Feeds

Canada says oui to VoIP

Meaning yes

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

Canada’s telecoms regulator will not regulate Voice Over Internet Protocol providers but will restrict how the incumbent telcos charge for services.

The Canadian Radio-television and Telecommunications Commission (CRTC) decided to take the action to protect new entrants to the business from the two incumbents Bell Canada and Telus. Both Bell and Telus said they would appeal the ruling. As it stands they would have to get regulator approval for pricing their own VoIP services. Incumbents are free to offer such services but must charge proper prices and not run them at a loss.

But the Canadian Cable Telecommunications Association (CCTA), which represents new entrants and VoIP firms, welcomed the announcement. Michael Hennessy, CCTA president, said: “Since VoIP has same pricing, packaging and functions as a traditional phone service, it should be regulated as a traditional phone service.”

Most countries have decided not to regulate VoIP services.®

Related stories

Canada mulls VoIP regs
Vonage rings up $200m investment
AT&T aims VoIP at business

Next gen security for virtualised datacentres

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.