Feeds

Foxconn: THESE child workers were NOT making Apple products

What do they teach them in schools nowadays?

Security for virtualized datacentres

Apple manufacturer Foxconn has admitted that child labourers were working at one of its factories in China.

The Taiwanese firm said an internal investigation found employees as young as 14 working at its plant in Yantai in the eastern Chinese province of Shandong, according to China Labour Watch.

The US-based NGO said Foxconn had confirmed the underaged interns in the factory and was now sending them back to school.

Apparently, the interns were mainly sent to Foxconn from schools, but the firm hadn't checked their IDs. China's minimum legal working age is 16.

"The schools involved in this incident should take primary responsibility, but Foxconn is also culpable for not confirming the ages of their workers," CLW said.

Foxconn said in a statement to the Financial Times that the students had only worked at the factory for around three weeks and the plant was not involved in any work the manufacturer does for Apple.

Staff injustices are rife at Chinese firms and Foxconn has been under intensifying scrutiny as an Apple supplier. Its factories have seen worker suicides and riots amidst allegations of bullying, long working hours, unhealthy conditions, disgusting dorms and underage employees. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.