Browse Definitions :

Off vs. off of

Writing for Business

interrobang Which is correct?
There are a number of methods you can use to capture VoIP calls ___ a LAN.
a. off
b. off of

Answer: Either.

Explanation
Although “off of” is widely considered ungrammatical, it’s sometimes the better choice — and I think this is one case where “off of” lends greater clarity to the sentence. The sentence is correct either way but to my mind, “off of” is a better choice.

Many grammar experts maintain that “off of” is always wrong but I think that is a rule that is made to be broken, at least occasionally.

The most common arguments against “off of” are that “of” is unnecessary and that two prepositions should never be placed side-by-side.

On Motivated Grammar, Gabe Doyle counters those arguments:

And yes, you can put two prepositions next to each other, as in this unobjectionable example:

(2) I pulled a coat out of the closet.

Going on to a somewhat more complex objection, antonymic phrases do not have to share structures or prepositions. The fact that you get on and not on of a train doesn’t mean that you have to get off and not off of it. Consider:

(3a) I put the sandwiches into the picnic basket, but someone has pulled them out of it.
(3b) One velociraptor was in front of Muldoon, the other next to him.

The point about “out of” is an interesting one because you hear “of” left out of that sentence increasingly, as in “I pulled my coat out the closet.” Maybe the false rule about double prepositions will evolve through use but it’s not there yet. In the meantime, let’s consider each case and select the best choice for the sentence in question.

See also: Onto vs. on to
Twitter bird  Follow me on [email protected]_of_grammar

Dig Deeper on Writing for Business

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

  • Kerberos

    Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close