Someone, sometime in the past month, has probably asked you, "If I tell you this, do you promise not to tell a soul?" If this has happened to you, you probably agreed. And it's reasonably likely that you later heard the same story in a slightly different form from somebody else, which meant that someone other than you was spreading the word. You were respecting a confidence, while others were out there blabbing.
That can be bad news. For example, in a largish meeting, someone might innocently ask if you know anything at all about a somewhat related subject. How do you respond? Do you deny all knowledge? Do you betray the confidence? If you deny all knowledge, you would be lying, and you risk appearing to be out of touch, or being caught in a lie. If you betray the confidence, you risk damaging a valuable friendship.Distinguishing between personal issues and organizational issues helps. When someone confides in you about a personal matter, it's best to honor that confidence without reservation. But since organizational issues rarely stay "secret," organizational confidences are usually just early notifications. A promise not to ever repeat what you're about to be told can therefore become a serious liability. It's best to find ways to lend support to your confidant without jeopardizing your own political safety. What can you do?
Negotiate with your confidant in advance. Here are some protections you can request.
- Time limit
- Ask if you can be free to talk after some specific date. Try to narrow your vulnerability to a limited time window if you can.
- Limited right to repeat
- Organizational confidences
rarely stay secret for long.
Consider them early
notifications, and put limits
on your non-disclosure.
- Ask if there are some people you can talk to. For example, your confidant might have spoken to others already, and talking to them might do no harm. Or it might be OK to talk to people who are distant enough from the immediate issue — your spouse or personal acquaintances outside the company, for example. Limit the "cone of silence" if you can.
- Escape clauses
- Let your confidant know that if you hear the information from any other source, then you'll feel free to discuss it, without attribution. Explain that if the information is out there, your denying knowledge of it could be a risk for you.
In time you'll find more risk reduction tactics. Send them to me and I'll post them.
The article you've been reading is an archived issue of Point Lookout, my weekly newsletter. I've been publishing it since January, 2001, free to all subscribers, over the Web, and via RSS. You can help keep it free by donating either as an individual or as an organization. You'll receive in return my sincere thanks — and the comfort of knowing that you've helped to propagate insights and perspectives that can help make our workplaces a little more human-friendly. More
Your comments are welcomeWould you like to see your comments posted here? rbrenblWgfwQUjWmEjMAdner@ChacbBhJfFCfVXrGuFhDoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Ethics at Work:
- Your Wisdom Box
- When we make a difficult decision, we sometimes know we've made the wrong choice, even before the consequences
become obvious. At other times, we can be absolutely certain that we've done right, even in the face
of inadequate information. When we have these feelings, we're in touch with our inner wisdom. It's a
- Budget Shenanigans: Swaps
- When projects run over budget, managers face a temptation to use creative accounting to address the
problem. The budget swap is one technique for making ends meet. It distorts organizational data, and
it's just plain unethical.
- When You Aren't Supposed to Say: III
- Most of us have information that's "company confidential," or even more sensitive than that.
Sometimes people who want to know what we know try to suspend our ability to think critically. Here
are some of their techniques.
- Virtual Termination with Real Respect
- When we have to terminate someone who works at a remote site, sometimes there's a temptation to avoid
travel — to use email, phone, fax, or something else. They're all bad ideas. Terminating people
in person is not only a gesture of respect. It's good business.
- Personnel-Sensitive Risks: II
- Personnel-sensitive risks are risks that are difficult to discuss openly. Open discussion could infringe
on someone's privacy, or lead to hurt feelings, or to toxic politics or toxic conflict. If we can't
discuss them openly, how can we deal with them?
See also Ethics at Work for more related articles.
Forthcoming issues of Point Lookout
- Coming October 25: Workplace Memes
- Some patterns of workplace society reduce organizational effectiveness in ways that often escape our notice. Here are five examples. Available here and by RSS on October 25.
- And on November 1: Risk Creep: I
- Risk creep is a term that describes the insidious and unrecognized increase in risk that occurs despite our every effort to mitigate risk or avoid it altogether. What are the dominant sources of risk creep? Available here and by RSS on November 1.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenbDaeblRKwmSTFNTmner@ChaczgapIUGtOibFmOkCoCanyon.com or (617) 491-6289, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- Ten Project Management Fallacies: The Power of Avoiding Hazards
- Most of what we know about managing projects is useful and effective, but some of what we know "just ain't so." Identifying the fallacies of project management reduces risk and enhances your ability to complete projects successfully. Even more important, avoiding these traps can demonstrate the value and power of the project management profession in general, and your personal capabilities in particular. In this program we describe ten of these beliefs. There are almost certainly many more, but these ten are a good start. We'll explore the situations where these fallacies are most likely to expose projects to risk, and suggest techniques for avoiding them. Read more about this program. Here's a date for this program:
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.
- Your stuff is brilliant! Thank you!
- You and Scott Adams both secretly work here, right?
- I really enjoy my weekly newsletters. I appreciate the quick read.
- A sort of Dr. Phil for Management!
- …extremely accurate, inspiring and applicable to day-to-day … invaluable.