Electronic Etiquette Encourages Efficiency

by

November 2, 2012

Encourage others to adopt acceptable etiquette when engaging electronically in a group:

  • Make an obvious point of silencing your cell phone
  • Mention the need for an uninterrupted meeting
  • Ask electronic offenders if everything is “still okay?”
  • Avoid Electronic Interruptions

Technology brings us closer to those who are far and can distance us from those who are near. Establish guidelines to ensure electronics don’t interrupt your conversation.

Electronic interruptions are best addressed before they pose a problem. By emphasizing the importance of dodging distractions, and silencing your cellular pointedly, others will hopefully follow your lead.

You’ll inevitably experience bad behaviour, so be prepared to reinforce your regulations. To draw attention to their bad behaviour, ask if they are still okay to continue, as they may not even realize they’ve been distracted by their smartphone.

Thanks to Karen Turner from Turner Efficiency for sending us this tip.

We're Integris. We're always working to empower people through technology.

Keep reading

How the Best IT Companies in Minnesota Support the Hybrid Workforce

How the Best IT Companies in Minnesota Support the Hybrid Workforce

After the initial shutdowns and stay-at-home orders lifted following COVID-19, workers throughout the United States and Minnesota decided that the work-from-home model was here to stay. It makes sense -- working from home offers a lot of convenience to your team – and...

Do I Need To Improve My Endpoint Protection?

Do I Need To Improve My Endpoint Protection?

A compromised endpoint gives hackers everything they need to get a foothold in your security network. Once there, they can steal data and potentially hold it for ransom. That’s why it’s so important for business owners to secure their critical endpoints (including...

Multi-Factor Authentication

Multi-Factor Authentication

Granting access to information is a necessity, as is security for both the user needing access and for the information for which access is being granted. The best way to handle this is by establishing user accounts for users. This does several things at once: Allows...