Feeds

Apple blacklisted by Chinese consumer watchdog

Support policies earn scorn as punters air grievances

Seven Steps to Software Security

A Chinese consumer rights group has slammed Apple’s after-sales service as unfair and placed it on an “integrity blacklist” after numerous complaints about maintenance and support.

The China Consumer Association in the southern province of Guangdong released a report into the tech giant’s support policies last week, citing strong customer dissatisfaction with how they have been treated, according to National Business Daily (via MIC Gadget).

The report highlighted the case of a customer named Wang who took his iPhone 4 in to be repaired within the warranty period. Although Apple replaced all the parts it refused to renew the warranty.

The report into consumer complaints levelled in the first half of 2012 singled out foreign electronics brands for poor after-sales service policies, but the fruity toy maker has been getting the most heat thanks to its high profile and previous run-ins.

The China Consumer Association has already pointed to a clause in Apple’s repair policy as unfair. It apparently states that the firm can use old spare parts to repair its kit, and requires that users agree to hand over any defective parts back to Apple, raising suspicions that it may be using these to repair other devices.

There have also been complaints about Apple’s refusal to accept responsibility for any damage to a product incurred in transit – which apparently impinges on Chinese consumer rights laws.

Time will tell whether such grievances affect consumer perception of the fruity electronics brand in the People’s Republic.

Considering the firm lost over $2 billion in revenues in Q3 thanks to slowing iPhone sales, it could do without such publicity in the world’s biggest smartphone market.

Apple did not immediately reply to a request for comment. ®

Boost IT visibility and business value

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.