Deviance can be defined by going out of the standards set intentionally. Whether it is societal standards or workplace policies. For example, being late or absent at work is an example of work-related deviance. Cyber-related deviance at work can be seen as encouraged due to the fact they are not doing it face to face and therefore believe they will not get caught. An example of this using the same subject previous, working from home and not logging on when required, but documenting the hours. Doing this in an office setting would be harder to get away with, but since COVID companies have allowed remote work to soar. Employees are meant to be working normal hours just from home, but they will log on to do the task and then watch TV or run errands instead. Some have even taken it as far as traveling to another state or country and working from there without telling anyone.

While cyber technology has increased, many think they have found a loophole out of getting in trouble technology has evolved, and if the company has the correct protection this can be prevented. There are more ways now that technology is online, but the risk of classified documents being downloaded before someone is fired to revoke access in anticipation is slowly being managed as now that organizations are adapting, they are taking the correct measures to prevent these steps. Such as having employees use a specific VPN where their work activities can be tracked and will be able to tell if someone is not active for a long period. As mentioned, deviance can happen anywhere outside the workplace and offline.

While some may look at technology as a gateway to allow this type of behavior that is not the case. Just as easily as it can be for a member to be tempted technology can be a way to prevent this or monitor it. Companies have more control if anything limiting access to certain files through role-based or access-based credentials. Some may hear more about these mishaps now with technology evolving, but that also shows the information being tracked and monitored compared to paper records that no one could have known were stolen.