Feeds

ACCC flags shift in regulation

Future of ADSL still matters while Oz waits for NBN

Intelligent flash storage arrays

The ACCC has re-opened the long-standing debate about wholesale ADSL regulation, issuing a discussion paper as the precursor to an inquiry as to whether the sector needs greater regulation.

While Australia’s infrastructure-based ADSL competitors – those who have installed their own DSLAM networks – have their access to Telstra’s copper network protected by regulation, there is no similar regulation protecting the host of ‘switchless’ retailers buying wholesale ADSL services.

“[T]he ACCC has regularly received complaints from access seekers about the level of Telstra’s wholesale ADSL prices relative to Telstra’s retail ADSL charges,” the regulator notes

As the Australian Competition and Consumer Commision notes in its discussion paper, it has previously considered whether or not wholesale ADSL should be regulated – in 2005-06 and again in 2010 (leading to an announcement earlier this year that it was adoption a “wait and see” approach to the issue).

The problem for the industry is that there’s only weak competition in the wholesale ADSL market. Telstra’s wholesale services are offered across its 2,800 “ADSL-enabled” exchanges, the Commission states, but other DSL infrastructure owners (it nominates AAPT and Optus as examples) have a far more limited footprint.

This means any retailer seeking a national footprint can do so only if it deals with Telstra. “It is clear that Telstra has retained a dominant position in the supply of retail and wholesale ADSL services,” the ACCC says.

The inquiry will also look at what competition concerns are likely to develop in the market; the likelihood that “effective” competition might emerge in the wholesale ADSL market; and whether Telstra’s proposed structural separation is likely to make the market more competitive without specific regulation.

The regulator appears to have a particular eye to the rural and regional markets, noting that in these areas, competing networks “have not developed to any material extent”.

The ACCC is accepting submissions until January 19, 2012. ®

Remote control for virtualized desktops

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
Inside the EYE of the TORnado: From Navy spooks to Silk Road
It's hard enough to peel the onion, are you hard enough to eat the core?
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.