Feeds

NBN Co preps revised access undertaking

New agreement expected by year-end

Choosing a cloud hosting partner with confidence

NBN Co, the company building Australia’s National Broadband Network, will revisit the rules and pricing for access to its network in response to feedback from access seekers.

The decision, which has been approved by the ACCC, means formal regulatory approval of the Special Access Undertaking (SAU), originally due in September, will be delayed until next year.

The industry had pushed back over several aspects of the SAU: the idea that the document would provide a 30-year regulatory framework wasn’t popular, and retailers were unhappy that the SAU sought to keep NBN Co’s pricing regimes out of reach of the ACCC.

The prices that the company had put in place also caused concern among ISPs; in particular, the cost of the CVC (connectivity virtual circuit – the pipe that aggregates multiple customers between a fibre service area and an NBN point of interconnect).

While NBN Co will still seek to retain control over prices, the organization has hinted at possible price reductions for CVCs.

“What doesn’t change in the revised approach is our commitment to maintain the affordability of our prices,” said Jim Hassell, NBN Co Head of Product Management and Industry Relations.

“The approach continues to lock-in the prices of key products for five years, maintains price controls over all products, and in addition now confirms NBN Co’s intention to decrease the price of the Connectivity Virtual Circuit (CVC) as demand increases.”

NBN Co has also yielded some ground regarding ACCC oversight of its prices, saying it will provide “a more explicit role” for the regulator in assessing its prices.

NBN Co has now proposed breaking up the SAU into different modules that will operate at different time scales. Only the “foundation” rules of the SAU will be set over 30 years, with other modules covering five- and ten-year time scales.

The revised SAU is to be completed before the end of the year, so El Reg will expect continuing lobbying efforts from retailers in the meantime. ®

Security for virtualized datacentres

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.