Feeds

Tata says USA rejecting HALF of Indians' work visa requests

Outsourcer forced into stateside campus recruitment blitz to fill junior roles

High performance access to file storage

Indian IT services giant Tata Consulting Services (TCS) has said as many as half of its visa applications to the US are now being rejected as Washington continues to clamp down on immigration ahead of a new bill passing through Congress.

TCS global head of human resources, Ajoyendra Mukherjee, told news site Livemint that the 50 per cent rejection rate had forced the company to increase hires from the US and Canada by a third this fiscal year, from around 450 to 600 each quarter.

On paper, the figures could be worrying for an Indian IT industry waiting with bated breath to see whether a divided House of Representatives passes the Senate-approved immigration bill.

Nasscom has already branded the Border Security, Economic Opportunity and Immigration Modernization Act “discriminatory” because it could put strict limits on the number of H-1B visas – the class of visa granted to temporary foreign workers.

It has been argued that this could put a strain on the coffers of Indian firms as US hires would push up the wage bill and associated costs.

However, Mukherjee told the news site that this is not necessarily the case.

“At the junior level (in the US), it’s probably less expensive to hire someone locally than taking someone from India. Everyone thinks getting someone from India would be cheaper, but it’s not true – it’s more expensive at the junior level,” he said.

TCS has apparently visited 35 universities in the US to hire fresh off the campus, as part of this strategy.

Nevertheless, the high rejection rates for visas are still thought to push up the cost of doing business in the US.

The 50 per cent rejection rate, which Mukherjee said has been on-going for the past couple of years, is thought to have jumped from around 30 per cent prior to that as US lawmakers warm to a protectionist agenda.

Gartner has warned that “risk mitigation and contingency planning are strategic imperatives for enterprises with outsourcing deals that utilise India-based talent”. ®

High performance access to file storage

More from The Register

next story
From corporate bod to startup star: The 10-month gig that changed everything
What I learned as a techie in my time away from globo firms
Facebook snubbed Google's Silicon Valley wage-strangle pact, Sheryl Sandberg claims
Report details letter COO wrote to court addressing 'no-compete deal' lawsuit
Another day, another nasty Android vuln
Memory corruption mess can brick your mobe
Barclays warns freelance techies of DOUBLE DIGIT rate cut
'IT was a car crash before, so this isn't going to get any better' - sources
VMware announces compulsory bi-ennial VCP recertification
Downside: more time and money; Upside: VMware hints at two-yearly release cycle
Sysadmins and devs: Do these job descriptions make any sense?
Industry lobby group defines skills used in 25 common IT jobs
Who earns '$7k a month' but can't even legally drink? A tech intern!
Glassdoor reveals astonishing salaries of Silicon Valley undergrads
Your CIO is now a venture capitalist and you work at their startup
This just happened without you changing job, by the way
Turnover at the top in Oz telco-land as AAPT, Huawei, Optus, lose top brass
Move along, nothing to see here but orderly transitions
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.