TACTICAL LAW
  • Home
  • Professionals
    • Pamela K. Fulmer
    • Dee A. Ware
    • Julie Bishop
    • Affiliated Counsel
  • Practice
    • Software Audit Defense
    • Licensing & Contract Disputes
    • Litigation
    • ERP Licensing & Disputes >
      • Oracle/NetSuite Disputes >
        • River Supply v. Oracle/NetSuite
    • Advertising and Competition
    • Trade Secrets & Employee Mobility
    • Intellectual Property
    • Arts & Entertainment
    • Tech Transactions
    • Outside General Counsel Services
    • Privacy and Data Security
  • Industries
  • Resources
  • About us
  • Oracle Blog
  • Tactical Law Blog
  • Contact

Oracle Blog

Brown v. GlobalLogic and Oracle: Key Allegations, Oracle E‑Business Suite, and What It Means for Customers

11/13/2025

0 Comments

 
By Pam Fulmer

A new class action filed in the Western District of Texas alleges that GlobalLogic Inc. and Oracle Corporation failed to protect highly sensitive personal information associated with GlobalLogic’s workforce. The complaint, brought by a former GlobalLogic employee, ties the incident to a zero‑day vulnerability that affected Oracle E‑Business Suite (EBS), and it raises significant questions for organizations that run HR, payroll, and finance on Oracle’s flagship ERP platform. A "zero day" (also written as "0-day") refers to a previously unknown software vulnerability that is discovered and exploited by attackers before the software vendor becomes aware of it and has a chance to develop and release a fix or patch. The term "zero day" comes from the fact that the vendor has had zero days to address and remediate the vulnerability. Below is a concise overview of the allegations, the Oracle software at issue, the timeline, and potential implications for Oracle and its customers.

Who the parties are and where the case was filed
  • Plaintiff: Arianna M. Brown, a New York citizen and former GlobalLogic employee, sues on behalf of a proposed nationwide class of individuals whose PII was compromised. (p. 3)
  • Defendants: GlobalLogic Inc. (Delaware; principal place of business Santa Clara, CA) and Oracle Corporation (Delaware; principal place of business Austin, TX). (p. 3)
  • Jurisdiction/venue: CAFA jurisdiction is alleged; venue is the Austin Division of the Western District of Texas based on Oracle’s principal place of business. (p. 3)

What Oracle software is involved?

The complaint squarely focuses on Oracle E‑Business Suite. GlobalLogic allegedly “uses Oracle E-Business Suite, a collection of applications, to manage core business functions such as finance, HR, accounts payable and receivable.” (p. 2) The plaintiff alleges Oracle issued a security advisory on October 4, 2025 concerning a previously unknown zero‑day exploit, that GlobalLogic determined its Oracle instance was exploited, and that the exfiltrated data came from the Oracle platform hosting HR information. (p. 7)
Based on GlobalLogic’s description, the exposed HR data could include names, contact details, dates of birth, nationality and passport information, employee identifiers, SSNs or other national identifiers, salary data, and bank account and routing numbers. (p. 8) For EBS customers, this underscores the sensitivity of the data commonly centralized in HR/payroll modules.

The alleged timeline
  • Earliest threat actor activity: July 10, 2025. (p. 7)
  • Most recent activity: August 20, 2025. (p. 7)
  • Oracle advisory: October 4, 2025 (previously unknown zero‑day). (p. 7)
  • Exfiltration identified: October 9, 2025. (p. 7)
  • Notification: Began November 7, 2025; at least 10,471 individuals impacted according to a filing with the Maine Attorney General. (p. 8 , p. 8)
GlobalLogic states it activated incident response, engaged third‑party cybersecurity experts, notified law enforcement, and applied Oracle’s patches upon release. (p. 7) The plaintiff alleges that notification lagged roughly 120 days after initial malicious activity. (p. 8)

Alleged harms and risks

The plaintiff claims actual misuse (a ~$520 fraudulent debit card charge in or around September 2025), increased spam/scam outreach, and ongoing time and anxiety related to monitoring. (p. 11) The complaint emphasizes continuing risks of identity theft given the breadth of HR data allegedly accessed and notes that the breach notice advised vigilance, fraud alerts, and potential contact with the FTC and law enforcement. (p. 9)

Theories of liability

The complaint pleads six causes of action:
  • Negligence: Alleged failure to implement and maintain reasonable security, to detect unauthorized access, to timely notify, and to adhere to industry standards; foreseeability of harm from compromised PII. (p. 22)
  • Negligence per se: Alleged violations grounded in Section 5 of the FTC Act and related FTC guidance regarding reasonable data security. (p. 25)
  • Breach of Implied Contract: PII provided as a condition of employment, with implied promises (and policy representations) to safeguard and promptly notify; alleged material breach by failing to safeguard and to notify. (p. 27)
  • Invasion of Privacy: Highly offensive unauthorized acquisition and disclosure of highly sensitive PII; alleged knowing inadequacy of security and notification delays. (p. 30)
  • Unjust Enrichment (pled in the alternative): Defendants allegedly benefited from employees’ PII and saved costs by underinvesting in security, unjustly retaining the benefit. (p. 32)
  • Breach of Fiduciary Duty: Alleged fiduciary obligations to safeguard PII, timely notify, and maintain accurate records; alleged breach through insufficient protection and delay. (p. 33)

Requested relief includes class certification, damages (including punitive where available), restitution/disgorgement, injunctive and declaratory relief, fees, and interest. (p. 34)

What this could mean for Oracle
  • Litigation exposure alongside customers: By naming Oracle, the lawsuit highlights a trend where platform vendors may be sued together with customers when a vulnerability is implicated. The complaint asserts that many Oracle customers may have been impacted and that GlobalLogic’s Oracle instance was exploited. (p. 8)
  • Spotlight on secure development and advisories: Oracle’s advisory on October 4, 2025 regarding a previously unknown zero‑day will likely focus discovery on secure development lifecycle, vulnerability disclosure, and emergency patching cadence. (p. 7)
  • Shared responsibility debates: Expect arguments about the division of responsibilities between Oracle (code/vendor advisories and patches) and customers (configuration, identity and access management, monitoring, segmentation). The complaint advances broad duty allegations against both companies. (p. 20)
  • Contract and representations scrutiny: While the complaint quotes GlobalLogic’s privacy policy and recruitment notice to establish data protection representations, plaintiffs may also explore any Oracle contractual terms or security documentation for representations and reliance. (p. 6)

Implications and practical steps for Oracle EBS customers

Given the alleged vector and data at issue, organizations running EBS for HR and finance should consider the following steps:
  • Map and minimize HR data in EBS: Identify exactly which PII elements reside in EBS HR modules and assess encryption at rest/in transit, tokenization options (e.g., SSNs, bank details), data minimization, and retention. The complaint’s description of impacted fields illustrates the breadth of sensitive data often centralized in EBS. (p. 8)
  • Accelerate zero‑day response: Establish a rapid pipeline for processing Oracle critical advisories—triage, exploitability assessment, emergency change windows—and deploy compensating controls (WAF rules, segmentation) while patching. The timeline suggests adversary activity predating public advisories, reinforcing the need for layered defenses. (p. 7)
  • Monitor for exfiltration from EBS: Tune database activity monitoring, DLP, and egress controls to EBS data flows, with alerts for bulk exports or anomalous queries and sufficient logging for forensics. The complaint alleges exfiltration on a particular date, making rapid detection and containment crucial. (p. 7)
  • Rehearse breach notification workflows: Coordinate legal, HR, and IT to satisfy multi‑state notification requirements and avoid delays that can exacerbate harm and litigation risk. The complaint flags a roughly 120‑day gap before notices began. (p. 8)
  • Revisit vendor contracts and SLAs: Clarify roles and expectations for vulnerability disclosure, patch SLAs, hardening guidance, telemetry, and incident coordination among Oracle, managed service providers, and your team. (p. 7)

What to watch procedurally

Defendants will likely contest class certification and move to dismiss certain claims, particularly around the existence and scope of duties, causation, and damages, and whether Oracle, as a platform vendor, owed duties directly to GlobalLogic’s employees. Expect factual disputes over controls in place, detection/notification timelines, and the extent of any misuse. The court’s treatment of duty and causation in a shared‑responsibility context will be closely watched by Oracle customers and other ERP platform users.

Bottom line

Brown v. GlobalLogic and Oracle places Oracle E‑Business Suite at the center of a high‑stakes data breach class action and highlights the operational and legal risks when zero‑days intersect with platforms that centralize highly sensitive employee data. Regardless of outcome, the allegations provide a timely reminder to EBS customers to tighten zero‑day preparedness, harden identity and access, monitor for exfiltration, streamline notification workflows, and clarify vendor/customer responsibilities.

0 Comments

New Class Action Targets Adobe’s “Dark Pattern” Subscription Practices — A Call for Fairness and Full Disclosure

11/12/2025

0 Comments

 
By Pam Fulmer

​A new putative class action filed in the Northern District of California alleges that Adobe deceives consumers into year-long, automatically renewing “annual, billed monthly” plans, obscures material terms and early termination fees in fine print and hyperlinks, and makes cancellation unduly difficult. The complaint also challenges Adobe’s dispute-resolution scheme, alleging the company refuses to pay arbitration fees and then forces consumers into small-claims court, depriving them of meaningful remedies. The suit seeks damages, restitution, injunctive relief, and a declaration that Adobe’s small-claims provision is unenforceable. 

What the case is about
​
•    The core allegation: Adobe prominently advertises per month pricing but defaults consumers into “annual, billed monthly” (ABM) commitments, while failing to clearly disclose that the plan auto renews and carries a steep early termination fee equal to 50% of remaining monthly payments if canceled within the first year. The complaint says these key terms are relegated to fine print and a web of hyperlinks rather than clearly and conspicuously presented at checkout. 
•    Cancellation obstacles: Plaintiffs allege Adobe’s online cancellation flow requires navigating multiple screens, prompts, and sometimes live-agent interactions, with “offers” to deter cancellation; at times, online cancellation may be disabled, pushing consumers to other channels.
•    Dispute resolution concerns: According to the complaint, Adobe requires a pre arbitration “informal” process, designates JAMS arbitration, but then refuses to pay JAMS fees and invokes a “small claims election” to shut down arbitration—effectively routing consumers to small claims court where counsel, discovery, and appeal are limited or unavailable.

Why this matters: fairness and full disclosure

At bottom, the case is about transparency. Subscription sellers must clearly and conspicuously disclose auto renewal terms, obtain affirmative consent, and provide easy, immediate online cancellation. Consumers should not be surprised by hidden minimum commitments, opaque renewal mechanics, or penalty fees buried in small type or behind hyperlinks. While Adobe is the defendant here, the industry at large should take note—companies like Oracle have also been criticized by customers and commentators for burying impactful terms behind inconspicuous hyperlinks. Clear, front and center disclosures and frictionless cancellation build trust, reduce disputes, and align with modern statutory requirements and regulator expectations.
Summary of the claims pled

The complaint asserts California consumer protection causes of action and seeks declaratory relief:

•    Declaratory judgment: A declaration that Adobe’s “small claims” provision is unconscionable and unenforceable; that Adobe has breached or waived any agreement to arbitrate by refusing to pay required arbitration fees; and that its terms do not constitute a valid FAA arbitration agreement as used.
•    California Consumer Legal Remedies Act (CLRA): For alleged misrepresentations and omissions regarding subscription characteristics and cancellation terms; advertising without intent to sell as advertised; representing rights/obligations that differ from reality; and inserting unconscionable terms.
•    False Advertising Law (FAL): For allegedly untrue or misleading statements by commission and omission regarding pricing, plan nature (monthly vs. annual commitment), renewal, and cancellation penalties.
•    Unfair Competition Law (UCL): “Unlawful,” “unfair,” and “fraudulent” prongs based on the same conduct, including alleged violations of the ARL, CLRA, and FAL; seeks restitution, disgorgement, and injunctive relief to stop deceptive designs and mandate clear disclosures.
•    Automatic Renewal Law (ARL) violations as the predicate: Plaintiffs allege Adobe failed to present auto renewal terms “clearly and conspicuously,” failed to obtain affirmative consent, failed to provide a retention capable acknowledgment with cancellation methods, misrepresented material facts, and failed to allow “online, at will” termination via a prominent link or immediate termination email—all resulting in unlawful charges and remedies including restitution. 

Alleged practices highlighted in the complaint

•    “Annual, billed monthly” default and fee disclosure: The ABM plan’s monthly price is emphasized visually; the annual commitment and 50% early termination fee are not clearly called out in proximity to consent, according to plaintiffs. The complaint details screens where fine print is minimized or pushed below the fold, and where the “Terms of Use” and “Subscription and Cancellation Terms” hyperlinks appear only at the final payment stage after personal and billing information is entered.
•    Early termination fee: For ABM plans, canceling in the first year triggers a fee equal to 50% of remaining monthly payments—allegedly a material term not disclosed clearly and conspicuously during enrollment.
•    “Cancel anytime” ambiguity: Plaintiffs say “cancel anytime” messaging conflicts with fee deadlines and limited refund windows, confusing consumers about real cancellation rights. 
•    Obstacles to cancellation: Multi page flows, prompts, and occasional forced customer support interactions; sometimes online cancellation is unavailable (e.g., during payment processing issues), contrary to ARL’s “online, at will” mandate, plaintiffs allege. 
•    Arbitration/Small claims pivot: The complaint asserts Adobe refused to pay JAMS’ fees after demands were filed and invoked a small claims election to administratively close arbitrations—then argued consumers must proceed in small claims court, which cannot award the injunctive relief sought under the UCL, FAL, and CLRA. 
Relief sought

Plaintiffs seek class certification; damages; restitution and disgorgement; declaratory relief regarding the dispute-resolution terms; civil penalties; injunctive orders to cure disclosures and cancellation flows; and fees and costs. 
Nature of the class action proceeding

The complaint seeks certification of a nationwide class of all natural persons in the United States who paid for Adobe subscriptions during the applicable limitations period. Plaintiffs allege common questions predominate—such as whether Adobe’s presentation of auto renewal terms was clear and conspicuous, whether affirmative consent was obtained, whether disclosures and cancellation methods satisfied the ARL, and whether marketing and UX choices were misleading or unfair. They contend a class action is the superior method to resolve uniform design and disclosure practices, given relatively modest per consumer losses and the burdens of individual litigation.

Takeaways for businesses and consumers

•    Put critical terms up front: If a plan is annual with monthly billing, say so conspicuously at every relevant step, alongside any early termination fee and renewal mechanics.
•    Obtain clear consent: Secure express, unambiguous assent to auto renewal terms; don’t bury consent in small print or optional hyperlinks late in checkout.
•    Make cancellation immediate and online: Provide a prominent “Cancel” link or button and allow immediate termination without friction or delays, consistent with modern statutory standards.
•    Design for trust: Hidden hyperlinks, fine print traps, or obstructive flows draw litigation and regulatory scrutiny. Companies across the software and cloud ecosystem—including those, like Oracle, that have faced criticism for concealing impactful terms in nested links—should embrace transparent, consumer centric UX and disclosures.
​
Conclusion

The Foret v. Adobe class action illustrates how the modern contract of adhesion has evolved from fine print to fine links. As digital interfaces become the new vehicles for assent, courts and regulators are signaling that hidden hyperlinks and misleading design choices will not withstand scrutiny.
Software and cloud vendors that rely on automatic renewals or tiered billing should review their contracting processes now—before deceptive hyperlink practices become the next wave of consumer litigation.
 
About Tactical Law Group LLP

Tactical Law Group LLP is a boutique law firm focused on technology contracts, software licensing disputes, and failed ERP and cloud implementations. Our attorneys monitor emerging litigation trends affecting SaaS providers, resellers, and customers across the United States.

For further insights into deceptive subscription practices and hidden online agreements, visit tacticallawgroup.com
0 Comments

Lessons from ERP Lawsuits: Key Contract Provisions and Litigation Themes

11/10/2025

0 Comments

 
By Pam Fulmer

​Enterprise Resource Planning (ERP) software is meant to unify a company’s core functions — finance, inventory, HR, sales, and operations — into one seamless system. But when implementations go wrong, they go spectacularlywrong. Multi-million-dollar projects can collapse under the weight of poor planning, hidden contract risks, and unrealistic promises.

Over the last several years, ERP lawsuits have surged as businesses confront failed go-lives, blown budgets, and software that simply doesn’t work as promised. These cases reveal recurring contractual pitfalls and litigation themes that every company should understand before signing — or litigating — an ERP deal.

1. The “One-Sided” Contract Problem

ERP contracts are almost always vendor-drafted, and rarely negotiated deeply enough. These agreements typically limit termination to “material breach,” restrict remedies to “re-performance,” disclaim reliance on pre-contract statements, and cap damages at the fees paid. In other words, the playing field is tilted in favor of vendors such as Oracle and SAP.
In practice, that means the customer is paying for the privilege of having no meaningful remedy when the project fails.

Courts scrutinizing ERP disputes have found that contractual asymmetry—where one side controls performance and the other bears the risk—can support claims of unconscionability, misrepresentation, or even fraud in the inducement. Companies entering new ERP engagements should focus on balancing rights and obligations: termination for cause, realistic service-level commitments, and clear consequences for missed milestones.

2. Misrepresentation and “Sales Cycle Fraud”
​

A consistent litigation theme in ERP cases involves misrepresentations during the sales cycle. Vendors often tout “industry-specific solutions,” “pre-configured accelerators,” or “SuiteSuccess”-type templates that supposedly guarantee rapid implementation. Sales teams are often comprised of individuals who have no real understanding of the technology they are promoting but they are excellent communicators and adept at instilling trust in the unsuspecting customer.  Do not fall for the sweet talking sales person trap.

In many lawsuits, discovery reveals that these representations were marketing talking points, not deliverables. When the customer later discovers that the promised functionality or timeline was unattainable, the question becomes whether those statements were mere “puffery” or actionable misrepresentations. Also, many of the initial scoping meetings are held online via Zoom or Teams.  Vendors avoid putting anything in writing, but are willing to make all kinds of promises orally in the meetings.  Ask vendors for permission to record the meetings.  If they balk, then be ready to take excellent notes and follow-up the meetings afterwards with emails to the vendor confirming what was discussed.  ERP customers need to create their own paper trail to best protect themselves.

Recent decisions suggest that where a vendor’s sales claims are specific (e.g., “this system will meet your regulatory requirements on Day One”), and the customer reasonably relied on them, courts are increasingly willing to let fraud claims proceed alongside breach of contract claims. And under California law, fraud in the inducement will cause any economic loss defense to fail if properly pled at the pleading stage.

3. The “Scope Creep” and Change Order Trap

Another major litigation driver is scope management. ERP projects evolve — modules are added, integrations multiply, and “configuration” quietly turns into “customization.”
If the contract lacks clear change management procedures, vendors often exploit ambiguity to demand additional fees, delay timelines, or avoid accountability. Conversely, if the client pushes changes informally, the vendor may later claim those requests voided the original timeline or deliverables.

Successful ERP contracts establish formal change control processes: written approval, pricing mechanisms, and impact analysis for each modification. In litigation, these documents often become the paper trail proving which party expanded or derailed the project scope.

4. Data Migration and Integration Failures

Data migration is the unsung villain of ERP disasters. Vendors frequently understate the effort required to cleanse, map, and migrate legacy data — leading to failed go-lives and business disruption.  Customers usually have no real understanding of the hours of commitment and hard work that this aspect of the implementation will require.

When litigation follows, discovery often shows that the vendor never performed adequate data assessment or testing. The resulting claims focus on negligent implementation, breach of professional standards, or failure to deliver a system fit for purpose.
Contractually, data migration and integration should be treated as core deliverables, not optional services. Define ownership, responsibilities, and testing protocols in the statement of work — not in vague “collaborative” language.

5. The “Go-Live” Decision and Post-Implementation Failures

A common flashpoint in ERP lawsuits is the go-live date. Vendors push for early go-live declarations to trigger milestone payments or project “completion.” Customers, meanwhile, may be pressured to sign off despite known defects.  Customers should resist such efforts and only sign off when the system is truly ready.  Otherwise, customers are in for a world of hurt.

Once the system goes live, vendors often argue that subsequent problems are support issues, not implementation failures — insulating them from liability under “acceptance” provisions.

Litigation frequently turns on whether the system was ever truly “accepted,” whether acceptance testing was manipulated, and whether the vendor concealed known deficiencies. Clear acceptance criteria and documented testing results can make or break a case.

6. Limitation of Liability and Damages Cap Clauses

Nearly every ERP contract includes a limitation of liability provision capping damages at fees paid — even if the project destroyed millions in business value. Courts generally enforce such caps unless there’s evidence of intentional misconduct, gross negligence, or fraud.

That’s why allegations of fraud in the inducement or willful misrepresentation are common in ERP litigation: they can open the door to consequential damages or rescission despite contractual caps. And as discussed above, many case fact patterns show slick sales teams overselling capabilities and inducing potential customers into expensive cloud software agreements that never really work.

From a drafting standpoint, customers should negotiate carve-outs for fraud, gross negligence, and data loss, and vendors should ensure those carve-outs are narrowly drawn to maintain predictability. If a vendor will not make changes to these provisions, you may want to find another vendor who will.

7. Arbitration vs. Litigation: Procedural Posture Matters

Many ERP contracts require arbitration — often in vendor-friendly venues. Yet post-termination and other disputes can raise intellectual property and data ownership issues that fall outside arbitration clauses.

Recent cases have tested whether unauthorized post-termination use or data withholding constitutes a “contractual” dispute or a statutory or property rights claim, potentially allowing litigation in court despite an arbitration clause.

Counsel should carefully analyze whether an arbitration clause actually governs all disputes, particularly where IP rights or fraud claims are at issue.

Vendors like arbitration clauses because they can cloak their failures in secrecy in confidential arbitration proceedings rather than in a public court of law.  Instead, of agreeing to arbitration, consider deleting such clauses and adopt language that allows parties to seek relief in federal or state court.  The threat of a public lawsuit filing will often cause ERP vendors to be more willing to look for common ground in an attempt to avoid a messy public lawsuit.

8. Lessons for Future Contracts — and Litigation Strategy

The pattern across ERP lawsuits is strikingly consistent:
  • Over-promised and under-delivered software
  • Vague or one-sided contracts
  • Poor project governance
  • Misrepresented implementation readiness
  • Unclear acceptance and change control mechanisms
For companies entering new ERP projects, contract prevention is the best litigation defense. For those already in dispute, success often depends on proving vendor misrepresentation, demonstrating non-performance against contractual standards, and preserving evidence from project documentation and communications.

Final Thoughts

ERP implementations are complex, high-stakes undertakings — but the legal issues that arise from them are surprisingly predictable. Whether advising on contract formation or litigating post-go-live failures, understanding the recurring themes in ERP lawsuits helps clients protect their investments and recover losses when vendors fall short.

At Tactical Law Group, we have seen these disputes play out across multiple platforms. Each case reinforces the same message: technology may change, but contract fundamentals do not.
 

0 Comments

Hidden Traps in Oracle’s Cloud Agreements: What ERP Customers Must Know (and Do) Before They Click “Accept”

11/9/2025

1 Comment

 
If you’re implementing an ERP system, you’re already juggling risk: budget overrun, schedule slippage, change management, data migration, and integration complexity. The last thing you need is a vendor contract that shifts even more risk onto your organization—often invisibly. Oracle commonly tucks its operative cloud terms into URLs or hyperlinks embedded in Estimate/Order Forms. Those seemingly “standard” terms contain multiple one-sided provisions that can leave customers exposed in precisely the moments they most need leverage.

This article analyzes two Oracle form agreements—the Oracle Cloud Services Agreement (CSA) and the Oracle NSGBU Transactional Subscription Services Agreement for NetSuite (NSA)—to highlight the most customer‑hostile clauses, why they matter in the ERP implementation context, the key differences between the forms, and practical strategies for leveling the playing field. Citations to specific clauses appear in footnotes.
Why “URL terms” and buried hyperlinks matter in ERP deals
  • They are easy to overlook. Teams focus on scope, price, and timeline laid out in an Estimate/Order Form and miss how the incorporated web terms reallocate risk to the customer. Both agreements expressly incorporate extensive “Service Specifications,” “policies,” and data protection terms by reference, and Oracle reserves the right to update some of them unilaterally during the term—so what you sign today may not be what governs tomorrow. (Cloud-CSA-Online-v062223-US-ENG.pdf, p. 9 , id., p. 8 , nsgbu-subscription-services-agreement-v061625-us-eng.pdf, p. 1 , id., p. 5) 
  • They move critical obligations off-page. Privacy, security, hosting, and support are often defined in linked policies. If those change mid‑implementation or mid‑incident, your remedies can vanish. Oracle expressly allows updates and says they won’t “materially reduce” performance or security—but Oracle decides materiality, not you. (Cloud-CSA-Online-v062223-US-ENG.pdf, p. 1 , nsgbu-subscription-services-agreement-v061625-us-eng.pdf, p. 5) 
Customer‑hostile clauses to watch—and why they sting during ERP implementations
  1. Non-cancelable, non-refundable orders; invoice splitting
  • What Oracle says: Orders are non‑cancelable and sums paid are non‑refundable (subject to narrow warranty remedies). Payments are due net‑30. You may receive multiple invoices. (Cloud-CSA-Online-v062223-US-ENG.pdf, p. 1 , id., p. 1) 
  • Why this hurts in ERP: If the project derails, you’re often stuck paying for shelfware. “Multiple invoices” can complicate internal controls and dispute management. In NetSuite’s NSA, the fees are similarly non‑refundable and non‑cancelable, and auto‑renewal is the default unless you give notice. (nsgbu-subscription-services-agreement-v061625-us-eng.pdf, p. 3 , id., p. 3) 
  • Level the field: 
    • Add phased acceptance milestones tied to functionality, data migration checkpoints, or integration tests; make future fees contingent on passing acceptance.
    • Insert a termination for convenience (T4C) with a fair wind‑down fee cap and a pro‑rata refund of prepaid, unused fees.
    • Remove or tightly constrain auto‑renewal; require written mutual renewal at negotiated pricing.
  1. “Excess usage” true-ups
  • What Oracle says: If you exceed ordered quantities, you must promptly buy and pay fees for the overage. (Cloud-CSA-Online-v062223-US-ENG.pdf, p. 1 , nsgbu-subscription-services-agreement-v061625-us-eng.pdf, p. 2) 
  • Why this hurts: During rollouts, counts fluctuate (e.g., temporary contractors, test users). Surprise true‑ups mid‑implementation can drain budgets.
  • Level the field: 
    • Include a buffer (e.g., 10–15%) and quarterly reconciliation, not immediate charge.
    • Define who counts as a “User” during testing; exclude non‑production credentials from billable metrics.
  1. Acceptable Use Policy as a suspension lever
  • What Oracle says: Broad “Acceptable Use Policy” with Oracle’s right to take “remedial action,” including removing or disabling access; grounds include benchmarking and performance testing, and Oracle can suspend for “significant threat” or alleged violations. (Cloud-CSA-Online-v062223-US-ENG.pdf, p. 1 , id., p. 4 , nsgbu-subscription-services-agreement-v061625-us-eng.pdf, p. 3 , id., p. 6) 
  • Why this hurts: ERP implementations require load tests, resilience testing, and integration validation. An overly restrictive AUP plus suspension rights can chill necessary diligence, and any suspension mid‑go‑live is catastrophic.
  • Level the field: 
    • Carve out approved performance and security testing in a written test plan with notice and contact protocols.
    • Add a “narrowly tailored suspension” clause requiring Oracle to limit suspension to the affected component, with prior notice, cure periods, and SLA credits for any wrongful or overbroad suspension.
  1. Oracle can update services and policies during the term
  • What Oracle says: Oracle may update services and specifications/policies during the term; it promises not to “materially reduce” performance, functionality, security, or availability. (Cloud-CSA-Online-v062223-US-ENG.pdf, p. 1 , nsgbu-subscription-services-agreement-v061625-us-eng.pdf, p. 5) 
  • Why this hurts: If a key feature is changed or deprecated after you’ve designed processes or integrations around it, remediation costs sit with you unless you negotiate protection.
  • Level the field: 
    • Require “no adverse change” to named critical features; if a change materially impairs your documented use case, secure a right to rollback, extended support, or a fee reduction/termination right with refunds.
    • Lock the specific version of security, hosting, and support policies for the term unless mutually agreed.
  1. Restrictions that block internal benchmarking and reverse engineering
  • What Oracle says: Prohibits benchmarking, availability testing, and reverse engineering; performance or vulnerability testing requires prior written approval. (Cloud-CSA-Online-v062223-US-ENG.pdf, p. 1 , nsgbu-subscription-services-agreement-v061625-us-eng.pdf, p. 3) 
  • Why this hurts: You lose leverage to compare actual performance to promises and to validate capacity before cutover.
  • Level the field: 
    • Negotiate a testing addendum that allows agreed test scripts in pre‑production and limited production windows.
    • Define acceptable data and tooling (e.g., synthetic datasets) and coordinate to minimize impact.
  1. Warranty is narrow; exclusive remedy is limited to correction or partial refund
  • What Oracle says: Warranty limited to “commercially reasonable care and skill” in material conformance with specs; Oracle does not warrant error‑free or uninterrupted service, and your exclusive remedy is correction or, if not feasible, to end the deficient services for a refund of prepaid fees for the post‑termination period. (Cloud-CSA-Online-v062223-US-ENG.pdf, p. 3 , id., p. 3 , id., p. 3 , nsgbu-subscription-services-agreement-v061625-us-eng.pdf, p. 6 , id., p. 7) 
  • Why this hurts: If the service underperforms during a critical cutover, your outage losses (e.g., missed shipments, revenue impact) fall on you, and the remedy is limited to a narrow credit/termination right.
  • Level the field: 
    • Add targeted warranties (e.g., data import tools will process volumes in the migration runbook; integrations will support specific throughput).
    • Incorporate meaningful SLAs with service credits escalating to termination rights; add “implementation protection” credits for go‑live windows.
  1. Liability caps and exclusions that wipe out meaningful recovery
  • What Oracle says: Broad exclusions of indirect, consequential, special, punitive, or exemplary damages, and for loss of revenue, profits, data, data use, goodwill, or reputation; total liability capped at fees paid for the services giving rise to liability in the prior 12 months. (Cloud-CSA-Online-v062223-US-ENG.pdf, p. 3 , id., p. 3 , nsgbu-subscription-services-agreement-v061625-us-eng.pdf, p. 7 , id., p. 7) 
  • Why this hurts: In ERP, most real harms are “indirect” (business interruption, inventory imbalance, missed invoicing). A 12‑month fee cap can be a fraction of your exposure.
  • Level the field: 
    • Carve out from the cap: data breach, confidentiality breach, IP infringement, willful misconduct, and violation of law; set a higher cap for data breach (e.g., 2–3x total contract value) and for implementation‑phase outages.
    • Narrow the consequential damages waiver by reinstating recovery for documented business interruption stemming from Oracle’s uncured material breach or gross negligence during a defined cutover window.
  1. IP indemnity with big exceptions
  • What Oracle says: Each party indemnifies for third‑party IP claims over materials they provide, but Oracle disclaims indemnity for claims based on third‑party content or third‑party portals accessed via the services. Remedies include modifying, licensing, or terminating and refunding unused fees. (Cloud-CSA-Online-v062223-US-ENG.pdf, p. 3 , id., p. 4) 
  • NetSuite NSA mirrors this structure and excludes indemnity for Third Party Applications; many ERP deployments rely on third‑party connectors or SuiteApps—your risk increases as your architecture becomes more realistic. (nsgbu-subscription-services-agreement-v061625-us-eng.pdf, p. 7) 
  • Level the field: 
    • Require IP indemnity to cover Oracle‑approved integrations/connectors and SuiteApps listed in your architecture; ensure the “termination and refund” remedy includes migration assistance and reimbursement of switching costs.
    • Add indemnity for violation of third‑party API terms caused by Oracle’s guidance or tooling.
  1. Data protection is your problem unless you buy add‑ons; HIPAA exclusion in NSA
  • What Oracle says: You are responsible for notices/consents, content vulnerabilities, and regulatory obligations for certain data (e.g., PCI/health) unless specified and covered by add‑on services. (Cloud-CSA-Online-v062223-US-ENG.pdf, p. 2 , id., p. 3) 
  • NetSuite NSA expressly disclaims HIPAA compliance unless specified: Oracle is not your Business Associate; the service may not be used to store/process PHI. (nsgbu-subscription-services-agreement-v061625-us-eng.pdf, p. 3) 
  • Why this hurts: ERP deployments often consolidate sensitive data (customers, payments, healthcare, export‑controlled). Misalignment between your data types and Oracle’s permitted data can create breach and compliance exposure.
  • Level the field: 
    • Inventory regulated data early; align on permitted data in writing. Buy required compliance modules (e.g., PCI) and reflect them in the order; include audit rights and breach response commitments.
    • Strengthen the data processing agreement with specific subprocessor lists, localization, and deletion/return SLAs.
  1. Suspension rights for delinquent accounts and “significant threats”
  • What Oracle says: Oracle can suspend for nonpayment and for perceived security threats or policy violations; during suspension, they’ll make your content/data available “as it existed on the suspension date.” (Cloud-CSA-Online-v062223-US-ENG.pdf, p. 4 , nsgbu-subscription-services-agreement-v061625-us-eng.pdf, p. 6) 
  • Why this hurts: A payment dispute or a false‑positive security flag during cutover can halt operations.
  • Level the field: 
    • Add a “no suspension during good faith dispute” clause when you pay undisputed amounts.
    • Require multiple, escalating notices and a minimum cure period; exclude suspension during agreed go‑live windows, absent imminent, demonstrable harm.
  1. Retrieval and deletion windows at term end
  • What Oracle says: Oracle will make your data available for retrieval for a period specified in service specs, then delete; details are in specs, not the main agreement. (Cloud-CSA-Online-v062223-US-ENG.pdf, p. 5) 
  • Why this hurts: If the retrieval window is short or the export format is limited, your off‑boarding may fail.
  • Level the field: 
    • Negotiate a specific retrieval period (e.g., 60–90 days) and structured export formats and assistance commitments.
    • Add a paid transition assistance clause with defined hours and rates for data extraction and verification.
  1. Assignment bans; audit rights (NSA)
  • What Oracle says: You may not assign; Oracle reserves audit rights (NSA) on 45 days’ notice, annually, with remediation in 30 days if non‑compliance found. (id., p. 8 , nsgbu-subscription-services-agreement-v061625-us-eng.pdf, p. 9) 
  • Why this hurts: M&A or internal reorganizations become friction points; audits during implementation consume resources.
  • Level the field: 
    • Add consent not to be unreasonably withheld for internal reorganizations, change of control, or transfer to affiliates.
    • Limit audit scope, frequency, and hours; exclude implementation sandboxes and pre‑production from “use” counts.
Key differences between the CSA (Oracle Cloud Services Agreement) and the NSA (NetSuite Subscription Services Agreement)
  • Product scope and ecosystem:
    • NSA is tailored to NetSuite and SuiteProjects Pro, with explicit terms for SuiteCloud technologies and SuiteApps (including customer‑developed SuiteApps counted as “Third Party Applications” and subject to Oracle inspection). This makes the integration and customization footprint a contract risk area unique to NetSuite. (id., p. 1 , id., p. 5) 
    • The CSA is more general across Oracle Cloud and leans on “Service Specifications” tied to URLs. (Cloud-CSA-Online-v062223-US-ENG.pdf, p. 9) 
  • Auto‑renewal:
    • NSA auto‑renews for a year unless you give notice 30 days prior; CSA does not contain an explicit auto‑renew provision in the core text provided. (nsgbu-subscription-services-agreement-v061625-us-eng.pdf, p. 3) 
  • HIPAA:
    • NSA explicitly prohibits PHI and disclaims Business Associate status unless otherwise specified; CSA addresses sensitive data at a higher level and pushes PCI/health data to add‑on services and specifications. (id., p. 3 , Cloud-CSA-Online-v062223-US-ENG.pdf, p. 3) 
  • Subsidiary/OneWorld terms:
    • NSA includes specific OneWorld/ Subsidiary Service provisions, including co‑resident environments for parent and subsidiaries and cross‑visibility of content—a governance and privacy risk if not managed. (nsgbu-subscription-services-agreement-v061625-us-eng.pdf, p. 2) 
  • Audit rights:
    • NSA grants Oracle explicit audit rights; CSA text cited here does not include a comparable audit clause. (id., p. 9) 
  • Training/Professional Services:
    • NSA defines Training and Professional Services, their deliverables, and limitations (e.g., no maintenance/updates for training deliverables). The CSA excerpt is focused on cloud services and hardware options; professional services are outside its “cloud hosting” specifications. (id., p. 5 , Cloud-CSA-Online-v062223-US-ENG.pdf, p. 9) 
Tactics to protect ERP customers in Oracle negotiations
  1. Tie money to measurable outcomes
  • Milestone‑based fees with acceptance criteria mapped to your ERP project plan (data migration, key integrations, UAT pass, performance thresholds).
  • Add a right to withhold a portion of fees pending cure of material defects during go‑live windows.
  1. Lock critical features and policies
  • Append a “Critical Capabilities Schedule” listing the exact features, APIs, limits, and security controls you rely on; prohibit material adverse changes, or provide economic relief/termination if they occur.
  1. Strengthen SLAs for implementation reality
  • Demand higher uptime and performance SLAs during cutover and quarter‑end cycles; include response and resolution SLAs for P1/P2 incidents; add service credits escalating to termination rights.
  1. Expand remedies beyond “fix or partial refund”
  • Create custom remedies for migration failure, data corruption, or prolonged underperformance: funded remediation hours, credits against professional services, and reimbursement for documented, reasonable out‑of‑pocket mitigation costs.
  1. Rebalance liability
  • Increase the cap to a multiple of annual fees or total contract value; create super‑caps for data breach and cutover‑window outages; carve back some consequential damages for documented business interruption arising from Oracle’s gross negligence or willful misconduct.
  1. Build a safe harbor for testing and security validation
  • A mutually agreed testing protocol permitting load, failover, and vulnerability testing in defined windows and environments without triggering AUP violations or suspension.
  1. Clarify data handling and exit
  • Specify data types permitted, encryption standards, data residency, subprocessor lists, incident notification timelines, and cooperation duties. At term end, secure a 60–90 day retrieval window, structured exports, and paid transition support.
  1. Control third‑party risk
  • Enumerate approved Third Party Applications/SuiteApps; require Oracle to support interoperability and include those components within IP indemnity scope; add a remedy if an Oracle‑driven API change breaks integrations.
  1. Guard against surprise true‑ups and audits
  • Include a non‑billable buffer and quarterly usage reviews; confine audit rights (NSA) to working hours, limit frequency, and exclude development/test.
  1. Stop silent renewal
  • Replace auto‑renew with express mutual renewal; bake in a cap on renewal increases (e.g., CPI + 3%) and a right to terminate if Oracle seeks higher pricing.
  1. No suspension during disputes and go‑live
  • Add “no suspension during good‑faith billing disputes” with payment of undisputed amounts; restrict suspension during defined go‑live and financial close windows absent imminent harm.
  1. Assignment flexibility
  • Permit assignment to affiliates or successors in corporate reorganizations or change of control with prior notice.
Practical playbook for counsel and project leaders
  • Due diligence before signature:
    • Pull every URL/policy incorporated by reference and snapshot the content at signing.
    • Align the agreement with the ERP project plan: acceptance, milestones, test plans, data types, integrations, and cutover windows.
  • Redline with purpose:
    • Focus on SLA definitions, liability carve‑outs, suspension limits, change‑control for features/policies, and exit assistance.
    • Add an Implementation Annex detailing environments, test rights, throughput/volumetrics, and issue‑management war room procedures.
  • Governance during rollout:
    • Establish a joint escalation matrix; require weekly risk reports; enforce RCA (root cause analysis) obligations for Sev‑1 incidents with corrective action commitments.
  • Preserve leverage:
    • Stage spend; avoid 100% prepayment. Use acceptance gates and holdbacks.
    • Negotiate executive‑level step‑in rights if performance falters.
  • Document everything:
    • Keep contemporaneous records of commitments made in sales cycles and workshops; incorporate them into the order or a binding SOW.
A closing note on tone and leverage
Oracle’s forms are written to protect Oracle. That’s expected—but not inevitable. In ERP, your operational risk dwarfs your subscription fee, so “standard terms” that cap liability at 12 months’ fees while banning consequential damages simply do not reflect your exposure. Do not accept boilerplate on faith. Treat the contract as a control surface for implementation risk: define, measure, and enforce the behaviors you need from your vendor when it matters most.
With disciplined contracting, you can convert invisible hyperlinks into enforceable commitments—and keep your ERP program out of the ditch.
 
1 Comment

    By Tactical Law Attorneys and From Time to Time Their Guests
    ​

    The contents of this blog is intended to convey general information.  It should not be relied upon as legal advice.  It is not an offer to represent you nor is it intended to create an attorney-client relationship.  Tactical Law does not sponsor, endorse, verify or warrant the accuracy of the information contained on internal sites or subsequent links.

    Picture

    Authors

    Collectively we have practiced law in California for over 60 years.  Our attorneys have advised clients of all sizes across industries on how to favorably resolve software audits, licensing and other disputes with Oracle/NetSuite and other software companies.

    Archives

    November 2025
    September 2025
    July 2025
    April 2025
    December 2024
    October 2024
    September 2024
    June 2024
    April 2024
    February 2024
    December 2023
    September 2023
    July 2023
    June 2023
    May 2023
    April 2023
    March 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    December 2021
    July 2021
    May 2021
    March 2021
    February 2021
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    January 2020
    December 2019
    November 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    August 2018
    July 2017
    January 2016

    Categories

    All

    RSS Feed

tactical law group llp

Privacy Policy
Terms of Use
Contact

 COPYRIGHT TACTICAL LAW GROUP LLP 2016-20235   ALL RIGHTS RESERVED
​ 
Legal Disclaimer:  Contents may contain attorney advertising under the laws of some states.  Prior results do not guarantee a similar outcome.
  • Home
  • Professionals
    • Pamela K. Fulmer
    • Dee A. Ware
    • Julie Bishop
    • Affiliated Counsel
  • Practice
    • Software Audit Defense
    • Licensing & Contract Disputes
    • Litigation
    • ERP Licensing & Disputes >
      • Oracle/NetSuite Disputes >
        • River Supply v. Oracle/NetSuite
    • Advertising and Competition
    • Trade Secrets & Employee Mobility
    • Intellectual Property
    • Arts & Entertainment
    • Tech Transactions
    • Outside General Counsel Services
    • Privacy and Data Security
  • Industries
  • Resources
  • About us
  • Oracle Blog
  • Tactical Law Blog
  • Contact