Feeds

Kiwi Telecom to split retail and wholesale operations

Wants to promote competition

Boost IT visibility and business value

Telecom New Zealand (Telecom) has announced plans to create an "independent wholesale operation" in a bid to promote telecoms competition.

Today's confirmation that Telecom plans to separate its wholesale and retail operations follows growing speculation about the future of the Kiwi incumbent after the government raised concerns about its market dominance and the lack of broadband competition.

If successful, rival operators should be able to get equal access to Telecom's wholesale network, giving them greater scope to compete and invest in broadband services.

"The country expects world-class broadband services, and our decision to reorganise our business is one more step towards ensuring healthy competition exists to provide that," incoming Telecom chairman Wayne Boyd said.

"We have looked at a number of arrangements in place or under consideration around the world, including BT in Britain and Telstra in Australia. We now intend to initiate the best form of separation to suit New Zealand's conditions."

Among the proposals outlined today is the idea of creating a level playing field for all retail operators - including Telecom - with the whole separation overseen by an independent monitoring group.

Further details of Telecom's plans are due to be published early in August.

In May it emerged that the Kiwi government was planning to drive through a series of measures to force Telecom to unbundle the local loop and increase competition.

A raft of proposals - including LLU, increased regulation, and the promotion of investment by rival operators in fibre, wireless and satellite networks - were put forward as a way to drag New Zealand out of the bottom third of the OECD's league table of broadband countries.

Execs from Telecom visited BT and Ofcom to see what measures have been undertaken in the UK to improve competition. At the time industry onlookers said the visit showed that Telecom was considering the idea of splitting its wholesale and retail businesses to head off criticism from its own government. ®

Seven Steps to Software Security

More from The Register

next story
Scotland's BIG question: Will independence cost me my broadband?
They can take our lives, but they'll never take our SPECTRUM
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
NBN Co adds apartments to FTTP rollout
Commercial trial locations to go live in September
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
What FTC lawsuit? T-Mobile US touts 10GB, $100 family-of-4 plan
Folks 'could use that money for more important things' says CEO Legere
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.