French NGOs file complaint against Samsung over Chinese labor practices
- 27 February, 2013 17:17
Three NGOs filed a complaint with a French prosecutor's office against Samsung's subsidiary in the country, saying that the affiliate should be held responsible for labor violations in China.
The complaint was filed Tuesday with the prosecutor's office in Bobigny, a suburb of Paris, by non-governmental organizations Peuples Solidaires, Sherpa and Indecosa-CGT, said Marie-Laure Guislain , head of litigation for Sherpa.
Subsidiaries of big vendors like Samsung shouldn't be able to get away with violations of labor laws by their sister companies in other countries, Guislain said. Samsung says in its French publications and advertisements that it respects the rights of Chinese workers and imposes codes of conducts and ethical standards, but the company is not keeping its promises, she said.
"What Samsung is saying in its advertising is that it is a very respectable company. This communication is misleading," Guislain said. Therefore, the nongovernmental organizations decided to file the complaint.
Samsung products are manufactured by underage workers China that often work 12 hour days and sleep with eight people in small dorm rooms, Guislain said. In September New-York based labor rights group China Labor Watch revealed this labor misconduct.
After the China Labor Watch report, Samsung announced it would take measures to keep its suppliers in China compliant with labor laws. The company also completed a round of audits that found problems relating to overtime and the way penalties were carried out. Since then, however, new problems with underage workers were reported by China Labor Watch that Samsung subsequently denied.
It is the first time that the NGOs have had the opportunity to file a complaint like this with the prosecution in France, said Guislain, adding that they had China Labor Watch to thank for that. "Before it was difficult to do such a thing because we didn't have proof," she said. The NGOs, however, think they have a strong case now, she said.
The organizations haven't heard back from the French prosecutors yet. "That usually takes quite a long time," said Guislain, who estimated that it might take a month or longer before they would hear the prosecutors' decision on whether to proceed with a case.
Samsung did not immediately reply to a request for comment.
Loek is Amsterdam Correspondent and covers online privacy, intellectual property, open-source and online payment issues for the IDG News Service. Follow him on Twitter at @loekessers or email tips and comments to firstname.lastname@example.org
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Real-Time Protection Against Malware Infection
Malware is at such high levels (more than 60 million unique samples per year) that protecting an endpoint with traditional antivirus software, has become futile. More than 100,000 new types of malware are now released every day, and antivirus vendors are racing to add new protection features to try to keep their protection levels up. Read more.
Managing the Rapid Rise in Database Growth: 2011 IOUG Survey on Database Manageability
As the era of “Big Data” marches on unabated, data is coming from an ever wider range of sources, including transactional systems, mobile devices, sensors, streaming media, and social networks. Businesses are looking for innovative ways to better leverage terabytes—and for some, petabytes—of information. Read more.
Building a Better Mousetrap in Anti-Malware
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.