Feeds

Egypt crafts mobile phone 'code of conduct'

Thou shalt not call home to say "I'm at the pyramids"

Internet Security Threat Report 2014

Think twice before using your mobile phone next time you're in Egypt, because the country has drawn up an “ethics code” for mobile phones.

The guide – written by the country’s National Telecom Regulatory Authority (NTRA) and Consumers Rights Protection Committee (CRPC) – contains 16 points designed to regulate your behaviour while using a mobile phone.

Point two of the code, for example, warns that you shouldn’t call others during times of rest, while point seven advises you not to send text messages containing inappropriate words or indecent pictures.

Anyone with a dislike for the Crazy Frog will like point 11 of the guide, which suggests phone owners “choose a non-annoying ringtone”.

Some of the code’s more reasonable points include a warning not to use your phone inside places of worship or while driving.

It’s unclear when the code – which doesn’t appear to carry any legal weight - was drawn up and whether it’s intended for Egypt’s inhabitants, visitors to the country, or both.

Nonetheless, the guide’s first point makes clear that “mobile phone technology is considered one of the greatest technologies that emerged in the last few years to serve humanity”.

This reason, according to the CRPC and NTRA, means that – above all – you should never use a mobile phone to “annoy or tease others”. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.