Feeds

Human rights group: Nintendo tops conflict minerals baddies list

HTC, Sharp, Nikon also not doing enough to dodge use of war-sourced kit

Secure remote control for conventional and virtual desktops

A human rights group has said that Nintendo, HTC and Sharp are among companies that don't do enough to ensure conflict minerals do not end up in their products.

The Enough Project, a part of the Centre for American Progress, put Nintendo at the bottom of its conflict minerals ranking in a report on sourcing minerals that are mined in war conditions amid human rights abuses.

"Nintendo has made no known effort to trace or audit its supply chain," the report stated baldly.

The Project also singled out Sharp, HTC, Nikon and Canon, saying that although they had started to look at conflict minerals, their progress was "far behind industry leaders".

The report scores firms on their efforts to figure out where the minerals and metals they use in their tech comes from and their attempts to get a conflict-free certification, as well as environmental rankings and support for legislation against conflict minerals.

Intel, Motorola, HP and Apple were all at the top of the list, having "moved forward to develop solutions despite delays in the legislative rule-making process by the US Securities and Exchange Commission - an excuse that many other companies have used to explain their lack of significant action", the Project said.

The report refers to the US 2010 Dodd-Frank financial reform law, which would require companies to disclose whether they use tantalum, tin, gold or tungsten from the Democratic Republic of Congo. The SEC is due to vote on 22 August on the guidelines needed to enforce the law.

Conflict diamonds from the DRC are a well-known commodity, but the large reserves of the minerals used in electronics that are in the country haven't had as much press.

With the new rules, firms will have to identify if there are any of conflict minerals in their products and if they are, the company will have to do a due diligence check to track them back to their origins. ®

Internet Security Threat Report 2014

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Special pleading against mass surveillance won't help anyone
Protecting journalists alone won't protect their sources
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Apple's iPhone 6 first-day sales are MEANINGLESS, mutters analyst
Big weekend queues only represent fruity firm's supply
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Bill Gates, drugs and the internet: Top 10 Larry Ellison quotes
'I certainly never expected to become rich ... this is surreal'
Big Content Australia just blew a big hole in its credibility
AHEDA's research on average content prices did not expose methodology, so appears less than rigourous
EMC, HP blockbuster 'merger' shocker comes a cropper
Stand down, FTC... you can put your feet up for a bit
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.