Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 4 Social Taboos Smartphone Users Should Never Break

b2ap3_thumbnail_bad_cell_phone_etiquitte_400.jpgCellphone etiquette goes hand-in-hand with common sense. Here are four cellphone etiquette tips that every device owner should know.

Don’t Use Your Phone During Mealtime
Mealtime is a social time for pretty much every culture around the globe. During this time, it’s expected that you are fully present and engaged in conversation--which is super hard to do if you’re glued to your phone. Even the quick glance at the screen to check notifications can be construed as rude.

Solution: Turn your phone off during mealtime, or at least, keep it off the table.

A restaurant in Iowa, Sneaky’s Chicken, offers a 10 percent discount for diners who don’t bring their treasured phone to their meal. Also, Bucato, in Los Angeles, has a dedicated “cell-phone section.”

Use a Voice Level That’s Appropriate for Your Setting
While it’s okay to use your phone in a room with other people, it’s not okay to talk on your phone using such a high volume that others around you can’t focus or must talk over you. The problem here often comes from phone calls with poor connections, causing the caller to feel the need to talk louder so they can be heard. Then there are those who feel the need to speak in abnormally high volumes when using the phone, no matter the situation or quality of their connection, much to the chagrin of those in the same room. Awareness of the volume of one’s own voice is the best deterrent here, which for some people, is easier said than done.

Solution: If you need to speak at higher-than-normal volume when using the phone, step outside or go to the next room

Hang Up Before Checking Out
While it’s perfectly acceptable to shop and use your phone at the same time, it’s rather rude to continue talking on your phone while a cashier is ringing you out. Even if you don’t plan on having a grand conversation with the person behind the register, talking on the phone still communicates that you essentially don’t think very highly of them and their time. Plus, it just makes things awkward for the poor cashier if they have to interrupt your conversation in order to ask you a question about your purchase.

Solution: In a scenario where you must stay on the phone while the cashier is ringing you out, at the very least, apologize for the inconvenience and be attentive to them just in case they need to ask you a question.

Don’t Leave Long Voicemails
Just because you can explain every detail possible in a voicemail, doesn’t mean that you should. When a voicemail goes beyond the one minute mark with no prospect of coming to an end anytime soon, it can overwhelm a person. This is especially the case if the message goes into great detail, requiring you to scramble to find a pen and paper; then you don’t get to a pen in time and have to listen to the long message all over again. Grrrr.

Solution: If you’ve got a lot to share, make the voicemail primarily about having the person call you back. Otherwise, it’s best to just leave your name, what you’re calling about, your callback number, and nothing more.

Surprisingly, as common sense as these tips are, we see cellphone users break them all the time. When it comes to preventing annoyances such as these, spreading knowledge about proper cell phone usage goes a long way. Therefore, if you know of any offenders of cell phone etiquette, share this article with them--in a subtle way.

What are some of the most annoying cellphone usage habits that you’ve observed (or are guilty of)? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity IT Support Smartphones Communication Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Quick Tips Cybersecurity Users Business Management Windows Phishing Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Server Save Money Data Recovery Windows 10 Passwords Saving Money Tech Term Holiday Chrome Gadgets Virtualization Social Media Managed IT Services Microsoft Office Automation Managed Service Operating System Facebook Artificial Intelligence Computers Cybercrime BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Wi-Fi Health Covid-19 Spam Managed Service Provider Office 365 Telephone Systems Alert Remote Information Technology Information Bandwidth Router BDR Social Engineering Mobility Recovery Employer-Employee Relationship Encryption Application Applications Remote Monitoring Law Enforcement Big Data Data Breach App History Password Mobile Computing Money Human Resources Remote Computing Mobile Office Data Storage Patch Management Government Private Cloud Office Tips Blockchain Managed IT Training Paperless Office VPN Apps How To Voice over Internet Protocol Two-factor Authentication Google Drive Mouse HaaS Avoiding Downtime Vulnerability Windows 7 Word Servers Wireless Flexibility Bring Your Own Device Data Management Gmail Marketing Work/Life Balance Data Security WiFi Settings IT solutions Entertainment Website Infrastructure Budget Education USB Physical Security Virtual Reality Apple Safety Sports HIPAA Employee/Employer Relationship Redundancy Social Keyboard RMM User Error Data Protection Conferencing Meetings Scam Risk Management Hacker Save Time Vendor Management The Internet of Things Lithium-ion battery Telephone System Staff Software as a Service Cleaning Machine Learning Connectivity Remote Work Vendor Firewall Managed Services End of Support Display SaaS Spam Blocking Internet Exlporer Electronic Medical Records Processor Augmented Reality IT Consultant PDF Network Congestion Hiring/Firing Hard Drive Fraud eWaste Remote Worker Humor Proactive IT Computing Cryptocurrency Best Practice YouTube Wearable Technology Business Intelligence Black Market Hard Drives Comparison Retail Audit Instant Messaging Worker CES Digital Signage IT Management Robot Excel Document Management Solid State Drive Wireless Technology Biometrics Botnet Business Technology Content Management How to IT Plan Downtime Virtual Desktop Access Control Virus Procurement Workplace Strategy Virtual Assistant Net Neutrality DDoS Unsupported Software Data storage Unified Threat Management Authentication Automobile Help Desk SharePoint Charger Computer Accessories Printing Compliance Computing Infrastructure OneNote Going Green Computer Care Update Customer Service Current Events Environment Managed Services Provider Telephony Samsung Printer Battery Database Google Docs Bluetooth Fax Server Shadow IT Identity Theft Remote Workers Legal Value Tablet Troubleshooting Email Best Practices MSP IT Assessment Accountants Manufacturing Outlook Leadership Domains Microchip Thought Leadership Politics Start Menu Credit Cards Advertising Managed IT Service Password Manager Security Cameras Screen Mirroring Loyalty Computer Tips Password Management Books Virtual CIO OneDrive Biometric Security IaaS Frequently Asked Questions Multi-Factor Security Maintenance Notifications Windows 10s Bloatware Search Engine Peripheral Twitter Mobile Using Data Business Mangement Cast Digital Security Cameras NIST Tablets Emergency Copiers Smart Tech 5G Tip of the week Trending Relocation webinar Public Cloud Entrepreneur Employer Employee Relationship Quick Tip Addiction Professional Services Amazon Recycling Video Games Smartwatch Assessment Ergonomics Wiring Development Practices Worker Commute OLED Windows Server 2008 Shortcut Consultant Cost Management PCI DSS Cache Experience Virtual Machine Tools Amazon Web Services Safe Mode Fiber Optics Criminal Scalability Employee Social Networking Television Analytics 2FA GDPR Messaging Hosted Computing Business Owner Cabling Online Shopping Best Available NarrowBand Policy Wireless Internet Hypervisor File Sharing Trend Micro Search Running Cable WIndows 7 Public Computer Dark mode Memory Transportation Camera SMS Inventory Default App Regulations Specifications iPhone Evernote Computer Fan Rootkit Procedure Wire Saving Time Shopping Google Search Travel dark theme Benefits Printers AI IT Infrastructure Millennials Files Workers Wireless Charging Bing FENG Chromecast FinTech Smart Office Windows Media Player Social Network User IBM PowerPoint Science Uninterrupted Power Supply Smart Technology Virtual Private Network Investment Flash Workforce Colocation Employee/Employer Relationships Cables Employees Windows 365 ISP Distributed Denial of Service Software Tips Managing Stress Monitor Customer Relationship Management Supercomputer Emails Analyitcs Project Management Video Conferencing Nanotechnology ROI Sync Telecommuting Bitcoin Cortana Shortcuts Programming Cameras Sales Point of Sale Personal Digital Signature Cryptomining Reputation Streaming Media Netflix Tech Support Two Factor Authentication Warranty Supply Chain Management Content Batteries Google Apps Techology Antivirus Root Cause Analysis Laptop Monitoring HVAC Windows 8 Music Windows 8.1 Digitize Analysis HBO Customers Knowledge IT service Administrator Devices Audiobook Windows Server 2008 R2 Skype Data loss Touchpad Printer Server Customer relationships Enterprise Content Management

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code