Do Your Employees Shop Online While at Work?

Do Your Employees Shop Online While at Work?

With the growing popularity of Cyber Monday sales and the growth of all types of eCommerce, your employees are likely tempted to shop during work hours. To add to the attraction, there are a lot of promotions exclusively available to online shoppers that take place during business hours of operations. Many companies allow occasional use of company time for personal use. However, some employees are going to take advantage of this generosity and abuse the privilege.

Online Shopping at Work - By the numbers.

  • 53 percent of employees do some online shopping during work, an increase from last year.
  • 49 percent of employees use their personal smart phones or tablets to shop at work, an increase from 42 percent last year.

Here are some ideas that might help you address the issue of excessive use of the Internet for personal purposes:

  • Develop a solid Internet and email policy that provides employees with clear expectations about your stance on personal time online at work. Follow through with enforcement of the policy when necessary.
  • Train your managers and supervisors on how to establish and maintain the expectations and policies of your workplace. Train them to recognize when an employee might be abusing their Internet access at work.
  • Designate times and/or durations that your team is allowed to use company Internet for personal purposes. Stress that those who don’t comply with designated time/duration will lose the privilege altogether.
  • For those businesses that are looking for a more aggressive approach to handling Internet abuse, consider implementing a web content filter. Web filters give you access control, allowing you to decide which websites your team can access. Filter settings can be deployed company wide, as well as individually for specific user permissions.

Since no two companies are alike, you may have to use trial and error to curb Internet abuse by your staff. Whatever you choose to do, SMART Services can help. We can design an Internet usage policy that works for your agency, or implement content filtering or other solutions to keep your staff on-task and productive. Contact us today at 586 258-0650 .

Let Smart Services position your agency for tomorrow’s technological challenges. For more than 25 years, Smart Services has helped agencies across the U.S. face a changing environment by providing innovative technology solutions that allow agencies to focus on growing their business. MyAgency Cloud, our complete cloud solution, covers all your technology needs in the cloud or at your agency. In today’s competitive environment, it’s time to make your agency technology a strategic asset, instead of a liability. Let us show you how. To learn more, please call our expert agency technology advisor at 586-258-0650.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, December 11 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Windows 8 Bandwidth Security Document Management Best Available HBO Camera Redundancy VPN Google Computer Fan HITECH Act Email 3D Printing Professional Services Saving Time MSP webinar Collaboration Managed IT Remote Monitoring Tutorial Monitoring Office 365 ISP lunch and learn Firewall SharePoint Touchpad CrashOverride IT Solutions Holiday Server Printers WIndows 7 Blogging Wayne Joubert Help Desk Company Culture Legal Communication Access Control Upgrade Taxes Going Green Emergency Phishing Scam Save Time Regulations Avoid Downtime Thank You Scott White Backup Outlook Employer-Employee Relationship Hacking Wireless Technology PowerPoint iPad Microblogging Customer Relationship Management Augmented Reality Virus Emails Audit Patch Management Education Virtual Assistant Google Drive Bloatware robot Adobe Advertising IT Budget Gifts Telephony Encryption Wiring Solid State Drive Cortana MAIA SMART Services Sales Transportation Technology Analytics Display Value Fun Managed Service Regulation Youtube eWaste Updates Congratulations Cybersecurity Artificial Intelligence Antivirus Testing press release Co-managed IT Nokia Root Cause Analysis Data Recovery Media Consumption Bring Your Own Device Surge Protector Supercomputer Distributed Denial of Service Budget Inbound Marketing Students Mobile Computing Data File Storage Payroll Google Maps Saving Money Excel Scam Peripheral Computing Cameras holidays hacker Customer Service Managed IT Service Mobile Security OneNote Windows 7 Music Unsupported Software Net Neutrality Data Management Storage Hetrick and Associates Debate Unified Threat Management Network BYOD Mobile Devices Small Business Humor Mobile Office IT Management Business Phone System Teamwork IT Services Private Cloud Productivity Science Battery Automobile Travel Reputation Devices Projects MySalesResults Jessica Stevenson Steve Anderson Ransomware Microsoft Excel Trending How To Outsourced IT Accessory SMARTweb Defense Data Theft Flexibility OneDrive The Internet of Things Comparison Identity Presentation Telephone Systems Windows Ink Keyboard Office automation Router Online Currency Internet Exlporer Project Management Vendor Employer Employee Relationship WiFi In the News Workers Touchscreen Content Filter email encryption Retail Tech Tip User Error NFL Work Station Kleinschmidt Insurance Cloud FAQ IT consulting website Smart Technology Cast Big Data Video Surveillance Politics WannaCry Innovation Tip of the Week Chevy HHR IT Consultant Gmail Black Market Streaming Media Hybrid Cloud Windows 10s iOS Virtualization Uninterrupted Power Supply USB Hyperlink Computer Accessories Keyboard Shortcuts Television Best Practices Access Hard Drive Hiring/Firing Managed IT Services Applications Biometrics Telephone Passwords Files App store Hosted Solution DDoS Business Continuity Update Computer Chromecast Specifications Money Government User Tips Take Your Agency to the Next Level Edge IT Support Extreme Technology Makeover Recovery Miscellaneous Administrator Ubuntu IT Service Gift Giving Work/Life Balance Financial Operating Sysytem Video Games Managing Stress Instant Messaging Information Virtual Reality Bluetooth Mobility Analysis Microsoft Android Spyware Google Docs Software as a Service Disaster Wasting Time Save Money Application hackers Printing Cloud Computing Tablet Samsung Productivity Buisness Hosted Solutions Law Enforcement Consultant Shortcut Computer Care Admin SMB Books Dark Web Wearable Technology BDR User Upgrades Language Sync Near Field Communication Microsoft Office 2010 Domains Business Management Intranet Wireless Electronic Medical Records Content Filtering Business Computing Social Engineering IT solutions Gamification Shadow IT Microsoft Windows 7 Data Protection Workplace Tips Proactive IT Users Alert Identities data backups Cost Management Business Intelligence Worker Commute Training File Sharing Mircrosoft Colocation Device Security Mobile Device Employee-Employer Relationship Proactive iPhone Mobile Device Management HaaS Marketing Evernote Wireless Charging Microsoft Office Data Privacy Identity Theft Images Chrome Lithium-ion battery Web Design Maintenance Ciminal Network Congestion video Blockchain Backkup Co-Managed Services Data Loss Vulnerability Unified Communications Applied TAM Apple WIndows Server 2008 Smartphone Scalability Mouse Tech Support Office Tips Managed Service Provider Internet of Things Cleaning Websites communications PDF Networking Wireless Internet Quick Tips Fax Server Remote Computing Human Resources Network Security Gadgets Prodcutivity Social Networking Privacy Best Practice Safety SaaS Webinar Back Up Point of Sale Utility Computing Hard Disk Drive Chromebook Alexa for Business End of Support Compliance Fraud Operating System Printer Windows Tablets Password Computer Forensics GLAD Software ebay Data Breach IIAI Running Cable Computers Hard Drives Smartphones Microsoft Word spam Amazon Data Security Conferencing Doug Vanni Facebook Current Events Hardware Branding Sports Two-factor Authentication Reliable Computing Business Technology VoIP social media Smart Tech Settings Managed IT Services Text Messaging Personal Information Information Technology Legislation Twitter Memory History Apps Experience Printer Server IT Support Browser Jerry Fetty Lifestyle Windows 10 App IT Technicians Benefits Administration Mobile Health Virtual Desktop IoT DocStar Bryant Caudill malware Cybercrime Licensing Tech Term Paperless Office Efficiency Google Assistant Laptop HIPAA Management Commerce Word Programming Vendor Management Financial Technology Phishing Microsoft Outlook 2007 Wi-Fi Search Disaster Recovery Windows 10 insurance Remote Workers Credit Cards Meetings Microsoft Outlook Risk Management Internet Data Backup Avoiding Downtime Connectivity Social Wasting Money Entertainment Charger Nanotechnology Data Storage agency automation Computer repair WPA3 Screen Mirroring

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *