Continuing our exploration of the tactics of bully chairs, we now turn to techniques that depend on the chair's abuse of the form of the meeting itself. See "When the Chair Is a Bully: I," Point Lookout for June 20, 2012, for more.
- Abusing the executive session
- The executive session, either formal or informal, is perhaps the most extreme form of participation control. It is especially tempting when the executive session attendees are trusted allies of the chair. When there are customs or bylaws that specify executive session attendees, the chair's ability to abuse this form is limited to overuse. That is, the chair allocates to executive sessions decisions regarding issues for which executive sessions aren't required. But when there is no definition of the reasons for convening executive sessions, any use at all potentially constitutes abuse.
- Excluding members of a team that otherwise meets regularly as a whole should be a rare event. Frequent use might indicate intentional exclusion of disfavored attendees. Logging dates and times of all incidents is useful, but unfortunately it is possible only if the executive sessions themselves aren't secret.
- Abusing the one-on-one
- Some chairs feel that the "entire meeting is against me." Some distrust nearly all attendees. Others feel powerless to oppose the influence of disfavored attendees. To these bully chairs, the one-on-one provides control. They meet privately with each attendee, so as to eliminate open discussion altogether, and enhance their ability to control — or misrepresent — what the "attendees" can say to each other.
- Since open discussion is an effective means of ensuring informed and sound decisions, chairs who adopt the serial one-on-one tactic are placing their organizations at risk. Log the frequency of open meetings and note trends in that frequency.
- Limiting what the meeting can discuss or decide
- It's typical for chairs to determine what is appropriate for discussion at meetings, or at what meetings particular topics can be discussed. This power is abused by chairs who schedule topics for meetings that disfavored attendees cannot attend, or who sequence agendas so as to schedule certain topics for portions of meetings in which disfavored attendees will be absent. Some chairs schedule topics so that disfavored attendees might be attending by means of a disadvantaged medium, such as telephone or video, when they usually attend in person. Some chairs decide that some topics won't be discussed at all.
- Log all Excluding members of a team
that otherwise meets regularly
as a whole should be
a rare eventdecisions that appear to have been taken outside the meeting context, or when disfavored attendees are absent or disadvantaged. This information can be helpful in demonstrating a pattern of abuse.
Chairs are powerful. Bully chairs abuse that power. Proof of abuse requires both an unambiguous demonstration of a pattern of abuse, and an open-minded supervisor who is willing to examine the proof. First issue in this series Top Next Issue
Is a workplace bully targeting you? Do you know what to do to end the bullying? Workplace bullying is so widespread that a 2014 survey indicated that 27% of American workers have experienced bullying firsthand, that 21% have witnessed it, and that 72% are aware that bullying happens. Yet, there are few laws to protect workers from bullies, and bullying is not a crime in most jurisdictions. 101 Tips for Targets of Workplace Bullies is filled with the insights targets of bullying need to find a way to survive, and then to finally end the bullying. Also available at Apple's iTunes store! Just . Order Now!
Your comments are welcome
Would you like to see your comments posted here? rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.comSend me your comments by email, or by Web form.About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
This article in its entirety was written by a human being. No machine intelligence was involved in any way.
Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
Related articles
More articles on Workplace Bullying:
- Looking the Other Way
- Sometimes when we notice wrongdoing, and we aren't directly involved, we don't report it, and we don't
intervene. We look the other way. Typically, we do this to avoid the risks of making a report. But looking
the other way is also risky. What are the risks of looking the other way?
- What Is Workplace Bullying?
- We're gradually becoming aware that workplace bullying is a significant deviant pattern in workplace
relationships. To deal effectively with it, we must know how to recognize it. Here's a start.
- See No Bully, Hear No Bully
- Supervisors of bullies sometimes are unaware of bullying activity in their organizations. Here's a collection
of indicators for supervisors who suspect bullying but who haven't witnessed it directly.
- Power Mobbing at Work
- Mobbing is a form of group bullying of an individual — the target. Power mobbing occurs when a
politically powerful person orchestrates the mobbing. It's a form of bullying that's especially harmful
to the target and the organization.
- Online Ethics
- The array of media for exchanging our thoughts in text has created new opportunities for acting unethically.
Cyberbullying is one well-known example. But sending text is just one way to cross the line ethically.
Here are some examples of alternatives.
See also Workplace Bullying and Workplace Bullying for more related articles.
Forthcoming issues of Point Lookout
- Coming January 22: Storming: Obstacle or Pathway?
- The Storming stage of Tuckman's model of small group development is widely misunderstood. Fighting the storms, denying they exist, or bypassing them doesn't work. Letting them blow themselves out in a somewhat-controlled manner is the path to Norming and Performing. Available here and by RSS on January 22.
- And on January 29: A Framework for Safe Storming
- The Storming stage of Tuckman's development sequence for small groups is when the group explores its frustrations and degrees of disagreement about both structure and task. Only by understanding these misalignments is reaching alignment possible. Here is a framework for this exploration. Available here and by RSS on January 29.
Coaching services
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Follow Rick
Recommend this issue to a friend
Send an email message to a friend
rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.comSend a message to Rick
A Tip A Day feed
Point Lookout weekly feed