Someone, sometime in the past month, has probably asked you, "If I tell you this, do you promise not to tell a soul?" If this has happened to you, you probably agreed. And it's reasonably likely that you later heard the same story in a slightly different form from somebody else, which meant that someone other than you was spreading the word. You were respecting a confidence, while others were out there blabbing.
That can be bad news. For example, in a largish meeting, someone might innocently ask if you know anything at all about a somewhat related subject. How do you respond? Do you deny all knowledge? Do you betray the confidence? If you deny all knowledge, you would be lying, and you risk appearing to be out of touch, or being caught in a lie. If you betray the confidence, you risk damaging a valuable friendship.Distinguishing between personal issues and organizational issues helps. When someone confides in you about a personal matter, it's best to honor that confidence without reservation. But since organizational issues rarely stay "secret," organizational confidences are usually just early notifications. A promise not to ever repeat what you're about to be told can therefore become a serious liability. It's best to find ways to lend support to your confidant without jeopardizing your own political safety. What can you do?
Negotiate with your confidant in advance. Here are some protections you can request.
- Time limit
- Ask if you can be free to talk after some specific date. Try to narrow your vulnerability to a limited time window if you can.
- Limited right to repeat
- Organizational confidences
rarely stay secret for long.
Consider them early
notifications, and put limits
on your non-disclosure.
- Ask if there are some people you can talk to. For example, your confidant might have spoken to others already, and talking to them might do no harm. Or it might be OK to talk to people who are distant enough from the immediate issue — your spouse or personal acquaintances outside the company, for example. Limit the "cone of silence" if you can.
- Escape clauses
- Let your confidant know that if you hear the information from any other source, then you'll feel free to discuss it, without attribution. Explain that if the information is out there, your denying knowledge of it could be a risk for you.
In time you'll find more risk reduction tactics. Send them to me and I'll post them.
The article you've been reading is an archived issue of Point Lookout, my weekly newsletter. I've been publishing it since January, 2001, free to all subscribers, over the Web, and via RSS. You can help keep it free by donating either as an individual or as an organization. You'll receive in return my sincere thanks — and the comfort of knowing that you've helped to propagate insights and perspectives that can help make our workplaces a little more human-friendly. More
Your comments are welcomeWould you like to see your comments posted here? rbrenEWkHNgplZKuyfxfBner@ChaclJinjGNWCgUDbHlFoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Ethics at Work:
- Looking the Other Way
- Sometimes when we notice wrongdoing, and we aren't directly involved, we don't report it, and we don't
intervene. We look the other way. Typically, we do this to avoid the risks of making a report. But looking
the other way is also risky. What are the risks of looking the other way?
- When You Aren't Supposed to Say: I
- Most of us have information that's "company confidential," or possibly even more sensitive
than that. When we encounter individuals who try to extract that information, we're better able to protect
it if we know their techniques.
- Ethical Influence: I
- Influencing others can be difficult. Even more difficult is defining a set of approaches to influencing
that almost all of us consider ethical. Here's a framework that makes a good starting point.
- Approval Ploys
- If you approve or evaluate proposals or requests made by others, you've probably noticed patterns approval
seekers use to enhance their success rates. Here are some tactics approval seekers use.
- Some Truths About Lies: III
- Detecting lies by someone intent on misrepresentation is an important skill for executives, managers,
project managers, and just about anyone involved in knowledge-oriented organizations. Here's Part III
of our little collection of lie detection techniques.
See also Ethics at Work for more related articles.
Forthcoming issues of Point Lookout
- Coming October 17: Overt Belligerence in Meetings
- Some meetings lose their way in vain attempts to mollify a belligerent participant who simply will not be mollified. Here's one scenario that fits this pattern. Available here and by RSS on October 17.
- And on October 24: Conversation Irritants: I
- Conversations at work can be frustrating even when everyone tries to be polite, clear, and unambiguous. But some people actually try to be nasty, unclear, and ambiguous. Here's Part I of a small collection of their techniques. Available here and by RSS on October 24.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenSttqnLxTqUolVMwiner@ChaczsRBUIosEUjwqGgWoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.
- Your stuff is brilliant! Thank you!
- You and Scott Adams both secretly work here, right?
- I really enjoy my weekly newsletters. I appreciate the quick read.
- A sort of Dr. Phil for Management!
- …extremely accurate, inspiring and applicable to day-to-day … invaluable.