shutterstock 4600 TEST SIZE V1 051716


 "IT Management that You can count on."

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

How to Keep Your Staff from Shopping from the Office

How to Keep Your Staff from Shopping from the Office

Since eCommerce has experienced a surge in popularity, your employees might be tempted to get their holiday shopping out of the way as soon as possible by doing a little bit of browsing during your hours of operation. Depending on your business’s policies regarding personal Internet usage during office hours, you may need to take action against those who abuse the privilege.

Here are some numbers surrounding online shopping at work:

  • 53 percent of employees are using time at work to shop online, an increase from last year.
  • 49 percent of employees use their personal smart phones or tablets to shop at work, an increase from 42 percent last year.

To help you limit the use of excessive online shopping during work hours, here are some tips to consider:

  • Implement Internet and email usage policies that clearly dictate how you, as the employer, expect your employees to use these services during their personal time at work. Better yet, reinforce these practices by following through on enforcement when necessary.
  • Train your managers and supervisors about the telltale signs of Internet abuse, and educate them on the expectations and policies that are put into place in your organization.
  • Give your employees “me time” during the day so that they can get the personal usage of the Internet out of the way so that it doesn’t affect their ability to work. Be sure to mention that those who don’t comply with these rules will lose the privilege completely.
  • A more aggressive approach to online content management comes in the form of a web content filter. A web filter can provide the tools needed to keep your team off of time-wasting websites and it can improve productivity as a whole. You can even set specific permissions by the user so that the problem employee doesn’t ruin the privilege for all.

We know that not all companies are the same, so we can work with you to ensure that your business’s Internet permissions policy works specifically for your needs. To learn more, reach out to us at (888) 894-6411.

Is a Data Backup Really That Necessary? In a Word:...
Is Work Invading Your Home Life?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Business Computing Network Security Backup Malware Hosted Solutions Mobile Devices Data Google VoIP Business Microsoft Software Email bgc roundup Disaster Recovery nonprofit Managed IT Services Business Continuity Alert Innovation Internet Hardware Outsourced IT communications IT Services Smartphones Managed IT Services Data Backup User Tips Tech Term Windows 10 Browser Computer Ransomware Server Saving Money Data Recovery Cybercrime Android Cloud Computing Efficiency Network Internet of Things IT Support BDR Computers Workplace Tips Smartphone Business Management Small Business IT Support Communication Windows Passwords Office Miscellaneous Save Money Productivity Productivity Quick Tips BYOD Cybersecurity Social Engineering Chrome Recovery Mobile Device Management Applications Artificial Intelligence Managed IT Telephone Systems Money Firewall Mobility Work/Life Balance Phishing Social Media Virtualization Windows 10 Gadgets Collaboration Hacking Upgrade Law Enforcement Facebook Vulnerability How To App Compliance VPN Health Wi-Fi Information Proactive IT Password Holiday Microsoft Office Private Cloud Office 365 Remote Monitoring Bring Your Own Device Bandwidth Two-factor Authentication Router Automation Data Protection Budget Office Tips Flexibility Managed Service Provider Avoiding Downtime Apps Safety Mobile Device Keyboard Redundancy Data Security Servers Identity Theft Connectivity Remote Computing Data Breach Business Intelligence Google Drive Word Information Technology Sports HaaS Mobile Computing History Spam Scam Black Market Value Operating System Infrastructure Paperless Office End of Support USB IT Management Voice over Internet Protocol Data Management Worker Software as a Service Employer-Employee Relationship Data storage Unified Threat Management Spam Blocking Battery Content Filtering Comparison Entertainment IT Plan SaaS Update Business Owner The Internet of Things CES Hiring/Firing Cleaning Emergency Managed Service Training Workers PDF Big Data Government Encryption Credit Cards Solid State Drive WiFi Document Management Content Management Computing Infrastructure Computer Care Marketing Patch Management Legal Windows 7 Fraud HIPAA OneNote Save Time Blockchain Virtual Assistant Risk Management Samsung Charger Settings Physical Security Unsupported Software Data Storage Website Automobile Wireless Technology Telephone System YouTube Electronic Medical Records Practices Augmented Reality Skype Cables Transportation Current Events iPhone Software Tips Audiobook Amazon Web Services How to Addiction Public Computer Staff Regulation Excel Remote Work Smart Tech Printers Loyalty Computer Fan Microchip Meetings Worker Commute Criminal NIST User Error Hosted Computing Remote Worker Wireless Start Menu Unified Communications Password Manager Machine Learning Benefits Knowledge Downtime Video Games Rootkit Reputation Advertising Online Shopping Troubleshooting Cache Multi-Factor Security Digital Signature Tip of the week Scalability Experience Warranty FENG Hard Drives Search Engine Data loss Cryptocurrency Monitor Colocation Inventory Wiring Windows 10s Tools Theft Education Business Mangement HVAC Smart Technology Network Congestion Robot HBO Specifications Customers Flash Evernote Laptop Wireless Internet Trending Chromecast Windows Server 2008 Devices Printer Relocation Bing Screen Mirroring Techology Safe Mode Employer Employee Relationship webinar Access Control Public Cloud Gmail Networking Two Factor Authentication Files Outlook Millennials Accountants MSP Vendor Management Sync Wireless Charging Shadow IT Books Touchpad Cortana Wire IBM Data Warehousing Lifestyle Hacker Instant Messaging Thought Leadership Mouse Assessment Humor Help Desk Cast Google Docs NarrowBand Computer Accessories Conferencing Workforce Authentication Mobile Users Recycling Enterprise Content Management IT Consultant File Sharing Telephony Fiber-Optic Hosted Solution Google Apps Smart Office Supercomputer Apple Best Practice Content Internet Exlporer Regulations Amazon Search Going Green Twitter Administrator Television CrashOverride Human Resources Bluetooth Netflix Frequently Asked Questions Telecommuting Politics Nanotechnology Camera Audit Professional Services Virtual Reality eWaste Password Management Leadership Thank You Congratulations nonprofits GDPR E-Commerce