Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 1, Issue 6;   February 7, 2001: The Tweaking CC

The Tweaking CC

by

When did you last receive an email message with a "tweaking CC"? Probably yesterday. A tweaking CC is usually a CC to your boss or possibly the entire known universe, designed to create pressure by exposing embarrassing information.

Maria opened her inbox one morning and found, among the usual meeting announcements, deadline reminders, and spam, a message from Ken. Ken and Maria had had some difficulties, and a low-grade feud had been simmering for some time. So when Maria saw Ken's name, she felt a twinge. His messages were never good news. And this one certainly wasn't.

"I need your input for the quarterly report by Friday," Ken reminded her. That was fine. But he went on, "I hope you'll make the deadline this quarter." Less fine. And he had CC'd her boss. Definitely not fine.

Hard at WorkKen's message to Maria contained a "tweaking CC," which is a CC to someone whom the sender believes has influence or power over the recipient. The tweaking CC is designed to intimidate.

We use the tweaking CC when we want to rattle people, by tattling on them or informing on them[1]. When used artfully, the tweaking CC provides cover to the sender, who can claim that the CCs were included only to keep everyone in the loop. Usually, this "FYI veil" is pretty thin — everyone can see right through it, except perhaps the sender.

When you receive a message with a tweaking CC, remember:

  • It's possible that the message you're looking at doesn't have a tweaking CC. Maybe the sender added the CCs for some other reason that you don't know about.
  • Tweaking CCs hurt. Let yourself feel the hurt. Denying the hurt will only cause you more grief later. Get support if you need it.
  • The sender is in pain, too. The sender's self-esteem is low. Senders of tweaking CCs often feel that it would not be enough to simply let you know that something is amiss — it's necessary to tell someone really powerful.
  • Taking any action at all within the first hour or two is unwise — you're very likely to make things worse.
  • Defending yourself gives credibility to the sender.
  • Defending yourself in email is risky because emails are so easily misunderstood.

Senders of
tweaking CCs
often feel
powerless
What about Maria? She went for a 20-minute walk. Later, she dropped in on her boss. She explained that she regarded the email from Ken as a tweaking CC. Her boss instantly recognized what she meant by the term, and told her that when he received the message he recognized it as such. He asked Maria if she wanted anything done about Ken's behavior, but Maria declined the offer, saying that since all was well between the two of them, she felt better, and she would find a way to work things out with Ken.

When you receive a message with a tweaking CC, breathe. Center yourself. Recognize your own power — the sender certainly does. Go to top Top  Next issue: Quantum Management  Next Issue

[1]
Analogous tactics can be used in person, or in telemeetings. See "Nasty Questions: I," Point Lookout for November 8, 2006, for more.

101 Tips for Writing and Managing EmailAre you so buried in email that you don't even have time to delete your spam? Do you miss important messages? So many of the problems we have with email are actually within our power to solve, if we just realize the consequences of our own actions. Read 101 Tips for Writing and Managing Email to learn how to make peace with your inbox. Order Now!

Where There's Smoke There's EmailAnd if you have organizational responsibility, you can help transform the culture to make more effective use of email. You can reduce volume while you make content more valuable. You can discourage email flame wars and that blizzard of useless if well-intended messages from colleagues and subordinates. Read Where There's Smoke There's Email to learn how to make email more productive at the organizational scale — and less dangerous. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenJGSGWVilQZPKdGQiner@ChaciaKGLbbRlEeiRJCioCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Emotions at Work:

Conflict Haiku
When tempers flare, or tension fills the air, many of us contribute to the stew, often without realizing that we do. Here are some haiku that describe some of the many stances we choose that can lead groups into tangles, or let those tangles persist once they form.
Bull Elk Antler Sparring for Dominance in their herdBelieve It or Else
When we use threats and intimidation to win debates or agreement, we lay a flimsy foundation for future action. Using fear may win the point, but little more.
A shouting matchCan You Hear Me Now?
Not feeling heard can feel like an attack, even when there was no attack, and then conversation can quickly turn to war. Here are some tips for hearing your conversation partner and for conveying the message that you actually did hear.
A diagram of effects illustrating two more loops in the Restructuring-Fear CycleThe Restructuring-Fear Cycle: II
When enterprises restructure, reorganize, downsize, outsource, lay off, or make other organizational adjustments, they usually focus on financial health. Here's Part II of an exploration of how the fear induced by these changes can lead to the need for further restructuring.
A visual illusionScope Creep and the Planning Fallacy
Much is known about scope creep, but it nevertheless occurs with such alarming frequency that in some organizations, it's a certainty. Perhaps what keeps us from controlling it better is that its causes can't be addressed with management methodology. Its causes might be, in part, psychological.

See also Emotions at Work and Writing and Managing Email for more related articles.

Forthcoming issues of Point Lookout

A shark of unspecified speciesComing May 2: Narcissistic Behavior at Work: VII
Narcissistic behavior at work prevents trusting relationships from developing. It also disrupts existing relationships, and generates toxic conflict. One class of behaviors that's especially threatening to relationships is disregard for the feelings of others. In this part of our series we examine the effects of that disregard. Available here and by RSS on May 2.
Jump ball in a game of basketballAnd on May 9: Unethical Coordination
When an internal department or an external source is charged with managing information about a large project, a conflict of interest can develop. That conflict presents opportunities for unethical behavior. What is the nature of that conflict, and what ethical breaches can occur? Available here and by RSS on May 9.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenshxlnkPycYUbQlguner@ChacfFTLbaeVmkIcRxbcoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
So buried in email that you don't even have time to delete your spam? Learn how to make peace with your inbox.
Dozens of articles about dealing with problems that come up in email.
52 Tips for Leaders of Project-Oriented OrganizationsAre your project teams plagued by turnover, burnout, and high defect rates? Turn your culture around.
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.
Comprehensive collection of all e-books and e-bookletsSave a bundle and even more important save time! Order the Combo Package and download all ebooks and tips books at once.