Online Powerhouses – Too Big to Sue?

Online Powerhouses – Too Big to Sue?

Online Powerhouses – Too Big to Sue?

Internet privacy is not just under siege from the NSA. Google is fighting two huge class action suits based upon privacy violations. Facebook recently settled two privacy-based class action lawsuits. These lawsuits are colossal because Google and Facebook are two mammoth companies with enormous numbers of customers. One class is comprised of everyone who has a Gmail account or sent a message to a GMail account over the last two years. How huge is that? The last time Google released the number of Gmail accounts was in June, 2012: 425 million worldwide. I’ve opened two myself since then.  But that’s only the number of Gmail accounts and doesn’t include everyone sending messages to Gmail accounts. Facebook boasts over 1 billion users. We mean huge.

Facebook-legal

(Image Source: Shutterstock)

The second Google case is In re Google Street View Electronic Communications Litigation. This class is every person in the US whose home WiFi Google tapped to perform its street view mapping. No one knows how many people that is, but it could be in the millions.

While lawyers typically look for moneyed defendants, the problem with lawsuits of this magnitude is that each privacy violation has a statutory penalty of up to $10,000 under the Wiretap Act. When the class of plaintiffs is so large, the penalties rapidly hit billions or even trillions of dollars – that is if every class member decides to participate.

So what does this really look like? Facebook lucked out on its class action, Fraley v. Facebook, when the judge approved a settlement in August to pay each class member $15. The potential class included 150 million users but only 615,000 filed claims. Facebook paid $20 million into a settlement fund with $9,225,000 going to class members; $5,000,000 to Internet privacy watch dog groups, called cy pres awards; and $3.5 million in attorneys’ fees. So Facebook is lucky because $20 million is far less than $2.25 billion (150 million members x $15). If each class member got $1,000, more would likely have signed up and well, you can do the math.

Facebook managed to settle its next class action on the Beacon program (Let’s broadcast details about our users’ personal lives!) with a $6 million cy pres award to a privacy group Facebook controls. Clearly Facebook thought it “cracked the code” on managing its privacy problems but the case is being appealed. And what’s more, settling class actions with cy pres awards in lieu of compensating individuals is now losing favor in the 9th Circuit where Google and Facebook live.

The Google cases have been progressing through the litigation process with the plaintiffs largely winning. Even with gross revenues of $50 billion in 2012, awarding significant damages to each class member would likely bankrupt Google, leaving the claimants without payments and hundreds of millions without services.

Some commentators are arguing that the suits are “Too Big to Settle”. In the class action world, once the class is certified by the court, settlements are very difficult. What usually happens is that prior to certification, the parties come up with their proposed settlement and present it to the court for approval. Once the class is certified, it’s up to the court to define the award. If the court won’t accept a cy pres award and applies statutory damages to each class member, we are looking at staggering judgments.

It’s reminiscent of the “Too Big to Fail” arguments of the big banks and auto companies. But do they warrant it? However you feel about class action suits, shouldn’t Google and Facebook be held accountable for privacy violations even though they are so large – or because they are so large? Would the impact of Google’s or Facebook’s demise be similar to bringing down the banking system or the auto industry? Or would the Internet ecosystem hiccup and move on?

The U.S. Supreme Court should announce if they will take the appeal of the Beacon Facebook class action and its cy pres award on Monday. Any bets?

By Cindy Wolf

Cindy is a Colorado lawyer with more than 25 years experience representing large and small domestic and multinational companies. Her expertise is in helping companies enter the cloud safely, either as providers or users. She also practices in the areas of corporate law and commercial contracting, with an emphasis on international issues. She can be reached at cindy@cindywolf.com. 

(Note: This publication is provided for informational purposes only. It does not constitute legal advice. There is no implicit guarantee that this information is correct, complete, or up to date. This publication is not intended to and does not create an attorney-client relationship between you and the author.)

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your content in the cloud is dangerous. The truth is that top tier cloud storage is more secure than most organizations’…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more complicated across public cloud models where there is shared ownership. As key business stakeholders in your company can you attest…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure is quickly becoming a thing of the past. In fact, the cloud has become so ingrained in the fabric of…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how they want to work, and even where they want to work — a onetime executive luxury that is increasingly available…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation and more recent technological advances, such as use of the cloud, have began to make their way into schools. Teachers…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand, but in an ever-changing technology landscape and with complex, inter-related business operations to manage, implementing GRC can seem like a…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring revenue, here are four essentials to guide your way: All Revenue Will Become Recurring Revenue. Perhaps not this week or…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls systems, retail terminals and scanners, and kiosks to medical devices, heating and lighting systems, connected homes, and smart cars. Identity…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago. The market persevered, weathering the “end of perimeter security” claims and adapting to become more flexible and dynamic, reaching beyond…