Feeds

Fair Trade officials tick off Apple Japan

Price fixing suspected - but not proved

  • alert
  • submit to reddit

Japan's Fair Trade Commission today announced it had officially warned Apple's Japanese operation not to force retailers to sell consumer-oriented iBooks and iMacs at list price or above.

The warning follows a ten-month investigation into Apple Japan over suspected retail price fixing - a violation of Section 19, Articles 12 (retail price maintenance) and 13 (illegal restrictions on trading) of the Japanese Anti-monopoly Law. The examination kicked off with raids on Apple's Japanese HQ last December.

The FTC said in a statement that the enquiry was now complete, and that it believed the Mac maker had indeed applied pressure to retailers to ensure they didn't undercut Apple's list prices.

However, the statement also said that no penalty would be imposed on Apple, suggesting the price-fixing was not widespread, or that the FTC could find no solid evidence for it.

Certainly, Apple has always denied any wrongdoing, or at least nothing that's illegal. "We believe our business activities did not breach Japanese laws," an Apple spokesperson said, cited by Reuters. ®

Related Stories

Apple Japan Fair Trade probe -- details emerge
Fair Trade investigators raid Apple Japan

For all our Apple stories, check out The Mac Channel

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.