Feeds

EDS hits TfL with restraining order

Oyster row gets legal

Reducing security risks from open source software

EDS has filed a restraining order against Transport Trading Limited, a Transport for London subsidiary, to stop it handing the £100m-a-year Oyster contract to Cubic.

Cubic and EDS were majority partners in TranSys, which ran London's Oyster scheme. TfL, keen to get better value for money, was renegotiating the contract with both partners, but after failing to get better terms from EDS TfL decided to hand the whole project to Cubic.

The deal was meant to be signed at the same time as the termination of TfL's contract with TranSys was announced. But EDS filed a temporary restraining order stopping TfL from signing with Cubic.

This all emerged in a Securities and Exchange Commission filing from Cubic.

The filing said that two rounds of negotiations failed - one with TranSys and one with EDS and Cubic separately. After this TfL decided to give Cubic the whole contract for ticketing from 2010, when the deal with TranSys ends, to 2013.

A Transport for London spokesman said: "EDS, one of the partners of the TranSys consortium, has sought to challenge the procurement arrangements for the new contract. Transport for London are vigorously defending this challenge and have appealed against the interim court order. We remain committed to delivering better value for money and to ensuring a seamless transition to any new contract from 2010." European competition laws lay down strict rules for big public sector procurement projects - usually requiring an open tender process of some kind.

The filing warned that Cubic revenues might be hit in the short term by the restraining order but it expects it to be lifted by the end of the year and most of the cash to be restored.

In separate news TfL said it will seek £1m from the TranSys partnership for lost revenue caused by the two recent failures of the Oyster card system across London. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.