Editorial: Increasing productivity

All of us at one point or another have used a work computer for personal business — to browse news, shopping, auction or weather Web sites, for example.

In fact, employees' use of work equipment was an issue even before PCs arrived on the scene. Workers used the telephone for personal calls or the copy machine to make copies of their children's book reports, for instance.

With the advent of the personal computer — a name that makes many managers cringe because it implies that the computer is one's personal property — opportunities for abuse have grown. Computers have revolutionized the way people work; they have become the primary tool we use to communicate, conduct research and store information. Information technology may have elevated our productivity, but it also has increased the chances for abuse.

As the Internet continues to become an essential part of our daily lives, the lines between work and personal uses sometimes get blurred. Shopping on eBay is clearly abuse, right? But what about that employee at the General Services Administration's Federal Supply Service who comes up with a great idea for improving the agency's online buying systems after using eBay's online auction?

Certainly, government employees and managers should rely on common sense when considering using government-owned systems for personal use. Some activities are clearly out of bounds: Spending most of the day shopping online is obviously wrong, and clearly visiting porn sites is inappropriate. But supervisors should not resort to micromanaging their employees.

Generally, computer abuse is a symptom of a larger problem. Therefore, managers should view such abuse as a performance problem.

But computer abuse should not be met with Draconian crackdowns. Agencies already have a difficult enough time attracting job candidates.

To quote the late Ronald Reagan, the best course of action is to trust but verify. Yes, there is going to be abuse, but those exceptions should not set the standards for everybody else.

Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.

Featured

  • SEC Chairman Jay Clayton

    SEC owns up to 2016 breach

    A key database of financial information was breached in 2016, possibly in support of insider trading, said the Securities and Exchange Commission.

  • Image from Shutterstock.com

    DOD looks to get aggressive about cloud adoption

    Defense leaders and Congress are looking to encourage more aggressive cloud policies and prod reluctant agencies to embrace experimentation and risk-taking.

  • Shutterstock / Pictofigo

    The next big thing in IT procurement

    Steve Kelman talks to the agencies that have embraced tech demos in their acquisition efforts -- and urges others in government to give it a try.

  • broken lock

    DHS bans Kaspersky from federal systems

    The Department of Homeland Security banned the Russian cybersecurity company Kaspersky Lab’s products from federal agencies in a new binding operational directive.

  • man planning layoffs

    USDA looks to cut CIOs as part of reorg

    The Department of Agriculture is looking to cut down on the number of agency CIOs in the name of efficiency and better communication across mission areas.

  • What's next for agency cyber efforts?

    Ninety days after the Trump administration's executive order, FCW sat down with agency cyber leaders to discuss what’s changing.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group