Management Matters Management MattersManagement Matters
Practical advice for federal leaders on managing people, processes and projects.

Summer Slowdown

ARCHIVES

In offices across the country, government or otherwise, August can bring an eerie sound -- silence. With the end of summer in sight and students just weeks away from starting the new school year, many workers choose August to cash in hard-earned vacation time. For federal managers, this rush of leave requests can create a number of challenges.

It is important to have a good grasp of the Office of Personnel Management's leave policies and to ensure your employees understand them as well. Employees have a right to take their accrued annual leave, but it is a supervisor's right to decide when that leave can be taken. And while the summer Friday "sick day" might be a running sitcom joke, an agency can grant sick leave only when the excuse is supported by acceptable evidence. An employee's self-certification as to the reason for his or her absence can qualify, but a manager can also require a medical certificate or other administrative evidence.

Once everyone has a solid understanding of the rules of the road, managers can determine whether and when to approve vacation requests.

That begins with parsing out a complete picture of the anticipated workload for the upcoming months by talking to other supervisors and project and program managers. Create a calendar laying out deadlines, likely periods of increased workload and other important dates that might affect leave requests. Then you can determine whether allowing leave would interfere with deadlines.

If you decide not to grant a request, be clear about the reason and provide date ranges when it would be more likely that leave could be approved. It might help morale to assure the employee that you considered all other options before denying the request, and that you are happy to consider alternative dates that would not conflict with high-priority projects.

If you grant the request, begin communicating immediately with the staffers who will be filling in about what responsibilities they will be taking on and how they can work with the employee in advance to minimize lost time and productivity during the leave period.

Before employees head out for vacation, be sure they change voicemail and email greetings to indicate they are out of the office. This makes callers aware that the office is still responsive and that someone else is acting on the absent employee's behalf. All out-of-office messages should contain clear and complete information on who can handle urgent issues while the employee is out.

It is easy to forget why employees are not only permitted but even encouraged to take leave. Vacation eases stress, offers health benefits and increases productivity. A 2007 Businessweek article titled "Do Us a Favor, Take a Vacation" chronicled the perils of overworked employees.

The article cited a Families and Work Institute study, in which workers identified vacation deprivation as a key driver of increased anger, resentment and mistakes on the job.

More employees are taking two or three days off at a time instead of cashing in accrued leave in bulk, but this approach is less effective at reducing stress. The study found that workers who take at least a week off experience an 82 percent increase in job performance after a trip.

Managers should capitalize on this restorative state. While returning from leave can be a tough transition for employees, it is a good time to work with them on big-picture brainstorming or offer up a new challenge.

Elizabeth Newell covered management, human resources and contracting at Government Executive for three years.

 
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.