Risk
11/1/2010
10:24 AM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Google Sues U.S. Over Unfair Cloud Contract

The Department of the Interior's request for proposals to provide the agency with e-mail service is written to exclude Google, the company claims.

Google and one of its cloud service resellers, Onix Networks, filed a lawsuit on Friday against the U.S. government for contract requirements that make the companies unable to compete against Microsoft in a bid for government business.

The U.S. Department of the Interior (DOI) is seeking a hosted e-mail and collaboration solution to serve its 88,000 users. The contract is estimated to be worth $59 million over five years.

Google wants to compete for the government contract but the Request for Quotations (RFQ) "specified that only the Microsoft Business Productivity Online Suite-Federal (BPOS-Federal) could be proposed."

Google claims that a "Limited Source Justification" directive issued by the agency's director of the Office of Acquisition and Property Management on August 30, 2010, represents single-source procurement "that is arbitrary and capricious, an abuse of direction, and otherwise contrary to law."

This the second time in recent months that Google has allegedly run into this problem. The company made similar claims informally following the State of California's decision to award a hosted e-mail contract to Microsoft last month.

California officials denied Google's claims that the state's process was unfair.

Google's lawsuit against the federal government describes a courtship with DOI officials that began in June, 2009, during which, the company alleges, it received tips that Microsoft's success in the bidding process was pre-ordained.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6335
Published: 2014-08-26
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and ...

CVE-2014-0480
Published: 2014-08-26
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL ...

CVE-2014-0481
Published: 2014-08-26
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a d...

CVE-2014-0482
Published: 2014-08-26
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors relate...

CVE-2014-0483
Published: 2014-08-26
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.