Whether through maliciousness or negligence, time theft at work is a pervasive practice among salaried and hourly employees alike.
A Forbes article has even stated that the average employee steals approximately 4.5 hours per week from their employer, totaling nearly 6 full work weeks per year. This costs businesses hundreds of billions of dollars a year worldwide.
This article will help employers and managers understand the causes of employee time theft at work, the types of time theft, and how to optimize employee time for the company’s benefit.
Want to ensure that your employees are focused on their tasks? With CurrentWare’s employee computer monitoring software, preventing time theft at work is as easy as installing the solution on your employee’s computers, blocking distracting websites, and running reports on their computer activity from a convenient central console.
At its core, time theft occurs when an employee accepts payment for work or time they did not actually complete. This practice comes in a range of severity, from employees mismanaging their allocated break times all that way up to intentionally fraudulent claims.
This practice is not always done maliciously, as is the case when employees accidentally forget to punch in/out on their time cards or if a lack of employee time tracking infrastructure causes them to overestimate time spent on work or underestimate time spent on breaks.
This theft of time goes both ways, too. A 2018 report from Good Jobs First and the Jobs With Justice Education Fund found that many leading U.S. employers have engaged in wage theft to reduce their payroll expenses. These payroll-profiting practices include forcing employees to work off the clock or depriving them of required overtime pay.
On the employer’s side, in 2011 the American Society of Employers estimated that 20% of every dollar earned by a U.S. company is lost to time theft at work.
In addition to what is covered in this section, time theft at work could also include “cyberloafing” with social media and personal emails, “goofing off”, spending excessive time socializing, sleeping, playing games, working unauthorized overtime, exaggerating the time spent working on tasks, and working on personal tasks and projects at work.
“Buddy Punching” is a form of time card fraud where an employee clocks in on the behalf of another employee, allowing them to get paid for time that was not spent at work.
The American Payroll Association reported in 2017 that buddy punching costs employers $373 million annually.
Buddy punching is used by an employee to fraudulently claim that they worked hours that they were not actually present for. For example, this could range from having someone punch them in when they are running late from an allocated break to taking entire days away from work while claiming their time was spent working.
A 2017 survey conducted by PollFish found that 16% of US workers aged 18+ admitted to participating in buddy punching and time clock fraud. This high percentage of buddy punchers should be alarming to all companies, especially considering that some people surveyed would likely not even admit to committing time clock fraud themselves.
Fraudulently clocking in on a time clock may run afoul of various laws. Those that are caught stealing time by intentionally manipulating their time clock may be subject to an employee time theft punishment including and up to dismissal.
There are many different types of work breaks and the amount of time allotted to each can vary. The most common types include lunch, bathroom visits, smoke breaks, snacking, and general rest.
In most instances, staff members can be allotted 30 minutes to an hour for a standard lunch break. In more labor-intensive jobs, it is common practice for the boss to allow more frequent and/or longer breaks in order to prevent exhaustion.
Overall, there are many studies that promote the health benefits that come with allowing employees to take brief pauses throughout the day, including this study by Science Daily that claims employees who take a break every hour are more productive than those that don’t.
So, there’s not much of an argument against allowing pauses throughout the work day. In fact, there are laws throughout federal and local governments that mandate them. But what happens when employees start abusing the amount of time they spend on break and take longer rest periods than allowed?
Let’s do a quick extrapolation and see how it breaks down over the course of a year.
Employee X takes a 40 minute lunch instead of their allotted 30 minutes each day. Over the course of a 5 day work week, that’s 50 minutes per week that is wasted. 200 minutes over the period of a month. 2,400 minutes throughout the year.
That’s a total of 40 hours wasted annually on lunch breaks alone, the equivalent of an entire week’s worth of work. If Employee X is being paid $20/hour, then their actions costs $800 annually in lost time.
When breaks become an excuse for excessive personal time at work, your business is losing precious employee time and attendance.
Technology has helped practically every type of business develop its services and workforces to be more connected, convenient, and accessible. Computers, smartphones, and the internet help companies connect with customers and allow large workforces to easily collaborate on group projects.
Without the internet and its technologies, many companies would not even exist. But, despite its necessity and many benefits, the internet can be misused by employees in a way that can cause major loss for a business.
The International Data Corporation estimates that 30 to 40 percent of employee internet activity is non-work-related. This misuse of the internet in the workplace is costing US businesses $63 billion in lost productivity each year, according to Websense Inc.
The internet has been around for decades at this point, and we all have likely witnessed an employee switching the screen on their desktop so that they don’t get caught playing games, checking their personal email, or scrolling through their social media feeds during their shift.
While it’s true that short, frequent breaks make people more productive, excessive unproductive web browsing may cause employees to lose more working hours than they realize.
Employers can use employee and computer monitoring tools to track and correct excessive cyberloafing; but what about employees who simply use their smartphones?
With smartphones in everybody’s pocket, staff members can freely check social media, stream movies, and play time-consuming games without being caught.
Smartphones make employee productivity management a difficult task:
However, unless you work in an industry with above-average security requirements (such as national defense and other highly classified government environments), outright banning cell phones isn’t the right way to go.
Banning cell phones in the workplace for productivity reasons could harm morale by communicating to employees that they are not trusted to self-manage their own workloads. As a best practice, you should focus less on the individual ebbs and flows of concentration and more on the quality and timeliness of the employee’s output.
One of the more extreme and legally technical forms of time theft occurs when employees abuse their organization’s paid leave program.
Whether it be for new parents, or for those who are battling a chronic or debilitating illness, paid leave is common within most companies and is often backed by government policy and programs.
Unfortunately, the steps that are involved in permitting a paid leave for an employee can be extensive, and there have been many cases in which the employee was abusing their paid leave.
In Ottawa, Canada, a city employee was found to have taken a total of 32 annual leave days over a number of years without ever recording it into the time tracking system.
Another employee from the same municipal workforce was found to have been handing in medical notes in order to claim paid time off while actually working for a different business during those paid leave days.
When paid leave is granted, it is the organization itself that needs to pay the employee during their leave. Fraudulent abuse of the paid leave system causes significant business losses.
Promote flexibility without sacrificing accountability with insights into how location flexibility affects employee engagement and productivity.
Employees are more likely to commit time theft at work when they are burnt out. Chronic stress, a toxic workplace culture, and a lack of equity in the workplace are all potential triggers for burnout in employees. Employees that become burnt out will be actively disengaged and far more likely to commit time theft as a way of getting back at their employers.
Employees that do not feel fairly compensated for their efforts or are otherwise dissatisfied with their work-life are less engaged and are more likely to exhibit counterproductive work behaviors (CWB) such as a lack of engagement, excessive personal activities during work hours, or fraudulently reporting hours worked.
Employees that are experiencing financial distress are more likely to steal time from their employer. They may manipulate their time card to misrepresent the time they spend on the job site in order to be paid for work that they did not put in.
Stealing time in this way may also provide a window of opportunity for the employee to work a second job for a few hours per week while claiming that time on their primary employer’s time clocks. This payroll manipulation allows those in financial distress to illegitimately claim more hours on their payroll.
One of the most prevalent causes of time theft at work is quite simply poor on-site supervision. When unscrupulous employees know that they can get away with stealing business time by playing games, taking extended breaks throughout their shift, making excessive personal phone calls, and browsing the internet while on the clock they could be incentivized to do so.
While managers should not be micromanaging all of the time their staff spends at work, there needs a culture of accountability in place to avoid payroll manipulation and disengagement. One employee accidentally running late from their 60-minute lunch break may be no big deal but employers need to be willing to perform corrective actions to prevent intentional types of time theft.
Tools such as scheduling software help improve employee supervision with insights into how employees are allocated and how they are expected to spend their time.
Employees that are unmotivated by their daily tasks are far more likely to waste company time and become time thieves. Whether the work is too easy or simply uninteresting, workers will often find non-work-related activities to pass time through the day.
To keep employees engaged while on the clock you should provide more rewarding tasks. Depending on the individual employee a more rewarding task could be one that is more challenging, requires more relevant skills, or involves added responsibility.
Employees that avoid work while on the clock may be influenced by their immediate colleagues and managers. For example, if low-level forms of time theft at work are prevalent and consistently left unaddressed this will create a culture that employees use as an example of what is acceptable for them to do.
Another way that company culture can contribute to supporting various types of time theft is when employees are in an environment that disproportionately punishes tardiness.
Naturally, excessive time mismanagement needs to be addressed to prevent time theft at work. That said, if a few minutes per week is punished too severely the lingering fear of punishment may incentivize an employee to consider buddy punching or other forms of punch clock manipulation rather than being transparent about their accidental 61-minute lunch break.
Time theft can occur when employees are not given clear expectations. If employees are not aware that the less-malicious examples of time theft (excessive socializing, over-extending breaks, etc) are a concern for the organization, they may inadvertently participate in these activities without a second thought.
By clearly communicating expectations for time spent at work and enforcing those expectations through formal policies, codes of conduct, regular message reinforcement, and monitoring, you can establish a baseline with which employees can operate from and allow them to be coached to better suit the needs and expectations of your organization
On the other hand, time theft can also happen maliciously.
Sometimes employees that willingly engage in time theft may also be doing so simply because the opportunity is present. Part of an organization’s time theft mitigation strategy needs to account for this possibility by implementing systems that can accurately track and verify employee time.
A lot has happened since the COVID-19 pandemic first hit in March of 2020. One of the biggest changes to many people’s daily lives has been the shift to working from home.
With the virus’ ability to quickly spread, employers were forced into adapting work from home strategies in order to keep afloat. This meant that workers were taking their office equipment to their homes and make-shifting their own sort of office environment in order to emulate a traditional work experience.
But the fact remains that a home office is not a traditional office space, and with that comes the inevitable fact that employee supervision for remote workers is very hard to manage. Without the oversight of managers and peers, employees working from home are susceptible to a wide range of distractions. Disgruntled or unscrupulous workers may even take advantage of this lack of visibility to steal time from their employers.
These incidents can range from running personal errands during work hours, not working their agreed-upon hours, or taking extended breaks while on the clock without the support of their business. Each of these distractions costs companies money in time lost and are prime examples of remote employee time theft.
One of the most difficult parts of mitigating time theft is a lack of resources for identifying its prevalence. Software to monitor employee internet usage will give human resources (HR) and management the insights it needs to understand the prevalence of time theft in your organization.
With the data collected through employee internet monitoring software, your organization can make educated coaching decisions and improve your employee’s mindfulness of distractions they engage in and how it may be impacting their performance.
CurrentWare is a global provider of solutions for web filtering, internet usage monitoring, bandwidth tracking, and data loss prevention.
If you would like to better understand how the internet is used (or misused) in your workplace you can try our internet monitoring solution BrowseReporter and our web filter BrowseControl with a FREE no commitment 14-day trial.
BrowseControl is an easy-to-use web filter that helps organizations enforce policies, improve productivity, reduce bandwidth consumption, and meet compliance requirements – no matter where their users are located.
With BrowseControl you can ensure a safe and productive environment by blocking high-risk, distracting, or inappropriate websites, improve network performance by blocking bandwidth hogs, and prevent users from using unsanctioned applications and software-as-a-service providers
BrowseControl’s security policies are enforced by a software agent that is installed on your user’s computers. This allows the solution to continue blocking websites and applications even when computers are taken off-site.
BrowseControl’s central console allows you to configure your security policies from the convenience of a web browser.
With BrowseControl you can Block or allow websites based on URL, category, domain, or IP address, assign custom policies for each group of computers or users, prevent users from launching specific applications, and block network ports to reduce the attack surface of your network
There are three key methods for blocking websites with BrowseControl:
The Blocked List allows you to block specific websites based on URL, domain, or IP address
Category Filtering allows you to block millions of websites across over 100 content categories including pornography, social media, and virus-infected sites.
and finally, you can use the Allowed List to allow specific websites that would otherwise be blocked based on their category, or for the greatest security and control you can block all websites except for those that are on the Allowed List.
When your users try to visit a blocked website they can either be presented with a custom warning message or directed to another site, such as a page with a reminder of your organization’s internet use policy.
With BrowseControl’s App Blocker you can prevent your users from launching specific applications.
Simply select the group you would like to restrict, enter the Original Filename of the application to the Application List, and add it to the blocked applications list.
When the user tries to launch the blocked application they can be presented with a custom warning message that alerts them of the restriction.
BrowseControl is best used in tandem with our computer monitoring software BrowseReporter. Using both solutions provides the visibility and control you need to ensure that your organization’s computers are being used appropriately.
Don’t let internet abuse run rampant in your organization. Take back control over web browsing with a free trial of BrowseControl.
Get started today by visiting CurrentWare.com/Download
If you have any technical questions during your evaluation our support team is available to help you over a phone call, live chat, or email.
Thank you!
With a modern automated time clock or time tracking application that uses multi-factor authentication systems you can reduce the risk of buddy punching on time clocks and maintain an accurate payroll.
Clear guidance and policies/codes of conduct are essential tools for establishing accountability, communicating expectations, and preventing punch clock/payroll manipulation.
Organizations need to develop time and attendance policies that are appropriate for the job at hand and easy enough for employees to understand. These policies should be regularly reviewed and administered in order to prevent employee time theft.
With your time and attendance policies set, your staff will have a pillar to be held accountable to. Ensure that they clearly understand your organization’s expectations and reinforce their accountability to those expectations through enforcement and coaching.
Internet time theft is one of the most pervasive example of time theft at work. With internet time theft, employees spend excessive personal time on unproductive websites and applications. Actively disengaged employees use these types of time theft to avoid work responsibilities and misrepresent the time they spend on their tasks.
A Gallup report found that actively disengaged employees cost the U.S. $450 to $550 billion per year in lost productivity. Social media, news, and games can all become a temptation for even the best of employees, amounting to significant losses.
Organizations can prevent internet time theft with internet restriction software. These solutions proactively prevent access to distracting websites during specified working hours; solutions such as BrowseControl can even by configured to allow access to unproductive websites during designated rest periods, allowing employees to take care of personal tasks.
To prevent employees from downloading distracting applications such as games, some internet restriction tools also comes with integrated features for blocking unauthorized downloads.
One of the difficulties of employee monitoring is that employees may feel that they are not trusted to manage their own schedules or they may worry that “big brother” is micromanaging their time and making uninformed judgements about their work ethics based on the data collected.
To help generate much-needed support from the employees in your workforce, there are ways to balance your time theft strategy to a reasonable standard.
Employee monitoring is an excellent tool for understanding how your workforce operates.
Unfortunately a history of overly-invasive deployments has caused serious concerns among employees, like:
Is my employer spying on me?
They’re just doing this to find an excuse to fire me
If they’re monitoring what I do at work, they obviously don’t trust me
This is not what you want your employees to feel.
In this video I’m going to guide you through the best practices for monitoring employees so you can avoid these mistakes and concerns from your employees
Hello and welcome to the CurrentWare YouTube channel.
My name is Neel Lukka and I am the managing director here at CurrentWare.
After watching this video you can learn more about this topic by reading our new white paper “Employee Monitoring: Best practices for balancing productivity, security and privacy”
You can find the link for that in the description below.
Before we start, I just want to give a quick disclaimer here.
I’m not a lawyer and this is not legal advice. These tips are for informational purposes only. If you want to use employee monitoring software in your company be sure to consult with a legal professional first.
Alright, let’s jump in
First up is the very best tip I can give you.
If you want to succeed, you have to let your employees know that they are being monitored.
Employees that do not know if they are being monitored, why they are being monitored, and how they are being monitored are more likely to have negative reactions to being monitored,
such as
Having higher rates of stress and anxiety
Being less likely to accept being monitored
And, ironically, becoming less productive
That’s not to say that transparency is going to negate each and every concern that your employees may have.
But if you start with transparency from the very beginning you have a far better chance of proving to your employees that these tools aren’t being used to spy on them.
By being transparent you’re also giving the chance to hear about their concerns from the start. This lets you work with them to make an employee monitoring strategy that is fair and minimally invasive.
Here are 4 transparency boosting tips:
Involve a representative sample of employees when you start planning your goals and the metrics you want to capture
Tell your employees what metrics are being captured, how they’ll be used, and what is being used to capture them
Have your staff read and sign policies that disclose your intended use of the employee monitoring software
and finally, give them access to their own data so they can see exactly what’s being captured. They can even use this data to manage their own productivity, which is a major bonus
The second tip I have for you is don’t use employee monitoring to micromanage
One of the reasons that monitoring can be perceived negatively is that it feels like it’s being used to punish employees. They worry that it’s the software equivalent of a micromanaging boss staring over their shoulder while they work, just waiting for them to slip up.
Some employers do monitor internet use to make sure employees aren’t getting carried away, but did you know that so-called “unproductive” internet browsing has actually been found to have a positive impact on productivity?
It’s true! But only if that browsing doesn’t take up more than 12% of their work time.
Employees feel far better about being monitored when they’re given the autonomy to self-manage first. Managers can step in if things are getting carried away or if their employees are visiting clearly inappropriate websites.
The third and final tip I have for you today is to not monitor more than you have to.
Think about it this way – if I told you that I wanted to make sure that employee’s weren’t visiting not safe for work websites, you’d think I was crazy for asking for a direct feed into their webcams.
The bottom line is this:
If you can meet your company’s goals with a less invasive method of monitoring, do it that way.
For example, if you want some backup for your acceptable use policies you can use internet monitoring software to see what sites are being visited.
But there’s no need to track individual keystrokes
Or maybe you want to protect data from being stolen. You can monitor the flow of data without recording audio clips of private conversations
Finally, maybe you want to track the work habits of employees that are working remotely or from home. Give them a company-provided device rather than monitoring their personal computers
That’s it for now.
If you want learn more, check out our new white paper “Employee Monitoring: Best practices for balancing productivity, security and privacy”
You can find the link for that in the description below.
If you’d like to try out employee monitoring in your company, visit CurrentWare.com/Download for a free trial of BrowseReporter, our computer monitoring software.
And as always stay tuned to our YouTube channel for more videos about employee monitoring, cyber security, and CurrentWare’s workforce management software.
If you would like to use monitoring solutions as a part of your time theft mitigation strategy, it is important to respect the privacy of your employees.
Only use the amount of monitoring that is appropriate for the needs of your organization, and ask for explicit consent from employees that will be monitored as a part of their work activities. For traveling or remote employees that require the use of a tracked device for work, it helps to provide them with a dedicated work device as the monitoring of personal devices can feel like a significant privacy violation for most employees.
With all of the concerns your organization may have regarding time theft it is important to consider that typically, the ultimate goal is to cultivate a workforce that is full of employees that are happy, engaged, and productive. Internet and application monitoring should be used to identify and coach repeat offenders and address productivity issues, not to micromanage your employees.
When assessing the prevalence and severity of time theft, you should consider the “human factor” behind your workforce—your workforce is full of multi-dimensional humans with needs outside of their immediate work obligations. By allowing a reasonable degree of flexibility for non-work activities such as taking personal calls/emails as needed or engaging in brief team-building conversations, you will make your staff feel trusted and valued, leading to an increase of engagement and productivity through greater job satisfaction.
While not all forms of time theft are malicious, having employees stealing company time is a significant drain on productivity. If left unchecked stealing time at work can become a pervasive issue. With a combination of time clock management software, company policies, web filtering and internet monitoring software, and proactive supervision you can prevent employee time theft in your company.
Ready to take back control over internet abuse in your organization? Get started today with a FREE trial of our internet monitoring and web filtering software solutions.
Cookie | Duration | Description |
---|---|---|
__cfruid | session | Cloudflare sets this cookie to identify trusted web traffic. |
cookielawinfo-checkbox-advertisement | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . |
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
JSESSIONID | session | The JSESSIONID cookie is used by New Relic to store a session identifier so that New Relic can monitor session counts for an application. |
LS_CSRF_TOKEN | session | Cloudflare sets this cookie to track users’ activities across multiple websites. It expires once the browser is closed. |
OptanonConsent | 1 year | OneTrust sets this cookie to store details about the site's cookie category and check whether visitors have given or withdrawn consent from the use of each category. |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Cookie | Duration | Description |
---|---|---|
__cf_bm | 30 minutes | This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. |
_zcsr_tmp | session | Zoho sets this cookie for the login function on the website. |
Cookie | Duration | Description |
---|---|---|
_calendly_session | 21 days | Calendly, a Meeting Schedulers, sets this cookie to allow the meeting scheduler to function within the website and to add events into the visitor’s calendar. |
_gaexp | 2 months 11 days 7 hours 3 minutes | Google Analytics installs this cookie to determine a user's inclusion in an experiment and the expiry of experiments a user has been included in. |
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_ga_GY6RPLBZG0 | 2 years | This cookie is installed by Google Analytics. |
_gcl_au | 3 months | Provided by Google Tag Manager to experiment advertisement efficiency of websites using their services. |
_gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |
CONSENT | 2 years | YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data. |
Cookie | Duration | Description |
---|---|---|
_opt_expid | past | Set by Google Analytics, this cookie is created when running a redirect experiment. It stores the experiment ID, the variant ID and the referrer to the page that is being redirected. |
IDE | 1 year 24 days | Google DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile. |
NID | 6 months | NID cookie, set by Google, is used for advertising purposes; to limit the number of times the user sees an ad, to mute unwanted ads, and to measure the effectiveness of ads. |
test_cookie | 15 minutes | The test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies. |
VISITOR_INFO1_LIVE | 5 months 27 days | A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface. |
YSC | session | YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages. |
yt-remote-connected-devices | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt-remote-device-id | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt.innertube::nextId | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
yt.innertube::requests | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
Cookie | Duration | Description |
---|---|---|
_dc_gtm_UA-6494714-6 | 1 minute | No description |
_gaexp_rc | past | No description available. |
34f6831605 | session | No description |
383aeadb58 | session | No description available. |
663a60c55d | session | No description available. |
6e4b8efee4 | session | No description available. |
c72887300d | session | No description available. |
cookielawinfo-checkbox-tracking | 1 year | No description |
crmcsr | session | No description available. |
currentware-_zldp | 2 years | No description |
currentware-_zldt | 1 day | No description |
et_pb_ab_view_page_26104 | session | No description |
gaclientid | 1 month | No description |
gclid | 1 month | No description |
handl_ip | 1 month | No description available. |
handl_landing_page | 1 month | No description available. |
handl_original_ref | 1 month | No description available. |
handl_ref | 1 month | No description available. |
handl_ref_domain | 1 month | No description |
handl_url | 1 month | No description available. |
handl_url_base | 1 month | No description |
handlID | 1 month | No description |
HandLtestDomainName | session | No description |
HandLtestDomainNameServer | 1 day | No description |
isiframeenabled | 1 day | No description available. |
m | 2 years | No description available. |
nitroCachedPage | session | No description |
organic_source | 1 month | No description |
organic_source_str | 1 month | No description |
traffic_source | 1 month | No description available. |
uesign | 1 month | No description |
user_agent | 1 month | No description available. |
ZCAMPAIGN_CSRF_TOKEN | session | No description available. |
zld685336000000002056state | 5 minutes | No description |