Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 6, Issue 7;   February 15, 2006: Nepotism, Patronage, Vendettas, and Workplace Espionage

Nepotism, Patronage, Vendettas, and Workplace Espionage

by

Normally, you terminate or reassign team members who actually inhibit progress. Here are some helpful insights and tactics to use when termination or reassignment is impossible.

When a team member actually impedes the progress of a project, and direct intervention isn't effective, reassignment and termination are the best options. But sometimes, politics intervenes — you can't reassign or terminate because of a constraint from on high. Sometimes the offender is a relative of the boss, or might be politically connected, or might be spying for a powerful political operator. In some cases, the goal might even be vendetta-driven sabotage.

Capitol Hill at nightWhen you can't terminate or reassign the offender, what are your alternatives? Frustration? Madness? Running for Congress?

Often you can accomplish the mission within the constraints you have to deal with. Here are some insights and tactics that can help.

The problem is bigger than you think
It's unlikely that this situation is the first or last of its kind. A repetition is probable. Even if you find a way around it this time, you might face the same problem again. Possible nightmare scenario: the person who replaces this offender is even worse.
Consider a course change for yourself
Since the situation is likely to repeat, ask yourself, "Do I really need this?" If you have alternatives, think about trying one of them. If you don't have alternatives, get some. Always have alternatives.
Work the politics
Evidently, you need stronger alliances than you now have if you want to remove the offender. Build those alliances. Even if it's too late for this incident, you'll likely need them eventually.
If you can't remove, reconfigure
If you can't You can often accomplish
the mission even when
you can't terminate
people who impede progress
remove the offender from the team, reconfigure to insulate the offender from anything important. If you do, you'll need a plausible rationale, especially for the political operator(s) who prevented reassignment. Reconfigure in a way that seems plausible enough to divide the forces that blocked a more straightforward approach.
Find an important-sounding new task
As you devise the reconfiguration, it's tempting to remove the person from all work. But it's far more plausible to reassign the offender to something important-sounding that isolates him or her from the critical elements of the current effort. Off site is best.
Identify an alternative resource
If the offender was uniquely able to do work you absolutely need done, find a consultant, or a contractor, or consider doing it yourself. Make no moves or announcements until you have an alternative resource.
Adopt a more selective meeting attendance policy
Shortening and focusing meeting agendas gives you an opportunity to focus the invitation lists. By omitting the tasks of offenders from agendas, you can exclude offenders from meetings.

Most important, be comfortable with a level of performance lower than you normally expect from teams you lead. This problem isn't one of your choosing, and charging the entire performance penalty to your personal account is probably unjustified. It isn't you that isn't doing your best — it's the organization that isn't doing its best. Go to top Top  Next issue: How Not to Accumulate Junk  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbrenSXaOVCPoSTrkyUwDner@ChactHmDteOddZvdBPHfoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Project Management:

Mountain fogSeeing Through the Fog
When projects founder, we're often shocked — we thought everything was moving along smoothly. Sometimes, with the benefit of hindsight, we can see that we had — or could have had — enough information to determine that trouble was ahead. Somehow it was obscured by fog. How can we get better at seeing through the fog?
Chocolate chip cookiesNine Project Management Fallacies: III
Some of what we "know" about managing projects just isn't so. Identifying the fallacies of project management reduces risk and enhances your ability to complete projects successfully.
Captain Robert F. Scott and most of his team returning from the South PoleProject Improvisation and Risk Management
When reality trips up our project plans, we improvise or we replan. When we do, we create new risks and render our old risk plans obsolete. Here are some suggestions for managing risks when we improvise.
The Dalles of the St. Croix RiverThe Politics of the Critical Path: II
The Critical Path of a project is the sequence of dependent tasks that determine the earliest completion date of the effort. We don't usually consider tasks that are already complete, but they, too, can experience the unique politics of the critical path.
Ross Marshall and Don Pugh at the kickoff meeting for the Expeditionary Combat Support System (ECSS) at Tinker Air Force BaseDeep Trouble and Getting Deeper
Here's a catalog of actions people take when the projects they're leading are in deep trouble, and they're pretty sure there's no way out.

See also Project Management and Managing Your Boss for more related articles.

Forthcoming issues of Point Lookout

Office equipment — or is it office toys?Coming July 25: Exploiting Functional Fixedness: II
A cognitive bias called functional fixedness causes difficulty in recognizing new uses for familiar things. It also makes for difficulty in recognizing devious uses of everyday behaviors. Here's Part II of a catalog of deviousness based on functional fixedness. Available here and by RSS on July 25.
Tim Murphy, official photo for the 112th CongressAnd on August 1: Strategies of Verbal Abusers
Verbal abuse at work has special properties, because it takes place in an environment in which verbal abuse is supposedly proscribed. Yet verbal abuse does happen at work. Here are three strategies abusers rely on to avoid disciplinary action. Available here and by RSS on August 1.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenoJDsqEnjAZikTujxner@ChacklZftMYxUWwyoeHCoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
101 Tips for Managing ConflictFed up with tense, explosive meetings? Are you the target of a bully? Learn how to make peace with conflict.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.