Friday, December 5, 2025

Antitrust risk handling in the telecommunication sector

Iratxe Gurpegui
Written by
Iratxe Gurpegui
6 min read
Antitrust risk handling in the telecommunication sector

Telecommunications markets sit at the crossroads of heavy regulation and fierce rivalry. That mix creates unique antitrust exposure that sector rules do not fully neutralize. Operators can comply with telecom-specific obligations and still face competition investigations, large fines, and civil claims. In the EU, for example, Telefónica and Portugal Telecom were fined for a non‑compete clause, and Slovak Telekom and its parent Deutsche Telekom were fined for margin squeeze and refusal to supply. These cases show why robust antitrust risk handling, rooted in day‑to‑day operations, matters in telecom.

What makes telecom antitrust exposure special

Telecom combines structural features that heighten antitrust risk:

  • High barriers to entry, spectrum scarcity, and sunk network costs, which concentrate market power.
  • Vertical integration with overlapping wholesale and retail roles, which create incentives for discriminatory access, margin squeeze, or tying.
  • Network sharing, MVNO and roaming agreements, which can be pro‑competitive if well designed, but risky if they enable sensitive information flows.

Common risk patterns include:

  • Horizontal conduct, such as price fixing, market or customer allocation, bid rigging, and the exchange of commercially sensitive information in industry forums.
  • Vertical restrictions, such as resale price maintenance or unjustified territorial and customer restrictions.
  • Abuse of dominance, including refusal to supply essential inputs, margin squeeze, excessive pricing, tying and bundling, and discriminatory terms.

A pragmatic antitrust risk handling model for telecom

A mature approach blends clear governance with sector realities. The core pillars are prevention, detection, and remediation, embedded in pricing, product, access, and partnership decisions.

Step 1, risk assessment and mapping

Map your activities and data flows to antitrust exposure. Prioritize by likelihood and impact, then set control owners and metrics. Below some examples of most common risks in telecoms, why they may be trigered, primary controls associated to risks, primary owners and key risk indicators.

Scenario

Typical triggers in telecom

Primary controls

Owner

Key risk indicator (KRI)

Exchange of sensitive information with competitors

Trade associations, spectrum or infrastructure working groups, bilateral talks

Pre‑cleared agendas, legal attendance for high‑risk meetings, do‑not‑discuss list, exit protocol, minutes retention

Employees in contact with competitors

Any mention of prices, customers, discounts, roadmaps in meeting notes where competitors have participated.

Margin squeeze

Wholesale access price rises while retail remains flat or falls, or retail discounts narrow margin

Internal margin squeeze test, cost models, separation of wholesale and retail pricing teams, approval workflow

Pricing committee, with legal clearance

Retail price minus wholesale input below defined cost benchmark

Refusal to supply essential inputs

MVNO or wholesale broadband access denied or delayed

Published reference offer, SLA timelines, objective eligibility criteria, decision log

Wholesale access

Access decisions exceeding SLA, inconsistent terms across applicants, complaints from applicants

Tying and bundling

Multi‑play offers, handset financing with service lock‑ins

Standalone availability, replicability test, discount allocation methodology, documentation

Product, pricing, legal

Share of sales where standalone option is not visible or is priced above viable benchmark

Network sharing and joint ventures

Sensitive information sharing, coordination of commercial strategy

Clean teams, information barrier charter, purpose limitation, data minimization

JV governance with legal

Unauthorized access to disaggregated competitor data

Step 2, control design for high‑risk areas

Information exchange and industry meetings

  • Only attend with pre‑cleared agendas. Require training for attendees.
  • Prohibit discussion of current or future prices, discounts, margin targets, key customers, market shares, territories, confidential roadmaps, MVNO access terms.
  • If a prohibited topic arises, object, leave the meeting, request that minutes reflect the objection and exit, and report internally.
  • Retain agendas, participant lists, and minutes. For informal contacts, keep contemporaneous notes.

Pricing and discounting guardrails

  • Separate wholesale and retail pricing teams, and document the separation.
  • Maintain cost models to support margin squeeze and predation screens. Avoid pricing below average variable cost or long run incremental cost unless robust, time‑limited promotion logic exists with documentation.
  • For resale price maintenance risks, use recommended or maximum resale prices, and avoid coercion or pressure on distributors. See EU VBER and Guidelines for safe harbors and hardcore restrictions.

Bundling and tying

  • Ensure the tied product is available standalone on transparent, commercially reasonable terms.
  • Conduct a replicability test, ask if an equally efficient competitor could match the bundle using wholesale inputs.
  • Allocate bundle discounts across components using a defensible methodology, and retain records.

Access to essential inputs

  • Publish a reference offer with scope, technical specs, prices, SLAs, and dispute resolution.
  • Implement a tracked workflow for requests, including intake, eligibility, timelines, and decision criteria.
  • Apply non‑discrimination. If terms differ, justify on objective grounds.

Network sharing, roaming, and JV governance

  • Define a clean team structure for competitively sensitive data, with approved data lists and purpose limitation.
  • Restrict strategic information flows that could influence independent competitive behavior.
  • Periodically audit data access logs and meeting materials.

Speak‑up channels and dawn raid readiness

  • Maintain anonymous reporting options, protect against retaliation.
  • Keep a dawn raid protocol, with document preservation and communication rules.

Step 3, monitoring, detection, and escalation

KRIs and dashboards

  • Parallel price movements with the main rival within 48 hours without cost or tax triggers.
  • Repeated wholesale acceptance delays beyond SLA.
  • Rising share of sales where bundles overshadow standalone visibility.
  • Unusual spikes in contacts with competitors around key commercial cycles.

Transaction testing and file reviews

  • Sample pricing files and approvals, verify the presence of cost models and legal clearance.
  • Review access request logs, compare terms across applicants.

From policy to behavior

Align governance, training, and controls with the realities of telecom operations, and translate principles into tools managers actually use.

Key building blocks:

  • Tone at the top and resources, leadership explicitly endorses zero tolerance of anticompetitive conduct. Appoint an empowered compliance leader with access to the board.
  • Policies and playbooks, publish a short antitrust code, meeting rules, pricing approval SOPs, and a bundling checklist. Translate principles into checklists that managers actually use.
  • Role‑based training, design annual modules for wholesale, retail, pricing, strategy, marketing, product, procurement, and M&A teams, including mock scenarios.
  • Second‑line challenge, require legal or compliance sign‑off for high‑risk pricing and access decisions, and record the rationale.
  • Independent review, run themed audits, for example margin squeeze or information exchange controls, and remediate gaps.

Red flags to brief frontline teams

  • Requests from competitors to align tariffs, promotions, or launch dates.
  • Invitations to share detailed sales forecasts, market shares, or customer lists.
  • Network sharing or joint venture meetings where pricing or customer strategies are discussed.
  • MVNO or wholesale access decisions that diverge from published reference terms without a documented, objective reason.
  • Bundles that are not practically available as standalone components on transparent terms.

How Naltilia helps compliance teams operationalise antitrust controls

Naltilia provides an AI‑powered platform that streamlines and automates regulatory compliance, which you can apply to antitrust risk handling in telecom without adding headcount pressure:

  • Regulatory risk assessment, structure your competition risk map by scenario, control, owner, and KRI, then refresh it on a defined cadence.
  • Tailor‑made policies, publish your antitrust code, meeting rules, and pricing SOPs, and distribute updates to specific teams with acknowledgment tracking.
  • Automated data collection, centralize evidence such as pricing approvals, agendas, minutes, access request logs, and SLA metrics to support audits and investigations.
  • Compliance workflow automation, route high‑risk pricing or bundling decisions for legal sign‑off, enforce separation between wholesale and retail, and track deadlines for MVNO access responses.
  • Remediation actions, create and monitor corrective tasks from audits or incidents, assign owners, and verify closure.

If you want to accelerate the design, rollout, and monitoring of your antitrust program, talk to our team at Naltilia

Closing thought

Effective antitrust risk handling in telecom is not a binder of policies, it is a set of practical guardrails built into pricing, product, access, and partnerships, monitored with data, and reinforced by leadership. Done well, it protects the company from fines and claims, and it also improves customer trust and regulatory relationships. With the right workflows and evidence at your fingertips, your compliance team can move from reactive firefighting to proactive control of the risk landscape.

This article is for general information only and does not constitute legal advice.