0% found this document useful (0 votes)
9 views1 page

Violation of Human Rights

DOC

Uploaded by

monika sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views1 page

Violation of Human Rights

DOC

Uploaded by

monika sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

VIOLATION OF HUMAN RIGHTS

During the visit, when the questions were asked to the workers, the following human rights
violations were identified.

1. Exploitation of Labour:

Workers at the spice factory are facing long working hours, low wages, and poor working
conditions along with a lack of proper safety equipment or breaks.

2. Child Labor:

Children below the age of 14 years in spice production, which deprives them of education and
exposes them to hazardous conditions.

3. Discrimination:

Workers are facing discrimination based on their gender, ethnicity, and other factors, impacting
their pay, job security, and treatment.

4. Unsafe Working Conditions:


Factories lack proper ventilation, safety protocols, or health protections, leading to
occupational hazards.
5. Poor Working Conditions:

Health Risks: Workers are exposed to harmful chemicals without protective gear, leading to
respiratory issues or skin diseases.

Inadequate Facilities: Lack of clean drinking water, restrooms, and sanitary conditions
significantly impact workers' health.

6. Wage Theft:

Unpaid Overtime: Workers may be required to work extra hours without compensation.

Illegal Deductions: Employers might make unauthorized deductions from wages, further reducing
take-home pay.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy