Velocity Technology Partners Blogs

Get Your Staff to Stop Shopping and Start Working

Get Your Staff to Stop Shopping and Start Working

With the growing popularity of Cyber Monday sales and explosion of all types of eCommerce, employees are more than likely tempted to shop during work hours. There are a lot of promotions exclusively available to online shoppers that take place during a business’ hour of operations. Many companies allow occasional use of company time for personal use. However, some employees are going to take advantage of this generosity and abuse the privilege.

With the growing popularity of Cyber Monday sales and explosion of all types of eCommerce, employees are more than likely tempted to shop during work hours. There are a lot of promotions exclusively available to online shoppers that take place during a business’ hour of operations. Many companies allow occasional use of company time for personal use. However, some employees are going to take advantage of this generosity and abuse the privilege.


Online Shopping at Work - By the numbers.

  • 53 percent of employees are using time at work to shop online, an increase from last year.
  • 49 percent of employees use their personal smart phones or tablets to shop at work, an increase from 42 percent last year.

Here’s a few ideas that might help you address the issue of excessive use of the Internet for personal purposes:

  • Develop a solid Internet and email policy that provides employees with clear expectations about the employer's stance on personal time online at work. Follow through with enforcement of the policy when necessary.
  • Train your managers and supervisors about how to establish and maintain the expectations and policies of your workplace. Train them to recognize when an employee might be abusing their Internet access at work.
  • Designate times and/or durations that your team is allowed to use company Internet for personal purposes. Stress that those who don’t comply with designated time/duration will lose the privilege altogether.
  • For those businesses that are looking for a more aggressive approach to handling Internet abuse, consider implementing a web content filter. Web filters give you access control, allowing you to decide which websites your team can access. Filter settings can be deployed company wide, as well as individually for specific user permissions.

Since no two companies are alike, you may have to use trial and error to curb Internet abuse by your staff. Whatever you choose to do, Velocity Technology Partners can help. We can design an Internet usage policy that works for your company, or implement content filtering or other solutions to keep your staff on-task and productive. Contact us today at (800) - 983 - 5765.

Need Gift Ideas? Try Out These Gadgets!
Tip of the Week: Need to Write an Email? Keep Thes...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, September 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Mobile Security Wi-Fi Outlook App store Congratulations Outsourced IT Productivity Remote Computing Communication Disaster Recovery Company Culture Risk Management Flexibility Mobile Devices User Error Fraud Virtualization Storage Unified Communications Windows Spam Blockchain iPhone IT support IT budget WiFi Retail Politics Updates Windows 10 Big Data WannaCry Excel Best Practice Screen Mirroring Devices Data Protection Work/Life Balance Network App Websites Microsoft Excel Application Hosted Solutions Analysis IT Support Privacy Compliance Legislation Hybrid Cloud Mobility Law Enforcement Edge Smartphone Data Recovery Gifts Sync Content Filtering WIndows Server 2008 Vendor Management Commerce Managing Stress Personal Information Google Docs Identity Theft Technology Redundancy Best Practices Chrome Smartphones Cloud Computing Network Security Computer Forensics BDR Server Students Tablets Business Adobe Project Management Thank You Connectivity Cortana IT Services Business Continuity Softphones Memory Managed Service Provider Specifications FAQ Data Breach Device Security Security Router Software Management Conferencing Hardware Content Filter Tech Term Hosted Solution Evernote History Sports Google Credit Cards Managed IT Services intranet Update Regulation Legal Proactive Efficiency Hard Drive The Internet of Things Ciminal Tip of the Week Data Backup Wireless Internet SaaS Vulnerability Data Computing Smart Tech Business Computing Data Theft Computer Audit Proactive IT Safety Language Remote Monitoring Internet of Things Innovation Data Loss Data Management Maintenance Backup Monitoring MSP Android Virus VPN Managed IT services Emergency Social Media Computers Antivirus Google Maps Communications Gadgets eWaste Email Data Storage PowerPoint IoT Cast Shortcut Financial Unsupported Software Chromebook Government Microsoft Office Cybersecurity Gmail Malware Managed IT Networking Employer-Employee Relationship Lifestyle Phishing Internet Word Artificial Intelligence Gamification Workers Cost Management NFL Passwords Marketing Business Management Twitter Office 365 Spyware Two-factor Authentication Money Automation Hackers Data Privacy Software as a Service Telephone Systems File Sharing Microsoft User Tips Sales Streaming Media Google Assistant Google Drive Applications Financial Technology Cleaning Travel Comparison Apple Telephone BYOD Charger Identities OneNote Holiday Wireless Technology Wireless Charging HBO Licensing VoIp Browser Windows Ink IT Management Bring Your Own Device Cybercrime Operating System Social Engineering IT Solutions Alert Ransomware Tech Support Saving Money Education Value Cloud Data Security Apps Microsoft Word Mobile Device Management Encryption Collaboration Printing Identity Small Business Patch Management