IDG News Service - BlackBerry data services can continue in Saudi Arabia after Research in Motion agreed to monitoring of e-mail and instant messaging data services, an official of the country's regulator, Communications and Information Technology Commission, (CITC) said on Tuesday.
RIM has agreed to place some of its communication servers in the country, said the official on condition of anonymity.
In a statement, CITC said it had decided to allow BlackBerry Messenger, RIM's instant messaging service, as part of the regulatory requirements had been met. Other regulatory requirements have not been met by operators, but CITC's statement did not specifically say which ones.
Etihad Etisalat, which uses the brand name Mobily, Saudi Telecom Company (STC), and Zain Saudi Arabia are the three operators in the country that offer BlackBerry services.
A RIM spokesman based in India said the company did not have a comment on the Saudi Arabia arrangement.
The CITC said last week that it would suspend BlackBerry services in the country on Friday, as it violated regulations. It subsequently provided an extension to operators until end of Monday to test out the solutions they were working on with RIM. The deadline passed without a cut in service, according to reports.
In his daily press briefing on Monday, Philip J. Crowley, assistant secretary at the U.S. Department of State, said that there had been a report of "at least an agreement between RIM and Saudi Arabia".
The U.S. Department of State said last week that it is in touch with the United Arab Emirates (UAE) and other governments to better understand their concerns and plans on the BlackBerry service. The UAE also said last week that it would suspend BlackBerry services from Oct. 11 unless RIM located servers in the country that can be monitored.
An agreement between RIM and Saudi Arabia is likely to have ramifications in other countries that are analyzing RIM's service, including India, Indonesia and Lebanon, which want to monitor BlackBerry communications, said Matthew Reed, an analyst with Informa Telecoms & Media.
Imad Hoballah, acting chairman and CEO of Lebanon's Telecommunications Regulatory Authority (TRA) said last week his agency is analyzing encrypted data sources to find ways that security agencies can get access to data when needed.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Move Mission-Critical Apps to the Cloud with AWS and F5
- Read this paper to learn about adoption inhibitors of the cloud, potential solutions, and how advanced Application Delivery Controller (ADC) technologies are critical...
- Pivotal Melds Big Data and Platform-as-a-service
- The value of Information has increased, so has the business's thirst for more information. Access to data and collaboration are at the heart...
- Operationalizing the Buzz: Big Data 2013
- The 2013 EMA/9sight Big Data research surveyed 259 business and technology stakeholders around the world.
- The Pivotal Big Data Suite- Reducing the Risks of Big Data
- The explosion of big data and the rapid evolution of big data tools and technologies is challenging IT to meet the demands of... All Government IT White Papers
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- All Government IT Webcasts