Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 4 Social Taboos Smartphone Users Should Never Break

b2ap3_thumbnail_bad_cell_phone_etiquitte_400.jpgCellphone etiquette goes hand-in-hand with common sense. Here are four cellphone etiquette tips that every device owner should know.

Don’t Use Your Phone During Mealtime
Mealtime is a social time for pretty much every culture around the globe. During this time, it’s expected that you are fully present and engaged in conversation--which is super hard to do if you’re glued to your phone. Even the quick glance at the screen to check notifications can be construed as rude.

Solution: Turn your phone off during mealtime, or at least, keep it off the table.

A restaurant in Iowa, Sneaky’s Chicken, offers a 10 percent discount for diners who don’t bring their treasured phone to their meal. Also, Bucato, in Los Angeles, has a dedicated “cell-phone section.”

Use a Voice Level That’s Appropriate for Your Setting
While it’s okay to use your phone in a room with other people, it’s not okay to talk on your phone using such a high volume that others around you can’t focus or must talk over you. The problem here often comes from phone calls with poor connections, causing the caller to feel the need to talk louder so they can be heard. Then there are those who feel the need to speak in abnormally high volumes when using the phone, no matter the situation or quality of their connection, much to the chagrin of those in the same room. Awareness of the volume of one’s own voice is the best deterrent here, which for some people, is easier said than done.

Solution: If you need to speak at higher-than-normal volume when using the phone, step outside or go to the next room

Hang Up Before Checking Out
While it’s perfectly acceptable to shop and use your phone at the same time, it’s rather rude to continue talking on your phone while a cashier is ringing you out. Even if you don’t plan on having a grand conversation with the person behind the register, talking on the phone still communicates that you essentially don’t think very highly of them and their time. Plus, it just makes things awkward for the poor cashier if they have to interrupt your conversation in order to ask you a question about your purchase.

Solution: In a scenario where you must stay on the phone while the cashier is ringing you out, at the very least, apologize for the inconvenience and be attentive to them just in case they need to ask you a question.

Don’t Leave Long Voicemails
Just because you can explain every detail possible in a voicemail, doesn’t mean that you should. When a voicemail goes beyond the one minute mark with no prospect of coming to an end anytime soon, it can overwhelm a person. This is especially the case if the message goes into great detail, requiring you to scramble to find a pen and paper; then you don’t get to a pen in time and have to listen to the long message all over again. Grrrr.

Solution: If you’ve got a lot to share, make the voicemail primarily about having the person call you back. Otherwise, it’s best to just leave your name, what you’re calling about, your callback number, and nothing more.

Surprisingly, as common sense as these tips are, we see cellphone users break them all the time. When it comes to preventing annoyances such as these, spreading knowledge about proper cell phone usage goes a long way. Therefore, if you know of any offenders of cell phone etiquette, share this article with them--in a subtle way.

What are some of the most annoying cellphone usage habits that you’ve observed (or are guilty of)? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Communication IT Support Smartphones Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Quick Tips Cybersecurity Users Business Management Upgrade Phishing Windows Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Saving Money Holiday Social Media Gadgets Chrome Virtualization Tech Term Automation Managed IT Services Microsoft Office Managed Service Facebook Cybercrime Operating System Artificial Intelligence Computers BYOD Mobile Device Management Networking IT Support Internet of Things Health Hacking Wi-Fi Covid-19 Information Technology Managed Service Provider Information Alert Spam Remote Office 365 Telephone Systems Bandwidth Router BDR Recovery Employer-Employee Relationship Social Engineering Mobility App Application History Applications Law Enforcement Human Resources Big Data Remote Monitoring Password Money Mobile Computing Encryption Data Breach Office Tips Training Government VPN Blockchain How To Paperless Office Private Cloud Remote Computing Managed IT Mobile Office Data Storage Patch Management Apps Servers Google Drive Wireless Gmail Avoiding Downtime Data Security Settings Two-factor Authentication Mouse HaaS Bring Your Own Device Data Management Infrastructure Voice over Internet Protocol Flexibility Work/Life Balance Marketing Vulnerability WiFi Windows 7 Word IT solutions Entertainment Website Budget USB Safety Managed Services Display Vendor Management HIPAA Sports The Internet of Things Redundancy Lithium-ion battery Keyboard Employee/Employer Relationship RMM Firewall Software as a Service Telephone System Staff Virtual Reality Machine Learning Apple Save Time Connectivity Remote Work Social User Error Cleaning Conferencing Meetings Scam End of Support Physical Security Risk Management Vendor Education Data Protection Hacker Remote Workers Comparison PDF DDoS Unsupported Software Processor IT Consultant SharePoint Charger CES Proactive IT Hard Drive Compliance Humor Best Practice OneNote Business Technology Computer Care Content Management Access Control YouTube Customer Service Current Events Environment Black Market Telephony Computing Virtual Assistant Samsung Authentication Fax Server Value Document Management Solid State Drive SaaS Wireless Technology Spam Blocking Electronic Medical Records How to Downtime Update Digital Signage Network Congestion Hiring/Firing Data storage Google Docs eWaste Virus Automobile Identity Theft Unified Threat Management Procurement Computing Infrastructure Workplace Strategy Computer Accessories Net Neutrality Going Green Help Desk Wearable Technology Printing Business Intelligence Augmented Reality Hard Drives Fraud Retail Audit Instant Messaging Worker Battery Shadow IT Printer IT Management Robot Remote Worker Excel Managed Services Provider Legal Bluetooth Botnet Biometrics Cryptocurrency Internet Exlporer IT Plan Virtual Desktop Database Windows Server 2008 R2 Workers Cache Benefits Amazon Web Services Customer relationships Notifications FENG Safe Mode Criminal Email Best Practices IT Assessment GDPR Manufacturing IBM Science Hosted Computing Wireless Internet Smart Technology Online Shopping Flash Relocation Computer Tips Managed IT Service File Sharing Security Cameras Inventory Specifications Virtual CIO Distributed Denial of Service OneDrive Software Tips Customer Relationship Management Camera Biometric Security Supercomputer Emails Analyitcs Wire Evernote Video Games Peripheral Sync Travel Digital Security Cameras Using Data Programming Worker Commute Experience Millennials Copiers Printers 5G Netflix Smart Office Two Factor Authentication Wireless Charging Scalability Quick Tip Consultant Ergonomics Antivirus Root Cause Analysis Smartwatch Business Owner Music Workforce NarrowBand Analytics Development HBO Virtual Private Network OLED Knowledge Windows 8 Skype IT service Virtual Machine Cables Search PCI DSS iPhone Best Available 2FA Fiber Optics Data loss Employee Leadership Tablet Nanotechnology Troubleshooting Telecommuting WIndows 7 Messaging Outlook Project Management Cabling Start Menu Domains Hypervisor Cortana Policy Files Dark mode Trend Micro Screen Mirroring Loyalty Digital Signature Books IaaS Chromecast SMS Frequently Asked Questions Maintenance Warranty Default App Procedure Mobile Saving Time Windows 10s Bloatware HVAC Google Apps Colocation dark theme Uninterrupted Power Supply Shopping Cast Google Search Analysis IT Infrastructure webinar Tablets Devices Emergency User PowerPoint AI Tip of the week Administrator Windows Media Player FinTech Professional Services Public Cloud Entrepreneur Enterprise Content Management Bing Employer Employee Relationship Monitor Social Network MSP Assessment Accountants Investment Thought Leadership Credit Cards Managing Stress Windows Server 2008 Shortcut Microchip Employees Tools Streaming Media Employee/Employer Relationships Cost Management Password Management Password Manager Reputation Content Multi-Factor Security Windows 365 Tech Support Cameras Social Networking ISP Television ROI Twitter Techology Laptop Video Conferencing Search Engine Customers Sales Bitcoin NIST Shortcuts Business Mangement Audiobook Trending Point of Sale Running Cable Personal Cryptomining Public Computer Smart Tech Memory Addiction Transportation Amazon Touchpad Supply Chain Management Regulations Monitoring Batteries Computer Fan Rootkit Recycling Politics Advertising Windows 8.1 Printer Server Digitize Wiring Practices

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code