IN RE BLACKBAUD, INC., CUSTOMER DATA BREACH LITIGATION
Case No.: 3:20-mn-02972-JFA
MDL No. 2972
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF SOUTH CAROLINA COLUMBIA DIVISION
May 14, 2024
MEMORANDUM OPINION AND ORDER
This matter is currently before the Court on Plaintiffs’ Motion for Class Certification (ECF No. 292). The motion has been fully briefed and is ripe for review. Each party has also moved to exclude portions of the reports and testimony of the others’ experts under
I. FACTUAL AND PROCEDURAL HISTORY
This case arises out of a data breach of Defendant Blackbaud‘s systems which occurred between approximately February 7, 2020 and May 20, 2020. Defendant is a publicly traded Software-as-a-Service (“SaaS“) company incorporated in Delaware and headquartered in Charleston, South Carolina. (ECF No. 194, p. 86). The company provides data collection services to a wide variety of “social good entities” including arts and cultural organizations, faith communities, foundations, healthcare organizations, higher education institutions, individual change agents, K-12 schools, and nonprofit organizations. These entities make up Defendant‘s customers, and Defendant serves them by collecting and storing the Personally Identifiable Information (“PII“) and Protected Health Information (“PHI“) belonging to these customers’ donors, patients, students, and congregants, which this Court will refer to as Defendant‘s “constituents.” The constituents, rather than Defendant‘s customers, are the plaintiffs in this case. The parties estimate that as many as 1.5 billion constituents’ data was exposed during the breach. (ECF No. 317-2, p. 75).
Although not directly pertinent to this order, the details of the data breach are as follows: Between February 7, 2020 and May 20, 2020, individuals this Court will refer to as “threat actors” infiltrated some of Defendant‘s data centers that are located in Massachusetts. (ECF No. 265). The threat actors’ identity was and is unknown. The threat actors were able to access Defendant‘s remote desktop environment initially using a compromised customer account, and they were ultimately able to gain widespread access to Defendant‘s data centers. Plaintiffs allege that over
In total, approximately ninety thousand backup files belonging to thirteen thousand Blackbaud customers and containing data belonging to approximately 1.5 billion constituents were impacted by the breach.2 (ECF No. 329, p. 13). As shown in the chart below, Defendant provides—or at one point provided—those customers with varying combinations of eleven separate products. (ECF No. 342, p. 9).
Defendant‘s customers can customize these products once they purchase them, and its customers have ultimate control over the data that is stored using these products, how it is stored, whether encrypted fields are used as designed by Defendant, and whether a product is customized to suit a given customer‘s specific needs.3 (ECF No. 329, p. 13). As a result of the data breach, nearly 90,000 backup files containing data belonging to the 13,000 aforementioned customers were accessed. In other words, the threat actors accessed a slew of customer backup files during the breach, as opposed to the “live” databases that Defendant also maintains. (ECF No. 293, p. 28; ECF No. 329, p. 13).
In this action, Plaintiffs represent a putative class of individuals (or “constituents“) whose data was provided to Defendant‘s customers and was ultimately hosted by Defendant. They assert that their PII and PHI were compromised from February 7, 2020 to May 20, 2020, when threat
Plaintiffs’ Motion for Class Certification asks this Court to certify the following classes and sub-classes: “Nationwide negligence and gross negligence classes under Massachusetts common law” for “[a]ll natural persons residing in the United States whose unencrypted information was stored on the database of a customer identified in Exhibit A to Defendant‘s Revised Fact Sheet from February 7, 2020 to May 20, 2020“; a sub-class under the California Consumer Privacy Act (“CCPA“) consisting of “[a]ll natural persons residing in California whose unencrypted information (1) was stored on the database of a customer identified in Exhibit A to Defendant‘s Revised Fact Sheet from February 7, 2020 to May 20, 2020 and (2) contains the combination of data elements identified in Appendix 2 to this memorandum“; a sub-class under the California Confidentiality of Medical Information Act (“CMIA“) consisting of “[a]ll natural persons residing in California whose unencrypted information (1) was stored on the database of a customer identified in Exhibit A to Defendant‘s Revised Fact Sheet from February 7, 2020 to May
II. LEGAL STANDARD
A. Class Certification
1. Federal Rule of Civil Procedure 23
Even if all elements of Rule 23(a) are met, the proposed classes and sub-classes must satisfy one of the three additional requirements for certification found in
A party must produce enough evidence to demonstrate that class certification is in fact warranted. See Wal-Mart Stores, Inc. v. Dukes, 564 U.S. 338, 350 (2011). If one of the requirements necessary for class certification is not met, the effort to certify a class must fail. See Clark v. Experian Information Solutions, Inc., 2001 WL 1946329, at *4 (D.S.C. Mar. 19, 2001) (citing Harriston v. Chicago Tribune Co., 992 F.2d 697, 205 (7th Cir. 1993)). The court must go beyond the pleadings, take a “close look at relevant matters,” conduct “a rigorous analysis” of
2. Ascertainability
The ascertainability requirement is a judicially-imposed gloss on
Courts in this circuit have used differing approaches to determine whether a proposed method of ascertaining a class is “administratively feasible.” In re Marriott, 341 F.R.D. at 144.
B. Daubert and Rule 702
Importantly, “two approaches . . . have emerged in the case law” with respect to making Daubert decisions at the class certification stage of a class action lawsuit. 3 William B. Rubenstein, et al., Newberg on Class Actions § 7:24 (5th ed. 2021). Courts are split between a “limited, focused, and perhaps tentative” application of Daubert and engaging in “a full and conclusive Daubert analysis . . . and assessment of the expert‘s persuasiveness.” Id. The Fourth Circuit has yet to rule
[W]hen an expert‘s report or testimony is critical to class certification . . . a district court must conclusively rule on any challenge tо the expert‘s qualifications or submissions prior to ruling on a class certification motion. That is, the district court must perform a full Daubert analysis before certifying the class if the situation warrants. . . . [T]he court must also resolve any challenge to the reliability of information provided by an expert if that information is relevant to establishing any of the Rule 23 requirements for class certification.
Am. Honda Motor Co. v. Allen, 600 F.3d 813, 815-16 (7th Cir. 2010); see also 3 William B. Rubenstein et al., Newberg on Class Actions § 7:24 (5th ed. 2021).
A witness who is qualified as an expert by knowledge, skill, experience, training, or education may testify in the form of an opinion or otherwise if the proponent demonstrates to the court that it is more likely than not that:
(a) the expert‘s scientific, technical, or other specialized knowledge will help the trier of fact to understand the evidence or determine a fact in issue;
(b) the testimony is based on sufficient facts or data;
(c) the testimony is the product of reliable principles and methods; and
(d) the expert‘s opinion reflects a reliable application of the principles and methods to the facts of the case.
In addition to the factors listed in Daubert, courts have looked to additional factors to evaluate whether an expert‘s testimony may be considered by the trier of fact. These factors include: (1) whether an expert is “proposing to testify about matters growing naturally and directly out of research they have conducted independent of litigation, or whether they have developed their opinions expressly for the purposes of testifying,“; (2) whether the expert has unjustifiably extrapolated from an accepted premise to an unfounded conclusion; (3) whether the expert has considered alternative explanations for their conclusions; (4) whether the expert “is being as careful as he would be in his regular professional work outside his paid litigation consulting“; and (5) whether the expert‘s “discipline itself lacks reliability.” See Daubert v. Merrell Dow Pharmaceuticals, Inc., 43 F.3d 1311, 1317 (9th Cir. 1995); see also General Elec. Co. v. Joiner, 522 U.S. 136, 146 (1997) (noting that “[a] court may conclude that there is simply too great an analytical gap between the data and the opinion proffered“); Claar v. Burlington N.R. Co., 29 F.3d 499, 502-03 (9th Cir. 1994); Sheehan v. Daily Racing Form, Inc., 104 F.3d 940, 942 (7th Cir. 1997); Kumho Tire Co. v. Carmichael, 526 U.S. 137, 151 (1999); Daniel J. Capra, Stephen A. Saltzburg & Christine M. Arguello, Evidence: The Objection Method 532-33 (6th ed. 2021). These factors are useful tools in analyzing whether an expert‘s testimony is reliable, but courts also must not “overlook the evidentiary forest for the many scientific and technical trees.” In re Marriott Int‘l at 774. “There are four related and sometimes overlapping concepts that help guide a trial judge in deciding a Daubert challenge . . . [whether the evidence is] relevant . . . reliable . . . helpful . . .” and whether the evidence “fit[s] the facts and issues of the specific case.” Id. (citing Daubert, 509 U.S. at 591-93).
The Fourth Circuit has emphasized in recent years the importance of the gatekeeping role that trial judges are to play when undertaking a Daubert analysis. See Sardis v. Overhead Door Corp., 10 F.4th 268, 290 (4th Cir. 2021) (stating that “[t]he trial court‘s gatekeeping function requires more than simply taking the expert‘s word for it“); see also United States v. Fultz, 590 F. App‘x 226, 226 (4th Cir. 2015) (stating that a “careful analysis into reliability” is “crucial . . . [b]ecause ‘expert witnesses have the potential to be both powerful and quite misleading‘“). This Court takes its gatekeeping role seriously, and its analysis of the expert opinions submitted by both parties is undertaken with the Fourth Circuit‘s recent re-emphasis of that gatekeeping role in mind.
III. ANALYSIS
A. Plaintiffs’ Motion for Class Certification
Plaintiffs have moved this Court under
Plaintiffs further assert that they satisfy the requirements of
Defendant argues that Plaintiffs’ case must fail as a threshold matter because Plaintiffs are unable to ascertain the class of individuals whose data was stored in Defendant‘s backup files without extensive and individual fact-finding, nor have they shown that they can identify the affected data elements belonging to those individuals as required by their class and sub-class definitions. (ECF No. 329, pp. 15-17). Instead, Defendant argues that Matthew Curtin, Plaintiffs’ expert on ascertainability (“Curtin“) has presented an unreliable method for ascertaining putative plaintiffs and their data. Defendant asserts that Curtin‘s method would require a prohibitively large and exhaustive restoration, organization, and search of the 90,000 backup files for each putative plaintiff and their respective data elements, in addition to the development of “data cleansing and standardization” and “validаtion” processes. (ECF No. 329, p. 23). Individualized inquiries with respect to each putative plaintiff would be required to determine, at minimum, (1) whether a putative plaintiff was a constituent of a customer whose backup files were accessed during the breach at the time of the breach, (2) which pieces of their PII or PHI were exposed, if any. Defendant further asserts that the lack of administrative feasibility inherent in Curtin‘s proposed method of ascertaining a class is magnified when it is applied to the proposed sub-classes, each of which requires the Plaintiffs to prove state of residency and to identify specific types of data or lists of data elements per plaintiff under each state law in question. (ECF No. 329, pp. 24-27). Defendant also contends that Plaintiffs have failed to satisfy Rule 23‘s commonality,
1. The Ascertainability Requirement
Because the ascertainability requirement is a threshold requirement that Plaintiffs must satisfy, this Court will address it first, before turning to the other requirements found in
Plaintiffs make four arguments in support of their contention that the classes and sub-classes in this matter can be readily ascertained. They argue that each of the following demonstrates that a class is ascertainable: (1) Defendant‘s ability to give notice to its customers of the breach; (2) Defendant‘s ability to create its Defendant Fact Sheet which contained information about the named plaintiffs; (3) Defendant‘s use of a program called Wirewheel to respond to CCPA requests; and (4) the method proposed by Curtin of identifying putative plaintiffs and identifying which of their data elements were exposed in the breach. (ECF No. 293, pp. 27-30). The Court will address each of these arguments, beginning with Plaintiffs’ argument that Curtin‘s method is a reliable and helpful method of ascertaining a class. To evaluate Plaintiffs’ arguments with respect to Curtin‘s method, this Court will address Defendant‘s Motion to Exclude the Testimony and Report of C. Matthew Curtin as to Ascertainability (ECF No. 341) and Plaintiffs’ Motion to Exclude the Report and Testimony of Sonya Kwon (ECF No. 419).
Defendant has moved to exclude Curtin‘s report and testimony as to ascertainability, pursuant to
Defendant‘s Motion to Exclude Curtin‘s report and testimony on ascertainability is granted for a number of reasons. Those reasons include Curtin‘s inability to provide this Court with an error rate and a statement about its occurrence consistent with generally accepted statistical practices for the Court to evaluate, his failure to sufficiently test his method, the non-replicability of his method, and his failure to sufficiently document his method so that it could be tested by Defendant‘s rebuttal expert. See Daubert, 509 U.S. at 592-95. Thus, Curtin‘s method cannot serve as support for Plaintiffs’ contention that the proposed classes and sub-classes can be ascertained.
Plaintiffs, in their Responsе in Opposition to Defendant‘s motion to exclude Curtin‘s opinion and testimony (ECF No. 380), assert that Curtin‘s method “consists of four steps: (i) restoring customer database files (the “Queryable Databases“); (ii) generating a database called the ‘Referential Index’ to assist searching through the Queryable Databases; (iii) obtaining basic information from class members; and (iv) executing a search through the Queryable Databases for data elements relating to the class members.” (ECF No. 380, pp. 9-10). It is worth noting that this presentation of Curtin‘s method differs from Plaintiffs’ description of Curtin‘s method in their Motion to Certify a Class. (ECF No. 329). In Plaintiffs’ Motion to Certify, they state that Curtin can “identify class members by querying the email addresses present in the data set provided by Blackbaud to Plaintiffs’ counsel during discovery.”10 (ECF No. 293, p. 27). They also state that Curtin can “query the affected data elements for any class member, which will permit Plaintiffs to identify which Classes and Sub-classes a class member belongs to.” (ECF No. 293, p. 27).
Notably, Plaintiffs appear to abandon their initial argument that Curtin can identify potential class members using the email addresses present in the customer backup files, which underscores the moving-target nature of Plaintiffs’ arguments regarding Curtin‘s method. Accordingly, Plaintiffs have made determining what steps Curtin‘s method entails no easy feat. Plaintiffs’ description of Curtin‘s method has changed significantly from the time the Motion to
Importantly, Plaintiffs have stated both at an earlier Case Management Conference and at the Daubert and class certification hearings held in March of 2024 that the report and testimony prоvided by Curtin are unnecessary to this Court‘s determination of whether a class is ascertainable in this case. (ECF No. 432; ECF No. 496, p. 20 (stating that “Curtin‘s software code is icing on the cake” and is “ancillary” to Plaintiffs’ other proposed methods of ascertaining a class)). That being the case, this Court‘s ruling on Defendant‘s Motion to Exclude (ECF No. 380) should do
ii. Curtin‘s Proposed Method is Not Reliable
First and foremost, Curtin‘s method is unreliable and unhelpful to this Court in light of Curtin‘s failure to provide an error rate for this Court to evaluate. See Daubert, 509 U.S. at 594
. The unreliability of Curtin‘s method is further underscored by the fact that his method (specifically his Referential Index) cannot be replicated, several of the steps he has proposed have not been sufficiently tested, Curtin has failed to identify the “final product” of step two of his method, and Curtin has not demonstrated that his method can be scaled to operate accurately across classes and sub-classes consisting of as many as 1.5 billion putative plaintiffs. See Daubert, 509 U.S. at 593-95.(a) Curtin‘s Failure to Properly Test or Provide an Error Rate
Two of the Daubert factors are the “known or potential rate of error” and “whether a theory or technique . . . can be (and has been) tested.” Daubert, 509 U.S. at 593-94; see also Nease v. Ford Motor Company, 848 F.3d 219, 232 (4th Cir. 2017) (noting that an expert‘s opinion, although “plausible,” was rendered unreliable and “no more than a hypothesis” due to the expert‘s failure to “validate it with testing” and to thereby provide the court with a “potential error rate“). Courts may also “conclude that there is simply too great an analytical gap between the data and the opinion proffered.” Gen. Elec. Co., 522 U.S. at 146. Further, and particularly relevant here, “[n]othing in either Daubert or the
There are numerous other components of Curtin‘s method that he has not tested and for which he has not otherwise provided any indicator of accuracy that require this Court to conclude
Second, Curtin ran no tests, or at least provided no record of any testing, to demonstrate his ability to accurately identify the state of residency and the necessary categories of data belonging to putative plaintiffs in the proposed state law subclasses. He merely stated that he has identified individuals who reside in California, New York, and Florida but has not validated those findings. (ECF No. 329-3, p. 68-71; ECF No. 317-2 p. 74 (stating merely that Curtin can “confirm an individual‘s state of residence in the data if that information is provided“)).14 Importantly, Defendant has already demonstrated that two named plaintiffs’ addresses within the customer backup files do not match their address at the time of the breach. (ECF No. 329, p. 25 (noting that one named plaintiff lived in New York in 2020 but had a New Jersey address in the backup files and that another named plaintiff lived in Colorado in 2020 but had a Mississippi address in the backup files)). Residency is just one requirement of several that the four state laws in question impose for a plaintiff to state a claim. The
Third, Curtin says he can use “the information provided by [a] class member” to identify their affected data elements, but he only did so using first and last name and email addresses in his report. (ECF No. 317-2, p. 141). Curtin relied on information from the Plaintiff Fact Sheets to run his searches, which he will not necessarily have were he to apply his method on a larger scale. He has not demonstrated how his method would work using other data elements even once, let alone at a large scale. Further, even the elements he did search for often returned a large number of results that he has not demonstrated an ability to filter to eliminate incorrect or inaccurate information that is not actually related to a class member. (ECF No. 494, pp. 46-48 (explaining that Curtin‘s Referential Index returned 179 street addresses in response to a query for one email address, and that another query for an email address returned over 1600 unique street addresses in addition to multiple different names)). This Court has more fully addressed the problem of what Curtin will use to search for putative plaintiffs’ data below. See infra Section III.A.4. Regardless, the undeveloped nature of this step as set forth in Curtin‘s method is mere ipse dixit that this Court will not consider.
Fourth, Curtin has not inspected or tested how his queries would work across all or even a majority of Defendant‘s products, choosing to test it on just two. (ECF No. 342, pp. 29-30; ECF
Another illustrative example of the potential for variety in the data elements stored by one single customer using one product can be found in the fact that Trinity Health stored treating physician names and dates for one named plaintiff and stored insurer and donation history information for another.15 (ECF No. 324, pp. 33-34). This level of variation in method of data storage and types of data stored for just one individual or using just one product suggests that an even greater degree of variation exists across all products and all customer databases. Curtin admittedly does not know how varied customer‘s uses of Defendant‘s products are, nor how the customizations implemented by Defendant‘s customers will impact his ability to query the customer backup files, since he only restored the most recent backup file for the customers he dealt with. (ECF No. 494, pp. 90, 92). Given that customers can and have stored data differently within just one product or for just one person, the amount of variation that is possible across all 11 products and all 90,000 customer backup files is not insignificant. (ECF No. 329-3, pp. 56-57).
(b) Curtin‘s Method Cannot Be Replicated
The Fourth Circuit, along with many other circuits, has acknowledged that replicability is a strong indicator of reliability and that the inability to replicate an expert‘s methods may indicate that the expert‘s methods are not reliable. See, e.g., Ruffin v. Shaw Indus., Inc., 149 F.3d 294, 297-99 (4th Cir. 1998). Curtin‘s method of ascertaining class members relies heavily upon the use of a Referential Index, which is a database that Curtin built by restoring and compiling the sample of Blackbaud customers’ data Defendant provided to make that data easier to search for specific data elements. See (ECF No. 317-2, pp. 133-34). Plaintiffs state that Curtin‘s Referential Index works “by storing, for a given piece of data about a Class member in the Referential Index-for example an email address-the identity of which Queryable Databases that email address appears in, where in those [databases] additional data elements associated with the email address can be found . . . and the specific search queries that Curtin‘s software executed to locate those data elements.” (ECF No. 410, p. 10).
The construction of a Referential Index using the restored customer backup files is step two in Curtin‘s method. (ECF No. 380, pp. 10-11). Importantly, while developing his method and drafting his report, Curtin created three separate Referential Indexes. (ECF No. 329-3, pp. 41-42).
Further, Curtin failed to provide clear instructions to allow the Defendant‘s expert, Sonya Kwon (“Kwon“), to recreate his Referential Index for testing purposes. (ECF No. 329-3, pp. 39-40; ECF No. 342, pp. 24-25). Plaintiffs now attempt to restyle Curtin‘s Referential Indexes as merely an “intermediate component” of Curtin‘s method rather than the final product and insist that all Kwon needs to test Curtin‘s method is Curtin‘s scripts.17 (ECF No. 380, pp. 11-12). This will not do. Kwon should have been afforded the opportunity to inspect the “final product” of Curtin‘s scripts so that she could determine whether the scripts or underlying data inputs were edited in response to the final product and whether Curtin applied any interpretations or assumptions to the final product. Plaintiffs’ insistence that there is no real “final” Referential Index and that no final product aside from scripts is needed to assess this important part of Curtin‘s
Curtin‘s non-production of a final Referential Index prevented Kwon from identifying the exceptions or anomalies that potentially arose when Curtin was using the scripts that he wrote, seeing how Curtin resolved any such issues and altered his code to address them, or knowing the amount of manual work that Curtin and his team had to expend across the three named plaintiffs. Muddled documentation and code writing alone may not impact the accurаcy of Curtin‘s methodology, but his results cannot be fully tested and validated as a consequence of the confusion around the relevant “scripts” and the application of his methodology. Ultimately, these failures on
(c) Curtin Has Not Demonstrated That His Method Can Be Automated
The Fourth Circuit‘s ascertainability requirement, first recognized in Hammond v. Powell, 462 F.2d 1053, 1055 (4th Cir. 1972), provides that the members of a class must be “readily identifiable.” Id. Curtin suggests that his method can be effectively and correctly implemented for tens of millions of putative plaintiffs across thousands of disparately constructed customer databases while he has, again, only tested his method on three individuals and two products. (ECF No. 317-2, p. 141; ECF No. 494, pp. 92-93). This Court might be inclined to accept Curtin‘s representations regarding his method‘s automatability if he had provided it with an acceptable error rate to evaluate. However, the absence of any assurance that Curtin‘s methods are reasonably accurate renders this Court unable to find that Curtin‘s methods can work well at the large scale for which they would need to be deployed if the proposed classes and sub-classes were certified. This Court is not merely concerned with whether Curtin‘s scripts can be modified to operate at a larger scale; it is concerned with whether Curtin‘s scripts will operate at a large scale accurately and whether a high degree of manual intervention will be necessary to that end. In the absence of any testing or scientific error rate, this Court is unable to simply take Curtin‘s word for it that his method can work at the necessary scale.19 Accordingly, Curtin cannot demonstrate that his method is “administratively feasible” and that it can be effectuated without “extensive and individualized fact finding.” Spotswood, 2019 WL 498822, at *6.
(d) Curtin Has Not Explained How He Would Validate His Results
Implicit in the nature of Curtin‘s method and in the nature of this case is the need to determine whether the data profiles Curtin‘s method generates are an accurate compilation of a particular plaintiff‘s exposed data elements.20 Curtin tested his method on three named plaintiffs, but he did not indicate whether or how he verified the accuracy of the identified data elements in his test searches for those three individuals.21 Notably, Curtin had the benefit of Plaintiff Fact Sheets containing information provided by the named plaintiffs that allowed him to begin his searches using email addresses that he knew belonged to the individuals in question along with the kinds of specific data elements that they believed had been exposed, a tool he would not have if he wеre looking for data belonging to non-named plaintiffs.22 These fact sheets enabled him to be sure the email address he was using belonged to the correct individual, as opposed to an organization or another person altogether, which Curtin has acknowledged is a possible problem when using his method. (ECF No. 494, p. 98). The fact sheets also enabled Curtin to know what kinds of data to look for and gave him the ability to confirm that certain data elements were correct, since he had the named plaintiffs’ self-verified information to compare his method‘s results to. See, e.g., (ECF No. 387-15, pp. 4-8 (listing named plaintiffs’ email address, date of birth, street
Ultimately, Curtin has stated that validating the data profiles his method produced was beyond the scope of what he was asked to do. (ECF No. 342, p. 26). This leaves the Court with no way of knowing how Curtin would confirm that (1) a given set of data elements all belong to the person associated with the email address or other information that is used as the “key” or starting point in his searches; that (2) no data elements belonging to that person and exposed in the breach were left out if he were to run his searches on a larger scale; and more importantly that (3) no data elements belonging to someone else have been included in the set of data elements Curtin‘s method produces. Curtin himself acknowledges that conflation of data across putative plaintiffs is possible and states that he has no idea at what rate that might occur. (ECF No. 494, pp. 98-99). In other words, in the absence of confirming data that can be systematically used to ensure the accuracy of search results, Curtin‘s results may be subject to manual intervention to validate its output, which is not viable on a broad scale. As a result, when Curtin‘s method is applied more broadly, he might conflate data elements associated with multiple different people, improperly attribute data elements to a person, or leave out data elements that were exposed in the breach. Because Curtin has not otherwise attempted to provide this Court with an error rate to evaluate, this Court is unable to rely on Curtin‘s assumption that the results his method would produce would be accurate without a proposed method of validation when used at the scale that this case would require.23
(e) Curtin Was Not Limited by the 100 Customer Sample
Curtin and Plaintiffs have complained that Curtin was unable to effectively test his method because he was limited to a sample of 100 customers’ backup files. (ECF No. 400, p. 15). This Court‘s holding that Curtin‘s methods are unreliable is unrelated to the limited sample of customers that Curtin was using. Rather, as Defendant points out, the issue is that Curtin failed to properly test his method or provide an error rate with respect to the “backup files he did have.” (ECF No. 400, p. 25). Curtin could have conducted additional testing and statistical analysis of the data present in the 100-customer sample to thoroughly examine whether his proposed method is producing the kind of output that he says it will and to search for unknown risk of error. Curtin chose not to conduct any testing beyond running scripts for three named plaintiffs or to otherwise search for and mitigate risk of error, overinclusion, underinclusion, and conflation of individuals’ data. That decision has rendered his method unreliable regardless of the size of the sample he was using.
Thus, Defendant‘s Motion to Exclude the Report and Testimony of C. Matthew Curtin is granted because his proposed method of ascertaining a class is unreliable and unhelpful to this Court in light of his failure to satisfy numerous Daubert factors. Several aspects of Curtin‘s method were not properly tested, he failed to provide this Court with a “potential rate of error” to evaluate, he failed to consider alternative explanations for his conclusions, and he extrapolated from numerous accepted premises to unfounded conclusions. See Daubert, 509 U.S. at 593-94; see also Daubert, 43 F.3d 1311, 1317 (9th Cir. 1995). This Court does not take lightly its responsibility to serve as a gatekeeper and to decline to rely upon unreliable expert testimony or to allow such to be presented to a jury. Curtin‘s report falls short of the standards the Fourth Circuit and the Supreme Court have set for expert‘s reports and testimony, and it should be excluded. Defendant has separately sought to
3. Plaintiffs’ Motion to Exclude the Report and Testimony of Sonya Kwon
In ruling on Defendant‘s motion to exclude Curtin‘s report and testimony as to ascertainability (ECF No. 341), this Court must also rule on Plaintiffs’ Motion to Exclude the Report and Testimony of Sonya Kwon. (ECF No. 419). The motion has been fully briefed and is ripe for review. Further, this motion was argued on March 6, 2024 at the Daubert and class certification hearing held in Charleston. Sonya Kwon is Defendant‘s rebuttal expert who, in pertinent part, offers opinions seeking to counter Curtin‘s expert report and testimony on ascertainability. Plaintiffs do not seek to fully exclude Kwon‘s report and testimony. Instead, they specifically seek to exclude two sets of opinions that Kwon offers on (1) the replicability of Curtin‘s method and (2) the usefulness of William Wecker‘s sample in “extrapolat[ing] conclusions relating to the size or properties of the class and subclasses . . .“. (ECF No. 410, p. 8). This Court‘s ruling is limited to Plaintiffs’ motion to exclude Kwon‘s opinion that step two of Curtin‘s method, his creation of a Referential Index, is not replicable. Plaintiffs contend that this portion of Kwon‘s report and testimony is irrelevant and should be excluded because “[Kwon] compared Curtin‘s final implementation of his method to previous, prototypical versions” of his method, “which says nothing about whether his method is replicable.” (ECF No. 410, p. 8).
Plaintiffs argue that Kwon‘s opinion-that step two of Curtin‘s method, his creation of a Referential Index, is not replicable-is “fundamentally flawed and irrelevant” because it is premised on a misunderstanding of Curtin‘s method. (ECF No. 410, p. 14). Specifically, Plaintiffs say that Kwon is errantly comparing “legacy, prototype versions” of Curtin‘s Referential Index with the “results” of Curtin‘s method, when she should simply be “checking whether Curtin‘s method reliably generates the same results every time.” (ECF No. 410, p. 14). Defendant counters that Kwon‘s opinion “directly rebuts” Curtin‘s own words found in his report and is therefore highly relevant. (ECF No. 448, pp. 8-9). Defendant points out that Curtin‘s report clearly states that he created “an index of data,” which he refers to as ”the Referential Index.” (ECF No. 448, p. 9) (emphasis added). Curtin also states that he “is able to store the specific SQL queries used to build the Referential Index, which would allow for someone else to re-create the Referential Index using my same methodology.” (ECF No. 448, p. 9). Thus, Defendant argues that Kwon‘s rebuttal opinion that Curtin‘s Referential Index “cannot even be identified, much less replicated” is helpful and relevant to this Court‘s evaluation of Curtin‘s opinions and testimony. (ECF No. 448, p. 9).
Plaintiffs’ argument that Kwon‘s replicability opinion is based on a flawed premise and is therefore unhelpful to this Court under Daubert and
Despite Plaintiffs’ decision to abandon Curtin‘s opinion that his Referential Index enables him to identify members of the class using their email addresses, the functionality and replicability of the Referential Index are still important to this Court‘s assessment of Curtin‘s overall method, as his Referential Index remains a key component of that method. (ECF No. 410, pp. 9-10). Even under Plaintiffs’ revised description of Curtin‘s method, his Referential Index purportedly “gives [Curtin] information about what data elements are associated with the piece of data he queries, plus a ‘map’ for where to find additional data elements relating to the email address.” (ECF No.
This Court is perplexed by Plaintiffs’ assertion that draft versions of Curtin‘s Referential Index are present in the virtual environment that he used, but no final version of that Referential Index is present within the virtual environment, nor was one ever created at all. (ECF No. 410, p. 12; ECF No. 387-31, pp. 8-9 (confirming that a “referential index” is in both database Instance 1 and in database Instance 3)). Curtin initially anticipated that someone else would need to re-create his Referential Index, despite Plaintiffs’ contention that Kwon‘s attempts to do so were errant. (ECF No. 317-2, p. 136). However, Curtin appeared to equivocate at his deposition when asked how his Referential Index could be replicated. Defendant specifically asked Curtin at his deposition whether it was his testimony that none of the Referential Indexes present on either Instance 1 or Instance 3 could be used to replicate his results. (ECF No. 387-31, p. 8). In response, Curtin said: “You can certainly query database instance 1 and the referential index there,” while noting that certain databases may have “failed in the restoration process.” (ECF No. 387-31, pp.
Kwon‘s efforts to use the scripts provided by Curtin on the same data that he used to replicate a Referential Index that resembled one of the three that he had built in his virtual environment constitute proper rebuttal testimony. See United States v. Stitt, 250 F.3d 878, 897 (4th Cir. 2001) (stating that rebuttal evidence is “evidence given to explain, repel, counteract, or disprove facts given in evidence by the opposing party“) (cleaned up). Specifically, Kwon attempted to recreate Curtin‘s Referential Index аutomatically using a set of Python scripts designed for that task and manually by running the five SQL scripts that Curtin directed her to use to see if either would produce a Referential Index that corresponded with either of the Referential Indexes that Curtin built.24 (ECF No. 329-3, pp. 41-50). She observed that her attempted recreations contained significantly different numbers of rows and tables of data and different numbers of email addresses than either of Curtin‘s Referential Indexes. (ECF No. 329-3, pp. 47-50). In light of that discovery, she offered an opinion that Curtin‘s Referential Index is not replicable and that his method is ultimately unreliable. Plaintiffs cannot require Kwon to only test Curtin‘s method in the manner that they would prefer, by running his scripts with no frame of reference to compare the product of those scripts to. Kwon‘s analysis of Curtin‘s Referential Indexes and her opinion that his method is flawed partly because his scripts do not produce a
Lastly, the argument that Kwon‘s ability to “run[] Curtin‘s scripts . . . [on] the same set of customer databases . . . [and] produce the same Referential Index” suggests that Curtin‘s own method is replicable is without merit. (ECF No. 410, p. 16). It makes perfect sense that Kwon arrived at the same results when she and her team ran the same set of scripts on the same data set multiple times. Kwon‘s ability to replicate her own results when using Curtin‘s scripts in no way indicates that Curtin‘s Referential Index is similarly replicable, nor does this aid Plaintiffs in meeting their burden of proof regarding the reliability of their ascertainability expert‘s opinions. Defendant correctly notes that Daubert‘s testability factor primarily requires that “‘someone else using the same data and methods . . . be able to replicate the results.‘” See City of Pomona v. SQM N. Am. Corp., 750 F.3d 1036, 1047 (9th Cir. 2014) (quoting Zenith Elecs. Corp. v. WH-TV Broad. Corp., 395 F.3d 416, 419 (7th Cir. 2005)); see also Ruffin, 149 F.3d at 297-99. The backwards suggestion that a rebuttal expert‘s own internal consistency when attempting to re-create an opposing party‘s expert‘s results demonstrates replicability is untethered to the law and does nothing to advance Plaintiffs’ arguments in favor of their motion to exclude Kwon‘s replicability opinion. Kwon‘s ability to produce a Referential Index using scripts provided by Curtin does not tell her whether or why Curtin‘s own Referential Index was different from the one she produced in any material ways. Curtin‘s and Plaintiffs’ insistence that Kwon should simply run his scripts ignores the fact that doing so with no benchmark in the form of a contemporaneously prepared
Curtin‘s and Plaintiffs’ insistence that none of his Referential Indexes were final, and that all that Kwon needs to test his method are his scripts, are not sufficient reasons to exclude Kwon‘s opinion on replicability. Kwon did exactly what a rebuttal expert should do, which is to attempt to follow Curtin‘s instructions using his scripts and the same pool of data that he used to see if any of her results matched any of the versions of the Referential Index that Curtin created in his virtual environment. She did not misunderstand Curtin‘s report, and her opinions on replicability are highly relevant and useful to this Court. Thus, Plaintiffs’ motion to exclude Kwon‘s opinions on the replicability of Curtin‘s Referential Index is denied.
4. Defendant‘s Discovery Responses
Plaintiffs next assert that Defendant‘s ability to create the Defendant Fact Sheet proves that a class is ascertainable. (ECF No. 293, pp. 27-28 (stating that “Blackbaud was able to determine which information was impacted for each named Plaintiff by querying [its own] databases using only [named Plaintiffs‘] names and ‘basic information’ about them.“)).26 Defendant counters that
i. Defendant Had the Plaintiff Fact Sheets
First, Plaintiffs’ argument overlooks the significance of the fact that Defendant was only able to effectively query the restored customer backup files because it had information from the B to its Defendant‘s Revised Fact Sheet. (ECF No. 329, p. 34 (explaining that “Blackbaud‘s fact sheet . . . reflects the data stored for each Plaintiff by the customers Plaintiffs identified in their fact sheets“)).
At the March 6-8 hearings, Plaintiffs proposed for the first time the creation of a website similar to the one used in the “Equifax data breach settlement” that could gather data from class members for use in searching the customer backup files to ascertain class members.28 (ECF No. 496, pp. 29–30). This method has not been briefed or tested, and Plaintiffs are not permitted to make such an important and entirely new argument at oral argument. See N. Carolina All. For Transp. Reform, Inc. v. U.S. Dep‘t of Transp., 713 F.Supp. 2d 491, 510 (M.D.N.C. 2010) (“Raising . . . new arguments for the first time at oral argument undermines the purpose of orderly briefing
In any case, neither the Equifax-esque website proposal nor the self-certified affidavit proposal was made in a timely fashion, and this Court will not permit Plaintiffs to continually alter their ascertainability proposals in a manner that deprives Defendant of its ability to meaningfully defend itself. Further, even if Plaintiffs were to rely on such proposals, that would not eliminate
Plaintiffs argued numerous times throughout their briefs and at the March 6–8 hearings that Defendant improperly conflates ascertainability and notice. (ECF No. 380, p. 7; ECF No. 494, pp. 72–73). The Court disagrees that the concepts were conflated but acknowledges that they are interrelated. The reason that Defendant and this Court must address Plaintiffs’ ability to reach putative class members at this stage of the litigation is because Plaintiffs’ proposed methods of ascertaining a class require information to be obtained from those class members to satisfy their proposed class definitions. See (ECF No. 293, pp. 12, 29 (stating that the third step in Curtin‘s method is “to obtain information from putative Class and Subclass members” and noting that “basic information from claimants” will be needed to identify class members); ECF No. 496, p. 29 (stating that Plaintiffs would need to obtain “basic information” from class members in order to “tell them, you‘re in the class or you‘re not“)). This Court understands well the difference between ascertainability and notice, and this Court is not under the misimprеssion that Plaintiffs must “identify every class member at the time of certification.” Krakauer v. Dish Network, L.L.C., 925 F.3d 643, 658 (4th Cir. 2019). However, when Plaintiffs themselves claim that information from class members is needed to ascertain a class, they cannot then insist that the Court and the opposing party are wrong to address whether Plaintiffs have timely and thoroughly demonstrated how that information would be obtained and whether a class can be ascertained using Plaintiffs’ proposed methods. See EQT Prod. Co., 764 F.3d at 359 (noting that “[t]he fact that verifying ownership will
This leaves Plaintiffs with a glaring hole in all of their proposals when faced with the problem of how they would begin their process of searching for putative plaintiffs’ allegedly exposed data. They have no clear starting point now that they have abandoned their argument that Curtin can use the email addresses present in his Referential Index for this purpose. (ECF No. 380, pp. 7, 11). Defendant, on the other hand, had such a starting point—the Plaintiff Fact Sheets. This significant dissimilarity between Defendant‘s method of searching for named plaintiffs’ data and Plaintiffs’ proposed method of searching for putative plaintiffs’ data undermines Plaintiffs’ argument that Defendant‘s process demonstrates ascertainability. Defendant had information that Plaintiffs do not have as a starting point and that Plaintiffs have not demonstrated that they will have.
ii. Defendant‘s Process Was Not Designed to be Automated or Scaled
Second, Defendant notes that its process of using the Plaintiff Fact Sheets to create its Defendant Fact Sheet was a manual and time-consuming process that was never intended to be scaled for use across 90,000 backup files and tens of millions of putative plaintiffs. (ECF No. 329, p. 22; ECF No. 342, pp. 35–36). Defendant has explained that it “[ran] searches for the data that it [] received from the plaintiffs against those rehydrated data files” and “manually reviewed all of the results to . . . tailor the information . . . to the actual plaintiff that had been named in the case.” (ECF No. 496, p. 98). Defendant‘s process was also clearly imperfect in light of Curtin‘s discovery of information belonging to named plaintiff Philip Eisen in customer backup files that Mr. Eisen did not identify on his Plaintiff Fact Sheet, while Mr. Eisen‘s information could not be found in backup files belonging to customers he identified as having his data. (ECF No. 342, pp.
Thus, Defendant‘s ability to create the Defendant Fact Sheet does not demonstrate by a preponderance of the evidence that a class can be ascertained because (1) Defendant‘s process was substantially manual and not made to be scaled and (2) Defendant had the Plaintiff Fact Sheets to use as a starting point in its process. See E&G, Inc. v. Mount Vernon Mills, Inc., No. 6:17-CV-318-TMC, 2019 WL 4034951, at *3 (D.S.C. Aug. 22, 2019) (stating that a plaintiff must “show[] by a preponderance of the evidence that class certification is appropriate under Rule 23“) (citing Wal-Mart Stores, Inc. v. Dukes, 564 U.S. 338, 350–51 (2011)). Plaintiffs must undertake a broader and more complicated task, which would require them to present a viable method of obtaining data
5. Defendant‘s Notice Given to Customers
Thirdly, Plaintiffs contend that Defendant‘s ability to give notice to its customers of the fact of the breach and the possibility that certain kinds of constituent data were exposed indicates that a class can be ascertained in an administratively feasible manner. (ECF No. 293, pp. 28–29). Defendant counters that its efforts to notify customers of the breach never required it to identify individual constituents or actually view and validate their data. (ECF No. 329, p. 22). Curtin offered an opinion that “Blackbaud‘s own efforts to notify its customers demonstratе that it is feasible to identify class members using objective criteria” that Defendant has moved to exclude. (ECF No. 342, p. 37). Again, this Court will address Plaintiffs’ argument regarding Defendant giving notice to its customers on its merits. Both Curtin‘s opinion and Plaintiffs’ argument rest on testimony from Jennifer Willson and materials produced in discovery by Defendant showing its queries and their results that must be dealt with whether or not Curtin‘s opinion on this point is excluded. (ECF No. 317-2, pp. 67–71; ECF No. 293, pp. 28–29).
Plaintiffs’ and Curtin‘s suggestion that Defendant‘s ability to notify its customers of the breach demonstrates that a class can be ascertained using objective criteria and in an
In summary, Defendant searched its set of live databases, not the 90,000 affected customer backup files, and performed pattern-matching that it did not validate in order to inform customers that their constituents’ PII had potentially been impacted in the breach.33 Those customers wеre not always able to provide individual notice to constituents, resulting in notice being given en masse to constituents, regardless of whether their data was impacted by the breach. This process of giving notice does not demonstrate that an administratively feasible method exists for ascertaining a class, particularly since none of the identified data was ever validated, and neither Defendant nor its customers took steps to identify specific individuals whose PII or PHI was affected.34 Defendant‘s search of a different set of databases from the backup files Plaintiffs must use, its reliance on pattern-matching to show it possible PII that it did not need to validate, and its notice to customers without needing to identify affected individuals all differ materially from what Plaintiffs must do to demonstrate that the proposed classes and sub-classes are ascertainable. Plaintiffs must inspect the 90,000 customer backup files that were accessed during the breach, identify at least some data points for each individual and validate them, and they must identify individual class members, not merely customers, to satisfy their class definitions. The steps Defendant took to give notice to its customers are not comparable to the steps Plaintiffs would
6. Defendant‘s Use of Wirewheel
For the first time at the March 6–8 hearings, Plaintiffs turned to a singular paragraph in Curtin‘s 206-page report that had not been highlighted or addressed in any of Plaintiffs’ prior briefs in this matter to argue that this paragraph presents a fourth method by which a class can be ascertained.35 Although this Court is not required to consider this argument, since it was not raised in a motion or any other filings made by Plaintiffs, this Court will address it briefly. See Synovus Bank v. Stevens Law Firm, No. 4:19-CV-01411-SAL, 2020 WL 12788154, at *2 n.3 (D.S.C. Jul. 20, 2020) (declining to consider an unconscionability argument raised by a party because it was raised “for the first time at the hearing on the present motion“); see also N. Carolina All. For Transp. Reform, Inc., 713 F.Supp. 2d at 510 (“Raising . . . new arguments for the first time at oral argument undermines the purpose of orderly briefing and risks subjecting an opponent to an unfair disadvantage.“). From the brief statements made by Plaintiffs’ and Defendant‘s counsel at the class certification hearing, this Court is not persuaded by Plaintiffs’ argument. Defendant‘s ability to
7. Remaining Ascertainability Arguments
Having addressed Plaintiffs’ four proposed methods of ascertaining a class—Curtin‘s method presented in his report, Defendant‘s creation of its Defendant Fact Sheet, Defendant‘s notice given to its customers, and Defendant‘s use of Wirewheel to comply with the CCPA—the Court finds it necessary to address two ancillary arguments made by Plaintiffs. Additionally, the Court will briefly summarize its conclusions regarding why the proposed classes and sub-classes are not ascertainable in this case.
i. Use of Records Within a Defendant‘s Control to Ascertain a Class
Importantly, Plaintiffs have noted that “courts do not look favorably upon the argument that records a defendant treats as accurate for business purposes are not accurate enough to define a class.” Soutter v. Equifax Info. Servs., LLC, 307 F.R.D. 183, 197–98 (E.D. Va. 2015); see also In re Marriott, 345 F.R.D. at 144–45. The Sixth Circuit, for instance, has stated that “the need to manually review files is not dispositive. . . . It is often the case that class action litigation grows out of systemic failures of administration, policy application, or records management that result in small monetary losses to large numbers of people. To allow that same systemic failure to defeat class certification would undermine the very purpose of class action remedies.” Young v. Nationwide Mut. Ins. Co., 693 F.3d 532, 540 (6th Cir. 2012). Further, a district court in this circuit
This Court recognizes and agrees with the proposition that a defendant should not be able to hide behind problems of its own making with respect to records it maintains and controls. However, this case is markedly different from the cases Plaintiffs have highlighted on this point primarily because of the business-to-business relationship between Defendant and its customers and the fact that Defendant never used the data at issue in this case to provide notice directly to named plaintiffs.36 Defendant is a Software-as-a-Service company, which means that its customers “control what data is collected, how it is stored, and where it is stored.” (ECF No. 329, p. 13). Further, the data breach in this case was of Defendant‘s customer backup files, not a live environment. (ECF No. 329, p. 13). The 90,000 backup files that were accessed are not uniform as to any one customer or product because of the customers’ ability to customize the products they purchase.37 (ECF No. 329-3, pp. 56–57 (explaining that just among the products Curtin inspected, approximately 57% of those backup files had been customized)). Thus, the customer backup files at issue in this case are not merely data that Defendant has organized poorly and is now trying to argue cannot be used to ascertain a class. The data in question consists of customizable, varied
This case is therefore not comparable to In re Marriott, Soutter, or the numerous other cases Plaintiffs mentioned at oral argument. None of the cases addressed by Plaintiff, and certainly none that bind this Court, implicate the sort of three-party relationship between Defendant, its 13,000 customers, and their constituents that makes the proposed classes in this case so difficult to ascertain. Further, unlike in Marriott, Defendant never used its customer backup files to provide notice directly to class members, nor has it performed any other tasks using the data at issue (through its use of Wirewheel, its production of the Defendant Fact Sheet, or otherwise) that demonstrate that the proposed classes and sub-classes are ascertainable. As discussed above, Defendant notified its customers of the fact of the breach, and in some cases it used pattern-matching to notify customers that information that resembled social security numbers was present in the databases that were breached. However, Defendant never contacted any putative class members directly to provide them with notice, nor is there evidence that Defendant‘s customers did so. In numerous instances, Defendant‘s customers chose to provide notice to all constituents instead of attempting to identify which constituents’ data was specifically affected. Thus, Defendant‘s observation that the customer backup files are widely varied, customized, and that Plaintiffs have not presented an administratively feasible way to ascertain a class is not a disingenuous argument but rather a factually correct statement that is supported by the record in this case.
ii. Whether Manual Review Can Preclude Ascertainability
Plaintiffs have further argued that this Court should not decline to find that the proposed classes and sub-classes are ascertainable simply because a large amount of data would need to be reviewed to satisfy the proposed class and sub-class definitions. (ECF No. 293, pp. 29–31). However, implicit in the ascertainability requirement is the reality that, at somе point, the task of identifying class members can become too large and cumbersome for a court or a party to undertake. See, e.g. Spotswood v. Hertz Corp., No. CV RDB-16-1200, 2019 WL 498822, at *6-7 (D. Md. Feb. 7, 2019) (stating that a “[p]laintiff cannot require [a] [d]efendant to manually search thousands of records to locate the putative class members” and that “the administrative difficulties involved with locating class members [manually] were too onerous“). Various cases within this circuit have addressed the extent to which manual review can preclude ascertainability, and there is not clear consensus regarding the point at which the amount of manual review precludes ascertainability. For instance, the District of Maryland in Yates v. NewRez LLC noted that a plaintiff is not required to prove that a class “can be perfectly generated at the touch of a button” in order to demonstrate ascertainability.38 Yates v. NewRez LLC, No. CV TDC-21-3044, 2023 WL 5108803, at *5 (D. Md. Aug. 9, 2023). The Kelly v. RealPage court similarly observed that where plaintiffs have “identified the records they require, demonstrated they are in [the defendant‘s] possession, and explained how those records can be used to verify putative subclass members,” a class is ascertainable. Kelly v. RealPage Inc., 47 F.4th 202, 223–24 (3d Cir. 2022). Lastly, the
In this case, Plaintiffs have identified the records they require, and they have shown that they are in Defendant‘s possession, but as discussed above, they have not provided a timely raised, sufficiently tested, thoroughly briefed, and administratively feasible method of using those records to ascertain a class. Additionally, this Court has considered the Fourth Circuit‘s recent guidance in Career Counseling and determined that the Fourth Circuit is instructing this Court and others that a certain degree of manual review can preclude ascertainability. See Career Counseling, 91 F.4th 202, at 211–12 (affirming the district court‘s ruling that the need to make “an individualized inquiry as to whether each [fax] recipient was using a stand-alone fax machine at the relevant time” for “more than 20,000 recipients” precluded ascertainability). In this case, far more than 20,000 individual inquiries would need to be made to ascertain the proposed classes and sub-classes. For the same reasons that the district court in Career Counseling court held that 20,000 inquiries into whether putative plaintiffs had a certain kind of fax machine precluded ascertainability, this Court finds that the hundreds of millions of inquiries that would be required to determine whether a putative plaintiff‘s data is located in the 90,000 customer backup files at issue and to validate those data elements place this case far outside the bounds of the “administrative feasibility” requirement imposed by this circuit.
Plaintiffs have suggested, albeit without sufficient support, that methods exist whereby the customer backup files can be restored and queried in an automated manner. Their assertion has not been demonstrated by a preponderance of the evidence. Curtin did not test or otherwise demonstrate an ability to do so within an acceptable rate of error, Defendant has not done so on a scale that proves to this Court that it can be done in a feasible manner, and Plaintiffs have offered
Plaintiffs agree that they must identify (1) whether someone‘s unencrypted data was exposed in the breach and (2) what specific elements were exposed. (ECF No. 414, p. 7). Plaintiffs also acknowledge that putative plaintiffs’ states of residence must be determined, although they contend that doing so is a “claims administration” problem rather than an ascertainability problem. (ECF No. 414, pp. 11–12). All of that information is useless unless it is confirmed that the individual in question was in fact a constituent of a Blackbaud customer at the relevant time and that the data elements being attributed to them are correct and do in fact belong to them. Plaintiffs suggested at the March 6-8 hearings that all this Court needs to do is undertake a simple “data in, data out” inquiry. (ECF No. 494, p. 72). This Court does not agree. A profile of non-validated data elements does not tell this Court whether a person is, in fact, a member of the class, especially in light of the possibility of “mixing and matching” of data elements across individuals that Plaintiffs have acknowledged. (ECF No. 494, p. 98). More than a binary inquiry is required to determine whether a putative plaintiff has been correctly identified (whether that is done using an email address, driver‘s license number, or some other primary key) and whether any of the data elements attributed to them do, in fact, belong to them. Given the estimated size of the class and the breadth of the customer backup files and the loose files, even a limited amount of manual intervention under any of the methods Plaintiffs have proposed would quickly become “too onerous” for the Court and the parties to undertake. See Spotswood, 2019 WL 498822, at *6.
iii. Summary of Ascertainability Conclusions
In sum, “class certification is inappropriate when ‘clаss members are impossible to identify without extensive and individualized fact-finding.‘” Career Counseling, 2021 WL 3022677, at *12. As discussed above, each method of ascertaining a class that Plaintiffs have proposed is flawed. Each would also require this Court to engage in significant individualized fact-finding if implemented. The inquiries that must be undertaken to ascertain class members in this case go far beyond a simple determination of whether Plaintiffs can run searches that will return results. Millions of individualized inquiries would be required to determine, at minimum, (1) whether the putative plaintiffs are in fact members of the class, in light of the clear risk of misidentification or conflation of email addresses and other identifiers that Plaintiffs have acknowledged, (2) which unencrypted data elements belonging to each putative plaintiff were exposed, due to the need for validation of each putative plaintiffs’ data profile to ensure that the proposed class and sub-class definitions are met and that data is not being mis-attributed to the wrong individual, and (3) which state a putative sub-class member resided in at the time of the breach. Further, none of Plaintiffs’ proposed methods would relieve this Court of the burden of needing to verify the aforementioned information, as all proposed methods involve an uncertain risk of error, the unavoidable need for manual intervention and validation, and therefore an untenable degree of individualized inquiry for each putative plaintiff. With an estimated class size of up to 1.5 billion individuals, Plaintiffs’ proposed classes and sub-classes cannot be ascertained without significant individualized inquiry at a scale that is not administratively feasible for Plaintiffs, this Court, Defendant, or any individuals or entities acting at their direction to undertake. Therefore, Plaintiffs have not met their burden of demonstrating that class certification is appropriate in this case.
Further, the cases Plaintiffs primarily rely upon to argue that ascertainability should be found are either not controlling or are distinguishable. The Soutter case involved a class of approximately 1,000 people, with the court estimating that a few attorneys could review the necessary documents “in a matter of days.” Soutter, 307 F.R.D. at 197. The Kelly v. RealPage case from the Third Circuit involved a review of two databases controlled and organized by the defendant, without any third party customer‘s involvement. See Kelly, 47 F.4th at 202. Curtin, on the other hand, has acknowledged that any process of searching the 90,000 customer backup files and loose files that resembles the process he proposed would likely require thousands of hours of work to complete. (ECF No. 494, p. 100). Lastly, none of the cases Plaintiffs address required information to be gathered from putative plaintiffs at such a large scale for a class to be ascertained in the first place. This case presents a far more onerous degree of review, both in terms of the
In sum, none of the methods Plaintiffs have proposed for ascertaining a class are administratively feasible on their face. Further, none of Plaintiffs’ proposed methods have eliminated the need for this Court, Defendant, or some other party to make tens of millions of individualized inquiries in order to determine whether a given individual satisfies Plaintiffs’ proposed class and sub-class definitions.40 Very few courts in this country thus far have been willing to certify Rule 23(b)(3) classes “involving individual consumers complaining of a data breach.” In re Marriott, 341 F.R.D. at 172. Given Plaintiffs’ failure to provide this Court with an administratively feasible method of ascertaining class members, this Court declines to join the minority of courts that have certified a class in a consumer data breach case such as this.
8. Rule 23‘s Other Requirements
B. The Parties’ Other Pending Daubert Motions
Plaintiffs and Defendant have each moved to exclude all of the other party‘s Daubert experts on various grounds. These motions are denied as moot, in light of the Court‘s ruling that the proposed classes and sub-classes are not ascertainable.
C. The Effect of Declining to Certify a Class
This Court recognizes that “there remains the problem of how to deal with conduct that inflicts small amounts of damage on large numbers of people.” In re Asacol Antitrust Litig., 907 F.3d 42, 56 (1st Cir. 2018). The First Circuit has recently aptly expressed many sentiments that this Court shares regarding the purpose of class action litigation and the decision not to certify a class even in the face of allegations that, if proven, were surely harmful and avoidable. The First Circuit, in In re Asacol Antitrust Litig., noted that:
Rule 23 serves as an important tool to address many such situations. See Mace v. Van Ru Credit Corp., 109 F.3d 338, 344 (7th Cir. 1997) (“The policy at the very core of the class action mechanism is to overcome the problem that small recoveries do not provide the incentive for any individual to bring a solo action.“); Castano v. Am. Tobacco Co., 84 F.3d 734, 748 (5th Cir. 1996) (noting that “negative value” suits provide the “most compelling rationale for finding superiority in a class action“). But that fact grants us no license to create aRule 23(b)(3) class in every negative value case by either altering or reallocating substantive claims or departing from the rules of evidence. Moreover, there are other tools available to address the problem of low-value, high-volume claims that pose individual issues of causation. Regulators may sue, see, e.g., FTC v. Actavis, Inc., 570 U.S. 136, 141 (2013); governments may bring parens patriae claims, see, e.g., New Hampshire v. Purdue Pharma, No. 17-cv-427, 2018 WL 333824, at *1 (D.N.H. Jan. 9, 2018); substantive laws may provide presumptions available to all class members, see, e.g., Halliburton, 134 S.Ct. at 2411-12; and private lawyers may marshal the threats of res judicata and fee shifting to induce aggregate settlements when liability is clear.
In re Asacol Antitrust Litig., 907 F.3d 42, 56 (1st Cir. 2018).
In this case, several of these alternative safeguards have been implemented. Forty-nine of the fifty state attorneys general have entered into a significant settlement with Defendant as a result of this data breach. Those settlements include a requirement that Defendant improve its use of firewalls, intrusion detection, and dark web monitoring, in addition to improving its incident and breach response plans. (ECF No. 496, p. 71). The SEC has entered a Cease-and-Desist Order instructing Defendant to cease and desist from enumerated violations of the Securities Act and the Exchange Act and to pay a fine. (ECF No. 319-1). The FTC has issued a “Decision and Order” that enjoins Defendant from many of the data security practices that Plaintiffs allege caused and then misrepresented the nature of the data breach. (ECF No. 480-3). That Order specifically requires Defendant to adhere to specific data deletion and data detention procedures and to obtain information security assessments from a third party periodically for twenty years. Id.
Plaintiffs argue that declining to certify a class in this case signals that certain defendants cannot be held accountable if they are big enough and if they cause significant enough harm. This Court disagrees. Declining to certify the proposed classes and sub-classes in this case signals that
Finally, this Court‘s decision to decline to certify the proposed classes and sub-classes should not be taken as a stamp of approval of Defendant‘s data security practices and its response to the data breach. If Plaintiffs’ allegations are true, Defendant could have taken greater precautions to protect customers and their constituents and could have correctly represented the extent of the breach upon initially discovering that it had occurred. (ECF No. 496, pp. 4–12). Nevertheless, the appropriate mechanism in this case for pursuing Defendant civilly for any damages incurred because of the breаch and Defendant‘s response to it is not the class action Plaintiffs’ counsel has proposed.
IV. CONCLUSION
Plaintiffs’ Motion to Certify a Class (ECF No. 292) is denied because Plaintiffs have failed to demonstrate that the proposed classes and sub-classes are ascertainable. Plaintiffs’ Motion to Exclude the Report and Testimony of Sonya Kwon (ECF No. 419) is denied, Defendant‘s Motion
IT IS SO ORDERED.
May 14, 2024
Columbia, South Carolina
Joseph F. Anderson, Jr.
United States District Judge
Notes
(ECF No. 317-2, pp. 66–67). This paragraph was not addressed in Plaintiffs’ Motion for Class Certification, its Reply, or its Response in Opposition to Defendant‘s Motion to Exclude Curtin‘s report and testimony on ascertainability. (ECF Nos. 293, 414, 380).“Blackbaud engineers provide California consumers who submit a CCPA Access request with a list of all their data elements that Blackbaud has sold in the past twelve months. In order to provide this information, Blackbaud uses a company called Whirewheel. To use Whirewheel, a California resident uploads their driver‘s license to the Whirewheel website to verify their identity, at which point their information is put into the Blackbaud engineering queue. Blackbaud engineers then search their databases to identify the data Blackbaud has sold in the past twelve months pertinent to that consumer. While this exercise pertains to Blackbaud‘s cooperative database—the database Blackbaud uses to sell consumer data to third parties—it demonstrates the feasibility of identifying affected class members and the data elements affiliated with their personal information.”
