google-site-verification: google65a83de5d23a6899.html google-site-verification: google65a83de5d23a6899.html
HomeBusinessAudit Report Reveals 400m Pkr Spent by PIA Pilots and Cabin Crew

Audit Report Reveals 400m Pkr Spent by PIA Pilots and Cabin Crew

An audit report of the state-claimed Pakistan International Airlines (PIA) has uncovered that the carrier’s pilots are overpaid and spend on rich lodgings in spite of having low efficiency. This has caused misfortunes of a large number of rupees between 2008-2017. 

The Audit report, accumulated by authorities of the PIA and the Civil Aviation Authority, pointed at an absence of profitability among the PIA pilots. Notwithstanding the pilots being generously compensated, 49 to 81 percent were not finishing their flying hours. 

The audit analyzed the records from 2008 to 2017 and claims that PIA pilots and lodge group spend lavishly on costly inn remains both locally and in worldwide goals, prompting lost a huge number of rupees. “The use is absolutely outlandish,” the report states. 

Must Read : British Airways Continue Operations from Islamabad after some ease in Coronavirus Cases

As a case close by, PIA pilots and group reportedly reserved a five-star inn in Karachi, in spite of the carrier possessing a 300 room inn in the city. Also, when the teams ventured out to worldwide stations, it picked extravagant lodgings over-planned ones, bringing about lost almost Rs. 408 million. 

A further breakdown, gave in the report, expresses that Rs. 14 million were spent in inn remains in Bangkok, Rs. 27 million in Beijing, Rs. 8 million in Birmingham, Rs. 26 million in Dubai, Rs. 2.4 million in Jeddah, Rs. 9 million in Kuwait, Rs .1 million in Kuala Lumpur, Rs. 214 million in London, Rs. 27 million in Manchester, Rs. 2 million Oslo, Rs. 72 million in Paris and Rs. 7 million in Toronto. 

This excessive use has brought about lost over Rs. 408 million for the national transporter.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

google-site-verification: google65a83de5d23a6899.html