Feeds

Exec slaps HP with pretexting and Dell hunting charges

While his ex-wife discloses HP’s TV sham

Top 5 reasons to deploy VMware with Tegile

Analysis Sex, lies and flat panel TVs. Dear lord, what has become of HP?

In November of 2005, HP struck out at a group of former executives. It alleged in a lawsuit that the employees used HP's intellectual property, research and funds to create a flat panel TV start-up on the side. At the same time, the workers advanced HP's own flat panel TV business, although with less efficiency than their own endeavor, according to HP.

HP remained clueless about the whole affair until the "ring-leader's" wife served the company with a subpoena during her divorce proceedings. She wanted to know what HP knew about byd:sign Inc., and HP became very curious.

One fantastic lawsuit, however, deserves another. "Ring-leader" Karl Kamb returned fire last week with a lawsuit of his own. And what a lawsuit it is.

Kamb's complaint leads with the "I learned it by watching you" charge familiar (video) to anyone growing up in the US during the 1980s.

In its lawsuit, HP knocked Kamb, the former VP of business and development in Japan, for violating the company's code of conduct and various non-dislcosure understandings.

So what? - Kamb asks, having watched HP implode in the public over the past few months as a result of its reporter and executive spy scandal. "HP expects each of its employees to exhibit 'loyalty' and 'a personal commitment' to the company," his lawsuit states. "HP, however, does not adhere to its own rules.

"For the past several months, HP has been embroiled in a scandal concerning its own ethical misdeeds. Headlines across the country have reported that HP engaged in improper attempts to obtain the telephone records of its own board members, its own employees and members of the media."

And then you get the kicker.

"Karl Kamb is a victim of HP's use of pretexting."

Kamb's lawsuit claims that HP and its "co-conspirators" used information such as his social security number to weasel phone records out of T-Mobile and Sprint.

Even more titillating, the lawsuit portrays HP as instructing Kamb to pay for intelligence about Dell's entry into the printer market. Kamb contacted a Japanese consumer electronics whiz who obtained the desired dirt on Dell and then asked HP to channel its payments through a third party, the lawsuit alleges.

HP, which characterized Kamb's counterclaim as "wholly without merit," can blame itself for opening the gateway to such lawsuits. The company's self-inflicted spy wound makes the pretexting and lack of ethics charges appealing to any party battling HP in court.

"You want to mess with me? Fine, we'll just rehash your spy issues in the press for a few months."

That said, a lengthy confrontation between HP and Kamb appeared inevitable, spy scandal or not, if you read the two sides' complaints.

Beginner's guide to SSL certificates

Next page: The HP Way

More from The Register

next story
Ellison: Sparc M7 is Oracle's most important silicon EVER
'Acceleration engines' key to performance, security, Larry says
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Lenovo to finish $2.1bn IBM x86 server gobble in October
A lighter snack than expected – but what's a few $100m between friends, eh?
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Hey, what's a STORAGE company doing working on Internet-of-Cars?
Boo - it's not a terabyte car, it's just predictive maintenance and that
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.