Risk

8/20/2012
02:40 PM
50%
50%

Judge Denies $20 Million Facebook Sponsored Stories Settlement

Settlement judge voice "serious concerns" over the proposal to divide $20 million between attorneys and consumer rights groups.

In a surprise turn of events, a Facebook settlement worth $20 million is headed back to the negotiating table.

U.S. District Judge Richard Seeborg Friday denied the proposed settlement, which relates to a class action lawsuit filed last year first in U.S. District Court in California, which accused the social network of using Facebook users' images for advertising purposes--as part of its Sponsored Stories program--without compensating them, in violation of California law.

Facebook ultimately negotiated a proposed settlement that would pay $10 million to the lawyers who filed the class action lawsuit, plus up to $300,000 in costs, and agreed in advance to not contest any of that payout.

In addition, Facebook was set to award a $10 million "cy pres" payment, meaning that in lieu of being paid out directly to people affected, it's given to charities instead. Under the proposed settlement, the charity payouts would have gone to the Consumer Federation of America, Rose Foundation, Center for Democracy and Technology, Campaign for a Commercial-Free Childhood, Stanford Law School Center for Internet and Society, and the Electronic Frontier Foundation, reported Wired. But many privacy experts at organizations not included in the settlement dismissed the proposal, saying it did nothing to help the people who'd actually had their likenesses misused by Facebook. In addition, the settlement would only allow users to limit--but not opt out from--how Facebook employs their images as part of Sponsored Stories. Minors, however, could opt out.

[ Social media is big business. Learn Why McKinsey Values Social Economy At Up To $1.3 Trillion. ]

The judge presiding over the settlement, however, asked how all parties involved had arrived at the recommended sums. "There are serious concerns with the provision of the settlement agreement permitting plaintiffs to apply for up to $10 million in attorney fees without objection by Facebook," said Seeborg in his ruling. "The fact that the parties negotiated that 'clear sailing' provision separately from the cy pres payment does not wholly eliminate the concern that class counsel may 'have bargained away something of value to the class.'"

Facebook argued that providing direct compensation to affected users wasn't the best settlement course, since the per-user revenue that the social network derived from each person under Sponsored Stories was very little. But Seeborg noted that under the state's Unfair Competition Law, which prohibits businesses from profiting on people's likenesses without compensating them, the damages can be up to $750 per claim, irrespective of any advertising revenue Facebook may have earned. "There is no dispute here that it would be impractical to the point of meaninglessness to attempt to distribute the proposed $10 million in monetary relief among the members of a class that may include upwards of 70 million individuals," he said. "Even paying each class member the modest sum of $10 might require a settlement fund of $1 billion--assuming a class size of 100 million--apart from administration costs."

The judge said he wasn't recommending a $1 billion settlement--or, for that matter, any amount in particular. Instead, he called on the attorneys involved to provide better justification for why $10 million was an adequate cy pres award, demanded "concrete estimates of the likely class size," and told attorneys to tell him just how many affected people they could accommodate via a settlement fund. Finally, he noted that it was unusual for Facebook to have agreed to the attorneys' fees and cy pres award separately, as opposed to negotiating a lump sum, and said it suggested that the current cy pres award amount might be insufficient.

"Although it is not a precise science, plaintiffs must show that the cy pres payment represents a reasonable settlement of past damages claims, and that it was not merely plucked from thin air," he said.

Attend Online Marketing Summit 2012 and gather the insights and strategies you need to make the right online marketing choices to deliver the most value for your business. The summit--in Santa Clara, Calif., Oct 22-25--offers four days of inspiration, connections, and practical learning. Register for Online Marketing Summit using code QJBQSA01 and receive a 25% discount on conference passes or a Free Expo Pass.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Printers: The Weak Link in Enterprise Security
Kelly Sheridan, Associate Editor, Dark Reading,  10/16/2017
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLink,  10/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.