Filed 8/23/18
                            CERTIFIED FOR PUBLICATION

                IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA

                              FIRST APPELLATE DISTRICT

                                        DIVISION THREE


 RICHARD SANDER et al.,
          Petitioners and Appellants,
                                                    A150061, A150625
 v.
 STATE BAR OF CALIFORNIA et al.,                    (City & County of San Francisco
                                                    Super. Ct. No. CPF08508880)
          Defendants and Respondents.

        Appellants and petitioners Richard Sander and the First Amendment Coalition
(Petitioners) challenge the trial court’s denial of their petition for writ of mandate seeking
to obtain information from the State Bar of California’s bar admissions database.
Specifically, Petitioners seek individually unidentifiable records for all applicants to the
California Bar Examination from 1972 to 2008 in the following categories: race or
ethnicity, law school, transfer status, year of law school graduation, law school and
undergraduate GPA, LSAT scores, and performance on the bar examination. Making
these records available to the public in a manner that protects the applicants’ privacy and
anonymity, they believe, will allow researchers to study the potential relationship
between preferential admissions programs in higher education and a gap in bar passage
rates between racial and ethnic groups.
        Following a bench trial, the superior court upheld the State Bar’s denial of
Petitioners’ request on five independent grounds. We need address only the first of them.
The court correctly found Petitioners’ request to be beyond the purview of the California




                                              1
Public Records Act (Gov. Code § 6250 et seq. (CPRA)) because it would compel the
State Bar to create new records.1 Accordingly, we affirm.
                                       BACKGROUND
                                       I. Phase I Litigation
        This case has taken a long and well-documented path between the trial court, this
court and the Supreme Court. Sander v. State Bar of California (2013) 58 Cal.4th 300,
307–309 (Sander) relates much of the relevant background (incorporated by reference
here) and provides the starting point for this appeal, the second in this court. (See Sander
v. State Bar of California (2011) 196 Cal.App.4th 614 [126 Cal.Rptr.3d 330], review
granted Aug. 25, 2011 and superseded by Sander)
        At issue in Sander was the trial court’s determination that the State Bar has no
common law or state Constitutional duty to disclose records in its admissions database.
The Supreme Court reversed and remanded. It explained: “The question presented is
whether any law requires disclosure of the State Bar’s admissions database on bar
applicants. We conclude that under the common law right of public access, there is
sufficient public interest in the information contained in the admissions database such
that the State Bar is required to provide access to it if the information can be provided in
a form that protects the privacy of applicants and if no countervailing interest outweighs
the public’s interest in disclosure. Because the trial court concluded that there was no
legal basis for requiring disclosure of the admissions database, the parties did not litigate,
and the trial court did not decide, whether and how the admissions database might be
redacted or otherwise modified to protect applicants’ privacy and whether any
countervailing interests weigh in favor of nondisclosure. Consequently, the Court of
appeal will be directed to remand the case to the trial court.” (Sander, supra, 58 Cal.4th
at p. 304; see p. 309 [“there is a public interest in access to the State Bar’s admissions
database that will require the State Bar to disclose the requested information if it can be



        1
            Unless otherwise indicated, further statutory citations are to the Government
Code.
                                                2
applied in a form that does not violate the privacy of applicants and if other
considerations do not warrant nondisclosure”]; see also Sander v. State Bar of California,
supra, 196 Cal.App.4th 614.)
       The Supreme Court in Sander expressly left open whether changes to the
admissions database necessary to protect applicants’ privacy would entail the creation of
new records, and thereby exceed the scope of disclosure required under public access
laws. (Sander, supra, 58 Cal.4th at p. 327.) It observed that “in the context of electronic
records, and in particular electronic databases, to resolve this issue would require
consideration of the complexity of the tasks required to produce the data in the form
requested; consequently, it would be premature for us to attempt to resolve this issue.”
(Ibid.) The case was remanded for the trial court to resolve (1) whether the requested
information can be provided in a form that protects the privacy of applicants; and (2)
whether countervailing interests outweigh the public’s interest in disclosure. (Ibid.)
       Following remand, more than a dozen individuals who had applied to take the
California Bar Exam since 1972 and two non-profit professional associations of African
American lawyers, the Black Women Lawyers Association of Los Angeles, Inc. and the
John M. Langston Bar Association of Los Angeles, intervened on the side of the State
Bar. They did so “to protect privacy and reputational interests that are at the heart of the
litigation between Petitioners and the State Bar” by preventing disclosure of “the
sensitive, private information of Individual Intervenors or the members of Organizational
Intervenors that stands to be exposed if the Petitioners prevail in this action.”
                               II. The Admissions Database
   Subject to a stringent stipulated protective order, the State Bar provided Petitioners’
experts with highly confidential data from its admissions databases to facilitate expert
analysis concerning the issues to be tried upon remand. The admissions databases consist
of five separate text files containing for each applicant who sat for the bar examination
between 1972 and 2008: (1) the number of times the applicant took the exam, and
whether he or she passed or failed; (2) law school graduation date and a code for any law


                                              3
school attended; (3) LSAT score and law school GPA; (4) race and ethnicity; (5) a file
linking the law school codes and law school names.
                               III. Post-Sander Legislation
   In 2015 the Legislature enacted Business and Professions Code section 6026.11,
which for the first time made records of the State Bar subject to production under the
CPRA. (Stats. 2015, ch. 537, § 6.) It also enacted a specific confidentiality statute
governing State Bar admission records. With exceptions not relevant here, section
6060.25 provides that “Notwithstanding any other law, any identifying information
submitted by an applicant to the State Bar for admission and a license to practice law and
all State Bar admission records, including, but not limited to, bar examination scores, law
school grade point average (GPA), undergraduate GPA, Law School Admission Test
scores, race or ethnicity, and any information contained within the State Bar Admissions
database or any file or other data created by the State Bar with information submitted by
the applicant that may identify an individual applicant . . . shall be confidential and shall
not be disclosed pursuant to any state law, including, but not limited to, the California
Public Records Act. . . .” (Bus. & Prof. Code, § 6060.25, subd. (a), added by Stats 2015,
ch. 537, § 8.)
                                   IV. The “Phase II” Trial
   The “Phase II” issues were tried to the court over five days. Much of the trial was
devoted to competing expert testimony about whether disclosure of the admission records
may reveal bar applicants’ private information or require the State Bar to create new
records not already in its possession.2 A primary issue was whether the four different
protocols proposed by Petitioners to de-identify or “anonymize” the data were sufficient




       2
         Four of the Intervenors testified to their concerns about the release of
information they provided to the State Bar with the understanding it would remain
confidential. State Bar admissions director Gayle Murphy testified, inter alia, about the
Bar’s collection and treatment of confidential information from applicants for admission
to the bar and the State Bar’s response to Petitioners’ requests.
                                              4
to prevent matching a record in the supposedly anonymous data to either an individual or
a small group of individuals.
                        A. Data Anonymization and Re-Identification
   Dr. Latanya Sweeney, a leading expert in data privacy and anonymization, provided a
67-page report and testified for the State Bar about the risks to bar candidates’ privacy in
releasing data in the manner proposed by Petitioners. Dr. Sweeney is a professor at
Harvard University, where she leads the Data Privacy Lab and teaches classes in data
privacy. She holds a Master’s Degree in computer science and electrical engineering and
a Ph.D. in computer science from M.I.T. Her work in the field of data privacy has been
cited in over 5,000 scientific publications.
   Dr. Sweeney testified that re-identification refers to whether someone can “use
reasonable effort to match the person’s identity to details in the released dataset sufficient
to know enough information about the person to identify him or her as a specific person.”
“We use the term ‘named person’ to refer to having sufficient information to individually
identify the person who is the subject of the data. Thus, if records in the DataSet can be
associated with named people, then the DataSet would be re-identified. Harm from a re-
identification can result if sensitive information contained in the data becomes known
about named persons. Although in most circumstances privacy concerns relate to
identification of an individual by strangers, in some cases, targeted identification of a
specific known person, and even self-identification, can be problematic where either the
data is not intended to be known to the person to whom it pertains or the facts that enable
self-identification can be compelled (such as by a prospective employer) even where they
are not generally known to the public. In each case the question is the same: can the
‘anonymous’ data be re-identified such that information is learned about specific
individuals?”
   Dr. Sweeney explained: “A unique re-identification occurs when a record in the data
matches to one person’s information uniquely. A ‘group re-identification’ occurs when a
few records in the dataset match to a small number of people. Both are examples of re-
identification that raise privacy concerns. For example, if a proposed data release does

                                               5
not include names or home addresses, but did include exact birthdates and specific
employers, it would be possible to use publicly-available websites and directories to
deduce the identity of many individuals in the database. A few-to-few match can be just
as damaging as a one-to-one match. For example, a release of medical records showing
that six of seven named individuals have a genetic disposition toward cancer would result
in a group re-identification of each individual as likely (6 in 7) to have that condition
even though it was not known which of the individuals was the one without the condition.
It is well recognized that this type of few-to-few identification poses privacy risks similar
to unique identification.” Data analytic companies that deal in data compilations and
derivations to link disparate datasets are also becoming increasingly able to re-identify
data historically regarded as anonymous.
                          B. Petitioners’ De-Identification Protocols
   Petitioners’ experts proposed four methods or “protocols” for rendering data
anonymous that they believed could protect privacy rights without unduly burdening the
State Bar. Under Protocol One, the State Bar would set up a physical “data enclave” to
house a version of the admissions database stripped of personal identifiers (name,
address, social security numbers and the like) and specified records (e.g., records of
students who attended unaccredited or correspondence schools or whose race is coded
American Indian, Alaska native, Filipino, Pacific Islander or from the Indian
subcontinent and for law schools that graduated fewer than 10 students who took the bar
exam in a given year). These processes would exclude approximately 30 percent of all
student records. The remaining data would be converted into a format compatible with a
statistical analysis software package and maintained in a “safe room” where members of
the public could conduct research under the supervision of an on-site operator. Anyone
seeking access to the data would have to explain their purpose for seeking the
information and sign an agreement not to re-identify individual applicants from the data.
Once granted access, users could use only electronic equipment and software provided
within the safe room and would be strictly limited as to hours of access and the kind of
information they could take away.

                                              6
       Under Protocols Two, Three and Four, petitioners proposed to apply various
techniques to the admissions database, such as data redaction, recoding and binning, that
would conceal applicant identities and prevent the risk of reidentification.3 Protocols 2
and 4 employ variations of a concept known as “k-anonymity,” a leading method of
anonymizing data invented by Dr. Sweeney. She explained, “The concept is simple. A
dataset is k-anonymous if for every record that appears in the data there are k
indistinguishable copies, where k is greater than or equal to 2. The scientific guarantee
flows directly from the definition. If a record contains information about a person, then
any record will map to at least k individuals; and conversely, if you know a person whose
information is in the data, then there will be at least k records that could belong to the
person. A k-anonymized dataset also maintains its privacy guarantee if the dataset is
linked to other data, because any attempt to link to a record in the data will do so
ambiguously to at least k records. Any re-identification attempt can never do better than
k equally likely matches. The proper size of k (i.e. how much anonymity to provide) is a
policy question depending on the sensitivity of the data and how ambiguous an
identification is considered permissible.” In other words, “K-anonymity, its privacy
guarantee is that for every record I see in the data, there are going to be at least k other –
there are going to be k copies of that record that are indistinguishable.”
    Applying k-anonymity to a dataset requires both choosing the size of k and the data
fields (e.g., bar passage, school, graduation year and race), also called variables or
attributes, to be anonymized.4 After direct identifiers such as names and social security
numbers are removed and the data is cleaned, various techniques can be used to
anonymize the remaining data. These include suppression (removing information from



       3
        Binning refers to the practice of grouping and segregating data of reasonably
equivalent values into a single group or set.
       4
        A particular instance of the variable is called a “value.” A row of data is an
“observation.” For any particular set of variables, a group of observations that share
the same value for those variables is a “cell.”
                                               7
data that might be identifying), adding “random noise,” scrambling data or generalizing
fields of information, or swapping values for generalized values.
    Under Protocols 2 and 4 Petitioners would apply a k of 11 to four different variables:
law school, graduation year, race, and whether the person ever passed the bar. 5 This
would be achieved by eliminating “substantial portions” of the admissions database,
reducing the eight ethnic categories in the data to four (white, black, Hispanic, and other);
collapsing graduation year data for law schools into three, six or nine-year “bands,”
depending on the average number of the school’s graduating class who took the bar, and
for the smallest schools conducting various data manipulations to mask information.6 If
those steps produced any groups (or k’s) of fewer than 11 identical records, the race
variables would be merged into aggregate categories for either “ ‘underrepresented
minority’ ” or “ ‘White and Other’ ” or, if either category still yielded groups with fewer
than 11 members, race would be redacted.
   Protocol 3 did not employ K-anonymity. Instead, it principally relied upon a
statistical analysis or, “more precisely, it describes intense computations of
mathematically determined standardizations of the data that report relative positions
within various distributions found in the data.” According to Dr. Sweeney, “it is clear
that this protocol requires a great deal of effort, even for me writing a Python [software]
program.” “The first step in Protocol 3 removes huge portions of the data. All data from
1982-1984, and 1999-2005 are removed. Records from 1985-1998 and 2006-2008
remain. The second step recodes race into the same four categories used in Protocol 2
and Protocol 4—namely, black, white, Hispanic and other. Then come the steps
involving statistical computations. The computations are done only on those records for


       5
        They would not k-anonymize LSAT or GPA scores or whether the applicant took
the bar more than once. Dr. Sweeney opined that these data fields are “potentially
knowable” by third parties and, if not anonymized, can be used to re-identify applicants
from the dataset using personally known or searchable public information.
       6
           Protocol 1 would also employ k-anonymity, but using a k of 5.

                                              8
law schools having 20 or more LSAT scores in a given year; all other records are
dropped. The computations themselves require computing different averages and
standard deviations and then recoding the data with new LSAT fields that contain the
relative position of the original LSAT score within the distributions computed.” The
next step in Protocol 3 manipulates the GPA field similarly, while the year of graduation
is replaced with a 4-year period and, finally, law school names are (with some
exceptions) replaced with “California” or “out of state.”     Petitioners’ experts describe
Protocol 3 as “a more radical approach to de-identifying the data” and conceded it was
“not a method we recommend, because of its impact upon data utility.”
   Protocol Four, as described by Petitioners’ experts, incorporated Protocol Two, and
(1) randomly redacted the applicant’s law school for 25% of the observations (see infra,
fn. 4); (2) rounded or suppressed law school GPA to no more than 2 digits; and (3)
redacted unique GPA values.
   Dr. Sweeney concluded that “[a]lthough the level of risk varies amongst the protocols,
each of Petitioners’ proposals for releasing the State Bar admissions data presents
cognizable risks that individuals may be specifically identified in the data, and thus their
bar scores, academic history, and other private information publicly revealed. Not only
may the information reveal specific individuals, as I have demonstrated it clearly does
reveal information on specific individuals. [¶] I am not opining that it is impossible to
anonymize the data, quite the contrary. However, the proper way to anonymize this kind
of sensitive data requires anonymization of all fields in the data . . . and to do so using
scientifically proven methods, not ad hoc binning, including replacing substantial
portions of the data with more generalized data or codes, and potentially adding
additional fictitious data. Petitioners’ protocols come nowhere close to meeting those
standards or otherwise assuring that none of the individuals in the DataSet can be
identified with reasonable certainty to their data, and further, some of the protocols have
a disproportionate adverse impact on underrepresented minorities.”




                                              9
   Admissions director Murphy testified that the State Bar does not maintain admissions
data in the clustered and banded formats Petitioners were requesting and that it would
have to create new documents to provide the requested records.
   Petitioners introduced an expert report that explained their protocols and disagreed
with Dr. Sweeney’s analysis. Their expert, Luk Arbuckle, testified about the efficacy of
the protocols to produce useful data while protecting the privacy of bar applicants.7 In
contrast to Dr. Sweeney’s view, Arbuckle opined that the proposed protocols adequately
mitigated the risk that individual applicants could be identified. “All of the Protocols we
have described take the most important privacy step: they all eliminate personal
information from the Admissions Database, including names, addresses, and Social
Security numbers. They then each take one or more supplemental steps to prevent any
data user from inferring individual identity by comparing information in the disclosed
data with outside information sources. In Protocol One, this is done by maintaining the
data in an Enclave, which prevents users from bringing in outside data and thus making
comparisons of ‘inside’ and ‘outside’ information. In Protocols Two and Four, the key
supplemental steps are to make sure that ‘cells’ – i.e., combinations of information about
bar applicants that can be generally uncovered from other public sources, with sufficient
research – contain no fewer than eleven observations. This makes it impossible to be
certain of any individual’s identity, using only the specified ‘publicly knowable’
variables. Protocol Four takes additional protective measures to guard against those rare
cases where a bar-taker[’s] Law School GPA might be known or inferred from public
sources” and “uses random censoring of a sample of law school identities. . . . In
Protocol Three, two supplemental procedures are used: recoding individual LSAT scores


       7
         Arbuckle holds Master of Science degrees in in Statistics and Mathematics. He
had five years’ experience in the field of data anonymization and re-identification risk at
the time of trial. In addition, labor economist Dr. Peter Arcidiacono testified for
Petitioners about the usefulness of the de-identified datasets under the different protocols
for economic and social research. Petitioners also presented deposition testimony from
Dr. Felicia LeClere, who developed and analyzed the protocols with Arbuckle, and social
science researcher Samuel Canas.
                                            10
and law school GPAs as standardized values, and then deleting law school identifiers
from the database.” Arbuckle disagreed with Sweeney’s opinion that the failure to K-
anonymize all data fields introduced an unacceptable risk of re-identification using
known or searchable information, principally because, in Petitioners’ view, such
information was not publicly available.
       The court denied the petition in a detailed 22-page order on five independent
grounds. “1. The disclosure of the requested records pursuant to any of Petitioners’
protocols requires the creation of a new record, and thus the State Bar is not required to
disclose the data; [¶] 2. The requested records are barred from disclosure pursuant to
Business and Professions Code section 6060.25; [¶] 3.The requested records are exempt
from disclosure pursuant to Government Code section 6254(k) in that disclosure is
prohibited by state law; [¶] 4. The requested records are exempt from disclosure pursuant
to Government Code section 6254(c) in that disclosure constitutes an unwarranted
invasion of privacy; and [¶] 5. The requested records are exempt from disclosure pursuant
to Government Code section 62255(a), the CPRA’s “catch-all” exemption.” Judgment
was entered for the State Bar and the intervenors and against Petitioners.
   Petitioners filed a timely appeal and petition for writ of mandate from the superior
court judgment. We consolidated the appeal and the writ petition and issued an order to
show cause why the petition should not be granted. We have also considered amicus
curiae briefs filed on Petitioners’ behalf by the Reporters Committee for Freedom of the
Press and 13 media organizations; the Pacific Legal Foundation; the National Association
of Scholars; Gail Heriot and Peter Kirsanow; and the Electronic Frontier Foundation.
                                      DISCUSSION
       The court’s initial ground for denying the petition is that disclosure of the bar
admissions data would require the Bar to create new records, a duty not imposed by
California’s access to public records laws. Petitioners contend this was erroneous as a
matter of law and that undisputed evidence shows the data manipulations required to
institute their proposed protocols are within the duties imposed by the CPRA. We
disagree.

                                             11
                                     I. Standard of Review
   We independently review the trial court’s interpretation of the CPRA and its
application to undisputed facts, but accept the court’s findings of historical fact if
supported by substantial evidence. (American Civil Liberties Union of Northern Cal. v.
Superior Court (2011) 202 Cal.App.4th 55, 66; BRV, Inc v. Superior Court (2006) 143
Cal.App.4th 742, 750; Fredericks v. Superior Court (2015) 233 Cal.App.4th 209, 223–
224 (Fredericks); Regents of University of California v. Superior Court (2013) 222
Cal.App.4th 383, 397 (Regents).)
     “ ‘ “A court’s overriding purpose in construing a statute is to ascertain legislative
intent. . . . [Citation.] In interpreting a statute to determine legislative intent, a court
looks first to the words of the statute and gives them their usual and ordinary meaning.
[Citation.] Statutes must be given a fair and reasonable interpretation, with due regard to
the language used and the purpose sought to be accomplished.” ’ ” (Fredericks, supra,
233 Cal.App.4th at p. 224.) Moreover, “[i]n CPRA cases, this standard approach to
statutory interpretation is augmented by a constitutional imperative. [Citation.]
Proposition 59 amended the Constitution to provide: ‘A statute, court rule, or other
authority, including those in effect on the effective date of this subdivision, shall be
broadly construed if it furthers the people’s right of access, and narrowly construed if it
limits the right of access.’ ” (City of San Jose v. Superior Court (2017) 2 Cal.5th 608,
617; Cal. Const., art I, § 3, subd. (b).)
                                            II. Analysis
       “The core purposes of the CPRA are to prevent secrecy in government and to
contribute significantly to the public understanding of government activities.”
(Fredericks, supra, 233 Cal.App.4th at p. 223.) To that end, the CPRA directs that
“[e]xcept with respect to public records exempt from disclosure by express provisions of
law, each state or local agency, upon a request for a copy of records that reasonably
describes an identifiable record or records, shall make the records promptly available to
any person upon payment of fees covering direct costs of duplication, or a statutory fee if
applicable. Upon request, an exact copy shall be provided unless impracticable to do so.”

                                               12
(§ 6253, subd. (b); see also § 6253.9, subd (a) [CPRA applies to records maintained in
electronic format].)
       As manifested by this case, an unavoidable tension exists between the CPRA’s
laudable purposes of transparency and disclosure and “ ‘the equally important public
interest in protecting citizens and public servants from unwarranted exposure of private
matters.’ ” (Fredericks, supra, 233 Cal.App.4th at p. 223.) To accommodate those
often-competing interests, “[t]he CPRA generally presumes that all documents
maintained by a public entity are subject to disclosure to any member of the public,
unless a statutory exemption applies or the catchall exemption, section 6255, is satisfied
(when public interest served by nondisclosure of records clearly outweighs the public
interest in disclosure).” (Ibid, italics added; see §§ 6254 et seq. [exemptions to
disclosure].)
       The threshold question in this case is not whether the information Petitioners seek
is subject to one of the CPRA’s statutory exemptions from disclosure. Nor is it whether,
as Petitioners would have it, the trial court improperly created a nonstatutory “new
exemption” for the records sought. The question, rather, is whether the information in
the form Petitioners ask the State Bar to release it is subject to the obligations imposed by
the CPRA in the first instance. The trial court correctly concluded that it is not.
       Petitioners’ threshold claim is that the trial court got the burden of proof backward
by implicitly “requiring them to prove that specific de-identification protocols would
prevent any individual from being re-identified and would prevent any group of
individuals [from] having any information revealed about it,” rather than requiring the
State Bar to prove the data could not be produced in a way that would adequately protect
bar applicants’ privacy. (See International Federation of Professional and Technical
Engineers, Local 21, AFL-CIO v. Superior Court (2007) 42 Cal.4th 319, 329 [“The party
seeking to withhold public records bears the burden of demonstrating that an exception
applies”].) We do not need to separately address this argument. The trial court’s finding
that the protocols require the creation of new records is independent of its conclusion on


                                             13
the possibility of re-identification. Petitioners’ argument has no bearing on our analysis
or holding on whether the protocols require creation of new records.
       In any event, the argument is not convincing. The trial court expressly stated that
“the State Bar has demonstrated that disclosure of the requested records is prohibited by
Business and Professions Code 6060.25 because individual applicants may be identified
from the data resulting from application of any of Petitioners’ protocols. Accordingly,
the Court finds that the State Bar has met its burden.”8 (Italics added.) The trial court
also expressly acknowledged the State Bar’s burden under section 6255, subdivision (a)
(the “catch-all” exemption) to show that the public interest served by nondisclosure
outweighed the public interest served by disclosure: “The CPRA provides that a public
agency is justified in withholding records if it demonstrates that ‘the public interest
served by not disclosing the record clearly outweighs the public interest served by
disclosure of the record.’ Gov’t Code § 6255(a).” (Italics added.) We will not infer error
where it is not shown on the record.
       But, as we have indicated, the trial court was correct for another, independent
reason. It is well established under California law and guiding federal precedent under
the Freedom of Information Act (FOIA) (see Regents, supra, 222 Cal.App.4th at p. 400)
that, while the CPRA requires public agencies to provide access to their existing records,
it does not require them to create new records to satisfy a request. (Fredericks, supra,
233 Cal.App.4th at p. 227]; Haynie v. Superior Court (2001) 26 Cal.4th 1061, 1073–1075
[agency not under duty to create a log of potentially responsive records].) “The basic rule


       8
          Business and Professions Code section 6060.25, subdivision (a) provides:
“Notwithstanding any other law, any identifying information submitted by an applicant to
the State Bar for admission and a license to practice law and all State Bar admission
records, including, but not limited to, bar examination scores, law school grade point
average (GPA), undergraduate GPA, Law School Admission Test scores, race or
ethnicity, and any information contained within the State Bar Admissions database or any
file or other data created by the State Bar with information submitted by the applicant
that may identify an individual applicant, other than information described in subdivision
(b), shall be confidential and shall not be disclosed pursuant to any state law, including,
but not limited to, the California Public Records Act.”
                                             14
is that an agency must comply with a request if responsive records can be located with
reasonable effort. [Citation.] If the agency would be required to create a new set of
public records in order to provide responses to a CPRA request, such agency action may
be found to exceed its statutory duties.” (Fredericks, supra, 233 Cal.App.4th at p. 227;
see Regents, supra, 222 Cal.App.4th at p. 400 [“Similarly to the FOIA, no language in
the CPRA creates an obligation to create or obtain a particular record when the document
is not prepared, owned, used or retained by the public agency”].)
       Federal law construing the FOIA is in accord. “The Act does not obligate
agencies to create or retain documents; it only obligates them to provide access to those
which it in fact has created and retained. . . . [O]nly the Federal Records Act, and not the
FOIA, requires an agency to actually create records, even though the agency’s failure to
do so deprives the public of information which might have otherwise been available to
it.” (Kissinger v. Reporters Committee for Freedom of the Press (1980) 445 U.S. 136,
152, citing NLRB v. Sears, Roebuck & Co. (1975) 421 U.S. 132, 161–162 [agency had no
duty to create material explaining information in disclosed records; FOIA “only requires
disclosure of certain documents which the law requires the agency to prepare or which
the agency has decided for its own reasons to create”]; Yeager v. Drug Enforcement
Administration (D.C. Cir. 1982) 678 F.2d 315, 321 (Yeager); Students against Genocide
v. Department of State (D.C. Cir. 2001) 257 F.3d 828, 837 [“although agencies are
required to provide ‘any reasonably segregable’ non-exempt portion of an existing
record, they are not required to create new documents”]; Center for Public Integrity v.
F.C.C. (2007) 505 F.Supp.2d 106, 114 (Center for Public Integrity).)
       We have found no cases addressing proposals for data manipulations as complex
as those proposed by Petitioners, but Center for Public Integrity, supra, 505 F.Supp.2d
106, is instructive. The plaintiff there initially requested records submitted by
telecommunications providers to the FCC but withdrew that request during litigation and
proposed instead that the FCC “replace filers’ numerical responses with either ranges . . .
or an indication of whether the deleted responses were ‘zero or greater than zero.’ ” (Id.
at p. 114.) The District Court for the District of Columbia ruled that requiring the FCC to

                                             15
produce data in either of those forms would require the creation of new records.
“[P]laintiff’s proposal would require the FCC to do more than simply redact portions of
the numbers . . . . The FCC would also have to replace the redacted numbers with new
numbers, which the FCC itself would have to select. Because agencies are not required
to create new records to satisfy FOIA requests, the Court is without authority to require
the FCC to adopt plaintiff’s proposal for the disclosure of modified data. . . .” (Ibid,
italics added, citing Students Against Genocide v. Department of State, supra, 257 F.3d
828 at p. 837 [agency could not be ordered to produce altered photographs at different
resolutions from the originals to mask the capabilities of the systems that took them]; see
American Civil Liberties Union v. Arizona Department of Child Safety (Ariz. App. 2016)
377 P.3d 339, 345–346 [construed consistently with FOIA, Arizona public records law
requires agency to search its electronic database to produce existing records but does not
require it “to create a new record that compiles analytical information about
information”].)
       Petitioners argue that much of this authority predates the emergence of electronic
databases as a commonplace repository of government information, and that more recent
cases require disclosure of electronically stored information “even if it requires extensive
compilation or extraction of data contained in electronic public records.” Their
argument is premised upon mischaracterizing the cited cases, which merely distinguish
between searching, extracting, compiling or redacting electronically stored data, which
our state and federal public access laws require, and creating new records, which they do
not. (See Schladetsch v. U.S. Dept. of H.U.D (D.D.C. 2000) 2000 WL 33372125
[programming necessary to perform computer search to extract and compile data did not
amount to creating a new record]; International Diatomite Producers Ass’n. v. U.S.
Social Security Admin. (N.D. Cal 1993) 1993 WL 137286 [redaction and segregation of
data is not equivalent to creating a new record]; Osborn v. Board of Regents of University
of Wisconsin System (Wis. 2002) 254 Wis. 2d 266, 299–302 [extraction and compilation
to segregate exempt from non-exempt data]; Bowie v. Evanston Community Consol.


                                             16
School Dist. No. (Ill. 1989) 128 Ill.2d 373, 376, 382 [holding that disclosing student test
scores in a “masked and scrambled format” did not create a new record].)
       Here, the trial court determined that each of Petitioners’ four proposed protocols
would require the creation of new records. “All of the protocols require the State Bar to
recode its original data into new values. . . . For example, the protocols group law
schools into three classes, designating a ‘school class’ code, which is not present in the
original Admissions Database. [Citations.] The protocols also involve recoding
race/ethnicity values to reflect four categories (Asian, Hispanic, Black, or White) instead
of the State Bar’s original eight race categories. Similar codes are created with respect to
year of graduation. [Citations.]
       “In addition, Protocol One would also require the State Bar to create a physical
data enclave which would provide restricted access to the State Bar’s Admissions
Database. Petitioners, however, failed to present any authority in support of their
position that the CPRA allows this Court to order the State Bar to create this type of data
enclave. The type of data enclave proposed under Protocol One is simply not a valid
remedy under the CPRA.
       “Protocols Two, Three, and Four require the creation of even more new data. For
example, Protocol Two involves replacing some applicants’ actual LSAT scores with a
calculated median, as well as possibly creating a new ‘underrepresented minority’ or
‘URM’ category that does not exist in the original Admissions Database. [Citation.]
Protocol Four involves rounding off actual law school GPAs to two significant digits.
[Citation.] Finally, Protocol Three, which both the State Bar’s and Petitioners’ experts
agree requires drastic changes to the State Bar’s original data, requires calculating new
values for GPAs and LSAT scores, as well as creating a variable indicating whether an
applicant’s law school is located in California or out-of-state. [Citations.]” The court
cited Dr. Sweeney’s testimony that none of the variables in Protocol Three exist in the
raw Bar data, and that every variable would have to be calculated or recoded or both, as
well as testimony from one of Petitioners’ experts that “ ‘[s]o much information has been


                                             17
changed or removed entirely from the data, law school name, the exact GPA, LSAT, all
the data cleaning steps, they do a lot to change the structure of the data.’ ”
       The court also rejected the Petitioners’ contention that their protocols merely
required the State Bar to redact or manipulate existing data and do some computer
programming. “It is clear that the various steps outlined do more than simply redact or
omit existing data. In order to achieve the ‘manipulated’ data contemplated under each
of the protocols, Petitioners had to produce a ‘Stata’ software that applied a code
specifically created to generate new data. [Citations.] Indeed, this case is vastly distinct
from the two Illinois district court cases cited by Petitioners, in which the public agencies
were ordered to produce a computer program that could delete certain information.”
Requiring the Bar to recode its existing data, the court concluded, would thus require it to
create new records. We agree.
       Petitioners argue that two provisions of the CPRA demonstrate that it in fact does
impose a duty on public agencies to create new records. Section 6253.9, subdivision (b)
authorizes an agency to charge a party requesting electronic records “the cost to construct
a record, and the cost of programming and computer services necessary to produce a
copy of the record” if the request “would require data compilation, extraction, or
programming to produce the record.” Section 6253, subdivision (c)(4) permits an agency
to delay its response to a request based on the time it takes to “compile data, to write
programming language or a computer program or to construct a computer report to
extract data.” Neither requires reprogramming computerized data to create new records.
No one disputes that public agencies can be required to gather and segregate disclosable
electronic data from nondisclosable exempt information, and to that end perform data
compilation, extraction or computer programming if “necessary to produce a copy of the
record.” (§ 6253.9, subd. (b).) But segregating and extracting data is a far cry from
requiring public agencies to undertake the extensive “manipulation or restructuring of the
substantive content of a record” (Yeager, supra, 678 F.2d at p. 323) such as Petitioners
propose here. Certainly, they have not identified any instances in which courts have
compelled a public agency to undertake programming that would assign new or different

                                              18
values to existing data, replace groups of data with median figures or variables, and
collapse and band data into newly defined categories.
       In short, the trial court got the law right. There is no doubt that a government
agency is required to produce non-exempt responsive computer records in the same
manner as paper records and can be required to compile, redact or omit information from
an electronic record. (See, e.g., §§ 6253.9, 6253 subd. (a)); Sierra Club v. Superior Court
(2013) 57 Cal.4th 157, 165; Yeager, supra, 678 F.2d at pp. 322-323.) But it cannot be
required to create a new record by changing the substantive content of an existing record
or replacing existing data with new data. The trial court’s application of this distinction
was entirely correct.9
       Petitioners also contend the trial court got it wrong on the facts. In their view,
notwithstanding Dr. Sweeney’s and Murphy’s testimony the evidence established that
disclosure pursuant to their protocols “would not create a new record, but would at most
require data extraction, compilation and programming.” But “[w]hen a trial court's
factual determination is attacked on the ground that there is no substantial evidence to
sustain it, the power of an appellate court begins and ends with the determination as to
whether, on the entire record, there is substantial evidence, contradicted
or uncontradicted, which will support the determination, and when two or more
inferences can reasonably be deduced from the facts, a reviewing court is without power
to substitute its deductions for those of the trial court. If such substantial evidence be
found, it is of no consequence that the trial court believing other evidence, or drawing
other reasonable inferences, might have reached a contrary conclusion.” (Bowers v.
Bernards (1984) 150 Cal.App.3d 870, 873–874, italics omitted.) The trial court here
considered extensive evidence, notably Dr. Sweeney’s report and expert testimony. On
that evidence, it determined that Petitioners’ requests required the creation of new


       9
         Our rejection of Petitioner’s claim that sections 6253.9 and 6253, subdivision
(c)(4) imply a break with settled law that public agencies are not required to create new
records also dispenses with Petitioners’ argument that federal cases interpreting FOIA on
this issue have no bearing on the CPRA because FOIA “has no equivalent provisions.”
                                              19
records, not simply data redaction, deletion or compilation. Because its finding is
supported by substantial evidence, we will not disturb it.
       Petitioners assert that, if nothing else, the court on its own initiative should have
concocted a plan for disclosing the bar application data “subject to a process that entails
only redaction of information, which would not require creating anything.” As we
understand it, they premise this suggestion on the requirement that it is the public
agency’s burden to prove a basis for nondisclosure of a public record. (See § 6255,
subd.(a) [agency must show withheld record is exempt from disclosure]; American Civil
Liberties Union of Northern Cal. v. Superior Court (2011) 202 Cal.App.4th 55, 67, 84–
85.) This, they seem to assert, means the trial court was obligated to independently
formulate a viable plan that would allow the State Bar to provide some, but not all, of the
requested fields of data, while protecting bar applicants’ privacy interests. It seems odd
for Petitioners to expect the trial court to succeed where their own experts in this highly
technical field did not. But no matter. Basic rules of appellate procedure prevent us
from addressing this claim on its merits. At no time in the trial court proceedings did
Petitioners suggest the State Bar was required to provide some, but not all, of the
requested fields of data. Nor, as far as we can tell, did they ask the trial court to order the
State Bar to do so, or present evidence on which fields could and should be released or
how any such release would not jeopardize Bar applicants’ privacy. “It is axiomatic that
arguments not raised in the trial court are forfeited on appeal.” (Kern County Dept. of
Child Support Services v. Camacho (2012) 209 Cal.App.4th 1028, 1038.)
       In summary, the trial court’s determination that Petitioners’ requests are beyond
the purview of the CPRA is legally correct and supported by the record. That finding is
an independently sufficient ground to deny the petition, so we need not address the trial
court’s four additional stated bases for its decision.




                                              20
                                      DISPOSITION
       The judgment is affirmed. The petition for writ of mandate is denied.10




       10
          We previously deferred ruling on Petitioners’ January 17, 2018 request for
judicial notice of a 2018 report by the State Bar of California to the Supreme Court titled
“Report to the Supreme Court of the State of California: Final Report on the 2017
California Bar Exam Standard Setting Study” and related correspondence. We now deny
the request because the documents to be judicially noticed have no bearing on our
analysis and disposition here. (Mangini v. R.J. Reynolds Tobacco Co. (1994) 7 Cal.4th
1057, 1063, overruled on another point in In re Tobacco Cases II (2007) 41 Cal.4th
1257.) “ ‘[J]udicial notice, since it is a substitute for proof [citation], is always confined
to those matters which are relevant to the issue at hand.’ ” (Ibid.)
                                              21
                                 _________________________
                                 Siggins, P.J.


We concur:


_________________________
Pollak, J.


_________________________
Jenkins, J.




                            22
Trial Court:                                    San Francisco City and County Superior
                                                Court



Trial Judge:                                    Honorable Mary E. Wiss

Counsel:

Jassy Vick Carolan, Jean-Paul Jassy, Kevin L. Vick, Duffy Carolan, for Petitioner and
Appellant, Richard Sander.

Sheppard, Mullin, Richter & Hampton, James M. Chadwick, Guylyn R. Cummins,
Andrea N. Feathers; First Amendment Coalition, David E. Snyder, for Petitioner and
Appellant, First Amendment Coalition.

Eugene Volokh, Richard J. Peltz-Steele, Robert E. Steinbuch, counsel for National
Association of Scholars, Amicus Curiae in support of Petitioners and Appellants.

Pacific Legal Foundation, Joshua P. Thompson, Timothy R. Snowball, counsel for
Pacific Legal Foundation, Amicus Curiae in support of Petitioners and Appellants.

Electronic Frontier Foundation, Jennifer Lynch, Aaron Mackey, Adam Schwartz, counsel
for Electronic Frontier Foundation, Amicus Curiae for Petitioners and Appellants.

Reporter’s Committee for Freedom of the Press, Katie Townsend, Bruce D. Brown,
Michael Shapiro, counsel for Reporter’s Committee for Freedom of the Press, American
Society of News Editors, Associated Press Media Editors, Association of Alternative
Newsmedia, Bay Area News Group, The California News Publishers Association,
Californians Aware, The Center for Investigative Reporting, Los Angeles
Times Communications LLC, The McClatchy Company, MPA – The
Association of Magazine Media, National Press Photographers Association,
Online News Association, and Society of Professional Journalists, Amici Curiae for
Petitioners and Appellants.

Center for Constitutional Jurisprudence, John C. Eastman, Anthony T. Caso; Gail Heriot,
counsel for Peter Kirsanow and Gail Heriot, Amici Curiae for Petitioners and Appellants.

Kerr & Wagstaffe, James M. Wagstaffe, Michael von Loewenfeldt, Melissa Perry; State
Bar of California Office of General Counsel, Vanessa Lynne Holton, Destie Lee
Overpeck, for Respondents.



                                           23
Steptoe & Johnson, William F. Abrams, Margaret Pirnie Kammerud, David H.
Kwasniewski, for Intervenors and Real Parties in Interest.




                                       24
