Feeds

Apple relieves Chinese iPod slave laborers

Promises a 60-hour week

Top three mobile application threats

Apple Computer has vowed to cease driving its Chinese iPod assemblers like rented mules, after being shocked, shocked, to learn of abuses at several of its overseas factories. The Mail on Sunday recently broke the story, and identified poor conditions at factories in Longhua and Suzhou, operated by Taiwanese outfits Foxconn and Asustek.

The paper described workers driven more than 60 hours and more than six days per week, living in dormitories packed 100 to a room, earning £27 per month, and being denied visits from non-empoyees. The Longhua facility is reported to hold 200,000 workers behind its fences, chiefly uneducated young women and girls.

Apple was quick to respond. "In response to the allegations, we immediately dispatched an audit team comprised of members from our human resources, legal and operations groups to carry out a thorough investigation of the conditions at the manufacturing site," the company explains.

The company said its investigators found no evidence of forced labor or the exploitation of child workers (16 is the minimum legal age in China).

Apple has declined to identify the factory at which it conducted this thorough investigation, but one would be forgiven for imagining it as one of the better examples of offshore tech manufacturing.

The report gushes about the factory campus that Apple visited, with its "employee housing, banks, a post office, a hospital, supermarkets, and a variety of recreational facilities including soccer fields, a swimming pool, TV lounges and Internet cafes."

"Ten cafeterias are also located throughout the campus offering a variety of menu choices such as fresh vegetables, beef, seafood, rice, poultry, and stir-fry noodles. In addition, employees have access to 13 different restaurants on campus," the report notes.

And "employees were pleased with the variety and quality of food offerings," Apple's investigators learned.

The company has instituted a policy requiring workers to have one day off each week, and limiting them to 60 hours of work per week, except in unusual circumstances (e.g., the Christmas rush).

"We believe in the importance of a healthy work-life balance," the company explained. ®

3 Big data security analytics techniques

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.