Workplace deviance is defined as the act of not accepting standards and resulting in violence, threats, or danger. Cyber technology has increased the probability of work deviance due to many factors. Those factors include cyberloafing, cyberbullying, and identity theft. These are all examples of workplace deviance with cyber technology. Cyberloafing is the act of using technology for the wrong purpose in the workplace. For example, if someone is at work and using technology, they might instead browse social media for personal entertainment. Cyberloafing is extremely common today especially with teens. This is bad because it could lead to lack of productivity and motivation. It is important that organizations must act upon and manage this issue by monitoring or creating policies to prevent this from happening. Cyberbullying refers to the act of online harassment, threat, and bullying. Cyber technology has given new opportunities for people in the workforce to engage in hurtful comments, hacking someone’s profile, spreading false rumors, etc. This is a prime example of workplace deviance because of how simple it is for an employee to harass another, especially considering how easy it is to cover up your identity through technology. For example, someone may get a promotion that seems unfair to someone else which could lead to hate comments such as, “You did not deserve that,” or “I should be the one with that promotion because I worked harder than you.” Cyberbullying in a workplace can lead to a decrease in work ethic from employees, an unfriendly work environment, or violence. The last way cyber technology created opportunities for workplace deviance is identity theft. Identity theft is that act of stealing someone’s personal information to use for personal gain. With new technology, it has become easier for criminals to hack and steal people’s identity. Identity theft has contributed majorly to the problem of workplace deviance. An example of identity theft in a workplace is if someone who worked with owning peoples data had a problem with whoever’s identity they had control over, it is very easy for that employee to expose that person’s identity. Because of this, it is important to know who you are hiring, set standards and rules, and monitor constantly.