
Harry Stonecipher, former CEO of The Boeing Company. Mr. Stonecipher, who had been recalled from retirement in 2003 to repair Boeing's image following a string of procurement scandals at the company, was asked to resign in 2005 following revelations of a love affair with a female executive. Ironically, Mr. Stonecipher had been viewed as "the fixer," and had presided over adoption of a new code of conduct for Boeing employees.
It's difficult to know for certain whether a situation like Mr. Stonecipher's might have been managed more effectively if more robust confidentiality-preserving procedures had been in place. But one can easily imagine similar situations that are allowed to persist much longer than they would have if such procedures were in place. Photo courtesy ChinaDaily.com.
A few weeks ago, we explored managing risks arising from situations of a delicate nature that cannot be widely disclosed within the enterprise. Because the conventional risk management apparatus — plans, meetings, publication, review and approval — is likely to lead to inappropriate disclosure of sensitive personal information, either such risks are not managed properly, or sensitive personal information is disclosed inappropriately or even illegally.
Let's examine what we would need to do to manage these risks while maintaining an appropriate level of confidentiality.
- Confidentiality infrastructure
- Whatever infrastructure we deploy must be capable of maintaining the confidentiality of sensitive personal information. It's likely that we need a tiered structure for access to personnel-sensitive risk management information. When designing or modifying procedures for managing personnel-sensitive risks, experts in management, security, risk management, and human resources must be involved.
- Multi-part risk plans
- Because some parts of a given risk plan could contain sensitive information, those parts might have to be separated and have controlled access. The number of controlled-access components of a risk plan could depend on the individuals who present personnel-sensitive risks. For instance, in a need-to-know based system, if risks associated with two people are involved and they have different supervisors, we might need independently confidential risk plan components for the two personnel-sensitive risks.
- Access for project managers and sponsors
- For a given project, the project manager and sponsor must have full access to risk management artifacts. To develop and manage their risk plan, they might need access to personnel-sensitive information not normally available to them. This could require adjustment of existing policies.
- Confidential risk reviews for personnel-sensitive risks
- Currently, It's likely that we need a tiered
structure for controlled access
to personnel-sensitive risk
management informationrisk plan review is usually conducted without regard to personnel confidentiality. That process can continue for the enterprise-public portions of risk plans, but the personnel-sensitive components must be reviewed in a confidential manner. - Confidential budgeting and resource allocation
- Components of project budgets and resource allocation plans intended to cover personnel-sensitive risks can remain enterprise-public, but the documents justifying these budgets and allocations are likely to be confidential and have controlled access, in parallel with the risk plans that drive them.
- Training
- Since the people involved in these procedures include some who are unfamiliar with procedures for maintaining confidentiality of personnel matters, training in personnel confidentiality is probably required. And since many of those already familiar with personnel matters are probably unfamiliar with the ways of risk management, they might also require some training.
Because the set of people with access to a given controlled-access document or decision can vary with the content of the document or decision, the requirement for confidentiality of some risk plan components can become cumbersome. But the alternatives — either noncompliance with regulations or poor risk management or both — is worse. First issue in this series
Top
Next Issue
Are your projects always (or almost always) late and over budget? Are your project teams plagued by turnover, burnout, and high defect rates? Turn your culture around. Read 52 Tips for Leaders of Project-Oriented Organizations, filled with tips and techniques for organizational leaders. Order Now!
Your comments are welcome
Would you like to see your comments posted here? rbrenaXXxGCwVgbgLZDuRner@ChacDjdMAATPdDNJnrSwoCanyon.comSend me your comments by email, or by Web form.About Point Lookout
Thank you for reading this article. I hope you enjoyed it and
found it useful, and that you'll consider recommending it to a friend.
This article in its entirety was written by a human being. No machine intelligence was involved in any way.
Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
Related articles
More articles on Ethics at Work:
Difficult Decisions
- Some decisions are difficult because they trigger us emotionally. They involve conflicts of interest,
yielding to undesirable realities, or possibly pain and suffering for the deciders or for others. How
can we make these emotionally difficult decisions with greater clarity and better outcomes?
Extrasensory Deception: II
- In negotiating agreements, the partners who do the drafting have an ethical obligation not to exploit
the advantages of the drafting role. Some drafters don't meet that standard.
Telephonic Deceptions: II
- Deception at work probably wasn't invented at work. Most likely it is a continuation of deception in
the rest of life. But the technologies of the modern workplace offer new opportunities to practice the
art. Here's Part II of a handy guide for telephonic self-defense.
Full Disclosure
- The term "full disclosure" is now a fairly common phrase, especially in news interviews and
in film and fiction thrillers involving government employees or attorneys. It also has relevance in
the knowledge workplace, and nuances associated with it can affect your credibility.
Online Ethics
- The array of media for exchanging our thoughts in text has created new opportunities for acting unethically.
Cyberbullying is one well-known example. But sending text is just one way to cross the line ethically.
Here are some examples of alternatives.
See also Ethics at Work for more related articles.
Forthcoming issues of Point Lookout
Coming October 1: On the Risks of Obscuring Ignorance
- A common dilemma in knowledge-based organizations: ask for an explanation, or "fake it" until you can somehow figure it out. The choice between admitting your own ignorance or obscuring it can be a difficult one. It has consequences for both the choice-maker and the organization. Available here and by RSS on October 1.
And on October 8: Responding to Workplace Bullying
- Effective responses to bullying sometimes include "pushback tactics" that can deter perpetrators from further bullying. Because perpetrators use some of these same tactics, some people have difficulty employing them. But the need is real. Pushing back works. Available here and by RSS on October 8.
Coaching services
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenaXXxGCwVgbgLZDuRner@ChacDjdMAATPdDNJnrSwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Follow Rick
Recommend this issue to a friend
Send an email message to a friend
rbrenaXXxGCwVgbgLZDuRner@ChacDjdMAATPdDNJnrSwoCanyon.comSend a message to Rick
A Tip A Day feed
Point Lookout weekly feed
