Feeds

Mobile device enslavement a plague on British workers' health

After-hours fondling threatens office bods

High performance access to file storage

British workers are ruining their health by fondling slabs and touching screens after the work day is done, the Chartered Society of Physiotherapy said.

UK office monkeys are slaving away well into the night on their tablets and smartphones to try to take the pressure off during their actual working hours, doing an average of two hours and 18 minutes of extra work a night on top of their six- to seven-hour days.

Londoners were the least able to switch off, usually spending two hours 50 minutes on their mobile devices after they left the office, though that could have as much to do with how much time they have to spend commuting as anything else, but folks across the country are having a hard time detaching from the office.

Around half of office workers polled by the physios said their out-of-hours work had increased in the last two years and the main reasons they found themselves glued to their screens were to try to ease the pressure of the working day or just plain having too much work to do.

“The results of this survey are a huge concern to physiotherapists, who see the consequences of poor posture and bad working practices each day," Dr Helena Johnson, chair of the Chartered Society of Physiotherapy, said.

“While doing a bit of extra work at home may seem like a good short-term fix, if it becomes a regular part of your evening routine then it can lead to problems such as back and neck problems, as well as stress-related illness. This is especially the case if you’re using handheld devices and not thinking about your posture."

The poll found that around two-thirds of office workers were already feeling the consequences of enslavement to their mobiles, reporting job-related ill health such as headaches and back pain.

The poll, done across the country and broken down into regions, is part of the society's efforts to get employers to consider their staff's health with a Workout at Work Day, which will attempt to encourage better working habits. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.