IDG News Service - BlackBerry data services can continue in Saudi Arabia after Research in Motion agreed to monitoring of e-mail and instant messaging data services, an official of the country's regulator, Communications and Information Technology Commission, (CITC) said on Tuesday.
RIM has agreed to place some of its communication servers in the country, said the official on condition of anonymity.
In a statement, CITC said it had decided to allow BlackBerry Messenger, RIM's instant messaging service, as part of the regulatory requirements had been met. Other regulatory requirements have not been met by operators, but CITC's statement did not specifically say which ones.
Etihad Etisalat, which uses the brand name Mobily, Saudi Telecom Company (STC), and Zain Saudi Arabia are the three operators in the country that offer BlackBerry services.
A RIM spokesman based in India said the company did not have a comment on the Saudi Arabia arrangement.
The CITC said last week that it would suspend BlackBerry services in the country on Friday, as it violated regulations. It subsequently provided an extension to operators until end of Monday to test out the solutions they were working on with RIM. The deadline passed without a cut in service, according to reports.
In his daily press briefing on Monday, Philip J. Crowley, assistant secretary at the U.S. Department of State, said that there had been a report of "at least an agreement between RIM and Saudi Arabia".
The U.S. Department of State said last week that it is in touch with the United Arab Emirates (UAE) and other governments to better understand their concerns and plans on the BlackBerry service. The UAE also said last week that it would suspend BlackBerry services from Oct. 11 unless RIM located servers in the country that can be monitored.
An agreement between RIM and Saudi Arabia is likely to have ramifications in other countries that are analyzing RIM's service, including India, Indonesia and Lebanon, which want to monitor BlackBerry communications, said Matthew Reed, an analyst with Informa Telecoms & Media.
Imad Hoballah, acting chairman and CEO of Lebanon's Telecommunications Regulatory Authority (TRA) said last week his agency is analyzing encrypted data sources to find ways that security agencies can get access to data when needed.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Top 3 Myths about Big Data Security : Debunking common misconceptions about big data security
- Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are...
- Magic Quadrant for Data Masking Technology
- IBM is a leader in Gartner Inc's Magic Quadrant for Data Masking Technology. Read the full report to learn about IBM.
- Best Practices for Securing Hadoop
- Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges
- Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks... All Government IT White Papers
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer...
- Charting Your Analytical Future - "Making predictive analytics part of your business processes" Webinar This session will show how predictive analytics can be used throughout the organization by anyone looking for answers and how organizations can make...
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success!
- Transform Your IT Service Management Watch this webinar, to learn how EasyVista can increase IT productivity & efficiency and deliver streamlined & integrated IT Service & Asset Mgmt.
- All Government IT Webcasts