Attend IT Limited Blog

By accepting you will be accessing a service provided by a third-party external to

Tip of the Week: How to Effectively Task Out Responsibilities

Tip of the Week: How to Effectively Task Out Responsibilities

With so many things that need to be accomplished each day, it always helps to have all the information needed to complete these tasks. If a task has no context assigned to it or no insight into how to approach it, productivity and morale are going to suffer. To prevent this, you need to properly task out your team’s goals. Here, we’ve provided some practices to help.

Creating the Ideal Task

Many productivity gurus (and assorted other authorities on the subject) have lent their expertise and created a rubric to help do just this:

Step + Detail + Deadline + Context = Task

This rubric Is particularly useful for creating single tasks, as well as individual steps in a larger process. Let’s go into these four components piece-by-piece.


With each task, there is going to be some inherent action necessary, so you need to address what that action needs to be. Does someone need to research something, write something, or simply check into something? Tell them what needs to be done for their goal to be accomplished.


You also need to provide additional information concerning each task for context and clarity. This would include things like:

  • The person or department who is responsible for completing this task
  • The purpose of the task that they should strive to accomplish
  • Why this task is important to the overall goal
  • Where any resources can be found to assist with the task and general guidance to help complete it


Once you’ve outlined what the task is, you need to identify when the task should be completed by. This helps ensure that projects are completed in a timely fashion, with certain milestones achieved within a certain timeframe.


Finally, you need to include other pertinent details about a task, including how much time may be spent on it, which project it is for, and what priority level it should have. This gives the person responsible for the task more information as they organize their schedule.

Let’s assume that you want to throw a surprise pizza party for your team, and so you wanted to give one trusted employee (we’ll assume he’s named Bob) the responsibility of ensuring the food was ordered ahead of time. The task you assign to Bob might look like this:

“Order Food for Staff Surprise Party on Friday

Assigned to BOB – Priority 3
*If unable to complete, please inform HR*


  • 3:15 – Get credit card from HR and call Pizzeria Porfirio. Place order for three large pizzas with peppers and onion and 75 of their house special chicken wings to be delivered Friday at 4:45.


  • 1:00 – Call Pizzeria Porfirio to confirm delivery”

That’s all there is to tasking out a process for your team to follow. There are also software solutions available to make this even easier for you and your team, so long as you keep these practices in mind and completely task out the things you assign to others. The clearer the process is, the more likely it is to be successful.

For more handy tips to boost your business’ productivity, make sure you subscribe to our blog!

How the Right Technology Can Help SMBs Reopen Safe...
Why Unified Communication Is Necessary… Especially...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, July 07 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Network Security Technology Business Computing Tip of the Week Best Practices Cloud Managed IT Services Productivity Privacy Disaster Recovery Hosted Solutions communications Malware Data Recovery Hackers Data Backup Business Data Backup Outsourced IT Innovation VoIP IT Services Cloud Computing Productivity Email Small Business Software Cybersecurity Efficiency Mobile Devices IT Support Computer Business Continuity Internet IT Support Automation Internet of Things Saving Money Business Management Hardware Upgrade Server Information Technology Phishing Smartphone Microsoft Managed IT Managed IT services Mobility Mobile Device Management Collaboration BDR User Tips BYOD Risk Management Budget Windows 7 Artificial Intelligence Network Avoiding Downtime Save Money Managed Service Provider Smartphones Quick Tips Cost Management Meetings Hosted Solution Communication Data Management Password Remote Computing Virtual Private Network Spam Compliance Passwords Computers Ransomware Firewall History Gadgets Content Filtering IT Service Managed Service Devices Training Hard Drives Hybrid Cloud Microsoft Office Paperless Office Manufacturing Google Workplace Tips Value Conferencing Audit Solid State Drive Business Technology MSP Saving Time Automobile Data Breach Remote Work Printing Personal Information Data Security Windows 10 Human Resources Remote Workers Redundancy Android Tech Term Telephone Systems Router Networking Recovery Marketing Document Management Flexibility AI Monitoring Payment Cards Disaster Professional Services Office 365 Workers End of Support Chromebook Machine Learning Save Time iPhone Voiceover Internet Protocol Smart Technology HIPAA Windows 10 Cybercrime Outsource IT Users VPN Voice over Internet Protocol Two-factor Authentication Proactive Alexa for Business Wi-Fi Facebook Time Management Management The Internet of Things Printers Transportation Encryption Lifestyle Operating System Electronic Medical Records Travel Smart Tech Vendor Virtualization Project Management Students Utility Computing Business Telephone Proactive IT Private Cloud Software as a Service Azure Spyware Advertising Social Media e-waste Fiber Optics Commerce Mobile Office Telephony Update Workstations Financial Technology Going Green Backup and Disaster Recovery IoT Upgrades Mobile Computing Applications Connectivity Employee-Employer Relationship Shadow IT Cybersecurty Big Data Unified Communications Business Intelligence Computer Repair Office Legal SMB Apple Active Directory Instant Messaging Covid-19 Windows Server 2008 WPA3 Development Antivirus Administration Dark Web Break/Fix Window 10 Wasting Money Streaming Media Downtime intranet App Remote Monitoring Evernote Wireless Technology User Error Windows Server Wireless Internet Browser Employees Wireless File Storage Word Help Desk Holiday Colocation Education Government Online Storage Cleaning Computing Amazon Content Filter Vulnerability Regulation Social Engineering E-Commerce SaaS Managed IT Service Payroll Mobile Work/Life Balance Money Employer-Employee Relationship Bandwidth Data Loss Phone System Black Market Mobile Device Gamification OneNote Copiers Hacking Entertainment Hacker Samsung Video Conferencing Nanotechnology Application Customer Relationship Management Analysis Virtual Assistant Data Protection iOS Projects Sync Cortana Scams Blockchain Managed Services WiFi Bring Your Own Device Data Storage Miscellaneous ROI Hosted Desktop IT solutions Patch Management Google Docs Benchmarks Music Ciminal Text Messaging Audits Memory Admin Sabotage FAQ Video Games Google Maps Digital Signage Computer Forensics Root Cause Analysis Hyperlink Battery Retail Reputation eCommerce App store IT Management Windows Server 2008 R2 Updates Smart Devices Computer Accessories Scalability Employee Managed Services Provider Identities Policy Unified Threat Management Screen Mirroring Windows 10s Outlook Microsoft Excel Analytics Office Tips Solutions Settings Adobe PC Wireless Charging Health Company Culture Internet Service Provider Gmail Augmented Reality Wasting Time Point of Sale Websites Mobile Security Information Tablets Microsoft Word Internet Exlporer Troubleshooting Computer Fan Legislation Facebook Privacy Safety HaaS Procedure Cast Hard Disk Drive Shortcut File Sharing Printer Business Strategy Keyboard Shortcuts Google Drive Smartwatch Identity Theft WannaCry Windows Politics Tech Support Charger PowerPoint Accessory Chrome YouTube Gifts Social Data Theft Identity NFL Maintenance CRM Vendor Management Humor Display Managing Stress Comparison Emergency Language Consultant Alert Testing Excel USB Storage Myths Books PCI DSS Licensing Server Maintenance Worker Commute Search Inventory Scam Experience Fraud PDF Best Practice Workstation Television CrashOverride Peripheral Holidays Data Privacy Emails IT Solutions eWaste Keyboard How To Net Neutrality Computer Care Google Assistant Co-Managed Services Robot 5G Specifications HBO Camera Virtual Reality Sports Threats IT budget Regulations Compliance Financial Investment Communitications Webinar WIndows Server 2008 Security Cameras Processor Edge Apps Telework Access Control OneDrive Credit Cards Relocation Hard Drive Windows Ink Micrsosoft Device Security Current Events Unsupported Software Twitter Telephone Medical IT Sales Law Enforcement Worker Virus Touchscreen