ACCC seeks comment on competition issues with Telstra's Adam acquisition
- 20 December, 2012 10:44
The Australian Competition and Consumer Commission (ACCC) has released a statement of issues paper seeking industry comment on Telstra’s proposed acquisition of Adam Internet.
The ACCC is seeking further information on potential competition issues due to the merger.
“The ACCC’s preliminary view is that the proposed acquisition is likely to result in a substantial lessening of competition in the supply of retail fixed voice and broadband services,” Rod Sims, ACCC chairman, said in a statement.
“This is because Telstra would have the ability and incentive to use its market power in wholesale markets to favour the Adam Internet business over its other wholesale customers which is likely to foreclose competition in the relevant downstream retail markets.”
Adam Internet is the last independent ISP in South Australia, with Sims concerned around the acquisition reducing competition in the South Australian market, which could impact on services in the state.
Yesterday Vodafone Hutchinson Australia, iiNet and Macquarie Telecom released a joint statement stating they opposed the deal.
“We believe that if the ACCC cannot identify that this acquisition would result in a substantial lessening of competition it is evidence that there is a flaw in the law,” the companies said in the statement.
Submissions for comment close 24 January, 2013.
The ACCC has deferred its decision about whether to give the acquisition the go-ahead to 7 February, 2013.
Follow Stephanie McDonald on Twitter: @stephmcdonald0
Follow Computerworld Australia on Twitter: @ComputerworldAU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Android Malware Exposed
Take an in-depth look at the evolution of android malware. The world of malware targeting the Android OS is similar yet very different from malware affecting Windows. Explore the rapidly evolving world of android malware and shed light on the various techniques used to exploit devices using this OS.
In Control at Layer 2: A Tectonic Shift in Network Security
Network hacking and corporate espionage are on the rise and set to intensify. Information security risks remain commonplace, and most organisations need to increase vigilance. This paper has analyses the realistic threats to fibre optic Ethernet networks – both at the LAN and WAN level. Read now.
Benefits of Deploying Microsoft Exchange Server 2010 on Dell Compellent with Data Progression
Messaging and collaboration platforms have emerged as mission critical applications, consuming a large portion of IT spending for organisations. The rich features in these applications have significantly changed the messaging requirements and needs of today’s information from anywhere with any device, the result is an ever increasing demand on storage systems both in terms of capacity and bandwidth. Many organisations are rethinking their storage strategies to meet the demanding criteria and to handle the future requirements. Read more.