Feeds

London Underground cleaners to refuse fingerprint clock-on

Biometric-swiping tech infringes on workers' dignity – union

The Power of One eBook: Top reasons to choose HP BladeSystem

Cleaners working on the London Underground will resort to industrial action this week in protest against the introduction of a controversial biometric clocking-in system.

Starting at just after midnight on Thursday morning, "up to 300 cleaners" will join in the action by refusing to scan their fingerprints every time they clock on for work, said the union. Their decision will set the workers on a collision course with ISS, the Danish firm which employs them.

According to the RMT union, 98 per cent of the 103 staffers who responded to the ballot voted in favour of the plans, which stopped short of calling for a full-on strike.

Bob Crow, RMT general secretary, said: “Our tube cleaning members have been urged to stand firm and follow the call by the union to take industrial action short of a strike by refusing to use any biometric/fingerprint technology to book on for duty. We believe this technology infringes on staff civil liberties and the overwhelming vote in favour of action shows our members' strength of feeling on this issue.

“Strong union organisation in the workplace is the key to preventing this unacceptable method of booking on and RMT will continue to build our 'Thumbs Down to Fingerprinting' campaign.”

The union is vague on exactly why biometric fingerprinting is a bad idea. When The Register contacted the RMT, a spokesperson told us staff felt "brutalised" by the system, which made them feel like "slabs of meat".

The union said it represented between 200 and 300 cleaners, and said that ISS had "bulldozed" the biometric system into use, against the wishes of its staff.

RMT also suggested the fingerprint-based sign-in system infringed the cleaners' "dignity". The previous clocking-on method involved an automated phone line and a sheet of paper.

El Reg also contacted ISS but they have not yet responded.

The job of cleaning the Tube is regarded as one of the worst and most poorly paid in the capital. In 2010, London Underground cleaners were guaranteed receipt of the London Living Wage, which is currently £8.55 an hour. The union describes the cleaners' work contracts as "insecure".

Before the word "fluffer" was co-opted by the pornographic film industry, it was the name given to hordes of poorly paid, often female workers tasked with cleaning human hair, caked grease, black brake dust and other filth from inside tube tunnels.

Fluffers still work the tracks late at night, when the trains have finished running, although their job has been made easier with the introduction of specialised tunnel-cleaning trains, akin to a series of vacuum cleaners mounted on a tube carriage. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.