234 F.R.D. 674 | D.N.C. | 2006
ORDER GRANTING IN PART AND DENYING IN PART MOTION TO COMPEL COMPLIANCE WITH SUBPOENA DUCES TECUM
I. INTRODUCTION
This case raises three vital interests: (1) the national interest in a judicial system to reach informed decisions through the power of a subpoena to compel a third party to produce relevant information; (2) the third-party’s interest in not being compelled by a subpoena to reveal confidential business information and devote resources to a distant
In aid of the Government’s position in the case of ACLU v. Gonzales, Civil Action No. 98-CV-5591 pending in the Eastern District of Pennsylvania, United States Attorney General Alberto R. Gonzales has subpoenaed Google, Inc., (“Google”) to compile and produce a massive amount of information from Google’s search index, and to turn over a significant number of search queries entered by Google users. Google timely objected to the Government’s request. Following the requisite meet and confer, the Government filed the present Miscellaneous Action in this District to compel Google to comply with the subpoena. On March 14, 2006, this Court held a hearing on the Government’s Motion.
II. PROCEDURAL BACKGROUND
In 1998, Congress enacted the Child Online Protection Act (“COPA”), which is now codified as 47 U.S.C. § 231. COPA prohibits the knowing making of a communication by means of the World Wide Web, “for commercial purposes that is available to any minor and that includes material that is harmful to minors,” subject to certain affirmative defenses. 47 U.S.C. § 231(a)(1). For this purpose, the statute defines the phrase “material that is harmful to minors” to mean material that is either obscene or material that meets each prong of a three-part test: “(A) the average person, applying contemporary community standards, would find, taking the material as a whole and with respect to minors, is designed to appeal to, or is designed to pander to, the prurient interest; (B) depicts, describes, or represents, in a manner patently offensive with respect to minors, an actual or simulated sexual act or sexual conduct, an actual or simulated normal or perverted sexual act, or a lewd exhibition of the genitals or post-pubescent female breast; and (C) taken as a whole, lacks serious literary, artistic, political, or scientific value for minors.” 47 U.S.C. § 231(e)(6).
Upon enactment of COPA, the American Civil Liberties Union and several other plaintiffs (“Plaintiffs”) filed an action in the Eastern District of Pennsylvania, challenging the constitutionality of the Act. The district court granted Plaintiffs’ motion for a preliminary injunction on the grounds that COPA is likely to be found unconstitutional on its face for violating the First Amendment rights of adults. ACLU v. Reno, 31 F.Supp.2d 473 (E.D.Pa.1999). The United States Court of Appeals for the Third Circuit affirmed the grant of the preliminary injunction. ACLU v. Reno, 217 F.3d 162 (3d Cir.2000). After granting certiorari, the Supreme Court of the United States vacated the judgment of the Third Circuit, and remanded the case to that court for further review of the district court’s grant of preliminary injunction in favor of Plaintiffs. The Third Circuit again affirmed the preliminary injunction, ACLU v. Ashcroft, 322 F.3d 240 (3d Cir.2003), and the Supreme Court again granted certiorari.
The Supreme Court affirmed the preliminary injunction and held that there was an insufficient record before it by which the Government could carry its burden to show that less restrictive alternatives may be more effective than the provisions of COPA. Ashcroft v. ACLU, 542 U.S. 656, 673, 124 S.Ct. 2783, 159 L.Ed.2d 690 (2004). Of these alternatives directed at preventing minors from viewing “harmful to minors” material on the Internet, the Court focused on blocking and filtering software programs which “impose selective restrictions on speech at the receiving end, not universal restrictions at the source.” Id. at 667, 124 S.Ct. 2783. To “allow the parties to update and supplement the factual record to reflect current technological realities,” the Court remanded the
Following remand, Plaintiffs filed a First Amended Complaint (“FAC”). (98-CV-5591LR, E.D. Pa., Docket Item No. 175). Apparently, in preparing its defense, the Government initiated a study designed to somehow test the effectiveness of blocking and filtering software. To provide it with data for its study, the Government served a subpoena on Google, America Online, Inc. (“AOL”), Yahoo! Inc. (‘Yahoo”), and Microsoft, Inc. (“Microsoft”). The subpoena required that these companies produce a designated listing of the URLs which would be available to a user of their services. The subpoena also required the companies to produce the text of users’ search queries. AOL, Yahoo, and Microsoft appear to be producing data pursuant to the Government’s request. Google, however, objected.
Google is a Delaware corporation headquartered in Mountain View, CA, that, like AOL, Yahoo, and Microsoft, also provides search engine capabilities. Based on the Government’s estimation, and uncontested by Google, Google’s search engine is the most widely used search engine in the world, with a market share of about 45%. The search engine at Google yields URLs in response to a search query entered by a user. The search queries entered may be of varying lengths, and incorporate a number of terms and connectors. Upon receiving a search query, Google produces a responsive list of URLs from its search index in a particular order based on algorithms proprietary to Google.
The initial subpoena to Google sought production of an electronic file containing two general categories. First, the subpoena requested “[a]ll URL’s that are available to be located to a query on your company’s search engine as of July 31, 2005.” (Decl. of Joel McElvain, Ex. A (“Subpoena”) at 4.) In negotiations with Google, this request was later narrowed to a “multi-stage random” sampling of one million URLs in Google’s indexed database. As represented to the Court at oral argument, the Government now seeks only 50,000 URLs from Google’s search index. Second, the government also initially sought “[a]ll queries that have been entered on your company’s search engine between June 1, 2005 and July 31, 2005 inclusive.” (Subpoena at 4.) Following further negotiations with Google, the Government narrowed this request to all queries that have been entered on the Google search engine during a one-week period. During the course of the present Miscellaneous Action, the Government further restricted the scope of its request, and now represents that it only requires 5,000 entries from Google’s query log in order to meet its discovery needs.
Despite these modifications in the scope of the subpoena, Google maintained its objection to the Government’s requests. Before the Court is a motion to compel Google to comply with the modified subpoena, namely, for a sample of 50,000 URLs from Google’s search index and 5,000 search queries entered by Google’s users from Google’s query log.
III. STANDARDS
Rule 45 of the Federal Rules of Civil Procedure governs discovery of nonparties by subpoena. Fed. R. Civ. P. 45 (“Rule 45”). The Advisory Committee Notes to the 1970 Amendment to Rule 45 state that the “scope of discovery through a subpoena is the same as that applicable to Rule 34 and other discovery rules.” Rule 45 advisory committee’s note (1970). Under Rule 34, the rule governing the production of documents between parties, the proper scope of discovery is as specified in Rule 26(b). Fed. R. Civ. P. 34. See also Heat & Control, Inc. v. Hester Industries, Inc., 785 F.2d 1017 (Fed.Cir.1986) (“rule 45(b)(1) must be read in light of Rule 26(b)”); Exxon Shipping Co. v. U.S. Dept. of Interior, 34 F.3d 774, 779 (9th Cir.1994) (applying both Rule 26 and Rule 45 standards to rule on a motion to quash subpoena).
Rule 26(b), in turn, permits the discovery of any non-privileged material “relevant to the claim or defense of any party,” where “relevant information need not be admissible at trial if the discovery appears reasonably calculated to lead to the discovery of admissible evidence.” Rule 26(b)(1). Rele
Rule 26 also specifies that “[a]ll discovery is subject to the limitations imposed by Rule 26(b)(2)(i), (ii), and (iii)” which requires that discovery methods be limited where:
(1) the discovery sought is unreasonably cumulative or duplicative, or is obtainable from some source that is more convenient, less burdensome, or less expensive; (ii) the party seeking discovery has had ample opportunity by discovery in the action to obtain the information sought; or (iii) the burden or expense of the proposed discovery outweighs its likely benefit, taking into account the needs of the case, the amount in controversy, the parties’ resources, the importance of the issues at stake in the litigation, and the importance of the proposed discovery in resolving the issues.
The Advisory Committee Notes to the 1983 amendments to Rule 26 state that “[t]he objective is to guard against redundant or disproportionate discovery by giving the court authority to reduce the amount of discovery that may be directed to matters that are otherwise proper subjects of inquiry.” However, the commentators also caution that “the court must be careful not to deprive a party of discovery that is reasonably necessary to afford a fair opportunity to defend and prepare the case.” Rule 26 advisory committee’s note (1983).
In addition to the discovery standards under Rule 26 incorporated by Rule 45, Rule 45 itself provides that “on timely motion, the court by which a subpoena was issued shall quash or modify the subpoena if it.. .subjects a person to undue burden.” Rule 45(3)(A). Of course, “if the sought-after documents are not relevant, nor calculated to lead to the discovery of admissible evidence, then any burden whatsoever imposed would be by definition ‘undue.’ ” Compaq Computer Corp. v. Packard Bell Elec., Inc., 163 F.R.D. 329, 335-36 (N.D.Cal.1995). Underlying the protections of Rule 45 is the recognition that “the word ‘non-party' serves as a constant reminder of the reasons for the limitations that characterize ‘third-party’ discovery.” Dart Indus. Co. v. Westwood Chem. Co., 649 F.2d 646, 649 (9th Cir.1980) (citations omitted). Thus, a court determining the propriety of a subpoena balances the relevance of the discovery sought, the requesting party’s need, and the potential hardship to the party subject to the subpoena. Heat & Control, 785 F.2d at 1024.
IV. DISCUSSION
Google primarily argues that the information sought by the subpoena is not reasonably calculated to lead to evidence admissible in the underlying litigation, and that the production of information is unduly burdensome. The Court discusses each of these objections in turn, as well as the Court’s own concerns about the potential interests of Google’s users.
A. Relevance
Any information sought by means of a subpoena must be relevant to the claims and defenses in the underlying case. More precisely, the information sought must be “reasonably calculated to lead to admissible evidence.” Rule 26(b). This requirement is liberally construed to permit the discovery of information which ultimately may not be admissible at trial. Overbroad subpoenas seeking irrelevant information may be quashed or modified. See, e.g., Moon v. SCP Pool Corp., 232 F.R.D. 633, 637 (C.D.Cal.2005) (quashing subpoena seeking the production of all purchasing information where the underlying contract dispute was limited to a particular geographic region); W.E. Green v. Baca, 219 F.R.D. 485, 490 (C.D.Cal.2003) (providing a survey of cases where in limiting the scope of a subpoena, district courts “effectively sustain[] an objection that the requests are vague, ambiguous, or overbroad in part, and overrules in part”).
This Court does not have the benefit of involvement with the underlying litigation. The Court adheres to the principle stated in Truswal Systems Corp. v. Hydro-Air Engi
However, the Court does not construe a general policy of permissiveness to require this Court to abdicate its responsibility to review a subpoena under the Federal Rules when presented with a motion to compel. The Court has reviewed the decisions comprising the lengthy procedural history of this case in the Eastern District of Pennsylvania, the Third Circuit, and the Supreme Court, as well as Plaintiffs’ current complaint. The Court has heard the parties at oral argument
1. Sample of URLs
As narrowed by negotiations with Google and through the course of this Miscellaneous Action, the Government now seeks a sample of 50,000 URLs from Google’s search index. In determining whether the information sought is reasonably calculated to lead to admissible evidence, the party seeking the information must first provide the Court with its plans for the requested information. See Northwestern Memorial v. Ashcroft, 362 F.3d 923, 931 (7th Cir.2004). The Government’s disclosure of its plans for the sample of URLs is incomplete. The actual methodology disclosed in the Government’s papers as to the search index sample is, in its entirety, as follows: “A human being will browse a random sample of 5,000-10,000 URLs from Google’s index and categorize those sites by content” (Supp. Decl. of Phillip B. Stark, Ph.D (“Supp. Stark Decl.”) It 4) and from this information, the Government intends to “estimate. . .the aggregate properties of the websites that search engines have indexed.” (Government’s Reply Memorandum in Support of the Motion to Compel Compliance with Subpoena Duces Tecum (“Reply”), Docket Item No. 21 at 4:8-9.) The Government’s disclosure only describes its methodology for a study to categorize the URLs in Google’s search index, and does not disclose a study regarding the effectiveness of filtering software. Absent any explanation of how the “aggregate properties” of material on the Internet is germane to the underlying litigation
Based on the Government’s statement that this information is to act as a “test set for the study” (Reply at 3:20) and a general statement that the purpose of the study is to “evaluate the effectiveness of content filtering software,” (Reply at 3:2-5) the Court is able to envision a study whereby a sample of 50,000 URLs from the Google search index may be reasonably calculated to lead to admissible evidence on measuring the effectiveness of filtering software. In such a study, the Court imagines, the URLs would be categorized, run through the filtering software, and the effectiveness of the filtering software ascertained as to the various categories of URLs. The Government does not even provide this rudimentary level of general detail as to what it intends to do with the sample of URLs to evaluate the effectiveness of filtering software, and at the hearing neither confirmed nor denied the Court’s speculations about the study.
As the court in Northwestern Memorial colorfully noted, “and of course, pretrial discovery is a fishing expedition and one can’t know what one has caught until one fishes [b]ut Fed.R.Civ.P. 45(e) allows the fish to object, and when they do so the fisherman has to come up with more,” 362 F.3d at 931— it is difficult for a court to determine the relevance of information where the party seeking the information does not concretely disclose its plans for the information sought. Given the broad definition of relevance in Rule 26, and the current narrow scope of the subpoena, despite the vagueness with which the Government has disclosed its study, the Court gives the Government the benefit of the doubt. The Court finds that 50,000 URLs randomly selected from Google’s data base for use in a scientific study of the effectiveness of filters is relevant to the issues in the ease of ACLU v. Gonzales.
2. Search Queries
In its original subpoena the Government sought a listing of the text of all search queries entered by Google users over a two month period. As defined in the Government’s subpoena, “queries” include only the text of the search string entered by a user, and not “any additional information that may be associated with such a text string that would identify the person who entered the text string into the search engine, or the computer from which the text string was entered.” (Subpoena at 4.) The Government has narrowed its request so that it now seeks only a sample of 5,000 such queries from Google’s query log. The Government discloses its plans for the query log information as follows: “A random sample of approximately 1,000 Google queries from a one-week period will be run through the Google search engine. A human being will browse the top URLs returned by each search and categorize the sites by content.” (Supp. Stark Deel. H 3.) To the extent that the URLs obtained by the researchers as a result of running the search queries provided are then used to create “a sample of a relevant population of websites that can be categorized and used to test filtering software” (Reply at 5) similar to the sample created from URLs from Google’s search index, the Court finds that were the Government to run these URLs through the filtering software and analyze the results, the information sought would be reasonably calculated to lead to admissible evidence.
Google’s arguments challenging the relevance of the search queries to the Government’s study center around its contention that a number of additional factors exist which may mitigate the correlation between a search query and the search result. (Google’s Opposition to the Government’s Motion to Compel (“Opp.”), Docket Item No. 12 at 6:9-8:l.) In particular, Google cites to the presence of a safe search filter, customized searches, or advanced preferences all potentially activated at the user end and not reflected in the user’s search string. (Opp. at 6:17-7:2.) Google also argues that the list of search queries does not distinguish between sources of the queries such as adults, minors, automatic queries generated by a program, known as “bot” queries, and artificial queries generated by individual users. (Opp. at 7:3-22.) Contrary to Google’s belief, the broad
B. Undue Burden
This Court is particularly concerned anytime enforcement of a subpoena imposes an economic burden on a non-party. Under Rule 45(3)(a), a court may modify or quash a subpoena even for relevant information if it finds that there is an undue burden on the non-party. Undue burden to the non-party is evaluated under both Rule 26 and Rule 45. See Exxon Shipping Co. v. U.S. Dept. of Interior., 34 F.3d 774, 779 (9th Cir.1994).
1. Technological Burden of Production
Google argues that it faces an undue burden because it does not maintain search query or URL information in the ordinary course of business in the format requested by the Government. (Opp. at 16:22-15.) As a general rule, non-parties are not required to create documents that do not exist, simply for the purposes of discovery. Insituform, Tech., Inc. v. Cat Contracting, Inc., 168 F.R.D. 630, 633 (N.D.Ill.1996). In this case, however, Google has not represented that it is unable to extract the information requested from its existing systems. Google contends that it must create new code to format and extract query and URL data from many computer banks, in total requiring up to eight full time days of engineering time. Because the Government has agreed to compensate Google for the reasonable costs of production, and given the extremely scaled-down scope of the subpoena as modified, the Court does not find that the technical burden of production excuses Google from complying with the subpoena. Later in this Order, the Court addresses other concerns with respect to this information, however.
Google also argues that even if the Government compensates Google for its engineering time, if the Government plans on executing a high volume of searches on Google, such searches would lead to an interference with Google’s search engine and disrupt use by users and advertisers. (Opp. at 16:24-17:3.) The Government only intends to run 1,000 to 5,000 of the search queries through the Google search engine. (Supp. Stark Deck 114.) Furthermore, these searches will be run by humans who will then categorize the search results and record their findings. (Supp. Stark Deck 114.) Given the volume and rate of the proposed study, the Court finds that the additional burden on Google’s search engine caused by the Government’s study as represented to the Court, is likely to be de minimus.
2. Potential for Loss of User Trust
Google also argues that it will be unduly burdened by loss of user trust if forced to produce its users’ queries to the Government. Google claims that its success is attributed in large part to the volume of its users and these users may be attracted to its search engine because of the privacy and anonymity of the service. According to Google, even a perception that Google is acquiescing to the Government’s demands to release its query log would harm Google’s business by deterring some searches by some users. (Opp. at 18.)
Google’s own privacy statement indicates that Google users could not reasonably expect Google to guard the query log from disclosure to the Government. Google’s privacy statement at www.google.com/priva-cypolicy.html states only that Google will protect “personal information” of users. “Personal information” is expressly defined for users at www.google.com/privacy faq.
However, even if an expectation by Google users that Google would prevent disclosure to the Government of its users’ search queries is not entirely reasonable, the statistic cited by Dr. Stark that over a quarter of all Internet searches are for pornography (Supp. Stark Deck H 4), indicates that at least some of Google’s users expect some sort of privacy in their searches.
3. Trade Secret
Rule 45(e)(3)(B) provides additional protections where a subpoena seeks trade secret or confidential commercial information from a nonparty. Once the nonparty shows that the requested information is a trade secret or confidential commercial information, the burden shifts to the requesting party to show a “substantial need for the testimony or material that cannot be otherwise met without undue hardship and assures that the person to whom the subpoena is addressed will be reasonably compensated.” Rule 45(c)(3)(B). Upon such a showing, “the court may order appearance or production only upon specified conditions.” Id. See also Klay v. All Humana, Inc., 425 F.3d 977, 983 (11th Cir.2005); Heat & Control, Inc. v. Hester Industries, Inc., 785 F.2d 1017, 1025 (Fed.Cir.1986).
a. Search Index and Query Log as Trade Secrets
Trade secret or commercially sensitive information must be “important proprietary information” and the party challenging the subpoena must make “a strong showing that it has historically sought to maintain the confidentiality of this information.” Compaq Computer Corp. v. Packard Bell Elec., Inc., 163 F.R.D. 329, 338 (N.D.Cal. 1995). A statistically significant sample of Google’s search index and Google’s query log would have independent economic value from not being known generally to the public. The disclosure of a statistically significant sample of Google’s search index or query log may permit competitors to estimate information about Google’s indexing methods or Google’s users. (Deck of Matt Cutts (“Cutts Deck”) HH 26, 27.) By declaration, Google represents that it does not share this information with third parties and it has security procedures to maintain the confidentiality of this information. (Cutts Deck 111129-35; Deck of Marty Lev.)
At oral argument, counsel for Google acknowledged that samples from its proprietary search index and query log of 50,000 URLs and 5,000 search queries are far less likely to lead to trade secret disclosure than the Government’s original requests. Because Google still continues to claim informa
b. Entanglement in the Underlying Litigation
Google’s remaining trade secret argument is that despite the narrowness of the sample provided, it would become entangled in the underlying litigation where further discovery would risk trade secret disclosure. Rule 45(c)(3)(B) was intended to provide protection for the intellectual property of non-parties. See Mattel, Inc. v. Walking Mountain Prod., 353 F.3d 792, 814 (9th Cir.2003) (citing Rule 45 advisory committee’s notes (1991)). On the one hand, a determination of the propriety of further discovery is for another set of motions, and not the one presently before the Court. On the other hand, further discovery in this case that would require disclosure of Google’s trade secrets is not merely a remote possibility. The Government has represented that it has sufficient information from other search engines with which to perform its study, but seeks information from Google because such information would add “substantial luster” to its study — ostensibly because there is something unique about the world of Google. The nature and extent of that uniqueness, if sufficient to add substantial luster to the Government’s study, is also likely to be a matter of discovery for Plaintiffs in the underlying suit involving more than the Government’s proposed “fifteen-minute deposition” of a Google engineer to confirm that the statistician’s procedure had been followed.
In light of the comments of Plaintiffs’ counsel at the hearing, the Court can foresee further entanglement based on Plaintiffs’ challenge to the Government’s ultimate study. In litigation where the ultimate question is not whether there is adult material on the Internet, but fundamentally about limiting the access by minors to such adult material, it is quite likely that Plaintiffs will challenge the sample produced by Google as not representative of what minors search for or encounter on the Internet. Such an inquiry would require additional discovery, some of which may implicate Google’s confidential commercial information. At the hearing, Plaintiffs’ counsel stated that it had already commenced such discovery with respect to a search engine included in the Government’s study. In other words, this Court is concerned that a narrow sample of Google’s proprietary index and query log, while in itself not likely to lead to the disclosure of confidential information, may act as the thin blade of the wedge in exposing Google to potential disclosure of its confidential commercial information.
c. Substantial Need
The burden thus shifts to the Government to demonstrate that the requested discovery is relevant and essential to a judicial determination of its case. See Upjohn Co. v. Hygieia Biological Laboratories, 151 F.R.D. 355, 358 (E.D.Cal.1993). Because “there is no absolute privilege for trade secrets and similar confidential information,” Centurion Indus., Inc. v. Warren Steurer and Assoc., 665 F.2d 323, 325 (10th Cir.1981) (citing Federal Open Market Committee v. Merrill, 443 U.S. 340, 362, 99 S.Ct. 2800, 61 L.Ed.2d 587 (1979)), the district court’s role in this inquiry is to balance the need for the trade secrets against the claim of injury resulting from disclosure. Heat & Control, 785 F.2d at 1025. The determination of substantial need is particularly important in the context of enforcing a subpoena when discovery of trade secret or confidential commercial information is sought from non-parties. See Mattel, 353 F.3d at 814.
Google contends that it should not be compelled to produce its search index or query log because the information sought by the Government is readily available from open URL databases such as Alexa and transparent search engines such as Dogpile, or that the Government already has sufficient information from AOL, Yahoo, and Microsoft. As
In this case, the Government has demonstrated a substantial need for some information from Google in creating a set of URLs to run through filtering software. It is uncontested that Google is the market leader with over 45% of the search engine market. (Supp. Stark Decl. UU 4-5.) Because Google has the greatest market share, the Government’s study may be significantly hampered if it did not have access to some information from the most often used search engine.
k- Cumulative and Duplicative Discovery
What the Government has not demonstrated, however, is a substantial need for both the information contained in the sample of URLs and sample of search query text. Furthermore, even if the information requested is not a trade secret, a district court may in its discretion limit discovery on a finding that “the discovery sought is unreasonably cumulative or duplicative, or is obtainable from some other source that is more convenient, less burdensome, or less expensive.” Rule 26(b)(2)(i). See In re Sealed Case (Medical Records), 381 F.3d 1205, 1215 (D.C.Cir.2004) (citing the advisory committee’s notes to Rule 26 and finding that “the last sentence of Rule 26(b)(1) was added in 2000 ‘to emphasize the need for active judicial use of subdivision (b)(2) to control excessive discovery”’). From this Court’s interpretation of the Government’s general statements of purpose for the information requested, both the sample of URLs and the set of search queries are aimed at providing a list of URLs which will be categorized and run through the filtering software in an effort to determine the effectiveness of filtering software as to certain categories. Both sources of the URL “test set” list seem to be open to the same sorts of criticism by Plaintiffs in the underlying litigation. The content of these objections are not germane to the Court’s determination of whether the information sought is relevant under the broad dictates of Rule 26, but the actual similarity of the two categories of information sought in their presumed utility to the Government’s study indicates that it would be unreasonably cumulative and duplicative to compel Google to hand over both sets of proprietary information. To borrow the Government’s vivid analogy, in order to aid the Government in its study of the entire elephant, the Court may burden a non-party to require production of a picture of the elephant’s tail, but it is within this Court’s discretion to not require a non-party to produce another picture of the same tail.
Faced with duplicative discovery, and with the Government not expressing a preference as to which source of the test set of URLs it prefers, this Court exercises its discretion pursuant to Rule 26(b)(2) and determines that the marginal burden of loss of trust by Google’s users based on Google’s disclosure of its users’ search queries to the Government outweighs the duplicative disclosure’s likely benefit to the Government’s study. Accordingly, the Court grants the Government’s motion to compel only as to the sample of 50,000 URLs from Google’s search index.
C. Protective Order
As trade secret or confidential business information, Google’s production of a list of URLs to the Government shall be protected by protective order. Generally, “the selective disclosure of protectable trade secrets is not per se ‘unreasonable and oppressive,’ when appropriate protective measures are imposed.” Heat & Control, 785 F.2d at 1025. The Court recognizes that Google was unable to negotiate the particular provisions of the
The Court grants the motion to compel as to a set of 50,000 URLs from Google’s search index and orders the parties to show cause, if any, on or before April 3, 2006, why a designation of the produced information as “Confidential” under the existing protective order is insufficient protection for Google’s confidential commercial information.
D. Privacy
The Court raises, sua sponte, its concerns about the privacy of Google’s users apart from Google’s business goodwill argument. In Gill v. Gulfstream Park Racing Assoc., the First Circuit held that “considerations of the public interest, the need for confidentiality, and privacy interests are relevant factors to be balanced” in a Rule 26(c) determination regarding the subpoena of documents used to prepare an allegedly defamatory report issued by a non-party trade association. 399 F.3d 391, 402 (1st Cir.2005) (citing, as also concerned with the interest of privacy in the context of discovery, Seattle Times Co. v. Rhinehart, 467 U.S. 20, 35 n. 21, 104 S.Ct. 2199, 81 L.Ed.2d 17 (1984), In re Sealed Case (Medical Records), 381 F.3d at 1215, and Ellison v. Am. Nat’l Red Cross, 151 F.R.D. 8, 11 (D.N.H.1993)).
The Government contends that there are no privacy issues raised by its request for the text of search queries because the mere text of the queries would not yield identifiable information. Although the Government has only requested the text strings entered (Subpoena at 4), basic identifiable information may be found in the text strings when users search for personal information such as their social security numbers or credit card numbers through Google in order to determine whether such information is available on the Internet. (Cutts Decl. UH 24-25.) The Court is also aware of so-called “vanity searches,” where a user queries his or her own name perhaps with other information. Google’s capacity to handle long complex search strings may prompt users to engage in such searches on Google. (Cutts Decl. 1125.) Thus, while a user’s search query reading “[user name] Stanford glee club” may not raise serious privacy concerns, a user’s search for “[user name] third trimester abortion san jóse,” may raise certain privacy issues as of yet unaddressed by the parties’ papers. This concern, combined with the prevalence of Internet searches for sexually explicit material (Supp. Stark Dec! 114) — generally not information that anyone wishes to reveal publicly — gives this Court pause as to whether the search queries themselves may constitute potentially sensitive information.
The Court also recognizes that there may a difference between a private litigant receiving potentially sensitive information and having this information be produced to the Government pursuant to civil subpoena. The interpretation of the Federal Rules in this Circuit requires that “when the government is named as a party to an action, it is placed in the same position as a private litigant, and the rules of discovery in the Federal Rules of Civil Procedure apply.” Exxon Shipping, 34 F.3d at 776 n. 4. However, in Exxon Shipping, the Ninth Circuit was faced with a situation where a litigant sought discovery from the Government; in this case, information is being produced to the Government. Even though counsel for the Government assured the Court that the information received will only be used for the present litigation, it is conceivable that the Government may have an obligation to pursue information received for unrelated litigation purposes under certain circumstances regardless of the restrictiveness of a protective order.
E. Electronic Communications Privacy Act
The Court also refrains from expressing an opinion on the applicability of the Electronic Communications Privacy Act, codified at 18 U.S.C. §§ 2510 to 2712. The ECPA was enacted in 1986 “to update and clarify federal privacy protections and standards in light of dramatic changes in new computer and telecommunication technologies.” Freedman v. America Online, Inc., 303 F.Supp.2d 121, 124 (D.Conn.2004) (quoting 132 CONG. REC. S. 14441 (1986)). See also Theofel v. FareyJones, 359 F.3d 1066, 1071 (9th Cir.2004). The Court only notes that the ECPA does not bar the Government’s request for sample of 50,000 URLs from Google’s index though civil subpoena.
V. CONCLUSION
As expressed in this Order, the Court’s concerns with certain aspects of the Government’s subpoena have been mitigated by the reduced scope the Government’s present requests. Nothing in this Order is intended to indicate how the Court would rule on the original broad subpoena or on any follow-up subpoena. The Court’s decision on this Motion to Compel reflects the limited use to which the Government intends to put the information produced in response to the subpoena. In particular, this Order does not address the Plaintiffs’ concern articulated at the hearing about the appropriateness of the Government’s use of the Court’s subpoena power to gather and collect information about what individuals search for over the Internet.
With these limitations, for the reasons stated in this Order, unless the parties agree otherwise on or before April 3, 2006, Google is ordered to confer with the Government to develop a protocol for the random selection and afterward immediate production of a listing of 50,000 URLs in Google’s database on the following conditions:
1. In the development or implementation of the protocol, Google shall not be required to disclose proprietary information with respect to its database;
2. The Government shall pay the reasonable cost incurred by Google in the formulation and implementation of the extraction protocol;
3. Any information disclosed in response to this Order shall be subject to the protective order in the underlying case;
To the extent the motion seeks an order compelling Google to disclose search queries of its users the motion is DENIED. The Court retains jurisdiction to enforce this Order.
. The Court continued the hearing date originally proposed by the parties in order to allow for amici to prepare and submit their briefs to the Court.
. Counsel for Plaintiffs also appeared at the Court’s hearing on the Government’s Motion to Compel.
. Whether adult material exists on the Internet could not seriously be contested by Plaintiffs with web content describing the slang terms "teabag-ging” and "pearl necklace” in graphic detail (FAC at 43), or websites which contain "numerous photographs of nude men and women in sexual poses with one another, and erotic stories that include graphic sexual scenes” (FAC at 34). Such a reading of the Complaint is also supported by the narrow question posed by the Supreme Court to be answered on remand for trial on the merits.
. The lack of disclosure on the part of the government is particularly striking when seen in the context of the time that the Government has had to prepare this issue. The Supreme Court’s directive to the Government to address the effectiveness of filtering software was issued in 2004. Additionally, this is not a case where the Govern
. To the extent that the Government is gathering this information for some other purpose than to run the sample of Google's search index through various filters to determine the efficacy of those filters, the Court would take a different view of the relevance of the information. For example, the Court would not find the information relevant if it is being sought just to characterize the nature of the URL’s in Google’s database.
. At the hearing, the Government argued that Google should not be concerned about loss of user trust because Google already discloses its users’ search queries on Google Zeitgeist. Had the Government truly believed that substantial amounts of search query information could be obtained from Google Zeitgeist, it is unlikely that the Government would require further search query information from Google. On the Court’s examination of Google Zeitgeist at http:llwww.google.com/press/zeitgeist.html, the website only provides the top ten search queries by country or the top fifteen gaining search queries in the United States. These queries for the Week of March 13, 2006, include "teri hatcher,” "world baseball classic,” and "sopranos.”
. “Says the DOJ's [spokesperson Charles] Miller, 'I’m assuming that if something raised alarms, we would hand it over to the proper [authorities].’ " (Decl. of Ashok Ramani, Ex. B. "Technology: Searching for Searches," Newsweek, Jan. 30, 2006.) (second alteration in original)