Smart Services has been providing independent agents with proactive, fast, and expert technology services since 1991.

Do Your Employees Shop Online While at Work?

Do Your Employees Shop Online While at Work?

With the growing popularity of Cyber Monday sales and the growth of all types of eCommerce, your employees are likely tempted to shop during work hours. To add to the attraction, there are a lot of promotions exclusively available to online shoppers that take place during business hours of operations. Many companies allow occasional use of company time for personal use. However, some employees are going to take advantage of this generosity and abuse the privilege.

Online Shopping at Work - By the numbers.

  • 53 percent of employees do some online shopping during work, an increase from last year.
  • 49 percent of employees use their personal smart phones or tablets to shop at work, an increase from 42 percent last year.

Here are some ideas that might help you address the issue of excessive use of the Internet for personal purposes:

  • Develop a solid Internet and email policy that provides employees with clear expectations about your stance on personal time online at work. Follow through with enforcement of the policy when necessary.
  • Train your managers and supervisors on how to establish and maintain the expectations and policies of your workplace. Train them to recognize when an employee might be abusing their Internet access at work.
  • Designate times and/or durations that your team is allowed to use company Internet for personal purposes. Stress that those who don’t comply with designated time/duration will lose the privilege altogether.
  • For those businesses that are looking for a more aggressive approach to handling Internet abuse, consider implementing a web content filter. Web filters give you access control, allowing you to decide which websites your team can access. Filter settings can be deployed company wide, as well as individually for specific user permissions.

Since no two companies are alike, you may have to use trial and error to curb Internet abuse by your staff. Whatever you choose to do, SMART Services can help. We can design an Internet usage policy that works for your agency, or implement content filtering or other solutions to keep your staff on-task and productive. Contact us today at 586 258-0650 .

Let Smart Services position your agency for tomorrow’s technological challenges. For more than 25 years, Smart Services has helped agencies across the U.S. face a changing environment by providing innovative technology solutions that allow agencies to focus on growing their business. MyAgency Cloud, our complete cloud solution, covers all your technology needs in the cloud or at your agency. In today’s competitive environment, it’s time to make your agency technology a strategic asset, instead of a liability. Let us show you how. To learn more, please call our expert agency technology advisor at 586-258-0650.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, June 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Licensing Virus Passwords Cast Legal Productivity Mobile Device Management IT Solutions Software Network Security MAIA Router Lifestyle Server IT Support hacker Printer Shortcut Jerry Fetty Video Surveillance Taxes Books Computer Forensics Computing Images Tablets Display Data Protection Miscellaneous Websites Wireless IT solutions Commerce Customer Relationship Management IT Service Chromecast Mobile Hard Drive Spyware Nokia Innovation File Sharing Meetings Help Desk Browser SaaS FAQ Sports Online Currency Text Messaging Debate Apps Blockchain Lithium-ion battery Antivirus press release Outlook Apple webinar Android Smartphone Mobile Office Nanotechnology HIPAA Government Tutorial CrashOverride Comparison Buisness Cost Management Best Available Hard Drives Administrator Social Networking Business Surge Protector Trending Google Branding Managed IT Services BDR Redundancy Data End of Support Data Privacy Hardware Networking Programming Managed IT Services Ransomware User Regulation How To Mircrosoft Scam Health Flexibility Consultant Operating System Device Security Hosted Solutions Biometrics Audit Retail Efficiency Avoiding Downtime Gadgets Disaster Wayne Joubert Tech Support Smart Tech Excel Chevy HHR Computer Care Computer repair Recovery HITECH Act Augmented Reality Administration Microsoft Excel iPhone data backups automation Remote Monitoring Office 365 insurance Best Practice Printer Server Network Files Compliance Business Computing Managing Stress User Tips HBO Big Data Printing Twitter social media Legislation NFL iOS User Error Wireless Charging Devices Unified Threat Management Humor Financial Technology Applied TAM Sales History Evernote Intranet Video Games Smart Technology VPN Microsoft Word iPad Dark Web Reputation Internet of Things Benefits Bluetooth Financial Password Money Fraud Storage IT Management Web Design Shadow IT IT Consultant Business Intelligence Data Loss Domains robot Network Congestion Conferencing Travel Windows 10s Internet Access Google Docs Scott White Save Time IT consulting Worker Commute Firewall Software as a Service Congratulations spam Windows Ink Language Saving Money Privacy Vendor Management Analysis Sync Workers App Hard Disk Drive Microsoft Outlook Identity Presentation IIAI IT Support Virtual Desktop Experience Advertising Data Backup email encryption Artificial Intelligence Bandwidth Encryption Gifts Mobile Device Vulnerability Best Practices Cloud Computing Hacking Hiring/Firing Specifications Laptop Media Consumption Scalability Amazon GLAD Collaboration Private Cloud Emergency Black Market Patch Management Managed IT Service App store Google Maps Value WiFi IT Technicians Data Recovery Paperless Office PDF Samsung Employer Employee Relationship WIndows 7 Budget Fax Server Mobile Security Prodcutivity Cybercrime Small Business Instant Messaging Update Telephone Systems Inbound Marketing Document Management Youtube communications Science Windows 8 Entertainment Gamification IT Budget Holiday Customer Service Smartphones Human Resources Mobile Devices Data Breach IoT Mobile Computing PowerPoint Cybersecurity Managed Service Provider Phishing eWaste Wi-Fi Safety WIndows Server 2008 Technology Alert Reliable Computing Virtual Reality Wearable Technology hackers Unified Communications Save Money Hetrick and Associates Identities Risk Management DocStar Proactive IT Tech Tip MSP Tech Term Supercomputer Connectivity 3D Printing holidays Automobile Uninterrupted Power Supply Information Technology Security Law Enforcement Chrome Cameras Extreme Technology Makeover Battery OneDrive malware Communication Wireless Internet Windows 10 Politics Fun Productivity Data Storage Adobe Data Management Personal Information Credit Cards Kleinschmidt Insurance Distributed Denial of Service Upgrades Unsupported Software Proactive Disaster Recovery SMART Services Bloatware OneNote Education Microblogging In the News Chromebook Cloud Memory Phishing Scam Saving Time Current Events ebay Wiring Windows 10 Backkup Cleaning VoIP Upgrade Employer-Employee Relationship Monitoring Going Green Avoid Downtime Google Assistant Company Culture Work Station Thank You Blogging Email Keyboard Remote Computing Microsoft Windows 7 Data Theft Take Your Agency to the Next Level Google Drive BYOD Solid State Drive Computer Accessories Project Management Steve Anderson The Internet of Things Office Managed IT USB Running Cable Virtualization Doug Vanni Transportation SharePoint Mouse Maintenance Updates Television Music Screen Mirroring Jessica Stevenson Computers Colocation Emails Professional Services Word Microsoft Streaming Media Ubuntu Training Phone System Microsoft Office Mobility Webinar Microsoft Office 2010 Users IT Services WannaCry Quick Tips Settings Gift Giving Gmail Regulations Marketing Business Continuity Bring Your Own Device Net Neutrality Operating Sysytem Ciminal Computer Wireless Technology Business Management website Windows Office Tips Teamwork Electronic Medical Records Data Security Hosted Solution DDoS HaaS Application Back Up Computer Fan Cortana Touchscreen Content Filtering agency automation Content Filter SMARTweb Defense Tip of the Week Social Engineering Microsoft Outlook 2007 Bryant Caudill Social Management Identity Theft Charger Two-factor Authentication Root Cause Analysis Work/Life Balance video Students Point of Sale Tablet Backup Applications Telephony Facebook Outsourced IT Edge MySalesResults Search Near Field Communication Analytics Co-managed IT Internet Exlporer Touchpad Workplace Tips lunch and learn ISP

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *