Smart Services has been providing independent agents with proactive, fast, and expert technology services since 1991.

Do Your Employees Shop Online While at Work?

Do Your Employees Shop Online While at Work?

With the growing popularity of Cyber Monday sales and the growth of all types of eCommerce, your employees are likely tempted to shop during work hours. To add to the attraction, there are a lot of promotions exclusively available to online shoppers that take place during business hours of operations. Many companies allow occasional use of company time for personal use. However, some employees are going to take advantage of this generosity and abuse the privilege.

Online Shopping at Work - By the numbers.

  • 53 percent of employees do some online shopping during work, an increase from last year.
  • 49 percent of employees use their personal smart phones or tablets to shop at work, an increase from 42 percent last year.

Here are some ideas that might help you address the issue of excessive use of the Internet for personal purposes:

  • Develop a solid Internet and email policy that provides employees with clear expectations about your stance on personal time online at work. Follow through with enforcement of the policy when necessary.
  • Train your managers and supervisors on how to establish and maintain the expectations and policies of your workplace. Train them to recognize when an employee might be abusing their Internet access at work.
  • Designate times and/or durations that your team is allowed to use company Internet for personal purposes. Stress that those who don’t comply with designated time/duration will lose the privilege altogether.
  • For those businesses that are looking for a more aggressive approach to handling Internet abuse, consider implementing a web content filter. Web filters give you access control, allowing you to decide which websites your team can access. Filter settings can be deployed company wide, as well as individually for specific user permissions.

Since no two companies are alike, you may have to use trial and error to curb Internet abuse by your staff. Whatever you choose to do, SMART Services can help. We can design an Internet usage policy that works for your agency, or implement content filtering or other solutions to keep your staff on-task and productive. Contact us today at 586 258-0650 .

Let Smart Services position your agency for tomorrow’s technological challenges. For more than 25 years, Smart Services has helped agencies across the U.S. face a changing environment by providing innovative technology solutions that allow agencies to focus on growing their business. MyAgency Cloud, our complete cloud solution, covers all your technology needs in the cloud or at your agency. In today’s competitive environment, it’s time to make your agency technology a strategic asset, instead of a liability. Let us show you how. To learn more, please call our expert agency technology advisor at 586-258-0650.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 22 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Router IT Technicians Business Intelligence Debate IT Consultant Mobile Devices Professional Services Software as a Service lunch and learn Internet Exlporer Best Practices Identity Theft Cybersecurity Ransomware Money Mobile Office Disaster Recovery Workplace Tips insurance Bring Your Own Device Jessica Stevenson Files Lifestyle Cloud Computing Cleaning Scott White SMARTweb Defense Internet of Things Avoiding Downtime Update Online Currency Data Backup agency automation Outlook Social WiFi Government malware Tablet Data Recovery Jerry Fetty Security Legal Wireless Technology Tech Support Microsoft Windows 7 MySalesResults Social Networking User Error Passwords Company Culture MAIA Telephony Small Business HIPAA GLAD Wi-Fi Cloud Productivity website Help Desk Artificial Intelligence Television Comparison VoIP Colocation Emergency Benefits Surge Protector Virtual Reality iPad Lithium-ion battery Apps Hosted Solution Smartphones BDR Internet Network Security Steve Anderson Managed IT Service Specifications Alert Microsoft Office email encryption Law Enforcement HaaS Automobile Printer Server Take Your Agency to the Next Level Hard Drives Saving Time data backups Recovery hacker robot Software Saving Money Save Time Android Disaster Work/Life Balance PowerPoint Computer Care Virus Windows Vendor Management Data Phone System Regulation HITECH Act Unified Threat Management Facebook IIAI Wayne Joubert Chevy HHR Safety Gadgets Save Money Business Computing Outsourced IT Compliance hackers Inbound Marketing Tech Tip Holiday How To communications Scam Miscellaneous Cybercrime Shortcut Collaboration Intranet Reliable Computing Password Innovation IT Solutions Social Engineering Mobile Device Management Training Domains Microsoft Office 2010 Windows 10 spam Gmail Advertising Risk Management Business Continuity Managed Service Provider Transportation Solid State Drive Buisness Google Computer Accessories Kleinschmidt Insurance Video Surveillance Business Windows 8 Information Technology Computer repair Budget Mobile Encryption Bandwidth Paperless Office Keyboard Uninterrupted Power Supply Managed IT Services Users Humor Operating System Maintenance video Smartphone Managed IT Point of Sale Microsoft Outlook holidays Hetrick and Associates Extreme Technology Makeover Microsoft Outlook 2007 social media Administration Virtualization Application Telephone Systems Backup Gift Giving Technology Health Computer Content Filtering Personal Information Hosted Solutions Office Tips Phishing DocStar Audit Managed IT Services Hacking press release Antivirus SMART Services Scalability Communication Tip of the Week Privacy Email Instant Messaging Web Design Search Sales VPN Dark Web Analytics Computers Current Events Presentation Server IT Support Proactive IT Text Messaging SaaS Applications Printer Data Protection Bryant Caudill Data Management Applied TAM IT Services Firewall Doug Vanni IT Service IT Support Wearable Technology Business Management Mobile Computing Remote Monitoring Efficiency Remote Computing Cost Management Quick Tips User Tips Wireless Spyware Going Green History Two-factor Authentication BYOD Back Up Mobility automation USB Marketing Backkup Operating Sysytem Document Management Network Congestion Network Private Cloud Best Practice webinar App Productivity Data Breach Virtual Desktop DDoS Avoid Downtime Twitter Retail Fax Server Upgrade Flexibility Hardware Trending Value Microsoft Commerce Mobile Device Travel Shadow IT Managing Stress Battery Sports

Blog Archive

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *