Feeds

Cancer doctor cites 'early' data on cell phone danger

Quick! Call a doct... oh damn.

Providing a secure and efficient Helpdesk

The head of a leading US cancer research institute has sent out a warning to his staff to limit their cell phone use because of a risk of developing brain cancer.

In a memo sent by University of Pittsburgh Cancer Institute director Dr. Ronald Herbman yesterday, he cautions mobile phone users should not to let a lack of evidence stop them from taking immediate action.

"We shouldn't wait for a definitive study to come out, but err on the side of being safe rather than sorry later," he said.

Herbman said his alarm is based on early, unpublished data linking long-term cell phone use with adverse health effects.

"Although the evidence is still controversial, I am convinced that there are sufficient data to warrant issuing an advisory to share some precautionary advice on cell phone use," Herbman wrote in his memo.

He first recommends that children avoid using mobile phones entirely except for emergencies.

"The developing organs of a fetus or child are the most likely to be sensitive to any possible effects of exposure to electromagnetic fields," he wrote.

Herbman also advised his staff to limit the number and duration of mobile phone calls, use text messaging when possible, and to periodically switch the phone to the opposite ear. Other recommendations include avoiding mobile phone use in public, "where you can passively expose others to your phone's electromagnetic fields."

The full list of his precautions is available here.

To date, no major academic study has found definitive evidence that cell phone exposure affects brain function. The effects of long-term use, however, remain somewhat sketchy as wide use of the technology is relatively new. ®

On the other hand...

El Reg prefers to err on the side of optimism, and is comfortable warning that prolonged cell phone use may instead increase the risk of all your dreams coming true.

Best cell phone side-effect EVER!

Fig 1) Resulting mutations to cells is pretty sweet, actually.

On a more somber note, high levels of mobile exposure has been proven by exhaustive studies to radically increase the chances of inadvisable late-night drunken calls to ex-girlfriends and former spouses. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.