ACCC seeks comment on 'pull through' activities for the NBN
- 18 December, 2012 14:28
The Australian Competition and Consumer Commission is seeking comment on Telstra's migration plan [PDF] for ‘pull through’ activities for the National Broadband Network (NBN).
The discussion paper relates to the ‘pull through’ process which will use existing copper or HFC lines to pull fibre through conduits to connect some premises to the NBN.
This process will result in existing telco services being temporarily cut, with Telstra required to seek permission from its wholesale customers to pull through lines which they are providing services over and also to notify wholesale customers if the process is not successful.
NBN Co or its contractors will undertake any pull through activities.
“These processes may have important implications for the ability of wholesale customers to minimise disruption to the supply of communication services to consumers,” the ACCC said in a statement.
Telstra filed a migration plan with the ACCC in August 2011 and lodged a draft response in October 2012 to required measures 2, 3, 4 and 6 that the ACCC was recently seeking comment on.
The ACCC was looking for public comment on four of the measures Telstra developed relating to the telco's NBN migration, including security measures around it receiving information from NBN Co’s to ensure it does not obtain an unfair advantage from information it receives from NBN Co.
Other measures in the discussion paper related to Telstra switching off its HFC and copper networks once an area is NBN-ready and situations where the telco will build copper paths to provide services which are not yet available on the NBN or do not have an NBN-comparable service.
Submissions for comment on pull activities close 1 February, 2012.
Follow Stephanie McDonald on Twitter: @stephmcdonald0
Follow Computerworld Australia on Twitter: @ComputerworldAU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Pathways Advanced ICT Leadership Development Program Course Outline and Big 6 2013
- Taking Managed Security Services to the Next Level
- Case Study: The True Value of Conference Calling
- ‘A Little Extra Service’ Raises Customer Satisfaction and Lowers Costs
- Convergence with Vblock Systems: A Value Measurement - IDC In-depth assessment
Trust issue looms large for tech companies capitalizing on personal data
5 women who've made it in IT
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Performance in Supply Chain
Delivering more products, heightened quality and shortened customers with flawless execution and minimal business interruption defines your supply chain success. This report discusses a newly developed end-to-end solution with the right tools to efficiently procure, assemble, ship and deliver the goods your customers want, when they want them.
Bell Gully Law Firm Success
Read this whitepaper to find out how one of New Zealand’s oldest leading law firms was able to remove tangible risk to the business and enhance productivity by rapidly deploying an improved fundamental Unified Communication solution.
Forrester Report: Close The Gaps Left by Traditional Vulnerability Management Through Continuous Monitoring
This report assesses the current state and effectiveness of vulnerability management.