Oracle sues ex-partner CedarCrestone over software support
CedarCrestone has offered third-party support for Oracle software
IDG News Service - Oracle has sued former partner CedarCrestone on grounds it has been providing third-party support for Oracle's software in an illegal fashion, a move that echoes previous actions Oracle took against former SAP subsidiary TomorrowNow and Rimini Street.
"For roughly seven years, Oracle valued its relationship with CedarCrestone and attempted to work with CedarCrestone for the benefit of mutual customers," states the suit, which was filed last week in U.S. District Court for the Northern District of California.
But Oracle has now learned that all the while, the systems integrator was stealing Oracle's software and using its status as a partner to get customers, it adds.
In 2005, CedarCrestone first signed an Oracle PartnerNetwork agreement in 2005, and maintained it until Oracle terminated the contract of Sept. 4, according to the suit.
CedarCrestone, of Alpharetta, Ga., didn't immediately respond to a request for comment on Monday. The company hadn't responded to Oracle's allegations in court filings as of Monday.
CedarCrestone has performed implementation services for Oracle's E-Business Suite and PeopleSoft applications, as well as Oracle Fusion Middleware. It also provided customers with tax and regulatory updates for their Oracle software systems, according to the suit.
But the company made false claims to prospective customers, saying that it developed the updates independently, "without using Oracle's competing updates 'as a starting point,'" according to the suit.
For example, in an Aug. 19, 2011 letter to Oracle, the company admitted that it had "delivered Oracle tax updates 'obtained by CedarCrestone''" to a customer, George Weston Bakeries, between November 2008 and August 2011, a period during which the bakery "had no right to receive such updates," according to the suit.
"In other words, CedarCrestone did not develop updates for George Weston Bakeries 'independently,' but instead 'obtained' Oracle's competing updates and sold copies of them to this customer," the suit adds.
CedarCrestone hasn't explained how it got the "Oracle-authored updates," according to a footnote in the suit.
CedarCrestone has downloaded "vast quantities of Oracle support materials," including the tax and regulatory updates, from Oracle's site with its partner login credentials, according to the suit.
In addition, CedarCrestone "has used unauthorized copies of entire Oracle software applications," it adds.
CedarCrestone has told prospective clients that they will receive a fresh update "shortly after their database is ready," according to Oracle's suit. But CedarCrestone "creates these updates using some existing customer's licensed Oracle software, which CedarCrestone apparently has copied ... and sells that service as an incentive to sign up."
This gives CedarCrestone "the ability to promise prospects a quick -- though infringing -- first deliverable," the suit adds.
In addition, CedarCrestone intentionally misled customers about the nature of its relationship with Oracle, according to the suit. For example, company representatives told officials in Oklahoma City that CedarCrestone's services are done "in a manner that is free of intellectual property infringement," it states.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts