Feeds

Apple the victim after Chinese scammers exploit returns policy

Fakers exchanged phony parts for real to build 'new' iPhones

The Power of One Brief: Top reasons to choose HP BladeSystem

The on-going saga over Apple’s “unfair” after-sales service in China has taken another twist after it was revealed that scammers exploited its returns policy to exchange fake parts for real ones, enabling them to build and sell new devices.

Five employees at an electronics store selling Apple goods were arrested in the Chinese city of Wenzhou after they submitted 121 fake iPhone 4S BAND parts to Apple, claiming they were damaged and needed replacing.

BAND is effectively the main part of an iPhone, with a value in China of around 3,000 yuan (£315), according to TechWeb (via TechInAsia).

The scammers would apparently exchange the fakes for real ones, buy a back cover, battery and other components and then build and sell as new iPhone 4S devices for a profit of 1,000 yuan (£105) a go.

It took Apple over a month to spot the scam, after which the owner of the store in question was informed and an investigation begun. On April 1 police finally cuffed a shop engineer and her boyfriend as the ringleaders.

Ironically, the investigation was being carried out at the same time as state-run media outlets in China, led by national broadcaster CCTV, were lambasting Apple over its “unfair” returns policy.

The main charge levelled was that, unlike in other countries, Apple would replace defective phones under warranty with new devices but use the back cover from the original phone so as to circumvent local laws requiring a reset on the warranty period.

CEO Tim Cook later offered “sincere apologies” in a grovelling open letter published on the Apple China web site and pledged to broaden warranty support.

But with scams like this likely to be just the tip of the iceberg, it's clear the fruity tech titan has a lot more to worry about in China than appeasing the authorities. ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.