Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 24, Issue 9;   February 28, 2024: Checklists: Conventional or Auditable

Checklists: Conventional or Auditable

by

Checklists help us remember the steps of complicated procedures, and the order in which we must execute them. The simplest form is the conventional checklist. But when we need a record of what we've done, we need an auditable checklist.
What most of us think of when we think of checklists

The checklist trope: what most of us think of when we think of checklists. This is what I'm calling a conventional checklist. It's a list of items that we might or might not actually check off as we're executing a procedure, or when we've completed it.

When we need to carry out a lengthy or complicated procedure, some of us have learned not to rely on memory to get all the right steps in the right order. We make checklists. We might check off the steps as we go, or after executing the procedure from memory, we might use the checklist to confirm that we got it right. These ways of using checklists — these "usage modes" and others — are what I'm calling "conventional."

We usually make checklists only if the procedure in question is complicated enough, or the consequences of missing a step are severe enough. But if the situation calls for a checklist of any kind, and if a conventional checklist is helpful, taking the next step to an auditable checklist is worth considering.

About conventional checklists

A conventional checklist functions as a reminder of the steps required when we execute a procedure. It also reminds us of the order in which we must execute those steps. There are two fundamental classes of conventional checklists, characterized by how they're meant to be used. [Gawande 2011] [Lau 2023]

READ-DO checklists
When people use a READ-DO checklist, they check off the items in the list as they execute them. This kind of checklist is sometimes called a "do-list."
DO-CONFIRM checklists
With a DO-CONFIRM checklist, people run the procedure often from memory and out of sight of the checklist. At some point they pause and check off the items of the checklist, confirming that they executed all the steps required.
The mental model we have of checklists of either category is planar. That is, we think of checklists as having been implemented on paper or a screen, where what you see is all there is (WYSIATI). Unlike Web pages, and unlike the forms we see on Web sites, conventional checklists have no moving parts, and no background software.

The audibility gap

Conventional checklists are better than no list at all, but they have limited value when something has gone wrong and we want to figure out what happened. Conventional checklists have no memory unless they're printed on paper and we save the paper.

But If the situation calls for a checklist of
any kind, and if a conventional checklist
is helpful, taking the next step to an
auditable checklist is worth considering
even if we do save the paper, conventional checklists contain only checkmarks. Many cannot reliably provide evidence to post-incident investigators about whether a procedure was followed accurately, or exactly how the team deviated from prescribed procedure, or who executed which steps of the procedure, or in what order they executed them.

An auditable checklist is a checklist that serves the needs of both auditors and the users of conventional checklists. And auditors need to know the identity of the person who checked off the item on the checklist, and the date and time when they did it.

One way of making a checklist auditable is to add space for date, time, and user ID alongside the space for the checkmark for each item. Although this sounds simple enough, such a change dramatically reduces the usability of even the best-designed checklists. Users must enter much more data, and the checklist then becomes visually cluttered.

That's the problem. Extending a conventional checklist to include the information auditors need makes the checklist less usable for its primary purpose. I call this the auditability gap. Another way to think of it is that auditor's usage mode is incompatible with the usage modes of other users.

Closing the auditability gap

In some situations, technology can close the auditability gap. By converting the checklist into an active form, supported by software running in the background, we can capture all information needed for audits without troubling the people who use the checklist to run the procedure. To accomplish this, the user of the checklist must use it on an electronic device capable of running the background software. Any web browser will serve, but paper will not.

The tradeoff we must make to gain this capability is prohibitive in some situations. But if devices as simple as a commercially available tablet are available, users can get access to the auditable checklist and enter data as they would in a conventional checklist, while the checklist carries the burden of capturing the audit data.

Last words

When something has gone wrong, we need to know whether or not people followed prescribed procedures. Because the data contained in the auditable checklists provides the answers, the data captured in auditable checklists must be secured. This circumstance reveals another requirement: the data captured from auditable checklists must be lockable and tamper-proof. Go to top Top  Next issue: Six More Insights About Workplace Bullying  Next Issue

How to Spot a Troubled Project Before the Trouble StartsProjects never go quite as planned. We expect that, but we don't expect disaster. How can we get better at spotting disaster when there's still time to prevent it? How to Spot a Troubled Project Before the Trouble Starts is filled with tips for executives, senior managers, managers of project managers, and sponsors of projects in project-oriented organizations. It helps readers learn the subtle cues that indicate that a project is at risk for wreckage in time to do something about it. It's an ebook, but it's about 15% larger than "Who Moved My Cheese?" Just . Order Now! .

Footnotes

Comprehensive list of all citations from all editions of Point Lookout
[Gawande 2011]
Atul Gawande. The Checklist manifesto: How to get things right. New York: Henry Holt and Company, 2011. Order from Amazon.com. Back
[Lau 2023]
Stuart "Kipp" Lau. "Best Practices in Checklist Design Account for Human Limitations," AINonline blog, March 1, 2023. Available here. Retrieved 10 February 2024. Back

Your comments are welcome

Would you like to see your comments posted here? rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Project Management:

Finger PuzzlesFinger Puzzles and "Common Sense"
Working on complex projects, we often face a choice between "just do it" and "wait, let's think this through first." Choosing to just do it can seem to be the shortest path to the goal, but it rarely is. It's an example of a Finger Puzzle.
Rough-toothed dolphinThe Injured Teammate: I
You're a team lead, and one of the team members is very ill or has been severely injured. How do you handle it? How do you break the news? What does the team need? What do you need?
Captain Robert F. Scott and most of his team returning from the South PoleProject Improvisation and Risk Management
When reality trips up our project plans, we improvise or we replan. When we do, we create new risks and render our old risk plans obsolete. Here are some suggestions for managing risks when we improvise.
A sturdy fence with a working gateRational Scope Management
In project management, rational, responsible scope management helps us focus on the task at hand. But rational scope management lets us adapt our work to changes in external factors, and changes in our understanding of the problem.
The S.S. Eastland, in Cleveland, Ohio, around 1911On Anticipating Consequences
Much of what goes wrong when we change systems to improve them falls into a category we call unanticipated consequences. Even when we lack models that can project these results accurately, morphological analysis can help us avoid much misery.

See also Project Management and Project Management for more related articles.

Forthcoming issues of Point Lookout

A white water rafting team completes its courseComing December 11: White Water Rafting as a Metaphor for Group Development
Tuckman's model of small group development, best known as "Forming-Storming-Norming-Performing," applies better to development of some groups than to others. We can use a metaphor to explore how the model applies to Storming in task-oriented work groups. Available here and by RSS on December 11.
Tuckman's stages of group developmentAnd on December 18: Subgrouping and Conway's Law
When task-oriented work groups address complex tasks, they might form subgroups to address subtasks. The structure of the subgroups and the order in which they form depend on the structure of the group's task and the sequencing of the subtasks. Available here and by RSS on December 18.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.