ManagementSpeak: This is strictly confidential.
Translation: It won’t be mentioned when we get you back for saying it.
You might want to keep this week’s translation confidential, just like the identity of this week’s contributor.
ManagementSpeak: This is strictly confidential.
Translation: It won’t be mentioned when we get you back for saying it.
You might want to keep this week’s translation confidential, just like the identity of this week’s contributor.
With the election over, the world’s opinionators have switched their opining from comparing candidates’ horse-race strategies and tactics to pointless post mortems on the same subject.
Pointless because the correct analysis is, what was Clinton thinking, setting up her own email server instead of using Gmail like everyone else?
Last week I promised to get back to business. I am. Because if you filter out all the noise, the Clinton Email Fiasco provides plenty of guidance for the world of organizational dynamics.
Start with an excellent long-form piece by Politico’s Garret Graff titled “What the FBI Files Reveal About Hillary Clinton’s Email Server” (9/30/2016). According to Graff, the FBI’s investigation documents “… depict less a sinister and carefully calculated effort to avoid transparency than a busy and uninterested executive who shows little comfort with even the basics of technology, working with a small, harried inner circle of aides inside a bureaucracy where the IT and classification systems haven’t caught up with how business is conducted in the digital age.”
In broad brush if not detail, the story should sound familiar. Start with Clinton’s technical illiteracy. She apparently doesn’t even know how to use a personal computer. For email, she once learned to use a Blackberry and that was the beginning and end of her tech savviness. Even her staff’s attempts to move her to an iPad or iPhone died on the vine.
Couple that with the sheer volume of emails she had to contend with — you’ll recall they numbered in the hundreds of thousands. Next mix in that the State Department’s secure email facilities were clumsy and antiquated. And that in addition to her Blackberry, Clinton managed much of her email traffic by having aides print out messages for her to read and hand-write responses. But outside the State Department’s facilities this couldn’t be done, so her staff forwarded emails to her private server as a workaround so they could be printed.
The punchline: Substitute your own company’s less-than-tech-savvy executives for Hillary Clinton. Substitute inconvenient or hard-to-use information technology for the State Department’s secure email system. Substitute Gmail and Dropbox for a privately managed email server.
And finally, substitute your technology-use policies for the State Department’s technology-use policies, and your insufficient technology refresh budget for the State Department’s insufficient technology refresh budget.
Get the picture?
Outrage is easy when someone in authority violates the policies everyone else is expected to follow. Empathy is harder.
But as any good business analyst will tell you, empathy is the essential ingredient in information technology design. “Documenting requirements” only gets you so far, as anyone knows who has documented the requirements for secure passwords will tell you. Those requirements are precisely what cause employees to write down their passwords on easily-found Post-It notes.
People have work to do. Executives are people too, often with bigger piles of work than anyone else. And character flaws notwithstanding, your typical executive mostly gets it done.
Executives are, if anything, even more impatient than anyone else regarding obstacles that keep them from doing it.
Regrettably, in my experience at least, at a personal level more executives see information technology as obstacle than see it as an assist, so while they might not be so extreme as to not know how to use a PC, there are plenty who won’t take the time to learn (for example) how to track changes in Word; to use SharePoint in its usual IT-friendly/user-unfriendly configuration; or to use the company’s web conferencing system’s whiteboard feature to facilitate mixed in-person/remote participant meetings.
Not to mention … it’s a whiteboard. How many employees at any level have PCs that let them use a stylus to draw on the whiteboard?
Answer: Very few, because of the rarely recognized chicken/egg nature of so many IT requirements: Few people ask for something because they don’t know it exists; IT doesn’t offer it because nobody asks for it.
So … where does the Clinton Email Fiasco take us?
It’s past time for businesses of all kinds to recognize that inconvenient IT, especially when coupled with a lack of technology savviness, constitutes a significant risk to the business.
Even more, it’s long past time to recognize that dealing with most risks by establishing policies are little more than CYA strategies. They’re pretty much worthless when it comes to preventing or mitigating the risks themselves.
While in your case the fiasco will be less obvious and visible, the lesson is nonetheless just as consequential when profits and brand are at stake as for more minor matters like appealing to voters.