Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 4 Social Taboos Smartphone Users Should Never Break

b2ap3_thumbnail_bad_cell_phone_etiquitte_400.jpgCellphone etiquette goes hand-in-hand with common sense. Here are four cellphone etiquette tips that every device owner should know.

Don’t Use Your Phone During Mealtime
Mealtime is a social time for pretty much every culture around the globe. During this time, it’s expected that you are fully present and engaged in conversation--which is super hard to do if you’re glued to your phone. Even the quick glance at the screen to check notifications can be construed as rude.

Solution: Turn your phone off during mealtime, or at least, keep it off the table.

A restaurant in Iowa, Sneaky’s Chicken, offers a 10 percent discount for diners who don’t bring their treasured phone to their meal. Also, Bucato, in Los Angeles, has a dedicated “cell-phone section.”

Use a Voice Level That’s Appropriate for Your Setting
While it’s okay to use your phone in a room with other people, it’s not okay to talk on your phone using such a high volume that others around you can’t focus or must talk over you. The problem here often comes from phone calls with poor connections, causing the caller to feel the need to talk louder so they can be heard. Then there are those who feel the need to speak in abnormally high volumes when using the phone, no matter the situation or quality of their connection, much to the chagrin of those in the same room. Awareness of the volume of one’s own voice is the best deterrent here, which for some people, is easier said than done.

Solution: If you need to speak at higher-than-normal volume when using the phone, step outside or go to the next room

Hang Up Before Checking Out
While it’s perfectly acceptable to shop and use your phone at the same time, it’s rather rude to continue talking on your phone while a cashier is ringing you out. Even if you don’t plan on having a grand conversation with the person behind the register, talking on the phone still communicates that you essentially don’t think very highly of them and their time. Plus, it just makes things awkward for the poor cashier if they have to interrupt your conversation in order to ask you a question about your purchase.

Solution: In a scenario where you must stay on the phone while the cashier is ringing you out, at the very least, apologize for the inconvenience and be attentive to them just in case they need to ask you a question.

Don’t Leave Long Voicemails
Just because you can explain every detail possible in a voicemail, doesn’t mean that you should. When a voicemail goes beyond the one minute mark with no prospect of coming to an end anytime soon, it can overwhelm a person. This is especially the case if the message goes into great detail, requiring you to scramble to find a pen and paper; then you don’t get to a pen in time and have to listen to the long message all over again. Grrrr.

Solution: If you’ve got a lot to share, make the voicemail primarily about having the person call you back. Otherwise, it’s best to just leave your name, what you’re calling about, your callback number, and nothing more.

Surprisingly, as common sense as these tips are, we see cellphone users break them all the time. When it comes to preventing annoyances such as these, spreading knowledge about proper cell phone usage goes a long way. Therefore, if you know of any offenders of cell phone etiquette, share this article with them--in a subtle way.

What are some of the most annoying cellphone usage habits that you’ve observed (or are guilty of)? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Business Continuity Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Users Business Management Windows Managed IT Services Upgrade Phishing Ransomware Data Backup Outsourced IT Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Saving Money Holiday Gadgets Chrome Social Media Tech Term Virtualization Managed IT Services Managed Service Microsoft Office Automation Artificial Intelligence Operating System Facebook Computers Cybercrime BYOD Mobile Device Management Internet of Things Networking IT Support Wi-Fi Hacking Health Covid-19 Spam Alert Office 365 Managed Service Provider Telephone Systems Information Information Technology Remote Router BDR Bandwidth Social Engineering Mobility Employer-Employee Relationship Recovery Application Law Enforcement Data Breach Remote Monitoring App Big Data Password History Money Encryption Applications Human Resources Mobile Computing Remote Computing Government Mobile Office Private Cloud Blockchain Managed IT Paperless Office Office Tips Training Apps How To VPN Data Storage Patch Management Two-factor Authentication IT solutions Vulnerability Entertainment Website Windows 7 Budget Word Avoiding Downtime Mouse HaaS Servers Bring Your Own Device Data Security Data Management Work/Life Balance Wireless Infrastructure Gmail Voice over Internet Protocol Flexibility Settings Marketing Google Drive WiFi Keyboard Virtual Reality Data Protection Vendor Apple Scam Managed Services USB Display Social User Error Vendor Management Meetings Employee/Employer Relationship Save Time RMM Telephone System Staff Software as a Service Risk Management Hacker Machine Learning Cleaning Connectivity Remote Work The Internet of Things Lithium-ion battery End of Support Education Physical Security Safety Firewall Sports HIPAA Redundancy Conferencing SaaS Cryptocurrency Printer Proactive IT Business Intelligence Managed Services Provider Bluetooth Worker Database Best Practice Audit YouTube IT Management Network Congestion Comparison Black Market Remote Workers eWaste CES Botnet IT Plan Processor IT Consultant Business Technology Content Management Document Management Humor Wireless Technology Unsupported Software Hard Drive Access Control Solid State Drive How to Downtime Wearable Technology Virtual Assistant Charger Retail Hard Drives Authentication Instant Messaging Compliance Robot Excel Data storage Computing OneNote Computer Care Automobile Current Events Biometrics Virtual Desktop Telephony Samsung Update Computing Infrastructure Going Green Digital Signage DDoS Value Google Docs Identity Theft SharePoint Electronic Medical Records Battery Virus Spam Blocking Shadow IT Legal Unified Threat Management Procurement Hiring/Firing Net Neutrality Customer Service Workplace Strategy Computer Accessories Internet Exlporer Augmented Reality Environment Fraud Help Desk Fax Server Printing Remote Worker PDF Personal Cryptomining Recycling Tablet Relocation Tools Point of Sale Supply Chain Management Wiring Television Domains Practices Amazon Web Services Video Games Monitoring Batteries Cache Digitize IaaS Safe Mode Maintenance Criminal Worker Commute Windows 8.1 Printer Server GDPR Public Computer Windows Server 2008 R2 Hosted Computing Experience Bloatware Online Shopping Scalability Regulations Customer relationships Wireless Internet Transportation IT Assessment File Sharing Rootkit Manufacturing Business Owner Tablets Email Best Practices Computer Fan NarrowBand Camera Inventory Entrepreneur Specifications Security Cameras Evernote Search Computer Tips Workers Managed IT Service Wire Benefits FENG OneDrive Biometric Security Shortcut Travel iPhone Virtual CIO Peripheral Printers IBM Cost Management Millennials Smart Technology Social Networking Wireless Charging Flash Digital Security Cameras Using Data Smart Office Copiers 5G Files Chromecast Software Tips Quick Tip Virtual Private Network Supercomputer Workforce Smartwatch Cables Consultant Sync Ergonomics Emails Running Cable Uninterrupted Power Supply Development OLED Memory Colocation Analytics PCI DSS Project Management Virtual Machine Nanotechnology Telecommuting Two Factor Authentication Employee Cortana Best Available Monitor 2FA Netflix Fiber Optics Root Cause Analysis Messaging Cabling Digital Signature WIndows 7 HBO Policy Warranty Knowledge Hypervisor Music HVAC Google Apps Science Reputation Skype Dark mode Streaming Media Trend Micro Tech Support Data loss SMS Default App Analysis Content Techology Laptop Outlook Procedure Administrator Leadership Saving Time Devices Troubleshooting Enterprise Content Management Google Search Customer Relationship Management Customers Start Menu dark theme Shopping Distributed Denial of Service Screen Mirroring AI Windows Media Player MSP Loyalty IT Infrastructure Accountants Audiobook Analyitcs User PowerPoint Credit Cards Touchpad Frequently Asked Questions FinTech Microchip Thought Leadership Books Bing Programming Password Management Password Manager Mobile Windows 10s Social Network Cast Investment Politics Managing Stress Multi-Factor Security Advertising Tip of the week Employees Search Engine webinar Employee/Employer Relationships Antivirus Twitter Emergency NIST Employer Employee Relationship ISP Business Mangement Windows 8 Professional Services Windows 365 Cameras Notifications Public Cloud Video Conferencing Assessment ROI IT service Smart Tech Trending Amazon Windows Server 2008 Sales Bitcoin Addiction Shortcuts

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code