Dunstan et al v. comScore, Inc.
Filing
6
MOTION by Plaintiff Mike Harris for leave to conduct limited expedited discovery (Attachments: # 1 Exhibit A)(Scharg, Ari) (Docket Text modified by Clerks' Office.)
IN THE UNITED STATES DISTRICT COURT
NORTHERN DISTRICT OF ILLINOIS, EASTERN DIVISION
MIKE HARRIS and JEFF DUNSTAN,
individually and on behalf of a class of similarly
situated individuals,
)
)
)
)
Plaintiffs,
)
)
v.
)
)
COMSCORE, INC., a Delaware corporation,
)
)
Defendant.
)
__________________________________________)
Case No. 1:11-5807
Hon. James F. Holderman
PLAINTIFF MIKE HARRIS’S MOTION FOR LEAVE TO
CONDUCT LIMITED EXPEDITED DISCOVERY1
Plaintiff Mike Harris (“Plaintiff”), through his attorneys, moves this Court for leave to
serve limited, expedited discovery on Defendant comScore, Inc. (“comScore”) pursuant to Fed.
R. Civ. P. 26(d). In support of his motion, Plaintiff states as follows:
INTRODUCTION
comScore is an Internet marketing research company that monitors and records
consumers’ Internet behavior using a wide array of sophisticated analytics tools. A subset of
comScore’s overall business model is at issue in this lawsuit. That is, as alleged in the underlying
1
In accordance with LR 37.2, on September 9, 2011, at approximately 4:15 p.m. (CST),
Plaintiff’s counsel, William C. Gray, met and conferred, by telephonic means, with Defendant’s
counsel, Michael G. Rhodes, in a good faith attempt to obtain the discovery sought by this
motion without court action. At that time, Mr. Rhodes asked Mr. Gray to put his request in
writing and provide him with a reasonable period of time to communicate with Defendant to
determine whether it would produce the requested discovery informally. Plaintiff’s counsel
obliged. On September 13, 2011, at approximately 3:37 p.m. (CST), Mr. Rhodes indicated, via email correspondence, that Defendant is unwilling to provide the requested information.
Complaint, comScore gathers data, in part, by inserting unauthorized spyware2 (“Unauthorized
Spyware”) onto a number of consumers’ computers without their knowledge or consent. This
Unauthorized Spyware continuously transmits highly personal data back to comScore, where it is
compiled, analyzed, and ultimately sold to third party clients.
Plaintiff has concerns about these practices and their immediate and irreversible harm to
consumers. Plaintiff further is fearful that key evidence in the possession of unknown third
parties may be destroyed. Therefore, Plaintiff seeks to conduct limited expedited discovery to (i)
determine whether comScore has terminated the operations of its spyware program, (ii) identify
any third parties currently possessing relevant information for preservation purposes, (iii) and
ensure that comScore adequately protects the personal information that it has illegally collected.
To that end, Plaintiff respectfully requests leave to issue three (3) narrowly tailored
interrogatories on an expedited basis. (Plaintiff’s proposed Interrogatories are attached as
Exhibit A.)
BACKGROUND
comScore’s business model, while highly technical, can be summed up as follows:
comScore collects massive amounts of information about consumers’ digital behaviors,
organizes the data, and then sells it to third parties. To accumulate raw data, comScore gathers
information using, inter alia, website analytics, mobile phone applications, research panels, and
surveys. The Complaint (Dkt. No. 1), however, focuses only on the specific class of proprietary
2
Spyware is “software that is installed in a computer without the user’s knowledge and
transmits information about the user’s computer activities over the Internet.” See, MerriamWebster Online Dictionary, http://www.merriam-webster.com/dictionary/spyware (last visited
September 13, 2011).
2
software that comScore developed to unlawfully collect data from consumers’ computers—its
Unauthorized Spyware.
Through its Unauthorized Spyware, comScore retrieves a continuous stream of
information, no matter how sensitive, about the activities conducted on an individual’s computer
system—all without the user’s knowledge. (Compl., ¶7.) comScore effectuates this scheme by
“bundling” its Unauthorized Spyware with seemingly innocuous software that consumers
download for free on the Internet, such as games and screensavers. (Compl., ¶¶33, 34.) Once
downloaded, the Unauthorized Spyware records and transmits virtually all information inputted
into a web browser, including, inter alia, websites viewed, search queries, names, addresses,
credit card numbers, usernames/passwords, and Social Security Numbers. (Compl., ¶7.) The
Unauthorized Spyware also records and transmits information concerning all files on the user’s
computer, as well as, all files located on other computers found on local networks. (Compl., ¶¶
49-54.) Worse, comScore designed the Unauthorized Spyware to deny consumers the ability to
disable or otherwise reject its 24/7 surveillance, and does not even alert users to its presence.
(Compl., ¶¶ 49-54.) As a result, scores of consumers remain unwilling subjects of comScore’s
research. (Compl., ¶29.)
comScore has already sold, and continues to sell, information to third parties that has
been intrusively and unlawfully gathered from consumers through its Unauthorized Spyware.
Plaintiff is concerned that the Unauthorized Spyware continues to monitor users, and also that
the private information obtained by the Unauthorized Spyware is not being properly safeguarded.
Further, the third party recipients of this data possess extremely relevant evidence that Plaintiff
will need to prove his case. Unfortunately, such companies are likely unaware of the existence of
this lawsuit or that they possess crucial evidence that must be preserved.
3
For these reasons, Plaintiff seeks limited, expedited discovery pursuant to Fed. R. Civ. P.
26(d), in the form of three (3) interrogatories in order to: (i) determine the identities of any third
parties that possess comScore’s illegally obtained consumer information, (ii) allow Plaintiff to
serve such companies with subpoenas directing them to preserve relevant information (thus
ensuring that the very evidence at the heart of this lawsuit is not destroyed), (iii) ensure that
comScore has ceased collection of information gathered through its nefarious Unauthorized
Spyware, and (iv) evaluate whether Plaintiff needs to seek a preliminary injunction to protect the
interests of the putative class. These reasons constitute sufficient bases for allowing Plaintiff to
proceed with limited, expedited discovery.
ARGUMENT
Courts in this Circuit have held that expedited discovery is appropriate upon a showing of
good cause. See, e.g., Vance v. Rumsfeld, 2007 WL 4557812, *5 (N.D. Ill. Dec. 21, 2007);
Merrill Lynch, Pierce, Fenner & Smith, Inc. v. O’Connor, 194 F.R.D. 618, 623-24 (N.D. Ill.
2000); Sheridan v. Oak St. Mortgage, LLC, 244 F.R.D. 520, 522 (E.D. Wis. 2007). To show
good cause, a moving party is required to demonstrate that the need for expedited discovery
outweighs the prejudice to the responding party. Vance, 2007 WL 4557812, at *5. In assessing
good cause under Rule 26(d), the Court should also evaluate the scope of the requested
discovery. Interscope Records v. Does 1-14, 2007 WL 2900210, *1 (D. Kan. Oct. 1, 2007).
Discovery is frequently expedited where “physical evidence may be consumed or
destroyed with the passage of time, thereby disadvantaging one or more parties to the litigation.”
Ervine v. S.B., 2011 WL 867336, *2 (N.D. Ill. 2011); Pod-Ners, LLC v. N. Feed & Bean of
Lucerne Ltd. Liab. Co., 204 F.R.D. 675, 676 (D. Colo. 2002); Ellsworth Assocs., Inc. v. United
States, 917 F.Supp. 841, 844 (D.D.C. 1996). In Ervine, this Court recently granted the plaintiff’s
4
motion to issue subpoenas to third parties prior to the Rule 26(f) conference in order to preserve
relevant information in their possession that might otherwise be destroyed. Ervine, 2011 WL
867336, at *2. Thus, good cause exists to expedite discovery where the possibility of destruction
or transfer of evidence decreases the likelihood of discovering relevant evidence. See Interscope
Records, 2007 WL 2900210, at *1 (good cause found to expedite discovery where electronic
documents would likely be destroyed).
Here, good cause exists to allow Plaintiff to conduct limited, expedited discovery.
Plaintiff seeks only to issue three (3) interrogatories that relate specifically to comScore’s
Unauthorized Spyware. As explained above, comScore records information about consumers’
private digital behaviors using the Unauthorized Spyware, and sells such data to third party
companies. The third party recipients of the Unauthorized Spyware data therefore possess
information that is not only highly sensitive, but also highly relevant to prove Plaintiff’s case.
Many of comScore’s clients are likely unaware of this lawsuit or that they possess relevant and
discoverable information. Without limited discovery, Plaintiff is unable to determine which
companies comScore sells its Unauthorized Spyware data to, or instruct them to preserve
relevant evidence. Only comScore itself is able to identify which companies have received
unlawfully collected information.
Additionally, much of the evidence held by comScore’s clients likely exists in transient
electronic format, and will be unobtainable if not expeditiously recovered and securely
preserved. Other relevant evidence is undoubtedly held on individual employee laptops or
portable disks, and therefore likely to be frequently purged. Thus, there is an immediate need to
identify the comScore clients that received information collected with its Unauthorized Spyware.
5
To efficiently identify such clients, Plaintiff seeks to issue three (3) interrogatories to
comScore. These interrogatories are narrowly tailored to specifically identify only those third
parties that may possess discoverable information (i.e., data collected using comScore’s
Unauthorized Spyware) or may come to possess such information in the near future. See
Interscope Records, 2007 WL 2900210, at *1 (“because plaintiffs seek very specific information
regarding a certain group of likely readily identifiable people, the court finds the scope of the
discovery sought sufficiently narrow”). To effectively preserve relevant evidence, Plaintiff
intends to issue subpoenas directing the identified parties in possession of information
improperly collected from the Unauthorized Spyware to (a) preserve any and all relevant
information, and (b) inform the Plaintiff that the responsive information has been preserved.
Plaintiff’s proposed discovery would not prejudice comScore. In fact, comScore need not
produce any documents, and instead, may simply identify information that is responsive to the
interrogatories.3 The only dangers present are the possible irreparable injuries associated with
continued unlawful monitoring and the potential inadvertent spoliation of evidence that Plaintiff
may face in the absence of expedited discovery. Such a danger far outweighs any minor
inconvenience to comScore in identifying relevant third parties, especially given the extremely
limited scope (i.e., only those companies that have received data from comScore’s Unauthorized
Spyware). In sum, Plaintiff’s proposed discovery request is sufficiently limited in scope, and
good cause exists to identify and preserve crucial evidence that may be destroyed. Ervine, 2011
WL 867336, at *2; Pod-Ners, LLC, 204 F.R.D. at 676; Ellsworth Assocs., Inc., 917 F.Supp. at
844.
3
Of course, Plaintiff would enter into an appropriate confidentiality agreement with
comScore with respect to this information.
6
CONCLUSION
For the foregoing reasons, Plaintiff Mike Harris respectfully requests that this Court grant
his Motion for Leave to Conduct Limited, Expedited Discovery in accordance with the following
schedule:
1.
Within 3 days of entry of the Court’s Order, Plaintiff shall serve comScore with
three (3) Interrogatories (Ex. A);
2.
Within 14 days of service upon comScore, comScore shall respond to Plaintiff’s
Interrogatories;
3.
Within 14 days of receiving comScore’s responses, Plaintiff shall issue subpoenas
duces tecum to all identified third parties; and
4.
Within 30 days of the entry of an Order, the Parties shall engage in a Rule 26(f)
conference.
Dated: September 13, 2011
RESPECTFULLY SUBMITTED,
MIKE HARRIS, INDIVIDUALLY AND ON
BEHALF OF A CLASS OF SIMILARLY SITUATED
INDIVIDUALS,
By: /s/ Ari J. Scharg
One of Plaintiff’s Attorneys
Jay Edelson
Steven W. Teppler
William C. Gray
Ari J. Scharg
EDELSON MCGUIRE, LLC
350 North LaSalle, Suite 1300
Chicago, Illinois 60654
Telephone: (312) 589-6370
jedelson@edelson.com
steppler@edelso.com
wgray@edelson.com
ascharg@edelson.com
7
CERTIFICATE OF SERVICE
I, Ari Scharg, an attorney, hereby certify that on September 13, 2011, I served the above
and foregoing Plaintiff’s Motion for Leave To Conduct Limited Expedited Discovery by
causing true and accurate copies of such paper to be transmitted to the persons shown below via
electronic mail, and further by causing true and accurate copies of such paper to be placed in
postage prepaid envelopes addressed to the persons shown below, and by causing such envelopes
to be deposited in the United States Mailbox located at 350 North LaSalle Street, Chicago,
Illinois on this 13th day of September, 2011.
Michael Rhodes, Esq.
Cooley LLP
101 California Street, 5th Floor
San Francisco, California 94111-5800
rhodesmg@cooley.com
Counsel for Defendant comScore, Inc.
/s/ Ari J. Scharg
Ari J. Scharg
8
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?