Under the Trade Practices Act 1974, the ACCC must not make an order granting an exemption unless it is satisfied that the exemption will promote the long-term interests of end users.
The ACCC has requested Telstra to supply public versions of all supporting material and will publish the additional material on its website once these have been received.
It will ensure interested parties have reasonable access to Telstra's confidential submissions, to allow adequate examination and comment on the applications. A confidentiality undertaking for interested parties to sign for access to the confidential submissions will shortly be provided on the website.
According to the ACCC it will also set a discussion paper and set a time limit for submissions on the exemption applications by interested parties. The ACCC invites submissions on any aspect of the exemptions.
Telstra has previously submitted an exemption application in relation to its supply of the DCTS on August 24, 2007, for 20 capital-regional routes. The ACCC released a discussion paper on October 19, 2007 and received submissions. A draft decision will follow.
ACCC publishes exemption applications from Telstra
By
Staff Writers
on Jan 7, 2008 1:29PM

Got a news tip for our journalists? Share it with us anonymously here.
Tags:
accc application capacity collaboration domestic exemption for from networking publishes service telco telstra the transmission
Partner Content

Build cybersecurity capability with award winning Fortinet training from Ingram Micro
Ingram Micro Ushers in the Age of Ultra

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program

Kaseya Dattocon APAC 2024 is Back

Tech For Good program gives purpose and strong business outcomes
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report