SMART Blog

Featured 

Do Your Employees Shop Online While at Work?

Do Your Employees Shop Online While at Work?

With the growing popularity of Cyber Monday sales and the growth of all types of eCommerce, your employees are likely tempted to shop during work hours. To add to the attraction, there are a lot of promotions exclusively available to online shoppers that take place during business hours of operations. Many companies allow occasional use of company time for personal use. However, some employees are going to take advantage of this generosity and abuse the privilege.

Online Shopping at Work - By the numbers.

  • 53 percent of employees do some online shopping during work, an increase from last year.
  • 49 percent of employees use their personal smart phones or tablets to shop at work, an increase from 42 percent last year.

Here are some ideas that might help you address the issue of excessive use of the Internet for personal purposes:

  • Develop a solid Internet and email policy that provides employees with clear expectations about your stance on personal time online at work. Follow through with enforcement of the policy when necessary.
  • Train your managers and supervisors on how to establish and maintain the expectations and policies of your workplace. Train them to recognize when an employee might be abusing their Internet access at work.
  • Designate times and/or durations that your team is allowed to use company Internet for personal purposes. Stress that those who don’t comply with designated time/duration will lose the privilege altogether.
  • For those businesses that are looking for a more aggressive approach to handling Internet abuse, consider implementing a web content filter. Web filters give you access control, allowing you to decide which websites your team can access. Filter settings can be deployed company wide, as well as individually for specific user permissions.

Since no two companies are alike, you may have to use trial and error to curb Internet abuse by your staff. Whatever you choose to do, SMART Services can help. We can design an Internet usage policy that works for your agency, or implement content filtering or other solutions to keep your staff on-task and productive. Contact us today at 586 258-0650 .

Let Smart Services position your agency for tomorrow’s technological challenges. For more than 25 years, Smart Services has helped agencies across the U.S. face a changing environment by providing innovative technology solutions that allow agencies to focus on growing their business. MyAgency Cloud, our complete cloud solution, covers all your technology needs in the cloud or at your agency. In today’s competitive environment, it’s time to make your agency technology a strategic asset, instead of a liability. Let us show you how. To learn more, please call our expert agency technology advisor at 586-258-0650.

 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Tuesday, September 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

NFL Administration Chromebook Cybercrime Artificial Intelligence Chrome Blockchain Help Desk Social Hacking Audit Human Resources Maintenance Google Docs Phishing Programming Antivirus Emails Automobile Language IT Technicians Mouse Point of Sale Saving Time Users Computers Windows Ink Microsoft Outlook 2007 Buisness Devices Data Storage Students Vendor Management IT solutions Blogging Upgrade Passwords Edge Technology Virus Business Management Router Augmented Reality Business Technology Doug Vanni FAQ HITECH Act Images File Storage Humor Cloud SaaS Screen Mirroring Email Lithium-ion battery holidays Google Maps Work Station Unsupported Software IT Services Dark Web Running Cable Browser Data Breach Transportation Files Black Market Unified Communications Office 365 Retail User Tips DocStar Recovery WiFi HIPAA Smart Technology Office Tips Financial Laptop Worker Commute BYOD Managing Stress Distributed Denial of Service Personal Information Outsourced IT Jessica Stevenson Display Tablet Bryant Caudill Amazon Professional Services webinar Wireless Technology IT Support Facebook eWaste Going Green Teamwork Mircrosoft Net Neutrality Workplace Tips Monitoring iPad Backkup Application Productivity Patch Management Mobile Device video Microsoft Office 2010 Tutorial Storage website Surge Protector Social Engineering Mobile Device Management MSP Mobile Supercomputer Cameras Applied TAM Uninterrupted Power Supply SMART Services Legislation Touchpad Computer Fan Miscellaneous Entertainment Budget Tech Term Phishing Scam Connectivity Wireless Charging Business Computing lunch and learn CrashOverride Wearable Technology Nokia MAIA Virtual Assistant Tech Support Administrator Upgrades Information Technology Charger Alert Windows 10s spam Workers IIAI Office Quick Tips Tech Tip Television Content Filtering Risk Management Best Practices Tablets WannaCry Steve Anderson Encryption Solid State Drive IT Solutions Extreme Technology Makeover Managed Service Provider Google Assistant Two-factor Authentication Networking data backups Regulations Health Hosted Solutions Word Server Intranet SharePoint Proactive insurance Content Filter Software as a Service Meetings WIndows Server 2008 Commerce Outlook Emergency Webinar Thank You Hiring/Firing Compliance SMARTweb Defense OneNote Politics Microsoft Excel Gift Giving Microsoft Word Licensing Fraud Business Intelligence Lifestyle Managed IT Service IT Management WPA3 Reliable Computing Adobe Near Field Communication Electronic Medical Records Kleinschmidt Insurance Video Surveillance Hetrick and Associates Virtualization Security Comparison Touchscreen Financial Technology Data Security WIndows 7 Credit Cards Best Available Big Data Testing Sports Chromecast Back Up Management Congratulations PDF Managed Service Vulnerability Value Remote Computing GLAD Data Protection Telephone Systems Company Culture DDoS Google Money File Sharing Chevy HHR automation HaaS Unified Threat Management Telephony Virtual Desktop Mobile Security Data Backup Data Privacy Projects Ciminal Network Security Information Online Currency Hybrid Cloud Alexa for Business Vendor Data Theft Computing Collaboration Employee-Employer Relationship App store Hard Disk Drive IT consulting Document Management Small Business Shadow IT Device Security OneDrive Data Loss Identity Theft iPhone Microsoft Windows 7 Analytics Flexibility Biometrics Windows 8 Windows Communication Taxes Fax Server Mobile Devices Managed IT Services Excel email encryption Microsoft Smartphone Operating Sysytem Inbound Marketing Marketing Redundancy Customer Service Disaster Printing Current Events Computer Accessories The Internet of Things Evernote Paperless Office 3D Printing Websites Hard Drives hackers Colocation Windows 10 Password Internet Work/Life Balance Cost Management Wiring Computer Care Employer-Employee Relationship Phone System iOS Travel Video Games Branding PowerPoint Business Continuity IT Support malware Scam Music Wayne Joubert Youtube Consultant Save Time Remote Monitoring Innovation Private Cloud Text Messaging Streaming Media Tip of the Week Analysis Wireless ISP Save Money Experience Software Ransomware Smart Tech Bring Your Own Device Identities Firewall Computer Privacy Data Memory Presentation Access Gmail VPN Printer Update Benefits App Reputation Gifts Web Design Bloatware IT Consultant Cast Apple Law Enforcement hacker How To Project Management Bluetooth Take Your Agency to the Next Level Holiday press release Virtual Reality Gamification Settings social media Gadgets Smartphones IT Budget Wi-Fi Science Updates Hard Drive Scalability Applications Education Cleaning Backup Shortcut Mobile Computing Camera Google Drive Root Cause Analysis In the News Battery Domains Computer Forensics Bandwidth History Computer repair Legal Mobility Network Congestion Customer Relationship Management Avoiding Downtime Identity Media Consumption Best Practice Scott White User Cloud Computing Nanotechnology User Error Microsoft Outlook End of Support Safety Efficiency Spyware Government Sync Saving Money BDR Productivity Specifications ebay Fun Internet Exlporer Keyboard Employer Employee Relationship VoIP Cortana Mobile Office Ubuntu Wasting Money Printer Server Debate Disaster Recovery Business Operating System Co-managed IT Books Microblogging Printers Avoid Downtime Advertising HBO Apps communications Data Management Instant Messaging IoT Training Regulation Data Recovery Hardware Network Managed IT Android Trending MySalesResults Managed IT Services Proactive IT Samsung Social Networking USB Internet of Things Jerry Fetty Cybersecurity agency automation Search Windows 10 Microsoft Office IT Service Wireless Internet Twitter robot Conferencing Prodcutivity Hosted Solution Sales

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *