Feeds

Spanish telco defiant over huge broadband anti-trust fine

Telefónica claims clear conscience

Boost IT visibility and business value

O2 parent company Telefónica has protested innocence after it was slammed by European anti-trust regulators for gaming the broadband market in its Spanish home territory.

The firm was yesterday hit with a €152m fine, the second largest in EU competition history after Microsoft's €280m wrist slap.

Brussels said Telefónica's penalty should serve as a warning to other incumbents that the commission will not stand for anti-competitive behaviour.

Chief regulator Neelie Kroes said: "Telefónica's conduct harmed Spanish consumers, Spanish businesses, and the Spanish economy as a whole, and by extension Europe's economy. I want to send a strong signal to dominant undertakings in all sectors...that I will not tolerate such behaviour."

Over several years, beginning in 2001, the former monopoly hamstrung its competitors by charging a price for wholesale broadband which was so close to Telefónica's retail price that they were forced to take a loss to stay in the market.

Broadband in Spain is 20 per cent more expensive, penetration 20 per cent lower, and growth 30 per cent slower than the western Europe average. More here from the EU.

Telefónica blamed contradictory rules from domestic and European regulators for the anti-competitive broadband market in Spain. It said it plans to lodge an appeal against the fine in the next few days. Full denial here (pdf). Mobile tentacle O2 already has a complaint in with the EU over the enforced cuts in roaming charges.

BT ran into similar anti-trust claims in the UK, particularly over local loop unbundling, once broadband became a mass market proposition in the earlier part of this decade. It was threatened with break up by Ofcom, but was able to dodge that bullet by setting up Openreach, a separate division designed to provide equal access to the national network to competitors. These days it would never be that naughty. ®

The essential guide to IT transformation

More from The Register

next story
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
PwC says US biz lagging in Internet of Things
Grass is greener in Asia, say the sensors
Ofcom sees RISE OF THE MACHINE-to-machine cell comms
Study spots 9% growth in IoT m2m mobile data connections
O2 vs Vodafone: Mobe firms grab for GCHQ, gov.uk security badge
No, the spooks love US best, say rival firms
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.