CIOs join fight to kill Ucita
John Rudin, CIO at Reynolds Metals Co. in Richmond, Va., is in the vanguard of a high-stakes political battle against a controversial law that's pitting users against software vendors, the Uniform Computer Information Transactions Act (UCITA).
And it's a fight that could have broad implications for user companies in every state -- especially if vendors rush to use Virginia law as a basis for software licenses.
Virginia's legislature is on the verge of sending UCITA to the governor for his expected signature. It may be the first state to adopt the measure as part of move to make the state attractive to high-tech businesses.
But Rudin helped organize many of Virginia's major employers into a lobbying counterattack, winning two important legislative concessions: Implementation of UCITA will be delayed until July 2001, after a study committee, made up in part of user companies and vendors, reviews the law.
Rudin said he believes UCITA gives vendors powerful leverage in contract negotiations. For instance, a "self-help" provision in UCITA would allow licensors to threaten disruption of a licensee's systems through automatic restraints such as a "time bomb" that could shut down a program, he said. A user company can go to court to seek an injunction, but the prospects of a costly legal fight may prompt a user to "succumb to the demands of the licensor. So there's a real power shift that occurs," he said.
Rudin likened it to being held hostage.
Rudin said he hopes Virginia's study committee will "make sure (UCITA) is a broad-based law that is fair to both parties" and bring a series of amendments to Virginia's legislature.
The National Conference of Commissions on Uniform State Laws adopted UCITA in July. The conference recommends commercial code law and sends it to the 50 states for their adoption. Only a handful of states have introduced the measure.
Large businesses, theoretically, should be able to negotiate contracts with vendors that protect and exclude provisions they don't want, say UCITA supporters. In these contracts, UCITA would only apply as a default rule in areas not covered by the contract.
"Parties in particular situations are always free to modify the contract," said Mark Uncapher, a vice president at the Information Technology Association of America. "This is just a fail-safe or fallback set of provisions."
But Randy Roth, director of corporate purchasing at Principal Financial Group in Des Moines, Iowa, said his ability to negotiate with large vendors is already limited.
"Microsoft basically owns our desktops. We have no clout with Microsoft," said Roth. With other vendors, once their software becomes part of a
- Who does NSS Labs "Recommend" for NGFW? In 2012, NSS Labs found that most available NGFW solutions "fell short in performance and security effectiveness." In 2013 NSS Labs noted "marked...
- What is this "File Sync" Thing and Why Should I Care About It? All of a sudden, getting a file from your work laptop to your iPad became as simple as clicking "Save." So it's no...
- The Keys to Securing Data in a Collaborative Workplace Losing data is costly. IT professionals have spent years learning how to protect their organizations from hackers, but how do you ward off...
- The Growing Demand for Rich Media This white paper discusses how IBM Customer Experience Suite Rich Media Edition can automate rich media workflows, from collaborating with creative agencies and...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer... All Management White Papers | Webcasts