Feeds

SCO ordered to pay Novell $2.5m Unix royalties

Cheque, mate

Combat fraud and increase customer satisfaction

A US district court judge yesterday ordered SCO to pay Novell $2.5m for unjust enrichment, breach of fiduciary duty and conversion.

Judge Dale A Kimball’s ruling in the SCO vs Novell lawsuit came 10 weeks after a four-day trial to decide how much money SCO should cough up to Novell.

Groklaw, which has a copy of the ruling here (pdf), said: “So, SCO breached its fiduciary duty to Novell, converted funds, and so it has to pay. That is ironic, in that this case started with SCO accusing Novell of slander of title, and asking for millions in damages. Instead it has to *pay* Novell millions.”

SCO kicked off the legal spat in January 2004 by slapping a slander of title action lawsuit on Novell in which it alleged that the software company improperly claimed to own UNIX SVRX copyrights that rightfully belonged to SCO.

Kimball issued a decision on 10 August 2007 that spent 100 pages working its way through the various claims and counterclaims presented by SCO and Novell over the years, concerning Unix ownership rights.

Much of the controversy covered by Kimball stemmed from the vague language of a 1995 Asset Purchase Agreement between Novell and SCO. Subsequent discussions held between the two companies did little to clear up the confusion as to whether or not Novell shifted Unix copyrights to SCO during the technology swap.

Kimball effectively turned the lawsuit inside out by ruling that Novell still owned the Unix operating system copyrights.

Yesterday the judge ordered SCO to pay Novell $2,547,817 for agreeing to unilaterally amend Sun's SVRX licence. Novell had sought $20m at trial.

"The court concludes that SCO was entitled to enter into the 2003 Microsoft Agreement and the other SCO source Licenses, but was not authorized to enter into the 2003 Sun Agreement based on its amendment of the provisions concerning Sun’s SVRX confidentiality requirements under the 1994 Agreement," said Kimball. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
IRS boss on XP migration: 'Classic fix the airplane while you're flying it attempt'
Plus: Condoleezza Rice at Dropbox 'maybe she can find ... weapons of mass destruction'
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.