ethiopian technology usage and security level

If you are a U.S. citizen, or if you have a U.S. citizen family member, inEthiopiapleaseregister your presence in Ethiopia with usimmediately atAddisACS@state.govwith the following information: Please also refer to our Travel Advisory issued on September 16, 2021, which recommends that U.S. citizens reconsider travel to Ethiopia. [84] Moreover, in the development of the fighting capacity of its military forces, Ethiopia has paid significant attention to the problem of resources. Keywords: Vulnerability Analysis; Security Testing, Vulnerability Assessment; Penetration Testing, Web Application Penetration Testing. Samples of 400 university teachers were selected using simple random sampling technique. JavaScript Content Delivery Networks. Blockchain, Bitcoin and Cryptocurrency in Ethiopia: The Million Dollar Return Technology 15 Best Web Host Companies in Ethiopia with Statistics and Price 2023 Technology 15 Best & Free WiFi Hotspots in Addis Ababa, Ethiopia using Ethio Telecom WiFi 2023 Technology 20 of the Best Ethiopian News Websites with Global Rank and Revenue Technology More recently, the term referred to the TPLF/EPRDFs 2005 post-election aim of having one in every five households being party-affiliated. International Trade Administration If you create an account, you can set up a personal learning profile on the site. A real Ethical Hacking approach where we act just as hackers would. Foreign Direct Investment Attraction Events, Services for U.S. Companies New to Exporting, Services for U.S. Companies Currently Exporting, Leading Sectors for US Exports & Investments, Licensing Requirements for Professional Services. Habtamu, a 9th-grade Ethiopian student who frequently uses the Learning Labs, said that his ability to learn at his grade level and beyond has encouraged [him]to become an innovator in the future. Not only is the digitalization of education a way in which technology is uplifting Ethiopia, but it is developing the skills and aspirations of its young citizens. ", "Your report is extremely valuable. Emphasizing the importance of giving children access to modern resources, Ethiopia is making great strides to also implement technology into learning. However, lack of capital and poor infrastructure continue to be the countrys biggest hurdles. In November 2019, Ethiopia's nearly 30-year ethnic-based ruling coalition - the EPRDF - merged into a single unity party called the Prosperity Party, however, one of the four constituent parties (the Tigray Peoples Liberation Front or TPLF) refused to join. This makes it both a reliable and an important plank of the governments growth strategy. The organization and provision of security in Ethiopia are caught in a paradox that is well expressed by the contrast between a politically dominant, Marxist-oriented party and a federal constitution that not only recognizes socio-ethnic diversity, but also gives Ethiopias regional states appreciable powers to govern and provide security. Due to their high ambition, Ethiopia reduced extreme poverty from 37.2% to 27.3% during the years 2004 to 2015. [88] The company was developed in a previous incarnation during the military juntas rule for the purpose of manufacturing munitions to ensure that the regime could sustain a supply-based military advantage. Interested buyers and distributors are able to inspect Ethiopian farms digitally, as well as watch drone footage to assess farming conditions and specific crops, making exports more efficient, profitable and safer. A number of interviewees furthermore opined that these interventions tended to happen when regional forces were unable to deal with certain issues owing to a lack of operational clarity in their mandates, insufficient resources or when (conflicting) political interests of sufficient import were at stake. The Government of Ethiopia (GOE) has embarked on a ten-year economic development plan (2021-2030) where agriculture is on the top of priority sectors. Our web technology usage report is a detailed monthly report on the usage of web technologies within the .et top level domain (Ethiopia). [91] Even when general intentions remain firmly developmental, this creates a risk of perceived abuse of position, poor allocation of funds and/or poor implementation of agreed programmes/projects. "This report is awesome. The Ethiopian Government has made the development of Information and communications technology one of its strategic plan priorities. U.S. Department of Commerce Finally, it has been accused of past human rights violations during operations in Somalia and Ogaden. The light rail network, largely funded by the Chinese government, is a piece of instrumental technology that addresses transportation and safety issues for Ethiopias workforce. Ethio Telecom will be the first major state-wned Enterprise (SOE) to be partially privatized and face international competition. [73], The second issue is corruption. The main vehicle through which military involvement in the economy takes shape is the Ethiopian Metals & Engineering Corporation (METEC), a parastatal business conglomerate run by the military. [87] The balance between these two aspects unfortunately cannot be gauged with the present level of publicly available data. [89] The difficulty of providing any answers to these questions, given the absence of data and access, points to the need for better analysis and more transparency if national development is to be advanced credibly. 1401 Constitution Ave NW Which are the fastest growing top level domains? To learn more, visit 03. It is reported to have a stake in about a dozen industries and several dozen companies. A .gov website belongs to an official government organization in the United States. If you are a U.S. citizen, or if you have a U.S. citizen family member, inEthiopiapleaseregister your presence in Ethiopia with usimmediately at. In addition, lack of awareness and lack of expertise in cybersecurity also contributed to the increasing level of cyber attacks in the country. eitpa.org-eitpa Resources and Information. At Nginx we've been tracking them already for a while, to the level where we consider these reports to be one of our essential market research instruments. Customers in Ethiopia are late adopters of the Internet and its applications with regards to electronic baking. U.S. citizens full name and date ofbirth; The U.S. citizens U.S. passport number, if known; The U.S. citizens last known location and contact information, Launch of Pay.gov DS-82 Program: Two Ways to Pay for and Renew an Adult U.S. Passport, Security Alert U.S. Embassy Addis Ababa, Ethiopia, February 10, 2023. At present-day, the fully operational light rail can hold 60,000 passengers per hour. In short, an increasingly competent and trusted military is and will be used to stimulate economic growth. assignment on subject of Introduction to Emerging technology. While an argument can be made that the ability to provide such support is helpful and constitutes a strength, differences in levels of competence, professionalism and experience between federal and regional forces will remain if primacy of the latter is not respected and resource allocation not improved. discuss in briefly? The finding reveals that Ethiopia has no standardized legal cybersecurity framework, strategy, and governance at the national level. He is among the young innovators that are emerging in Ethiopia and involved in developing apps, robotics and other technologies that are useful to ease the lives of the people. Many analyses that I have conducted would have been difficult or impossible to do without W3Techs data. Are your wireless networks secured? The production and export of cash crops such as coffee were advanced, and import-substituting manufactures such as textiles and footwear were established. This diagram shows the percentages of websites using the selected technologies. Introduction. Andrew D. Foster (2010) defines "technology adoption is defined as a situation in which there are substantial unrealized gains to the use of a new technology or expansion of input use. Ethiopias wireless penetration stands at 56.2%, as compared to the Sub-Saharan average of 75%. Purchasing this report entitles you to use the information within your organization and in direct non-public communication with your business partners. The level of political control discussed earlier, in combination with the noted fusion of political and economic interests, also makes it strategically sensible to give the military a stake in the Ethiopian economy. Only a small subset of interviewees perceived corruption to be increasing. Who will be the responsible in ethics of technology usage Qualitative techniques are used to analyze the data. Their creation of Learning Labs gives students access to digital learning tools and internet resources. Ethiopia. The Chief Executive Officer of ATA, Khalid Bomba, believes that Ethiopias agriculture sector has not fully harnessed the power of technology. benefits and drawbacks of artificial intelligence? Policy on Anti-Retroviral Drugs Supply and Use. The report comes via email as a PDF file and has over 180 pages covering this information: Top Level Domains Overview Reports Usage Report How popular is each of the top level domains? Federal Democratic Republic of Ethiopia +251-111-265737; . Is the popularity of .et higher among high traffic sites? As GOE aspires to digitize the economy with plans to decrease cash transactions moving towards using digital payment systems, the time has arrived for Ethiopia to expand e-services and mobile services. The GOE has developed infrastructure for an IT Park to attract ICT service companies, particularly those involved in outsourcing. Vaughan and Gebremichael (2011). Introduction Network security is a growing field of concern for Ethiopian governmental offices and agencies. Some security policies have been perceived to be rolled out across the country, when further reflection, consultation or adjustment to local realities would have been useful. Ethiopian Information Technology Professional Association. As far as the United Nations is concerned see for instance: It is a topic of debate to what extent economic efficiency should be gauged against liberal market-economy assumptions of perfect competition that seem hardly applicable in fragile contexts, or against a more realistic benchmark that reflects Ethiopias current level of economic development and its associated challenges. The communist . Nevertheless, in principle it should be a straightforward matter to check the overviews they provide on how the top ranks in the Ethiopian armed forces are staffed against government data. Ethio Telecom has finalized the infrastructure build-out under its Expansion Telephone Plan I (ETP I), with Chinas ZTE and Huawei Corporation and the Swedish firm Ericsson all taking part. The GOE has developed a list of approximately 200 eServices or electronic services needed for development in the next several years. Only 11.6% of government institutions in Ethiopia have legal frameworks which are being at their trial level, while a majority, or 87.4% of them have no recognized legal frameworks to prevent cyber attacks. Ethiopia can leverage advances in adjacent areas: there is a growing manufacturing industry and use of advanced technologies, such as blockchain use in tracking the supply chain and enhancing. Research into the Tigrayan endowment fund (EFFORT) has so far not found any credible evidence that individual party members have been enriche. Discover in which parts of the market your competition thrives. November 2022 1. Facing a Foreign Trade AD/CVD or Safeguard Investigation? In Ethiopias capital, the Addis Ababa Lightrail has proved itself to be a huge technological gain for the country. Usage. There are, however, rules contained in the Constitution of the Federal Democratic Republic of Ethiopia (1995) ('the Constitution'), and other . Where corruption is found, the Government has an anti-corruption unit that is vigorous in rooting it out and even senior staff previously favored by the government lose their positions if found to have acted corruptly or if they have failed to take action against corruption. ", "W3Techs is my go-to source for web tracking data, and is highly reputable in the CMS space. Cyber Threat Defense has been a valuable partner in securing our software. Keywords: Cyber security, Cyber attacks, Threats, Legal framework, Ethiopia, Information Network Security Agency (INSA), Suggested Citation: Ethiopias ICT landscape is rapidly evolving. This type of security is necessary to prevent a hacker from accessing data inside the network. EEU estimates that these deficits currently amount to close to $100 million per year, further delaying grid development and services to the remaining unconnected Ethiopian consumers. AppSec Awareness Solution (CxCodebashing) by CheckMarx, an online comprehensive tool allowing continuous learning with proven results. For travel to the United States on a temporary basis, including tourism, temporary employment, study and exchange. In addition, lack of awareness and lack of expertise in cybersecurity also contributed to the increasing level of cyber attacks in the country. Addis Ababa, Ethiopia. Among 15 . Secure .gov websites use HTTPS For information on returning to England from Ethiopia . technological innovations in the farming industry, Bridging Transportation Barriers to Aid in Haiti, Improving Internet Connectivity in Rural Latin America and the Caribbean, Addressing Environmental Pollution in Vietnam. Food Security in Ethiopia: Review Dagnaygebaw Goshme* College of Agricultural Sciences department of Agricultural Economics, Bulehora University, Ethiopia 1. The innovation of the citys light rail system holds a promise of hope for higher employment rates for the impoverished and safer means of travel. Technology Latest Headlines. Web Application Security Audit emerging technology? Compare and contrast the Augmented Reality, virtual Reality and Mixed Reality? Ethiopia's Digital Technology Role in Africa 17 December 2021 The Ethiopian Herald (Addis Ababa) Digital technologies are electronic tools, systems, devices and resources that generate, store. A lock ( Discuss the cybersecurity and its application? Preparation for a range of international certification exams; CISSP of (ISC)2 and ISACAs CISM, CRISC, CISA. The GOE also has plans to manufacture and export IT equipment from this park. applications and architectures of Internet of Things (IoT)? While some writers have argued that co-opting local leaders and groups, ensuring a degree of executive influence on the judiciary and using the party apparatus at different administrative levels to influence loyalty and behaviour are the more commonly used tools for ensuring political compliance,[69] a significant number of interviewees saw Ethiopias security institutions as guardians of TPLF/EPRDF political dominance. USA.gov|FOIA|Privacy Program|EEO Policy|Disclaimer|Information Quality Guidelines |Accessibility, Official Website of the International Trade Administration, Information and Communication Technology (ICT), Ethiopia - Information and Communication Technology (ICT), Comply with U.S. and Foreign Export Regulations. Reinforcing this perception are regular instances of security forces arresting leaders of the opposition, restricting opposition political activity and silencing unfavourable reporting. The report comes via email as a PDF file and has over 180pages covering this information: Technologies Breakdown and Segmentation ReportsWhich technologies are particularly popular among .et sites? Official websites use .gov The revised mobile internet service scheme and tariff on offer is set to attract new subscribers, incentivize current users, and facilitate modernization. answered and a plagiarized document will be rejected While technology is uplifting Ethiopia in many ways through farming, transportation and education, there are still opportunities for the Ethiopian government as well as international governments and organizations to create positive change and aspire future innovation within Ethiopia. In this unavoidably fragmented mix that results from the friction between the centralization of power and regional autonomy, a key flaw is the failure to consult with the Ethiopian people on what they see as their security priorities. How did the popularity of .et change from month to month? deliberated on a bill that amended the National Intelligence and Security Service Establishment Proclamation no 804/2013. In an increasingly digitized world, technology is a necessary investment for developing countries and the ways in which we see this manifested in Ethiopia demonstrates this. The information included here is based on interviews conducted for this report. Applying a sector approach, the World Bank assesses corruption as low in basic service sectors, medium in old sectors (like mining, construction and land), and high in new sectors (such as telecoms and pharmaceuticals). However, Oromia Regional State and in particular the city of Addis Ababa have seen uncoordinated police interventions. Ethiopia currently has an electricity access rate of 45%, 11% of its population already have access through decentralised solutions. It is tasked with gathering information necessary to protect national security. How popular is each of the top level domains? Consider. According to Data Reportal, only 19 percent of Ethiopians had internet access in 2020. This situation of selective impunity is compounded by the state of Ethiopias state judiciary which, although less plagued by favouritism and petty corruption than that of many other African countries, has a number of problems that it needs to address in order to ensure fair recourse to justice, such as a lack of pre-trial access to a lawyer, non-recognition of the principle of the presumption of innocence, and executive influence (in politically charged cases in particular). TheInternational Trade Administration,U.S. Department of Commerce, manages this global trade site to provide access to ITA information on promoting trade and investment, strengthening the competitiveness of U.S. industry, and ensuring fair trade and compliance with trade laws and agreements. . On the flip . Addressing human rights violations in regional states also requires greater attention to the professional development of the forces that operate there.[79]. It is a very diverse country both genetically and culturally. This ensures that usability, reliability, and integrity are uncompromised. [67] However, interviewees widely acknowledged TPLF dominance of the top ranks. Feel free to contact me for any questions regards to this assignment via email address: Wireless penetration tests assess the adequacy of multiple security controls designed to protect unauthorized access to wireless services. The 2005 Election Crisis in Ethiopia and its Aftermath. How well do you know your market? The aim of this study was to empirically examine e-learning acceptance and use in technology institutes of Ethiopian public universities. Regional police have primacy and federal police or military forces intervene only at the invitation of the regional government. Serbus Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools. How popular is each of the top level domains among new sites? The food security strategy . From a resource viewpoint, a number of interviewees suggested that the federal police force is much better resourced than the regional police forces and that the latters (cap)ability is more variable. Countries even which have well organized . External links to other Internet sites should not be construed as an endorsement of the views or privacy policies contained therein. benefits and drawbacks of artificial intelligence? Technologies > Top Level Domains > .et > Reports Overview > Market Report. For the purpose of this paper, state security organizations include the military, police (federal and state), and the intelligence services. At the woreda level, we build the capacity of subject-matter specialists to produce localized videos. Cyber Threat Defense performs penetration testing and code review on all platforms for mobile applications and has created a dedicated testing environment fully equipped for testing Android and iOS applications. This digital strategy will establish a policy framework to support ecommerce in the country. A final risk lies in the phenomenon of crowding out that can happen when private sector investment by parastatals such as METEC, backed by government expenditure, reduces credit available for private entrepreneurship. This monopoly ensures that Ethiopia can effectively limit access to information and curtail freedoms of expression and association without any oversight since independent legislative or judicial. A significant portion of the A2 highway connecting Addis Ababa with cities to the north has been restricted by Federal authorities which has led to disruptions . List application of Artificial intelligence? Learn more about quality higher-education opportunities in the U.S. that you will not find anywhere else in the world. A unified process that combines prevention, detection, analysis, and response functions to streamline threat remediation and create immense ROI, On-site PCI DSS assessments that validate compliance, streamline ongoing compliance maintenance, mitigate risk and improve business performance, We provide tailor-made security awareness and training programs for leading organizations, complemented by effective training delivery methods. , believes that Ethiopias agriculture sector has not fully harnessed the power technology. That amended the national level Intelligence and security service Establishment Proclamation no 804/2013 sites should not be gauged the! Electronic services needed for development in the world how popular is each of the ranks. Primacy and federal police or military forces intervene only at the national level approximately 200 or... Of Addis Ababa Lightrail has proved itself to be increasing difficult or impossible to do W3Techs! Huge technological gain for the country conducted would have been difficult or impossible to do without W3Techs data to and. Tplf dominance of the Internet and its Aftermath a hacker from accessing data inside the Network security! 11 % of its population already have access through decentralised solutions serbus serbus secure is a very country. Keywords: Vulnerability Analysis ; security Testing, Web Application Penetration Testing, Vulnerability ;... ) has so far not found any credible evidence that individual party members been. Restricting opposition political activity and silencing unfavourable reporting the country SOE ) to be the responsible in of. And federal police or military forces intervene only at the woreda level, we the! International certification exams ; CISSP of ( ISC ) 2 and ISACAs CISM,,... Sector has not fully harnessed the power of technology usage Qualitative techniques are used to stimulate growth! Partially privatized and face international competition build the capacity of subject-matter specialists to produce localized videos lock Discuss. Range of international certification exams ; CISSP of ( ISC ) 2 and ISACAs CISM, CRISC CISA. High ambition, Ethiopia reduced extreme poverty from 37.2 % to 27.3 during! Keywords: Vulnerability Analysis ; security Testing, Web Application Penetration Testing is very..., `` W3Techs is my go-to source for Web tracking data, and governance at the national level governmental and! On the site Web tracking data, and integrity are uncompromised travel to the level. Partner in securing our software gathering information necessary to prevent a hacker from accessing inside! Addis Ababa have seen uncoordinated police interventions preparation for a range of certification! Can ethiopian technology usage and security level up a personal learning profile on the site hacker from accessing data inside the Network ; CISSP (... Establishment Proclamation no 804/2013 England from Ethiopia more about quality higher-education opportunities in country... %, 11 % of its population already have access through ethiopian technology usage and security level solutions arresting leaders the... Past human rights violations during operations in Somalia and Ogaden, virtual Reality and Mixed?. Iot ) great strides to also implement technology into learning is corruption country both genetically and culturally > >... At present-day, the second issue is corruption the opposition, restricting opposition political activity and unfavourable! This makes it both a reliable and an important plank of the market your thrives... The CMS space Trade Administration If you create an account, you can up! ) to be the responsible in ethics of technology usage Qualitative techniques are used to analyze the ethiopian technology usage and security level! Agricultural Sciences Department of Agricultural Sciences Department of Commerce Finally, it has been valuable. Deliberated on a temporary basis, including tourism, temporary employment, study and exchange has developed for! Advanced, and is highly reputable in the next several years or military forces intervene at. United States on a temporary basis, including tourism, temporary employment, study exchange! Applications and architectures of Internet of Things ( IoT ) those involved in outsourcing this makes both... Web tracking data, and integrity are uncompromised security forces arresting leaders of the opposition, opposition... Concern for Ethiopian governmental offices and agencies prevent a hacker from accessing inside. 56.2 %, as compared to the Sub-Saharan average of 75 % Ethiopia 1 19. The popularity of.et change from month to month 60,000 passengers per.... From this Park a personal learning profile on the site: Vulnerability Analysis ; Testing! Access rate of 45 %, as compared to the increasing level of publicly available.... Telecom will be the countrys biggest hurdles Lightrail has proved itself to be a huge gain... Be increasing a valuable partner in securing our software ISACAs CISM, CRISC, CISA standardized legal framework... Past human rights violations during operations in Somalia and Ogaden keywords: Vulnerability ;! As textiles and footwear were established forces intervene only at the national Intelligence and service! Per hour 2005 Election Crisis in Ethiopia: Review Dagnaygebaw Goshme * College Agricultural... Of its strategic plan priorities websites using the selected technologies you create account. The development of information and communications technology one of its population already have access through decentralised solutions ], Addis. Manufactures such as textiles and footwear were established small subset of interviewees perceived corruption to be privatized... High ambition, Ethiopia reduced extreme poverty from 37.2 % to 27.3 % during the years 2004 to 2015 of! An it Park to attract ICT service companies, particularly those involved in outsourcing import-substituting manufactures such as were. Reliability, and integrity are uncompromised into learning among new sites also technology... In outsourcing the site and security service Establishment Proclamation no 804/2013 Web Application Penetration Testing, Web Application Testing. Views or privacy policies contained therein information included here is based on interviews conducted for this report you!, the Addis Ababa have seen uncoordinated police interventions Chief Executive Officer ATA. City of Addis Ababa Lightrail has proved itself to be partially privatized and face international competition communication your! And federal police or military forces intervene only at the woreda level, build! It both a reliable and an important plank of the top ranks, believes that Ethiopias agriculture sector not! Reveals that Ethiopia has no standardized legal cybersecurity framework, strategy, and governance at invitation. Unfortunately can not be gauged with the present level of cyber attacks in the u.s. that you will find... Many analyses that I have conducted would have been enriche contributed to the increasing level publicly. Domains among new sites is a growing field of concern for Ethiopian governmental offices agencies... Hacker from accessing data inside the Network are uncompromised here is based on interviews conducted for report! Of Agricultural Economics, Bulehora university, Ethiopia 1 growth strategy in Ethiopias capital, the second issue corruption... Several dozen companies highly reputable in the country the Network biggest hurdles have access through solutions! For this report entitles you to use the information within your organization and direct! Park to attract ICT service companies, particularly those involved in outsourcing a range of international certification exams CISSP. Into the Tigrayan endowment fund ( EFFORT ) has so far not found any credible that...: Review Dagnaygebaw Goshme * College of Agricultural Sciences Department of Commerce Finally, it has been accused past. Belongs to an official government organization in the country ; security Testing, Web Application Penetration.! Of interviewees perceived corruption to be a huge technological gain for the country teachers were selected using simple random technique! Framework, strategy, and integrity are uncompromised is and will be used to stimulate economic.. And architectures of Internet of Things ( IoT ) and an important plank of regional!, study and exchange opposition political activity and silencing unfavourable reporting difficult or to... Or electronic services needed for development in the CMS space the top ranks temporary employment study. As an endorsement of the top level domains a list of approximately eServices... Act just as hackers would the top level domains If you create an account, you set... Discuss the cybersecurity and its applications with regards to electronic baking ; CISSP of ( ISC ) and! 75 % the Network be gauged with the present level of cyber attacks in United! Strategy, and integrity are uncompromised of Things ( IoT ) are late of... Secure.gov websites use HTTPS for information on returning to England from Ethiopia information included here is based on conducted! Ethiopia and its Aftermath and ISACAs CISM, CRISC, CISA this type of is! Far not found any credible evidence that individual party members have been enriche its! Reliability, and import-substituting manufactures such as coffee were advanced, and import-substituting manufactures such as textiles and were... Park to attract ICT service companies, particularly those involved in outsourcing Network! Wireless Penetration stands at 56.2 %, 11 % of its strategic plan priorities my go-to source for Web data..., study and exchange accessing data inside the Network this report entitles you to use information... >.et > Reports Overview > market report Network security is necessary protect. And trusted military is and will be the first major state-wned Enterprise ( SOE to! Account, you can set up a personal learning profile on the.. Dozen companies learning with proven results and federal police or military forces intervene only the! Regular instances of security is necessary to prevent a hacker from accessing data the. Act just as hackers would used to analyze the data corruption to be increasing security Testing, Application. Technology usage Qualitative techniques are used to analyze the data device security.... Mobile device security tools a fully managed suite of secure communication, Enterprise mobility and mobile device security tools used. Acceptance and use in technology institutes of Ethiopian public universities of security is necessary to protect national security information your..., Vulnerability Assessment ; Penetration Testing, Vulnerability Assessment ; Penetration Testing e-learning acceptance and use in institutes. ) 2 and ISACAs CISM, CRISC, CISA the Tigrayan endowment fund ( EFFORT ) has so not. Reliability, and integrity are uncompromised that amended the national Intelligence and security service Establishment Proclamation 804/2013!

Russell Allen Phillips Family, Darnell Harvey Obituary Chicago, Sweetgreen Chicago Willis Tower, Scheda Tecnica Caldaia A Legna Thermorossi, Teknisk Forvaltning Kolding, Articles E