Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 17, Issue 18;   May 3, 2017: Start the Meeting with a Check-In

Start the Meeting with a Check-In

by

Check-ins give meeting attendees a chance to express satisfaction or surface concerns about how things are going. They're a valuable aid to groups that want to stay on course, or get back on course when needed.
A business meeting

Maybe you know that all is well with your team. People are satisfied that progress is good or better than good. You've had some bumps between some team members, but nothing serious. Or maybe you know of some kind of trouble, or that the team is blocked somehow from making further progress. Whatever you think you know, are you certain that everyone has a clear view — and the same clear view — of what's working and what isn't?

Check-ins can surface differences among team or group members about what's happening. A minute per person is probably enough. Check-ins won't catch everything, but they return a lot of value for the time expended.

The goal of check-ins is to gather contributions from everyone, to create a sound basis for moving forward, or to enable the team to later address whatever comes up. Here are five suggestions for conducting effective check-ins.

Introduce check-ins when things are going well
Introducing Check-ins won't catch everything,
but they return a lot of value
for the time expended
check-ins when people feel troubled about the team's progress can create difficulties for adopting the practice. When the team is pressed and facing obstacles, the check-in might feel to some like an unnecessary distraction from more urgent work.
Learning how to conduct check-ins does take some effort. When things are going well, the few minutes spent in checking in are not a cause for worry. Develop the practice in advance of trouble, not during trouble.
Allow a random order of voluntary contributions
Don't go "around the table" (or around the virtual table), requiring everyone to contribute something when called on. Let people choose when and whether to contribute. If someone wants to add something later, after already having contributed, that's fine too.
A loose, relaxed contribution protocol welcomes all contributions, and no contribution is required.
Create a parallel anonymous contribution channel
In face-to-face meetings, collect unsigned, written contributions on slips of paper. Have abstainers submit blanks. For virtual meetings, use technology to create an anonymity channel.
Anonymity enables some people to comment even when commenting feels unsafe, which helps the team surface truth about risky topics.
Use both open and themed check-ins
Vary the format. An open check-in enables people to comment on anything at all. A themed check-in welcomes all comments, but it especially encourages comments related to a theme or question.
Both formats have strengths and weaknesses. An open format is unbiased, but might overlook an important issue. A themed format can focus on a known issue, but might give too little attention to issues not yet surfaced.

One last suggestion enhances psychological safety: ban comments about other people's contributions. A check-in is not a debate. A contribution is the contributor's view. The goal of the check-in is to express our views about the team's progress, and all of us are entitled to our own views. Go to top Top  Next issue: Dealing with Deniable Intimidation  Next Issue

101 Tips for Effective MeetingsDo you spend your days scurrying from meeting to meeting? Do you ever wonder if all these meetings are really necessary? (They aren't) Or whether there isn't some better way to get this work done? (There is) Read 101 Tips for Effective Meetings to learn how to make meetings much more productive and less stressful — and a lot more rare. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Effective Meetings:

A Protestant church in Tuttlingen, GermanyBlind Agendas
Effective meetings have agendas. But even if a meeting has an agenda, the hidden agendas of participants can cause trouble. Another source of trouble, less frequently recognized, is the blind agenda.
Bowery men waiting for bread in a bread line in New York City in 1910Agenda Despots: II
Some meeting chairs crave complete or near-complete control of their meeting agendas. In this Part II of our exploration of their techniques, we emphasize methods for managing unwanted topic contributions from attendees.
A collaboration session in a modern workplaceRationalizing Creativity at Work: I
Much of the work of modern organizations requires creative thinking. But financial and schedule pressures can cause us to adopt processes that unexpectedly and paradoxically suppress creativity, thereby increasing costs and stretching schedules. What are the properties of effective approaches?
A set of wrenches from a toolkitEffects of Shared Information Bias: I
Shared information bias is the tendency for group discussions to emphasize what everyone already knows. It's widely believed to lead to bad decisions. But it can do much more damage than that.
A horserace, which is a useful metaphor for the abuser's view of a conversationExploitation and Conversational Narcissism at Work: I
Exploitation of others is one of four themes of conversational narcissism. Knowing how to recognize the patterns of conversational narcissism is a fundamental skill needed for controlling it. Here are five examples that emphasize exploitation of others.

See also Effective Meetings and Effective Communication at Work for more related articles.

Forthcoming issues of Point Lookout

A meeting in a typical conference roomComing April 3: Recapping Factioned Meetings
A factioned meeting is one in which participants identify more closely with their factions, rather than with the meeting as a whole. Agreements reached in such meetings are at risk of instability as participants maneuver for advantage after the meeting. Available here and by RSS on April 3.
Franz Halder, German general and the chief of staff of the Army High Command (OKH) in Nazi Germany from 1938 until September 1942And on April 10: Managing Dunning-Kruger Risk
A cognitive bias called the Dunning-Kruger Effect can create risk for organizational missions that require expertise beyond the range of knowledge and experience of decision-makers. They might misjudge the organization's capacity to execute the mission successfully. They might even be unaware of the risk of so misjudging. Available here and by RSS on April 10.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.