Nokia Siemens scales down presence in Iran
- 14 December, 2011 23:23
Telecommunications vendor Nokia Siemens Networks is further limiting the way it does business in Iran, as the international stance against the country is hardened.
The company started to scale back its presence in Iran last year, but has until now extended maintenance contracts, which it will no longer do, a spokeswoman said on Wednesday.
Nokia Siemens made the decision as a result of tougher export restrictions against Iran, said the spokeswoman.
The telecommunications equipment vendor isn't the only one that has decided to limit its business activities in Iran.
Last week, Huawei Technologies said it will "restrict its business development there by no longer seeking new customers and limiting its business activities with existing customers" due to "the increasingly complex situation in Iran", according to a statement on its website, while also underlining that its business in the country has been in full compliance with all laws and regulations including those of the U.N., U.S. and E.U.
Ericsson took similar measures in December last year, a spokesman said.
The vendors have been criticized on several occasions for providing equipment to countries that could use it to curb human rights.
In August, Nokia Siemens came under fire because a Siemens division had allegedly supplied technology to a monitoring center in Bahrain, which was used to help carry out human rights violations. The monitoring center business was sold by Nokia Siemens in 2009.
Partly as a result of the issues raised by the potential for misuse of its technology, Nokia Siemens adopted a human rights policy to address the issues of new technologies and freedom of expression, it said in a statement at the time.
On Friday, European Commissioner Neelie Kroes said that technology companieshave a moral obligation not to sell to repressive regimes.
Every actor, public and private, must take up responsibility for how its products can be used, and be transparent about the technology they are selling in certain countries, according to Kroes.
At the same time, she highlighted the fact that information and communications technology also help the struggle for human rights.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Six Reasons to Empower Your SharePoint Citizen Developers
More and more business applications are being created by “citizen developers” - end users who are not IT developers but who create solutions for themselves and their groups. This white paper explores six reasons to embrace citizen development in an intelligent way that minimises risks and maximises the return on your SharePoint investment. Read now.
Spear-Phishing Email: Most Favored APT Attack Bait
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
Advanced Persistent Threats and Real-Time Threat Management
Businesses face a constantly evolving threat landscape. One of the greatest challenges is presented by advanced persistent threats (APTs), which are sophisticated, multi‐faceted attacks targeting a particular organisation. Mitigating the risk of APTs requires advances beyond traditional layered security to include real‐time threat management. This whitepaper describes the nature of APTs, the risks they pose to businesses, and techniques for blocking, detecting, and containing APTs and other emerging threats. Read now.