Velocity Technology Partners Blog

Velocity Technology Partners has been serving Athens, Gainesville and North Georgia since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Get Your Staff to Stop Shopping and Start Working

Get Your Staff to Stop Shopping and Start Working

With the growing popularity of Cyber Monday sales and explosion of all types of eCommerce, employees are more than likely tempted to shop during work hours. There are a lot of promotions exclusively available to online shoppers that take place during a business’ hour of operations. Many companies allow occasional use of company time for personal use. However, some employees are going to take advantage of this generosity and abuse the privilege.

With the growing popularity of Cyber Monday sales and explosion of all types of eCommerce, employees are more than likely tempted to shop during work hours. There are a lot of promotions exclusively available to online shoppers that take place during a business’ hour of operations. Many companies allow occasional use of company time for personal use. However, some employees are going to take advantage of this generosity and abuse the privilege.


Online Shopping at Work - By the numbers.

  • 53 percent of employees are using time at work to shop online, an increase from last year.
  • 49 percent of employees use their personal smart phones or tablets to shop at work, an increase from 42 percent last year.

Here’s a few ideas that might help you address the issue of excessive use of the Internet for personal purposes:

  • Develop a solid Internet and email policy that provides employees with clear expectations about the employer's stance on personal time online at work. Follow through with enforcement of the policy when necessary.
  • Train your managers and supervisors about how to establish and maintain the expectations and policies of your workplace. Train them to recognize when an employee might be abusing their Internet access at work.
  • Designate times and/or durations that your team is allowed to use company Internet for personal purposes. Stress that those who don’t comply with designated time/duration will lose the privilege altogether.
  • For those businesses that are looking for a more aggressive approach to handling Internet abuse, consider implementing a web content filter. Web filters give you access control, allowing you to decide which websites your team can access. Filter settings can be deployed company wide, as well as individually for specific user permissions.

Since no two companies are alike, you may have to use trial and error to curb Internet abuse by your staff. Whatever you choose to do, Velocity Technology Partners can help. We can design an Internet usage policy that works for your company, or implement content filtering or other solutions to keep your staff on-task and productive. Contact us today at (800) - 983 - 5765.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

IT Support Small Business Money Technology Managing Stress Telephone Systems Sales Tip of the Week Vendor Management Conferencing Security App store Education Cybercrime Congratulations Lifestyle Microsoft Google Sports Microsoft Excel Maintenance Smartphone Data Loss Router Ransomware Employer-Employee Relationship Mobility Identity Compliance BDR Internet Identity Theft Travel Adobe Work/Life Balance Data Privacy eWaste Government Edge IT support Management Licensing Cloud Cost Management Device Security User Tips Best Practice Shortcut Screen Mirroring Students Monitoring Flexibility Emergency Cast Gamification User Error Phishing Backup Storage Efficiency Managed IT Collaboration Cortana Managed IT Services Financial Server Proactive Language Microsoft Word Devices Unsupported Software Best Practices File Sharing Internet of Things Data Theft Malware Computing Retail Software Communication Apple Financial Technology Tech Support Communications Microsoft Office Software as a Service Automation Big Data Alert Social Media Passwords Charger Data Recovery Networking iPhone Holiday Smart Tech Mobile Security Business Management IT Services FAQ HBO IT Solutions Remote Monitoring App Gadgets Browser Data Breach IT budget Wireless Charging Virus Audit Disaster Recovery Network Outsourced IT Content Filtering PowerPoint Analysis Data Storage Windows Artificial Intelligence Content Filter Update Spam Office 365 Updates Windows Ink Data Security Credit Cards Unified Communications Chrome Android Hard Drive Company Culture Computer Hackers Managed Service Provider Wireless Internet Cloud Computing Google Maps Two-factor Authentication OneNote Smartphones BYOD History Streaming Media Operating System Workers SaaS Data Backup Mobile Devices Marketing Specifications Sync Gifts Thank You Hosted Solutions Twitter Blockchain MSP NFL Gmail Word Spyware Data Protection Hardware Telephone Chromebook Cybersecurity Ciminal Wireless Technology Social Engineering Google Docs Project Management Evernote Apps Productivity Google Drive Legislation Identities Websites Fraud Computers Safety Hosted Solution VoIp Commerce Tablets Remote Computing Politics The Internet of Things WIndows Server 2008 Value Google Assistant intranet Wi-Fi Law Enforcement Email Innovation Business Continuity Proactive IT IoT Personal Information Windows 10 Business Application VPN Mobile Device Management Computer Forensics Risk Management Saving Money Legal Cleaning Antivirus Printing WannaCry Outlook Vulnerability Excel Comparison Data Management Virtualization Patch Management Redundancy Business Computing Memory Privacy Network Security Connectivity Encryption WiFi Tech Term IT Management Softphones Applications Data