Browse Definitions :
Definition

off-hours communications

Off-hours communications are work-related emails, texts, phone calls, social media messaging and other communications that are transmitted when an employee is not officially working. The term is generally understood to apply to times outside of work hours, which may be specific as in nine-to-five, or any time beyond the employee’s contractual agreement, such as 40 hours a week.

The ongoing trends of mobile computing and telecommuting mean that employees often work from home, in coffee shops, hotels and airports, among a great number of other possibilities. Employees may be accessible through multiple channels throughout much of their days and nights. However, receiving and responding to work-related communications makes it hard to distinguish between work hours and free time. It’s also difficult to calculate the amount of time that off-hours communications take, since they tend to be intermittent and sporadic.

Furthermore, those messages have a greater effect on the employee than just the time it takes to communicate. According to interruption science, it typically takes employees 23 minutes to return fully to what they were doing after an interruption, and that is likely to be as true for an evening with your family as it is for work-related tasks.

To prevent employee burnout, the best practice is to clearly define what off-hours consist of within an organization and make it corporate policy to refrain from sending communications at those times. 

This was last updated in July 2019

Continue Reading About off-hours communications

SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

  • data compliance

    Data compliance is a process that identifies the applicable governance for data protection, security, storage and other ...

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close