Feeds

O2 could impose out-of-contract iPhone lock-in

Whose handset is it, anyway?

Boost IT visibility and business value

iPhone users might, or might not, be able to unlock when their contract expires, as O2 still hasn't decided if deserters should be able to take their toys with them.

Apple fans who rushed to O2's contracts to get their hands on an iPhone have been asking if they'll be able to take their precious status symbol with them if they change networks. However, not only are they being told conflicting stories, but it seems the network hasn't decided itself, yet.

Until now, the Telefonica-owned operator was refusing to unlock handsets, on the grounds that it had an exclusive contract with Apple. That exclusive is now over, and iPhone users will be welcomed by Orange and Vodafone if O2 will provide the unlock code (officially) needed to put a competitor's SIM into the iPhone.

In a statement, O2 told us: "we did not offer unlocking at the end of a customer’s iPhone contract as we had the exclusive contract for the iPhone in the UK. Obviously, that situation has changed... and we are currently working through what will happen."

So if you're one of the many clutching an iPhone but unhappy with O2's coverage or service, then you'll just have to shell out for a new one or hope that O2 will relent over time. Or you could take the unofficial unlocking route, and perhaps jailbreak your handset while you're there. ®

The essential guide to IT transformation

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.