Feeds

Conn. lawman grills Apple and Amazon over e-book pricing

Most favored nation status scrutinized

The essential guide to IT transformation

Connecticut's top law enforcement official said he is investigating whether agreements Apple and Amazon.com have reached with e-book publishers violate antitrust laws by freezing competitors out of the market.

In letters to the general counsels of Apple and Amazon, Attorney General Richard Blumenthal said he was concerned about guarantees both companies have secured promising them e-book prices that are lower than any other sellers. The so-called MFN, or most favored nation, status doesn't automatically violate antitrust laws, but it could harm consumers, Blumenthal said.

“MFN clauses — especially when they are offered to two of the largest e-book retail competitors in the United States — have the potential to impair horizontal competition by encouraging coordinated pricing and discouraging discounting,” Blumenthal wrote in the letters here and here (both are PDFs), which were sent late last week. “The net effect is fairly obvious, in that MFSs will reduce the publisher's incentive to offer a discount to Apple if it would have to offer the same discount to Amazon, leading to the establishment of a price floor for e-books offered by the publisher.”

A preliminary review by Blumenthal has already found that e-book prices offered by Amazon, Apple, Borders and Barnes & Noble for several titles on The New York Times Bestseller list were identical.

“These agreements among publishers, Amazon and Apple appear to have already resulted in uniform prices for many of the most popular e-books — potentially depriving consumers of competitive prices,” Blumenthal said in a statement. He has requested a meeting with legal representatives of both companies “to discuss the issues I have raised in greater detail.”

Apple and Amazon have secured the guarantees from Macmillan, Simon & Schuster, Hachette, HarperCollins, and Penguin. Blumenthal has long been a thorn in the side of companies accused of privacy and competition tresspasses. In the late 1990s, he vigorously pursued Microsoft for antitrust violations. More recently, he has pursued Google for its Streetview Wi-Fi snooping, Craigslist for prostitution ads, and MySpace for catering to registered sex offenders. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Barnes & Noble: Swallow a Samsung Nook tablet, please ... pretty please
Novelslab finally on sale with ($199 - $20) price tag
Banking apps: Handy, can grab all your money... and RIDDLED with coding flaws
Yep, that one place you'd hoped you wouldn't find 'em
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Primetime precrime? Minority Report TV series 'being developed'
I have to know. I have to find out what happened to my life
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.