the installation
process of their own software. Except as expressly admitted herein, comScore denies the
allegations of paragraph 13 of the Complaint and each of them.
14.
In many cases, comScore provides no method for the monitored consumer to uninstall its
software, and often deceives the consumer into thinking that all of comScore's nefarious software
has been removed. Moreover, comScore designed its computer applications to resist attempts to
uninstall the Surveillance Software. For example, when a consumer uninstalls the third-party
freeware program, comScore's Surveillance Software will not be removed.
ANSWER: comScore denies the allegations of paragraph 14 of the Complaint and each
of them. comScore’s software is designed so that it can be permanently and easily uninstalled
using the standard Windows “Add or Remove Programs” utility. Moreover, when the software
has been installed, an icon appears in the Panelist’s system tray to conspicuously disclose the
software’s presence, thereby signaling to the user whether the software is currently installed.
The icon disappears when the software has been uninstalled. comScore affirmatively states that
it is inaccurate to refer to the relationship between comScore and its third party distribution
partners as involving a “bundle.” In fact, once installed, the comScore software is independent
of the software provided by the third party, precisely so that an individual may remove the
comScore software at any time and independent of the other software installed on this
individuals’ computer. comScore admits that to remove comScore’s software, a Panelist must
uninstall the comScore software, but the converse is also true: the removal of comScore’s
software does not also remove the third party software. In this instance, the comScore software
is simply a separate offer made as part of the third party provider’s installation process; it is not a
“bundle.”
15.
comScore designed its Surveillance Software to be highly persistent. User attempts to
disable comScore's applications are wholly ineffectual, as the software automatically re-starts
itself when deactivated. As a result, it is impossible to "tum off' comScore's 24/7 monitoring.
9
ANSWER: comScore denies the allegations of paragraph 15 of the Complaint and each
of them. comScore affirmatively states that its software can be permanently uninstalled using
the Windows “Add or Remove Programs” utility. After a Panelist properly uninstalls the
comScore software, the software does not automatically restart itself.
16.
Even if a monitored consumer can manage to manually uninstall the Surveillance
Software, Defendant programmed its applications to secretly leave behind a comScore root
certificate. As discussed in more detail in Section VII infra, leaving an untrusted root certificate
on a user's computer exposes that individual to attacks by hackers, and allows comScore to
remonitor the consumer's computer in the future.
ANSWER: comScore denies that it “programmed its applications to secretly leave
behind a comScore root certificate.” comScore made use of root certificates with an early
version of its software, but no current version of its software has employed root certificates since
April 2005. comScore further denies that the installation of a root certificate exposes users to
harm from hacking or that it allows comScore to “re-monitor the consumer’s computer.”
comScore believes that installation of a root certificate in and of itself does not expose users to
harm from hacking, as no alternative use may be made of this certificate without possession of a
master certificate, to comScore’s knowledge. comScore has strictly limited internal access to the
certificate authority and is not aware of any instances in which third parties have had access to
the certificate authority. A root certificate does not create “back door” access to a consumer’s
computer, so comScore is incapable of “re-monitoring the consumer’s computer” with the
existence of a root certificate by itself. Except as expressly admitted herein, comScore denies
the allegations of paragraph 16 of the Complaint and each of them.
17.
Defendant's Terms of Service ("TOS") do not reveal the extensive and highly intrusive
amount of data collected by comScore from consumers' computers.
10
ANSWER: comScore denies the allegations of paragraph 17 of the Complaint and each
of them. comScore’s TOS discloses to all prospective Panelists what types of information
comScore collects and how the information is collected.
18.
On information and belief, comScore has intentionally designed its Surveillance Software
and business practices to surreptitiously maximize both the number of consumers monitored by
Defendant, as well as the breadth of information collected.
ANSWER: comScore denies the allegations of paragraph 18 of the Complaint and each
of them.
19.
comScore's nefarious tactics drive Defendant's bottom line by enabling the company to
sell valuable consumer information to clients for enormous fees. While highly lucrative to the
company, comScore's methods demonstrate a wholesale disregard for consumer privacy rights
and violate numerous state and federal laws.
ANSWER: comScore denies the allegations of paragraph 19 of the Complaint and each
of them.
PARTIES
20. Plaintiff Mike Harris is a natural person and citizen of the State of Illinois.
ANSWER: comScore lacks knowledge or information sufficient to form a belief as to
the truth of the allegations in paragraph 20, and on that basis, denies them.
21.
Plaintiff Jeff Dunstan is a natural person and citizen of the State of California.
ANSWER: comScore lacks knowledge or information sufficient to form a belief as to
the truth of the allegations in paragraph 21, and on that basis, denies them.
22.
Defendant comScore, Inc. is a Delaware corporation with its headquarters located at
11950 Democracy Drive, Suite 600, Reston, Virginia 20190. Defendant does business
throughout the State of Illinois and the United States.
ANSWER: comScore admits the allegations set forth in paragraph 22 of the Complaint.
11
JURISDICTION AND VENUE
23.
This Court has jurisdiction over the subject matter of this action pursuant to 28 U.S.C. §
1331. This Court has jurisdiction over Defendant because it conducts business in Illinois and/or
because the improper conduct alleged in the Complaint occurred in, was directed from, and/or
emanated or exported from Illinois. Personal jurisdiction is additionally proper because Plaintiff
Mike Harris is a resident of Illinois.
ANSWER: The allegations of paragraph 23 are legal conclusions to which no response
is required. To the extent a response is required, comScore denies that subject matter jurisdiction
exists.
24.
Venue is proper in this District under 28 U.S.C. § 1391(a) because the injury arose in this
District. Venue is additionally proper because Defendant transacts significant business in this
District, including entering into consumer transactions.
ANSWER: The allegations of paragraph 24 are legal conclusions to which no response
is required. To the extent a response is required, comScore admits that it transacts business in
this District.
FACTUAL BACKGROUND
Section I.
25.
comScore is an Internet research corporation that provides marketing data to a wide
variety of clients, generally in the form of aggregated reports about online consumer behavior.
To collect the data necessary for its reports, comScore monitors consumers' actions using
proprietary software ("Surveillance Software") operating on users' computers.
ANSWER: comScore admits that it measures the online activity of Internet users who
volunteer to become Panelists, using proprietary software that Panelists voluntarily install on
their computers, and that it provides market research data to its clients. Except as expressly
admitted herein, comScore denies the allegations of paragraph 25 of the Complaint and each of
them.
12
26.
The data collected about monitored consumers by the Surveillance Software is
transmitted, often in real-time, to comScore’s servers. This information is aggregated and
organized for Defendant's marketing reports, which are then sold to its clients. comScore
currently monitors at least two million computers worldwide.
ANSWER: comScore admits that the data collected from Panelists through comScore’s
software is transmitted to comScore’s servers. comScore further admits that it provides certain
syndicated clients with access to reports after the information is aggregated (e.g., comScore
would disclose, for example, that in December, four million people went to
www.anydomain.com, and has never and would never disclose that on December 18, a specific
panelist went to www.anydomain.com). comScore admits that there are currently over two
million people under measurement worldwide. Except as expressly admitted herein, comScore
denies the allegations of paragraph 26 of the Complaint and each of them.
27.
comScore's clients vary widely by industry and size, and include high-profile companies
such as the New York Times, the Wall Street Journal, Proctor and Gamble, and Eli Lilly and
Company. These companies use comScore's reports for, among other things, statistics for news
articles and gauging consumer interest in products and services.
ANSWER: comScore admits that its clients vary by industry and size, and include
companies such as the New York Times, the Wall Street Journal, Proctor and Gamble, and Eli
Lilly and Company, who use comScore’s data as part of their ordinary business practices.
Except as expressly admitted herein, comScore lacks information sufficient to form a belief as to
the truth of the remaining allegations in paragraph 27 of the Complaint, and on that basis, denies
them.
28.
comScore is capable of parsing enormous amounts of information and extrapolating
narrowly defined trends and statistics, as evidenced by the following quote from the New York
Times: "ComScore found a decline of 10 percent in time spent on Web-based email among 18to 24-year-olds, about the same as it found for people up to the age of 54.”
13
ANSWER: comScore admits that its data can be used to identify certain trends and
statistics. Except as expressly admitted herein, comScore lacks information sufficient to form a
belief as to the truth of the remaining allegations in paragraph 28of the Complaint, and on that
basis, denies them.
29.
To provide the highly targeted research data noted above, comScore-through its
Surveillance Software-constantly collects, monitors, and analyzes every online move, no matter
how private, of over two million persons.
ANSWER: comScore admits that its software obtains limited information about the
online activity of Internet users who volunteer to become Panelists. comScore denies that it
“collects, monitors, and analyzes every online move” of its Panelists, and offers as an example
that comScore’s software is specifically designed not to collect text messages or the text of
emails, and that this is just one example of the many areas not monitored by comScore’s
software. comScore denies the remaining allegations of paragraph 29 of the Complaint and each
of them.
30.
Unfortunately, most, if not all monitored consumers are not aware of the depth of data
comScore mines from their computers everyday. In many cases, consumers are not even aware
of the Surveillance Software's very existence.
ANSWER: comScore incorporates its response to paragraph 12. Except as expressly
admitted therein, comScore denies the allegations of paragraph 30 of the Complaint and each of
them.
Section II.
31.
As stated in Section I supra, comScore tracks the online behavior of over two million
(2,000,000) consumers worldwide. To accomplish this, comScore has developed proprietary
software that monitors every action conducted on an individual's computer. comScore deploys
this software primarily by two methods: 1) online respondent acquisition and 2) a third-party
application provider program.
14
ANSWER: comScore admits that its worldwide Panel consists of around two million
Internet users. comScore further admits that it has developed proprietary software that Panelists
voluntarily download and install, which measures the Panelists’ online activity. comScore
further admits that its software is distributed through multiple methods. comScore denies that its
software monitors every action conducted on an individual’s computer. comScore denies the
remaining allegations of paragraph 31 of the Complaint and each of them.
32.
Online respondent acquisition simply refers to comScore's method of paying affiliate
partners to post comScore's advertisements on their websites in an effort to solicit consumers to
download comScore's Surveillance Software. To entice consumers to download the Surveillance
Software, comScore offers sweepstakes enrollments and prizes in exchange for membership in
its "program." Potential members are also offered software, such as computer games, for free.
ANSWER: comScore admits that it recruits Panelists through a variety of online
methods, which include the use of banner advertisements on third party websites. comScore
admits that it pays third parties to post comScore’s advertisements on their websites. comScore
further admits that in exchange for volunteering to become a member of a panel, Panelists may
be offered various benefits including planting of trees in their name, sweepstakes enrollments,
prizes, points, or free software. Except as expressly admitted herein, comScore denies the
allegations of paragraph 32 of the Complaint and each of them.
33.
The second and more devious method that comScore uses to induce consumers to install
its Surveillance Software is through its third-party application provider program. This method
involves comScore paying developers to bundle the Surveillance Software with the third-party
application provider's software. The third-party computer application included in the bundled
software may be a free screensaver, game, CD burning software, greeting card template, or any
other type of "freeware." In many cases, the existence of the Surveillance Software bundled with
the freeware is only disclosed, in an inconspicuous fashion, after the installation process has
already begun.
15
ANSWER: comScore admits that it recruits Panelists through a variety of online
methods, which include partnering with third party software developers that offer comScore’s
software during the installation of their own software. comScore further admits that the thirdparty software may consist of free screensavers, games, CD burning software, greeting card
templates, or other types of “freeware.” comScore denies that the incorporation of its software
with the third-party software is done “in an inconspicuous fashion” and incorporates by reference
its response to paragraph 12 regarding comScore’s various methods of disclosure. Except as
expressly admitted herein, comScore denies the allegations of paragraph 33 of the Complaint and
each of them.
34.
For example, if a consumer downloads a free screensaver bundled with comScore's
Surveillance Software, the third-party developer of the screensaver is then paid by comScore for
the download of the bundled software.
ANSWER: comScore admits that it compensates the third-parties who provide an offer
for comScore’s software as part of the third parties’ software applications. Except as expressly
admitted herein, comScore denies the allegations of paragraph 34 of the Complaint and each of
them.
35.
comScore's monitoring software is marketed through subsidiaries bearing names such as
TMRG, Inc. and VoiceFive, Inc., with varying names for its Surveillance Software, such as
RelevantKnowledge, OpinionSpy, Premier Opinion, OpinionS quare, PermissionResearch, and
MarketScore.
ANSWER: comScore admits that its software is marketed through subsidiaries,
including but not limited to, TMRG, Inc. and VoiceFive, Inc. comScore further admits that its
subsidiaries have used varying names for comScore’s software over time, such as
RelevantKnowledge, Premier Opinion, OpinionSquare, PermissionResearch, and MarketScore.
Except as expressly admitted herein, comScore denies the allegations of paragraph 35 of the
Complaint and each of them.
16
Section III.
36.
As discussed herein, comScore's intrusive methods for collecting highly sensitive
information from consumers' computers are staggering. However, comScore's Terms of Service
(“TOS”) presented (or not presented) to the user paint a far different picture than reality.
ANSWER: comScore denies the allegations of paragraph 36 of the Complaint and each
of them.
37.
comScore's full Privacy Policy and Terms of Service fail to disclose the following facts
regarding Surveillance Software operations performed on a consumer's computer:
(a) the Surveillance Software scans files on both local and network volumes;
(b) the Surveillance Software has full rights to access and change any file on the
consumer's computer;
(c) the Surveillance Software opens an HTTP "backdoor" to transmit data;
(d) the Surveillance Software analyzes packets of data as they enter and leave a
consumer's computer over a local network, and data as they are transferred to and from
other computers on the consumer's network;
(e) the Surveillance Software has no user interface from which a consumer can turn off
the software, modify the settings, or otherwise determine what information the
software is collecting;
(f) the Surveillance Software implants a "root certificate" that modifies the consumer's
computer security settings, and the "root certificate" remains on a consumer's system
even after the Surveillance Software is removed;
(g) the Surveillance Software modifies a computer's firewall settings;
(h) the Surveillance Software redirects all internet traffic through comScore's servers
before routing it to the consumer's intended website;
(i) the Surveillance Software injects code without user intervention into various web
browsers and instant messaging applications;
(j) the Surveillance Software can be upgraded, modified, and controlled remotely,
without consumer intervention or permission;
(k) the Surveillance Software will not be deleted if a consumer deletes the free
application (e.g. free screensaver) with which the Surveillance Software was bundled;
17
(1) the Surveillance Software will interact with, scan, and monitor networked
computers beyond simply the original user's computer.
ANSWER: comScore denies the allegations of paragraph 37 of the Complaint and each
of them, as well as Plaintiffs’ characterization of the TOS, which is a document that speaks for
itself. comScore affirmatively states that its proprietary software operates in a manner consistent
with its Privacy Policy and Terms of Service. comScore also affirmatively states that it has
already denied many of the so called “facts” upon which Paragraph 37 of the Complaint
expressly relies.
38.
Often, comScore's TOS do not display any actual reference to Defendant's full license
agreement whatsoever. (See Exhibit A, attached hereto as a true and accurate copy of comScore's
Premier Opinion Surveillance Software Terms of Service bundled with a screensaver.) Most
ANSWER: Except as expressly set forth herein, comScore denies the allegations of
paragraph 38 of the Complaint and each of them. comScore affirmatively states that for a
limited period one third party partner failed to include a link to comScore’s full Privacy Policy
and User License Agreement, however, in these cases, the consumer was presented with
comScore’s TOS and was required to accept the terms of this TOS. However, this situation was
quickly corrected and affected a very small portion of Mac Panel users only. These Mac Panel
users’data was never used in any comScore reports, and thus was never provided, even in
aggregate form, to anyone outside of comScore. Moreover, the full terms of the Privacy Policy
and User License Agreement were available at all times to those Panelists through links installed
in the Windows Start Menu, or through an icon on a Mac. In the vast majority of cases,
comScore’s TOS is presented directly to prospective Panelists within a dialog box that pops up
during the installation process. This dialog box contains a link to comScore’s full User License
Agreement and Privacy Policy (“ULA”), as reflected in Exhibit A of the Complaint. comScore
denies the remaining allegations of paragraph 38 of the Complaint, and each of them.
18
39.
In many instances, when a consumer installs third-party applications bundled with
comScore's Surveillance Software, the graphical display shown to the user makes it appear that
only one piece of software is being installed. For example, if a person installs a free screensaver
bundled with Defendant's RelevantKnowledge Surveillance Software, a screen will appear
during, and not before, the installation process displaying a brief description of comScore's
product. Importantly, however, the screen is resented seamlessly with the rest of the installation.
ANSWER: comScore admits that, when a prospective Panelist installs a free
screensaver that includes an offer for comScore’s RelevantKnowledge software, a dialog box
appears during the installation process containing comScore’s TOS, which discloses what type of
information will be collected and references comScore’s full ULA. Except as expressly admitted
herein, comScore denies the allegations of paragraph 39 of the Complaint and each of them.
40.
Other comScore TOS display screens are presented to the user during the bundled
software installation process in such a way that the average, non-expert consumer would not
notice the hyperlink to Defendant's full agreement. Examples of these inadequacies include
comScore designing its TOS without a functioning link to the full terms, or wedging the link
within a sentence, only offset by color.
ANSWER: comScore denies the allegations of paragraph 40 of the Complaint and each
of them.
Section IV.
41.
Once installed, comScore's Surveillance Software continuously transmits the monitored
consumer's online actions back to its servers. In fact, all Internet traffic from the consumer's
computer is sent through comScore servers before reaching a destination website.
ANSWER: comScore admits that, once installed, its software collects and transmits
certain aspects of a Panelist’s online activity back to comScore’s servers. comScore denies that
any Internet traffic from a Panelist’s computer is sent through comScore’s servers before
19
reaching a destination website. Except as expressly admitted herein, comScore denies the
allegations of paragraph 41 of the Complaint and each of them.
42.
In order to collect information about a monitored consumer, comScore designed its
Surveillance Software to scan and examine a wide variety of items on the consumer's computer.
Through its Surveillance Software, comScore injects code into the monitored consumer's web
browser, i.e. Internet Explorer, Safari, Firefox, to monitor everything viewed, clicked, or typed
into the browser.
ANSWER: comScore admits that when a Panelist downloads the comScore software,
computer code is installed that works with the Panelist’s web browser (e.g., Internet Explorer,
Chrome, Firefox) to measure the Panelist’s online activity. Except as expressly admitted herein,
comScore denies the allegations of paragraph 42 of the Complaint and each of them.
43.
Additionally, to facilitate its monitoring, comScore's Surveillance Software adds an
exception to a the computer's firewall, allowing it unfettered access. Because certain consumers'
firewalls are stricter than others, such an attempt to modify the firewall settings, or the
subsequent redirection of Internet traffic resulting from the firewall modification, often causes
the firewall to lockdown or "freeze" the computer to prevent further harm.
ANSWER: comScore admits that certain versions of its software make modifications to
the Windows Firewall that was introduced with XP Service Pack 2, and incorporates its response
to paragraph 6 of the Answer, as though fully set forth herein. comScore lacks knowledge and
information sufficient to form a belief as to the truth of the remaining allegations in paragraph 43
of the Complaint, and on that basis, denies them.
44.
In addition to identifying the specific webpage that the monitored consumer is viewing,
the Surveillance Software also transmits information to comScore revealing how much the
individual pays for items in online transactions, how long the individual views items before
purchase, and much more. For example, comScore's Surveillance Software observes and reports
20
where the monitored individual's mouse is moving, such as whether or not the monitored
consumer is hovering over an advertisement.
ANSWER: comScore admits that its software is able to identify the web pages that a
Panelist is viewing, and the length of time a Panelist is online. comScore denies that it has ever
measured the location or movement of the mouse. Except as expressly admitted herein,
comScore denies the remaining allegations of paragraph 44 of the Complaint.
45.
Perhaps more striking, the Surveillance Software is indiscriminate about the information
gathered and sent to comScore's servers. Therefore, names, addresses, credit card numbers,
Social Security Numbers, and search terms on search engines are all siphoned and transmitted to
comScore.
ANSWER: comScore denies the allegations of paragraph 45 of the Complaint and each
of them, and incorporates its response to paragraphs 4 and 7 of the Answer, as though fully set
forth herein.
46.
Because comScore requires precise demographic information to create its marketing
reports, the Surveillance Software must distinguish which user is currently using the computer at
what time. In other words, comScore must know whether or not a father (male, age 45) or his
daughter (female, age 14) is using the computer, as that information is necessary to produce
accurate demographic marketing reports. To that end, comScore has developed a patented
procedure known as "User Demographic Reporting" for creating biometric signatures of
consumers by tracking mouse movements and keystrokes. In this way, each time an individual
uses the computer, comScore's Surveillance Software tracks his or her keystrokes and mouse
movements until it identifies the user as the 14-year-old daughter or 45-year-old father in the
household.
ANSWER: comScore admits that it developed “User Demographic Reporting”
(“UDR”), a proprietary technology designed to identify a particular Panelist in a household.
21
Except as expressly admitted herein, comScore denies the allegations of paragraph 46 of the
Complaint and each of them.
47.
comScore's software is highly persistent and constantly runs in the background during all
computer activities, yet provides no mechanism to turn it off. If, for any reason, the software
stops running (including manual user attempts to stop it), it automatically restarts. Accordingly,
it is nearly impossible for a consumer to disable the Surveillance Software to avoid spying on
certain users of the computer system.
ANSWER: comScore denies the allegations of paragraph 47 of Complaint and each of
them. comScore’s software is designed so that it can be permanently uninstalled using the
standard Windows “Add or Remove Programs” utility and so it is not “impossible” to “turn off”
the software. For those Panelists who do not uninstall the software, comScore admits that its
software runs in the background during a Panelist’s computer activities.
48.
By definition, comScore's Surveillance Software is “spyware,” meaning it is designed to
gather data from a consumer's computer without consent and transfer it to a third party. Because
of this characterization, scores of anti-virus and anti-spyware websites identify comScore
applications as "severe" or "high risk" spyware or adware. For example, Microsoft's Malware
Protection Center has singled out several comScore applications as problematic. In the same
vein, numerous U.S. colleges and universities warn students of the dangers of running
ComScore's software and ban Internet traffic to Defendant's servers.
ANSWER: comScore denies that its software constitutes “spyware,” or that it is
designed to gather data from a consumer’s computer without consent. comScore affirmatively
states that anti-virus offerings from companies including Microsoft, AVG and McAfee
categorize comScore’s software as clean, and do not classify it as spyware. comScore lacks
knowledge and information sufficient to form a belief as to the truth of the remaining allegations
in paragraph 48 of the Complaint, and on that basis, denies each of them.
22
Section V.
49.
comScore's TOS indicate that the application will only monitor and collect data about the
computer on which it is installed. (See Exhibit A & B and supra Section III).
ANSWER: comScore denies the characterization in Paragraph 49 of the Complaint of
comScore’s TOS, which speaks for itself. Moreover, Paragraph 49 references, and relies on, an
exhibit to the Complaint (“Exhibit B”) that does not exist. On that basis, comScore lacks
knowledge and information sufficient to form a belief as to the truth of the remaining allegations
in paragraph 49 of the Complaint, and on that basis, denies them.
50.
Defendant's TOS are devoid of any mention that all files on that individual's computer
will be scanned-and that information about those files will be sent to comScore's servers.
ANSWER: comScore denies the characterization in Paragraph 50 of comScore’s Terms
of Service, which is a document that speaks for itself. comScore notes that its TOS informs
users that its software monitors and collects “certain hardware, software, computer configuration
and application usage information,” as depicted in Exhibit A to the Complaint. Further,
comScore denies the premise upon which paragraph 50 is based – that comScore’s software
causes “all files on that individual’s computer [to] be scanned.”
51.
In clear contrast to comScore's TOS, its Surveillance Software additionally scans and
sends information about available files located on the local network-not just the individual
consumer's computer-to Defendant's servers.
ANSWER: comScore incorporates its response to paragraph 10 of the Answer. Except
as expressly admitted herein, comScore denies the allegations of paragraph 51 of the Complaint.
52.
Put another way, if a monitored consumer uses a local network to store and access files-a
nearly ubiquitous practice among modem organizations-then the Surveillance Software also
scans all accessible files on the network and sends information about the data to comScore's
servers. Depending on the network, these files may include confidential business files, financial
documents, trade secrets, or classified government documents.
23
ANSWER: comScore incorporates its response to paragraph 51 of the Complaint.
Except as expressly admitted therein, comScore denies the allegations of paragraph 52 of
Complaint and each of them.
53.
comScore's Surveillance Software also monitors and analyzes "packets" of information
entering and leaving the monitored consumer's computer.
ANSWER: comScore admits that its software measures certain types of packets. Except
as expressly admitted herein, comScore denies the allegations of paragraph 53 of the Complaint
and each of them.
54.
Worse still, comScore's Surveillance Software intercepts wireless packets traversing the
local network. Accordingly, a monitored consumer using a computer on a local wireless network
also subjects other nearby computers on the network to data collection by the Surveillance
Software.
ANSWER: comScore admits that its software measures certain types of packets, but
because these packets can only be used to identify the type of other devices on a network,
comScore denies that any non-Panelist computer is subject to data collection. Except as
expressly admitted therein, comScore denies the allegations of paragraph 54 of the Complaint
and each of them.
Section VI.
55.
comScore's Surveillance Software has no user interface from which a consumer can turn
off or uninstall the software, modify the settings, or otherwise control what information the
software is collecting.
ANSWER: comScore denies the allegations of paragraph 55 of the Complaint and each
of them. comScore’s software is designed so that it can be uninstalled using a Windows user’s
“Add or Remove Programs” utility.
56.
As discussed in Section II supra, comScore pays third-party developers to bundle
Surveillance Software with their applications.
24
ANSWER: comScore admits that it pays third-party developers to offer comScore’s
software with their applications. Except as expressly admitted herein, comScore denies the
allegations of paragraph 56 of Complaint and each of them.
57.
Even assuming that an individual recognizes the implications of installing comScore's
Surveillance Software in tandem with software such as a free screensaver, or later determines
that the free screensaver was the source of the comScore software, a reasonable consumer would
believe that once the screensaver was uninstalled, comScore's software would be uninstalled as
well. That is not the case.
ANSWER: comScore denies Plaintiffs’ characterizations regarding what a “reasonable
consumer would believe,” and on that basis denies the allegations of paragraph 57 of the
Complaint and each of them. comScore’s software is designed so that it can be permanently
uninstalled using the standard Windows “Add or Remove Programs” utility. Any time comScore
software is running, an icon appears in the Panelists’ system tray to conspicuously disclose the
software’s presence, thereby signaling to the user whether or not the software has been
uninstalled. Moreover, the presence of comScore’s software is made known to Panelists in
numerous other ways, as described in comScore’s response in paragraph 12 of the Answer.
58.
When a monitored consumer uninstalls bundled software, comScore's Surveillance
Software remains active on that monitored consumer's computer. As a result, comScore
continues to collect information about the monitored consumer, even though the individual
believes comScore's Surveillance Software was uninstalled. Indeed, the only way to remove
comScore's Surveillance Software is by manually locating and removing it from the system.
ANSWER: comScore admits that, to remove comScore’s software, a Panelist must
uninstall comScore’s software and not the separate third-party freeware program, and
incorporates its response in paragraph 14 of the Answer as if fully set forth herein. comScore
lacks knowledge and information sufficient to form a belief as to the truth of the remaining
allegations in paragraph 58 regarding the purported beliefs of consumers as characterized by
25
Plaintiffs, and on that basis, denies them. comScore notes, however, that its software can be
uninstalled using a Windows user’s “Add or Remove Programs” utility. Moreover, any time
comScore software is running, an icon appears in the Panelists’ system tray to conspicuously
disclose the software’s presence, thereby signaling to the user whether or not the software has
been uninstalled.
59.
Because many consumers lack the requisite technical expertise to manually remove
comScore's software, these users remain unwitting members of Defendant's monitoring program.
In many cases, consumers are forced to purchase automated spyware removal software to fully
eliminate any traces of Defendant's software.
ANSWER: comScore lacks knowledge and information sufficient to form a belief as to
the truth of the allegations in paragraph 59 of the Complaint and each of them, which reflects
Plaintiffs’ characterizations of the “technical expertise” of consumers, and on that basis, denies
them.
Section VII.
60.
If a monitored consumer manages to manually uninstall comScore's Surveillance
Software, Defendant sti11leaves its own "root certificate" on the user's computer.
ANSWER: comScore denies the allegations of paragraph 60 of Complaint and each of
them. comScore’s software stopped installing “root certificates” in April 2005.
A. What is a Root Certificate?
61.
In very basic terms, a root certificate is part of an intricate system that helps ensure that
websites on the Internet are secure. Web browsers, such as Microsoft's Internet Explorer, come
pre-packaged with a store of root certificates issued by trustworthy Certificate Authorities such
as VeriSign. A Certificate Authority, such as VeriSign, distributes certificates to trustworthy
companies like Amazon.com. When an individual browses Amazon.com, the user's web browser
identifies a certificate that was "signed" by VeriSign, and the individual is given assurance that
the website is secure. Without this system, it would be extremely difficult, if not impossible, for
26
users to verify which websites were secure and thus safe to transmit sensitive information to, i.e.
credit card numbers and Social Security Numbers.
ANSWER: Paragraph 61 reflects Plaintiffs’ characterizations of general industry
information and does not require a response. To the extent a response is required, comScore
lacks information sufficient to form a belief as to the truth of the allegations in paragraph 61 of
the Complaint, and on that basis, denies them.
62.
A Certificate Authority, such as VeriSign, must follow stringent regulations in order to
have its root certificate included in a popular web browser. For example, Microsoft requires
entities applying for root certificates to comply with rigorous guidelines delineated by the
WebTrust for Certification Authorities program sponsored by the American Institute for
Certified Public Accountants (AICPA).
ANSWER: Paragraph 62 reflects Plaintiffs’ characterizations of general industry
information and does not require a response. To the extent a response is required, comScore
lacks information sufficient to form a belief as to the truth of the allegations in paragraph 62 of
the Complaint, and on that basis, denies them. comScore notes, however, its Panels are certified
by WebTrust, the very “certification authority” identified in this paragraph of the Complaint.
comScore’s Panels are also certified by, among others, the Better Business Bureau, VeriSign
Trusted, Trust Guard, and Network Solutions.
63.
To average users, the significance of a root certificate is most readily manifested by the
small lock in the top left of a web browser that appears when conducting secure transactions over
the Internet. This image provides the individual with peace of mind that sensitive information
can be transmitted to the website without interception by nefarious actors.
ANSWER: Paragraph 63 reflects Plaintiffs’ characterizations of the expectations of
“average users” and does not require a response. To the extent a response is required, comScore
lacks information sufficient to form a belief as to the truth of the allegations in paragraph 63 of
the Complaint, and on that basis, denies them.
27
B. comScore Installs its Own Root Certificate Through its Surveillance Software
64.
Included in the installation of the Surveillance Software is a comScore root certificate.
This root certificate allows comScore to collect information transmitted through the user's
browser, regardless of whether or not the transaction is secure. In other words, because
comScore has installed its own root certificate, when a monitored consumer is viewing a
website-such as Amazon.com-and thinks that the transaction is free from interception by thirdparties because of the image of a small lock in the top left of the browser, that information is still
captured by Defendant.
ANSWER: comScore denies the allegations of paragraph 64 of the Complaint and each
of them. comScore’s software stopped installing “root certificates” in April 2005. comScore
further denies Plaintiffs’ characterizations of what “a monitored consumer” might believe with
respect to the monitoring of online activity.
65.
If a monitored consumer uninstalls the Surveillance Software, comScore has designed its
software to leave behind the root certificate.
ANSWER: comScore denies the allegations of paragraph 65 of the Complaint and each
of them. comScore’s software stopped installing “root certificates” in April 2005.
66.
The risks caused by untrusted root certificates are well documented and Defendant's
actions pose serious risks to monitored consumers' computer systems.
ANSWER: comScore is not aware of any instances in which any consumers have been
harmed by the presence of a root certificate installed by the comScore software and, on that
basis, denies the allegations of paragraph 66 of the Complaint. Moreover, comScore stopped
installing “root certificates” in April 2005.
28
FACTS RELATING TO PLAINTIFFS
67.
In or around March of 2010, Plaintiff Mike Harris downloaded and installed a free
screensaver secretly bundled with comScore's Surveillance Software onto his Macintosh
computer. The computer Plaintiff used was connected to a local wireless network.
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 67 of the Complaint, and on that basis, denies them.
68.
After discovering that he had inadvertently installed this software, he searched the World
Wide Web to determine how to get rid of the application. Harris attempted to uninstall the
screensaver, however the Surveillance Software continued operating. Plaintiff Harris has a high
level knowledge of information technology, and was still only able to uninstall the software after
conducting hours of diligent research.
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 68 of the Complaint, and on that basis, denies them.
69.
Plaintiff Harris did not agree to comScore's Terms of Service and did not know that he
was installing Surveillance Software when he installed the free software.
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 69 of the Complaint, and on that basis, denies them. comScore notes,
however, that Plaintiff Harris would not have been able to install comScore’s software unless he
affirmatively clicked to agree to comScore’s Terms of Service, which expressly informs users of
the presence of comScore’s software. Assuming Plaintiff Harris installed comScore’s software,
he would have also been presented with a “welcome” pop up, after installation, thanking him for
joining the Panel and providing a link to comScore’s Privacy Policy and to an FAQ that
discusses, among other things, how to uninstall comScore’s software.
70.
In or around September of 2010, Plaintiff Jeff Dunstan downloaded and installed free
greeting card template software secretly bundled with comScore's Surveillance Software onto his
personal computer running the Microsoft Windows operating system.
29
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 70 of the Complaint, and on that basis, denies them.
71.
After installation, Dunstan's firewall detected the re-routing of his Internet traffic to
comScore servers, and in response, effectively disabled his computer from accessing the Internet.
In fact, Plaintiff Dunstan's computer became entirely debilitated in reaction to the Surveillance
Software operating on his computer.
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 71 of the Complaint, and on that basis, denies them.
72.
Plaintiff Dunstan spent approximately ten hours investigating and researching how
comScore's software became installed on his computer and how to remove it.
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 72 of the Complaint, and on that basis, denies them.
73.
Eventually, Plaintiff Dunstan had to pay forty dollars ($40) for third-party anti-virus
software to entirely remove the software from his computer and restore it to a functioning state.
Plaintiff Dunstan did not agree to comScore's Terms of Service and did not know that he was
installing Surveillance Software when he installed the free software.
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 73 of the Complaint, and on that basis, denies them. comScore notes,
however, that Plaintiff Dunstan would not have been able to install comScore’s software unless
he affirmatively clicked to agree to comScore’s Terms of Service, which expressly informs users
of the presence of comScore’s software. Assuming Plaintiff Dunstan installed comScore’s
software, he would have also been presented with a “welcome” pop up, after installation,
thanking him for joining the Panel and providing a link to comScore’s Privacy Policy and to an
FAQ that discusses, among other things, how to uninstall comScore’s software. comScore
further denies that Dunstan “had to” purchase third-party anti-virus software to remove the
comScore software, since the software can be removed using a standard Windows utility.
30
CLASS ALLEGATIONS
74.
Plaintiffs Mike Harris and Jeff Dunstan bring this action pursuant to Fed. R. Civ. P.
23(b)(2) and (3) on behalf of themselves and the following two classes:
The Surveillance Software Class: All individuals and entities in the United States
that have had comScore's Surveillance Software installed on their computer(s).
The Dunstan Subclass: All individuals and entities in the United States that have
incurred costs in removing the Surveillance Software.
The Surveillance Software and the Dunstan Subclass are collectively referred to
throughout this Complaint as "the Classes."
ANSWER: Paragraph 74 of the Complaint reflects Plaintiffs’ characterization of their
own complaint and proposed classes and does not require a response. To the extent a response is
required, this allegation is denied.
75.
Excluded from the Classes are Defendant, its legal representatives, assigns and
successors, and any entity in which Defendant has a controlling interest. Also excluded is the
judge to whom this case is assigned and the judge's immediate family, as well as any individual
who contributed to the design and deployment of Defendant's software products.
ANSWER: Paragraph 75 of the Complaint reflects Plaintiffs’ characterization of their
own complaint and proposed classes and does not require a response, and denies that this action
can be maintained as a class action. To the extent a response is required, this allegation is
denied.
76.
The Classes consist of hundreds of thousands, if not millions, of individuals and other
entities, making joinder impractical. On information and belief, Defendant has deceived millions
of consumers who fall into the definition set forth in the Classes.
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 76 of the Complaint, and on that basis, denies them. comScore denies
31
that it has “deceived millions of consumers,” and denies that this action can be maintained as a
class action.
77.
Plaintiffs' claims are typical of the claims of all other members of the Classes, as
Plaintiffs and other members sustained damages arising out of the wrongful conduct of
Defendant, based upon the same actions of the software products which were made uniformly to
Plaintiffs and the Classes.
ANSWER: The allegations set forth in paragraph 77 of the Complaint assert
conclusions of law to which no response is required. To the extent paragraph 77 may purport to
assert allegations of fact to which a response may be required, comScore denies each and every
allegation contained in this paragraph, and denies that this action can be maintained as a class
action.
78.
Plaintiffs will fairly and adequately represent and protect the interests of the other
members of the Classes. Plaintiffs have retained counsel with substantial experience in
prosecuting complex litigation and class actions. Plaintiffs and their counsel are committed to
vigorously prosecuting this action on behalf of the members of the Classes, and have the
financial resources to do so. Neither Plaintiffs nor their counsel have any interest adverse to
those of the other members of the Classes.
ANSWER: The allegations set forth in paragraph 78 of the Complaint assert
conclusions of law to which no response is required. To the extent paragraph 78 may purport to
assert allegations of fact to which a response may be required, comScore denies those allegations
and denies that this action can be maintained as a class action. comScore lacks knowledge or
information sufficient to form a belief as to the truth of the allegations in paragraph 78 regarding
the motivations of Plaintiffs and their counsel, or their financial wherewithal, and on that basis,
denies them.
79.
Absent a class action, most members of the Classes would find the cost of litigating their
claims to be prohibitive and will have no effective remedy. The class treatment of common
32
questions of law and fact is also superior to multiple individual actions or piecemeal litigation in
that it conserves the resources of the courts and the litigants, and promotes consistency and
efficiency of adjudication.
ANSWER: The allegations set forth in paragraph 79 of the Complaint assert
conclusions of law to which no response is required. To the extent paragraph 79 may purport to
assert allegations of fact to which a response may be required, comScore denies those
allegations, and denies that this action can be maintained as a class action.
80.
Defendant has acted and failed to act on grounds generally applicable to Plaintiffs and the
other members of the Classes, requiring the Court's imposition of uniform relief to ensure
compatible standards of conduct toward the members of the Classes.
ANSWER: The allegations set forth in paragraph 80 of the Complaint assert
conclusions of law to which no response is required. To the extent paragraph 80 may purport to
assert allegations of fact to which a response may be required, comScore denies those
allegations, and denies that this action can be maintained as a class action.
81.
The factual and legal bases of comScore' s liability to Plaintiffs and to the other members
of the Classes are the same, and resulted in injury to Plaintiffs and all of the other members of
the Classes. Plaintiffs and the other members of the Classes have all suffered harm as a result of
comScore's wrongful conduct.
ANSWER: The allegations set forth in paragraph 81 of the Complaint assert
conclusions of law to which no response is required. To the extent paragraph 81 may purport to
assert allegations of fact to which a response may be required, comScore denies those
allegations, and denies that this action can be maintained as a class action
82.
There are many questions of law and fact common to the claims of Plaintiffs and the
other members of the Classes, and those questions predominate over any questions that may
affect individual members of the Classes. Common questions for the Classes include but are not
limited to the following:
33
(a) whether comScore's intentionally designed its software to scan files located on a
monitored consumer's local network;
(b) whether comScore intentionally designed its software to intercept packets on
wireless networks;
(c) whether comScore intentionally designed its software and/or business model with
third-party application providers to avoid uninstallation when the third-party
application was uninstalled, thus thwarting user attempts to remove the software;
(d) whether comScore intentionally designed its Terms of Service to exclude the true
functionality of its Surveillance Software;
(e) whether comScore's conduct described herein violated the Stored Communications
Act (18 U.S.C. §§ 2701, et seq.);
(f) whether comScore's conduct described herein violated the Electronic
Communications Privacy Act (18 U.S.C. §§ 2510, et seq.);
(g) whether comScore's conduct described herein violated the Computer Fraud &
Abuse Act (18 U.S.C. §§ 1030, et seq.);
(h) whether comScore's conduct described herein violated the Illinois Consumer Fraud
and Deceptive Practices Act (815 ILCS 505/1 et seq.);
(i) whether comScore has been unjustly enriched by Plaintiffs and the Classes.
ANSWER: The allegations set forth in paragraph 82 of the Complaint assert
conclusions of law to which no response is required. To the extent paragraph 82 may purport to
assert allegations of fact to which a response may be required, comScore denies those
allegations, and denies that this action can be maintained as a class action.
83.
Plaintiffs reserve the right to revise these definitions based on facts learned in discovery.
ANSWER: Paragraph 83 of the Complaint reflects Plaintiffs effort to reserve certain
rights and does not require a response.
34
FIRST CAUSE OF ACTION
Violations of the Stored Communications Act
(18 U.S.C. §§ 2701, et seq.)
(On Behalf of Plaintiffs and the Classes)
84.
Plaintiffs incorporate the foregoing allegations as if fully set forth herein.
ANSWER: comScore hereby incorporates as though fully set forth herein its answers to
paragraphs 1 through 83.
85.
The Electronic Communications Privacy Act, 18 U.S.C. §§ 2510 et seq. (the "ECPA")
broadly defines an "electronic communication" as "any transfer of signs, signals, writing, images,
sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio,
electromagnetic, photoelectronic or photooptical system that affects interstate or foreign
commerce ... " 18 U.S.C. § 2510(12). The Stored Communications Act incorporates this
definition.
ANSWER: The allegations set forth in paragraph 85 assert conclusions of law to which
no response is required. To the extent paragraph 85 may purport to assert allegations of fact to
which a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with their language. Except as specifically admitted, comScore denies each and
every allegation contained in this paragraph.
86.
Pursuant to the ECPA and Stored Communications Act ("SCA"), "electronic storage"
means any "temporary storage of a wire or electronic communication incidental to the electronic
transmission thereof." 18 U .S.C. § 2510( 17)(A). This type of electronic storage includes
communications in intermediate electronic storage that have not yet been delivered to their
intended recipient.
ANSWER: The allegations set forth in paragraph 86 assert conclusions of law to which
no response is required. To the extent paragraph 86 may purport to assert allegations of fact to
which a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
35
inconsistent with their language. Except as specifically admitted, comScore denies each and
every allegation contained in this paragraph.
87.
The SCA mandates, among other things, that it is unlawful for a person to obtain access
to stored communications on another's computer system without authorization. 18 U.S.C. § 2701.
ANSWER: The allegations set forth in paragraph 87 assert conclusions of law to which
no response is required. To the extent paragraph 87 may purport to assert allegations of fact to
which a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with their language. Except as specifically admitted, comScore denies each and
every allegation contained in this paragraph.
88.
Congress expressly included provisions in the SCA to address this issue so as to prevent
''unauthorized persons deliberately gaining access to, and sometimes tampering with, electronic
or wire communications that are not intended to be available to the public." Senate Report No.
99-541, S. REP. 99-541, 35, 1986 U.S.C.C.A.N. 3555, 3589.
ANSWER: The allegations set forth in paragraph 88 assert conclusions of law to which
no response is required. To the extent paragraph 88 may purport to assert allegations of fact to
which a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with their language. Except as specifically admitted, comScore denies each and
every allegation contained in this paragraph.
89.
comScore has violated 18 U.S.C. § 270 1 (a)(1) because it intentionally accessed
consumers' communications without authorization and obtained, altered, or prevented authorized
access to a wire or electronic communication while in electronic storage by continuing to operate
after the user uninstalled bundled software. Defendant had actual knowledge of, and benefited
from, this practice.
36
ANSWER: The allegations set forth in paragraph 89 assert conclusions of law to which
no response is required. To the extent paragraph 89 may purport to assert allegations of fact to
which a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with their language. Except as specifically admitted, comScore denies each and
every allegation contained in this paragraph.
90.
Additionally, Defendant has violated 18 U.S.C. § 2701(a)(2) because it intentionally
exceeded authorization to access consumers' communications and obtained, altered, or prevented
authorized access to a wire or electronic communication while in electronic storage by
continuing to operate after the user uninstalled bundled software. Defendant had actual
knowledge of, and benefited from, this practice.
ANSWER: The allegations set forth in paragraph 90 assert conclusions of law to which
no response is required. To the extent paragraph 90 may purport to assert allegations of fact to
which a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with their language. Except as specifically admitted, comScore denies each and
every allegation contained in this paragraph.
91.
comScore has also violated 18 U.S.C. § 2701 (a)(2) because it intentionally exceeded
authorization to access consumers' communications and obtained, altered, or prevented
authorized access to a wire or electronic communication while in electronic storage by accessing
files on the Plaintiffs' and the Classes' local networks without permission.
ANSWER: The allegations set forth in paragraph 91 assert conclusions of law to which
no response is required. To the extent paragraph 91 may purport to assert allegations of fact to
which a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
37
inconsistent with their language. Except as specifically admitted, comScore denies each and
every allegation contained in this paragraph.
92.
As a result of Defendant's conduct described herein and its violation of § 2701, Plaintiffs
and the Classes have suffered injuries. Plaintiffs, on their own behalves and on behalf of the
Classes, seeks an order enjoining Defendant's conduct described herein and awarding themselves
and the Classes the maximum statutory and punitive damages available under 18 U.S.C. § 2707.
ANSWER: comScore admits that Plaintiffs purport seek the relief requested in
paragraph 92. Except as otherwise expressly admitted herein, comScore denies the allegations of
paragraph 92.
SECOND CAUSE OF ACTION
Violations of the Electronic Communications Privacy Act
(18 U.S.C. §§ 2510, et seq.)
(On Behalf of Plaintiffs and the Classes)
93.
Plaintiffs incorporate the forgoing allegations as if fully set forth herein.
ANSWER: comScore hereby incorporates as though fully set forth herein its answers to
paragraphs 1 through 92.
94.
The Electronic Communications Privacy Act, 18 U.S.C. §§ 2510, et seq. (the
"ECPA") broadly defines an "electronic communication" as "any transfer of signs,
signals,writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part
by a wire, radio, electromagnetic, photoelectronic or photooptical system that affects interstate or
foreign commerce ... " 18 U.S.C. § 2510(12).
ANSWER: The allegations set forth in paragraph 94 assert conclusions of law to which
no response is required. To the extent paragraph 94 may purport to assert allegations of fact to
which a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with their language. Except as specifically admitted, comScore denies each and
every allegation contained in this paragraph.
38
95.
The ECPA defines "electronic communications system" as any wire, radio,
electromagnetic, photooptical or photoelectronic facilities for the transmission of wire or
electronic communications, and any computer facilities or related electronic equipment for the
electronic storage of such communications. 18 U.S.C. § 2510(14).
ANSWER: The allegations set forth in paragraph 95 assert conclusions of law to which
no response is required. To the extent paragraph 95 may purport to assert allegations of fact to
which a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with their language. Except as specifically admitted, comScore denies each and
every allegation contained in this paragraph.
96.
The ECPA broadly defines the contents of a communication. Pursuant to the ECPA,
"contents" of a communication, when used with respect to any wire, oral, or electronic
communications, include any information concerning the substance, purport, or meaning of that
communication. 18 U.S.C. § 2510(8). "Contents," when used with respect to any wire or oral
communication, includes any information concerning the identity of the parties to such
communication or the existence, substance, purport, or meaning of that communication. The
definition thus includes all aspects of the communication itself. No aspect, including the identity
of the parties, the substance of the communication between them, or the fact of the
communication itself, is excluded. The privacy of the communication to be protected is intended
to be comprehensive.
ANSWER: The allegations set forth in paragraph 96 assert conclusions of law to which
no response is required. To the extent paragraph 96 may purport to assert allegations of fact to
which a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with their language. Except as specifically admitted, comScore denies each and
every allegation contained in this paragraph.
39
97.
Plaintiffs' and Classes Members' personal computers and computer networks constitute
"electronic computer systems." Plaintiffs and Classes members transmit "electronic
communications" by and through their computers and computer networks in the form of, among
others, emails, sending requests to visit websites, online chats, file transfers, file uploads, and file
downloads.
ANSWER: The allegations set forth in paragraph 97 assert conclusions of law to which
no response is required. To the extent paragraph 97 may purport to assert allegations of fact to
which a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with their language. Except as specifically admitted, comScore denies each and
every allegation contained in this paragraph.
98.
Defendant's conduct violated 18 U.S.C. § 2511(1)(a) because Defendant intentionally
intercepted and endeavored to intercept Plaintiffs' and Classes Members' electronic
communications to, from, and within their computers and computer networks.
ANSWER: The allegations set forth in paragraph 98 assert conclusions of law to which
no response is required. To the extent paragraph 98 may purport to assert allegations of fact to
which a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with their language. Except as specifically admitted, comScore denies each and
every allegation contained in this paragraph.
99.
Defendant's conduct violated 18 U.S.C. § 2511(1)(d) because Defendant used and
endeavored to use the contents of Plaintiffs' and Classes Members' electronic communications to
profit from its unauthorized collection and sale, knowing and having reason to know that the
information was obtained through interception in violation of 18 U.S.C. § 2511(1).
ANSWER: The allegations set forth in paragraph 99 assert conclusions of law to which
no response is required. To the extent paragraph 99 may purport to assert allegations of fact to
40
which a response may be required, comScore states that the statutes cited by Plaintiffs speak for
themselves, and comScore denies any characterization of the laws applicable to this case that is
inconsistent with their language. Except as specifically admitted, comScore denies each and
every allegation contained in this paragraph.
100.
Defendant intentionally obtained and/or intercepted, by device or otherwise, these
electronic communications, without the knowledge, consent or authorization of Plaintiffs or the
Classes.
ANSWER: The allegations set forth in paragraph 100 assert conclusions of law to
which no response is required. To the extent paragraph 100 may purport to assert allegations of
fact to which a response may be required, comScore states that the statutes cited by Plaintiffs
speak for themselves, and comScore denies any characterization of the laws applicable to this
case that is inconsistent with their language. Except as specifically admitted, comScore denies
each and every allegation contained in this paragraph.
101.
Plaintiffs and the Classes suffered harm as a result of Defendant's violations of the
ECPA, and therefore seek (a) preliminary, equitable and declaratory relief as may be appropriate,
(b) the sum of the actual damages suffered and the profits obtained by Defendant as a result of
their unlawful conduct, or statutory damages as authorized by 18 U.S.C. § 2520(2)(B),
whichever is greater, (c) punitive damages, and (d) reasonable costs and attorneys' fees.
ANSWER: comScore admits that Plaintiffs purport seek the relief requested in
paragraph 101. Except as otherwise expressly admitted herein, comScore denies the allegations
of paragraph 101.
THIRD CAUSE OF ACTION
Violation of the Computer Fraud and Abuse Act (“CFAA”)
(18 U.S.C. §§ 1030, et seq.)
(On Behalf of Plaintiffs and the Classes)
102.
Plaintiffs incorporate the foregoing allegations as if fully set forth herein.
41
ANSWER: comScore hereby incorporates as though fully set forth herein its answers to
paragraphs 1 through 101.
103.
Defendant intentionally accessed a computer without authorization and/or exceeded any
authorized access and in so doing intentionally breached its own Terms of Service and Privacy
Policy.
ANSWER: The allegations set forth in paragraph 103 assert conclusions of law to
which no response is required. To the extent paragraph 103 may purport to assert allegations of
fact to which a response may be required, comScore states that the statutes cited by Plaintiffs
speak for themselves, and comScore denies any characterization of the laws applicable to this
case that is inconsistent with their language. Except as specifically admitted, comScore denies
each and every allegation contained in this paragraph.
104.
Defendant illegally obtained this information from a protected computer involved in
interstate or foreign communication.
ANSWER: The allegations set forth in paragraph 104 assert conclusions of law to
which no response is required. To the extent paragraph 104 may purport to assert allegations of
fact to which a response may be required, comScore states that the statutes cited by Plaintiffs
speak for themselves, and comScore denies any characterization of the laws applicable to this
case that is inconsistent with their language. Except as specifically admitted, comScore denies
each and every allegation contained in this paragraph.
105.
By scanning and removing information from local and network files, monitoring internet
behavior, including keystroke logging consumer input, and injecting code and data onto
Plaintiffs' computers, Defendant accessed Plaintiffs' computers, in the course of interstate
commerce and/or communication, in excess of the authorization provided by Plaintiffs as
descried in 18 U.S.C. § 1030(a)(2)(C).
ANSWER: The allegations set forth in paragraph 105 assert conclusions of law to
which no response is required. To the extent paragraph 105 may purport to assert allegations of
42
fact to which a response may be required, comScore states that the statutes cited by Plaintiffs
speak for themselves, and comScore denies any characterization of the laws applicable to this
case that is inconsistent with their language. Except as specifically admitted, comScore denies
each and every allegation contained in this paragraph.
106.
Defendant violated 18 U.S.C. § 1030(a)(2)(C) by intentionally accessing Plaintiffs' and
Classes Members' computers and computer networks without authorization and/or by exceeding
the scope of that authorization.
ANSWER: The allegations set forth in paragraph 106 assert conclusions of law to
which no response is required. To the extent paragraph 106 may purport to assert allegations of
fact to which a response may be required, comScore states that the statutes cited by Plaintiffs
speak for themselves, and comScore denies any characterization of the laws applicable to this
case that is inconsistent with their language. Except as specifically admitted, comScore denies
each and every allegation contained in this paragraph.
107.
Plaintiffs' computer, and those belonging to Class Members, are protected computers
pursuant to 18 U.S.C. § 1030(e)(2)(B) because they are used in interstate commerce and/or
communication. Specifically, Plaintiff Dunstan spent $40 to purchase a spyware removal
program to fully remove the program and restore his computer to a functioning state.
ANSWER: The allegations set forth in paragraph 107 assert conclusions of law to
which no response is required. To the extent paragraph 107 may purport to assert allegations of
fact to which a response may be required, comScore states that the statutes cited by Plaintiffs
speak for themselves, and comScore denies any characterization of the laws applicable to this
case that is inconsistent with their language. Except as specifically admitted, comScore denies
each and every allegation contained in this paragraph.
108.
By accessing, collecting, and transmitting Plaintiffs and Classes Members' computer data
without authorization, Defendant intentionally caused damage to those computers by impairing
the integrity of information and/or data.
43
ANSWER: The allegations set forth in paragraph 108 assert conclusions of law to
which no response is required. To the extent paragraph 108 may purport to assert allegations of
fact to which a response may be required, comScore states that the statutes cited by Plaintiffs
speak for themselves, and comScore denies any characterization of the laws applicable to this
case that is inconsistent with their language. Except as specifically admitted, comScore denies
each and every allegation contained in this paragraph.
109.
Through the conduct described herein, Defendant has violated 18 U.S.C.§
1030(a)(5)(A)(iii).
ANSWER: The allegations set forth in paragraph 109 assert conclusions of law to
which no response is required. To the extent paragraph 109 may purport to assert allegations of
fact to which a response may be required, comScore states that the statutes cited by Plaintiffs
speak for themselves, and comScore denies any characterization of the laws applicable to this
case that is inconsistent with their language. Except as specifically admitted, comScore denies
each and every allegation contained in this paragraph.
110.
As a result, Defendant's conduct has caused a loss to one or more persons during any one-
year period aggregating at least $5,000 in value in real economic damages.
ANSWER: The allegations set forth in paragraph 110 assert conclusions of law to
which no response is required. To the extent paragraph 110 may purport to assert allegations of
fact to which a response may be required, comScore states that it lacks knowledge or information
sufficient to form a belief as to the truth of the allegations of paragraph 110, and on that basis,
denies them.
111.
Plaintiffs and the Classes expended time, money and resources to investigate and remove
comScore's tracking software from his computer.
ANSWER: comScore lacks information sufficient to form a belief as to the truth of the
allegations in paragraph 111, and on that basis, denies them.
44
112.
Plaintiffs and Classes members have additionally suffered loss by reason of these
violations, including, without limitation, violation of the right of privacy.
ANSWER: The allegations set forth in paragraph 112 assert conclusions of law to
which no response is required. To the extent paragraph 112 may purport to assert allegations of
fact to which a response may be required, comScore states that it lacks knowledge or information
sufficient to form a belief as to the truth of the allegations of paragraph 112, and on that basis,
denies them.
113.
Defendant's actions were knowing and/or reckless and caused harm to Plaintiffs and
members of the Classes.
ANSWER: The allegations set forth in paragraph 113 assert conclusions of law to
which no response is required. To the extent paragraph 113 may purport to assert allegations of
fact to which a response may be required, comScore denies those allegations.
FOURTH CAUSE OF ACTION
Violation of the Illinois Consumer Fraud and Deceptive Practices Act
(815 ILCS 505/1 et seq.)
(On Behalf of Plaintiff Dunstan and the Dunstan Subclass)
114.
Plaintiff incorporates the foregoing allegations as if fully set forth herein.
ANSWER: comScore hereby incorporates as though fully set forth herein its answers to
paragraphs 1 through 113.
115.
The Illinois Consumer Fraud and Deceptive Practices Act, 815 ILCS 505/1 et seq.
("ICFA"), protects both consumers and competitors by promoting fair competition in commercial
markets for goods and services.
ANSWER: The allegations set forth in paragraph 115 assert conclusions of law to
which no response is required. To the extent paragraph 115 may purport to assert allegations of
fact to which a response may be required, comScore states that it lacks knowledge or information
sufficient to form a belief as to the truth of the allegations of paragraph 115, and on that basis,
denies them.
45
116.
The ICFA prohibits any unlawful, unfair or fraudulent business acts or practices
including the employment of any deception, fraud, false pretense, false promise,
misrepresentation, or the concealment, suppression, or omission of any material fact. 815 ILCS
505/2.
ANSWER: The allegations set forth in paragraph 116 assert conclusions of law to
which no response is required. To the extent paragraph 116 may purport to assert allegations of
fact to which a response may be required, comScore states that the statutes cited by Plaintiffs
speak for themselves, and comScore denies any characterization of the laws applicable to this
case that is inconsistent with their language. Except as specifically admitted, comScore denies
each and every allegation contained in this paragraph.
117.
Defendant has engaged in deceptive and fraudulent business practices, as defined by the
ICFA, by intentionally concealing the fact that its software was included in supposed "freeware."
comScore has further violated the ICFA by fraudulently designing its software to be highly
resistant to uninstallation by the user. In addition, comScore has omitted material facts about the
true nature of its software products in its Terms of Service. Defendant's practice of profiting
from information deceptively gathered from unwitting consumers also constitutes a violation of
the ICFA.
ANSWER: The allegations set forth in paragraph 117 assert conclusions of law to
which no response is required. To the extent paragraph 117 may purport to assert allegations of
fact to which a response may be required, comScore states that the statutes cited by Plaintiffs
speak for themselves, and comScore denies any characterization of the laws applicable to this
case that is inconsistent with their language. Except as specifically admitted, comScore denies
each and every allegation contained in this paragraph.
118.
Plaintiff Dunstan and the Subclass have suffered harm as a proximate result of the
violations of law and wrongful conduct of Defendant in the form of actual monetary damages
and violations of their privacy rights. Specifically, Plaintiffs computer was debilitated by the
46
surreptitiously installed Surveillance Software and he was forced to spend $40 on third party
software to remove comScore' s Surveillance Software.
ANSWER: The allegations set forth in paragraph 118 assert conclusions of law to
which no response is required. To the extent paragraph 118 may purport to assert allegations of
fact to which a response may be required, comScore states that it lacks knowledge or information
sufficient to form a belief as to the truth of the allegations of paragraph 118, and on that basis,
denies them
119.
Plaintiff seeks an order (1) permanently enjoining Defendants from continuing to engage
in unfair and unlawful conduct; (2) requiring Defendants to pay actual and compensatory
damages; (3) requiring Defendants to make full restitution of all funds wrongfully obtained; and
(4) requiring Defendants to pay interest, attorneys' fees, and costs pursuant to 815 ILCS
505/10a(c).
ANSWER: comScore admits that Plaintiffs purport seek the relief requested in
paragraph 119. Except as otherwise expressly admitted herein, comScore denies the allegations
of paragraph 119.
FIFTH CAUSE OF ACTION
Unjust Enrichment
(On Behalf of Plaintiffs and the Classes)
120.
Plaintiffs incorporate the foregoing allegations as if fully set forth herein.
ANSWER: comScore hereby incorporates as though fully set forth herein its answers to
paragraphs 1 through 119.
121.
Plaintiffs and members of the Classes conferred a monetary benefit on Defendant.
Defendant received and retained money by selling data to its clients that was collected about
Plaintiffs and the Classes through its Surveillance Software. Much of this information was
collected from Plaintiffs and the Classes without authorization and through deceptive business
practices.
ANSWER: comScore denies the allegations of paragraph 121.
47
122.
Defendant appreciates or has knowledge of such benefit
ANSWER: comScore denies the allegations of paragraph 122.
123.
Under principles of equity and good conscience, Defendant should not be permitted to
retain the money obtained by selling information about Plaintiffs and members of the Classes,
which Defendant has unjustly received as a result of its unlawful actions.
ANSWER: The allegations set forth in paragraph 123 assert conclusions of law to
which no response is required. To the extent paragraph 123 may purport to assert allegations of
fact to which a response may be required, comScore states that the legal principles cited by
Plaintiffs speak for themselves, and comScore denies any characterization of the laws applicable
to this case that is inconsistent with those principles. Except as specifically admitted, comScore
denies each and every allegation contained in this paragraph.
124.
Accordingly, Plaintiffs and the Classes seek full disgorgement and restitution of any
amounts comScore has retained as a result of the unlawful and/or wrongful conduct alleged
herein.
ANSWER: comScore admits that Plaintiffs purport to seek the relief requested in
paragraph 124. Except as otherwise expressly admitted herein, comScore denies the allegations
of paragraph 124.
PRAYER FOR RELIEF
WHEREFORE, Plaintiffs, individually and on behalf of the Classes, pray for the
following relief:
A. Certify this case as a class action on behalf of the Classes defined above, appoint Mike
Harris and Jeff Dunstan as class representatives, and appoint their counsel as class
counsel;
B. Declare that comScore's actions, as described herein, violate the Stored Communications
Act (18 U.S.C. §§ 2701, et seq.), the Electronic Communications Privacy Act (18 U.S.C.
§§ 2510, et seq.), the Computer Fraud and Abuse Act (18 U.S.C. §§ 2510, et seq.),and
Illinois Consumer Fraud and Deceptive Practices Act (815 ILCS 505/1 et seq.);
48
C. Award injunctive and other equitable relief as is necessary to protect the interests of the
Plaintiffs and the Classes, including, inter alia: (i) an order prohibiting comScore from
engaging in the wrongful and unlawful acts described herein; and (ii) requiring comScore
to refrain from accessing files attached to consumers' local networks; and (iii) requiring
comScore to delete its root certificate when the Surveillance Software is removed; and
(iv) requiring comScore to conspicuously and truthfully display the manner in which it
collects data about monitored consumers in its Terms of Service; and (v) requiring
comScore to uninstall its Surveillance Software when bundled software is uninstalled;
and (vi) requiring comScore to refrain from intercepting wireless network traffic without
authorization.
D. Award damages, including statutory damages of $1,000 per violation under the Stored
Communications Act, 18 U.S.C. § 2707(c), and the Electronic Communications Privacy
Act, 18 U.S.C. § 2520, and punitive damages where applicable, to Plaintiffs and the
Classes in an amount to be determined at trial;
E. Award Plaintiffs and the Classes their reasonable litigation expenses and attorneys' fees;
F. Award Plaintiffs and the Classes pre- and post-judgment interest, to the extent
allowable; and
G. Award such other and further relief as equity and justice may require.
ANSWER: comScore denies that Plaintiffs are entitled to a judgment or to any other relief
as requested in their “PRAYER FOR RELIEF.”
SEPARATE AND ADDITIONAL DEFENSES
comScore asserts the following separate and additional defenses to Plaintiffs’ Complaint,
without assuming the burden of proof on such defenses that would otherwise fall on Plaintiffs.
comScore reserves the right to supplement or amend these defenses as discovery is conducted,
and does not knowingly or intentionally waive any applicable separate and additional defense.
comScore reserves all other affirmative defenses pursuant to Rule 8(c) of the Federal Rules of
Civil Procedure, the Patent Laws of the United States, and any other defenses, at law or in
equity, that now exist or in the future may be available based on discovery and further factual
investigation in this case.
49
First Separate and Additional Defense
(Venue)
1.
Plaintiff entered into an agreement with comScore that contains a binding forum selection
clause providing for exclusive venue in Virginia state court or the Eastern District of Virginia.
Second Separate and Additional Defense
(Waiver)
2.
The Complaint and the claims asserted therein are barred by the doctrine of waiver.
Third Separate and Additional Defense
(Failure to Mitigate Damages)
3.
Plaintiffs failed to properly mitigate their alleged damages by, among other things: (1)
failing to remove comScore’s software through the Windows Add/Remove programs utility,
which is the industry standard, rather than purchasing unnecessary antivirus software; (2) failing
to review comScore’s FAQ and Privacy Policy, which would have quickly and expressly
informed them how to remove comScore’s software; and (3) objectively manifesting their assent
to the installation of comScore’s software, and to comScore’s TOS and Privacy Policy, when that
was apparently not their intention.
Fourth Separate and Additional Defense
(Statute of Limitations and Laches)
4.
Plaintiffs define the putative class to include individuals that fall outside the applicable
statute of limitations and/or whose claims are barred by the doctrine of laches
PRAYER FOR RELIEF
Wherefore, comScore prays for relief and judgment as follows:
1.
That the Court deny Plaintiffs’ prayer for relief in its entirety and that the Court
dismiss the Complaint with prejudice and enter judgment in comScore’s favor and against
Plaintiffs;
2.
That the Court award comScore its costs and expenses that it incurs in this action
50
and attorneys’ fees as permitted by law; and
3.
That the Court award comScore such other and further relief that it deems
appropriate.
Jury Demand
Defendant demands a jury trial of all issues so triable.
Dated: December 13, 2011
Respectfully submitted,
By: /s/ Whitty Somvichian
Michael G. Rhodes (admitted pro hac vice)
Whitty Somvichian (admitted pro hac vice)
Ray Sardo (admitted pro hac vice)
COOLEY LLP
101 California Street, 5th Floor
San Francisco, CA 94111
Telephone: (415) 693-2000
rhodesmg@cooley.com
wsomvichian@cooley.com
rsardo@cooley.com
By: /s/ Paul F. Stack
Paul F. Stack
Mark W. Wallin
STACK & O’CONNOR CHARTERED
140 South Dearborn Street, Suite 411
Chicago, IL 60603
Telephone: (312) 782-0690
Facsimile: (312) 782-0936
Attorneys for Defendant comScore, Inc.
51
Certificate of Service
I hereby certify that on December 13, 2011, I electronically filed the foregoing document
with the Clerk of Court using the CM/ECF system, which will send notifications of such filings
to the following:
Attorneys for Plaintiffs
Jay Edelson
William Charles Gray
Steven W. Teppler
Ari Jonathan Scharg
EDELSON McGUIRE, LLC
350 North LaSalle, Suite 1300
Chicago, Illinois 60654
Telephone : (312)589-6370
jedelson@edelson.com
wgray@edelson.com
ascharg@edelson.com
steppler@edelson.com
Respectfully submitted,
By: /s/ Whitty Somvichian
Michael G. Rhodes,(admitted pro hac vice)
Whitty Somvichian, (admitted pro hac vice)
Ray Sardo,(admitted pro hac vice)
COOLEY LLP
101 California Street, 5th Floor
San Francisco, CA 94111
Telephone: (415) 693-2000
mrhodesmg@cooley.com
wsomvichian@cooley.com
rsardo@cooley.com
By: /s/ Paul F. Stack
Paul F. Stack
Mark W. Wallin
STACK & O’CONNOR CHARTERED
140 South Dearborn Street, Suite 411
Chicago, IL 60603
Telephone: (312) 782-0690
Facsimile: (312) 782-0936
Attorneys for Defendant comScore, Inc.
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?