Product Development: Cruciality of decisions & risk log

If you are a product manager you would have experienced at least one of the below scenarios.Scenario 1: During a meeting with partners (we refer to our clients as partners), a conflict surfaces while recalling the reasons for a particular decision in the past. You have one version of the story while the partner remembers an altogether different version or, worse, doesn’t remember anything about the decision.Scenario 2 : A new team member joins the team. During a discussion, he/she asks “why are we doing it this way” and you go blank. You need time to recollect your thoughts to give the right answer.

Scenario 3: Before starting the project, you identify risks that might arise during the development phase. Your partners ignore it and give you a go-ahead. Months later, when you start facing technical issues and convey it to them, your partners don’t remember the conversation you had at the beginning of the project.

Scenario 4: During knowledge transition sessions, you share everything that you know about the product’s development history. But you fail to remember when and why this decision came into existence. It’s difficult to recollect exact conversations that led you to take this decision. It’s all in the email threads but even those emails are hard to find.

Do you feel deja-vu reading the above scenarios?

I do. I have lost count of the times I’ve faced these scenarios. I am sure you would have faced them too sometime in your career. It’s not that I haven’t tried anything to overcome these challenges. I have tried different things apart from discussing over calls with our clients/partners-

  • Mentioning all the important decisions in emails
  • Mentioning all risks in the initial proposal
  • Mentioning new risks in the emails as they come
  • Sending MoMs with a defined structure- discussions, decisions, action items
  • For any kind of technical decision, attaching an analysis document in the respective JIRA ticket and adding a comment with the final takeaway.

But, the truth is, as the product grows and the team expands, searching emails for MoMs and referring to JIRA tickets doesn’t make the cut.

Especially if you are working on a big project that goes on for years. After a time, recovering JIRA tickets and long email threads feels like digging the Earth for a dead body. I myself have faced this while recalling why we decided using Inspectlet over Fullstory? Or, why did we decide to push the MVP deadline?

So, what’s the solution?

When I started looking for a solution to this problem, I discovered that I am not alone. A lot of PMs face this problem. Thankfully, there’s a solution to tackle this problem. A product manager can maintain registers/logs for a product that can help him/her remember important product decisions. These two logs are-

  1. Decision log
  2. Risk log

Decision log

A decision log is a centralized list of all critical decisions taken throughout the product’s life cycle. It can be a business decision impacting the delivery, a technical decision, a process decision or a people decision.

This helps in effective communication in the present and then in future for recall times in conflicting situations.

Decision Log Template | FREE Download

What goes inside a decision log?

  • What is the decision about?
  • When was the decision made? (Date)
  • Why this decision? Pros and cons, if any.
  • Who are the contributors? Who is the approver?
  • Outcome of the decision?
  • When the decision was proposed?

Risk Log

It would be a centralized list of all potential risks and issues identified throughout the product life cycle. This includes all the information of the identified risk – nature of risk, level of risk, mitigation etc.

Many times, we maintain the product risk log for internal purposes only. But, keeping it open with all stakeholders really helps.

How do I create and use a Risk Log?

What goes inside a risk log?

  • What is the actual risk?
  • What is the impact of the risk?
  • When was this risk identified?
  • What is the impact level?
  • What is the probability level? (PB Level)
  • Priority level (PR level) = Impact level * Probability level  (PB Level)
  • Who is the owner?
  • Are there any mitigation notes?
  • What are the recent updates?

When to list a risk?

All the risks should be identified and communicated to the stakeholders using the Risk Log itself right at the beginning.

After that, risk identification should be a recurring activity. You can make it a part of your sprint rituals – sprint planning, retrospective or even in your daily scrum meetings.

Risks can be identified by anyone – Stakeholders, Leads, PMs, Designer, QAs or Developers.

Just as in decision log, a risk’s priority could change in future or a risk could become an issue (i.e. already occurred). You can read about Risks vs Issues. Hence, at a given time the risk register should show the updated risk information.

Also, once the risk becomes an issue it can go to the Issue Log which is the same as Risk Log and usually kept in parallel.

In short, maintaining Decision and Risk logs in your product might be an additional task for you in the starting. But, once it becomes a part of your process, it really proves beneficial in the long run. You can use it to-

  • Keep everyone on the same page.
  • Save time in debating/recalling the reasons for a particular decision.
  • Avoid “We told you so” situations that become the root cause of conflicts..

Is your Digital life at risk? Let’s know more about it!

Is Your Company At A Risk Of Losing Data? Top 4 Security Risks Every SME Owner Should Know - My Siccura - Private and Secure Digital Life

Are you using social media platforms on daily basis then you must be aware of its dark side impacts on your social life? Let’s talk and rethink about your personal safety before using these interactive internet based applications. As people use it to connect with far-flung friends and family members to send speedy messages to colleagues and can broadcast major and minor actions in your lives. This is also a basic platform for many businesses to collaborate or share information for instance; individuals can discuss an assignment with co-workers by means of a various social media messaging session. With advancement employers and schools are more and more using social media to reach out to possible employees and students as well.

According to the Bureau of Justice Statistics, more than 16 million US residents became victims of identity theft in 2012 alone. Keeping your passwords, financial, and other personal information safe and protected from outside intruders has long been a priority of businesses, but it’s increasingly critical for consumers and individuals to pay attention to data protection advice and use various top-notch practices to keep your personal information secure and protected. There is loads of information out on the internet there for consumers, families, and persons on protecting their bank credentials, sufficiently protecting desktop and laptop from hackers, malware, and other threats, and most excellent practices for using the Internet safely for personal safety. Protecting your individual information via various cybersecurity training programs can help lessen your menace of individuality theft.

Various conducts to secure your data:

5 easy ways to secure privacy of your data - The Economic Times

  • Maintain proper security on your PC, Mobiles and other electronic devices to secure your social life.
  • Systematically store and arrange your personal information securely
  • Ask questions before deciding to share your individual information

Practices for personal safety and Keeping Your Devices Secure

Digital Safety Kit - Committee to Protect Journalists

  • Install good quality anti-virus software, anti-spyware software, and a firewall.
  • Don’t open files which are not known to you or download programs sent by outsiders.
  • Before sending personal information over your laptop on a public wireless check if your information will be protected.
  • Keep financial information on your laptop only if necessary.
  • Don’t use an automatic login feature on your bank accounts and emails that save your username and password.
  • Delete mail that contains identifying information or account numbers or invalid transaction.

There is so much information that may make you get confused, principally if you’re not a tech-savvy. In order to mend these issues, you can adopt various straightforward best practices and tips for protecting your devices from threats or simply consult us via and get various security tips to secure your social platforms.

error: Content is protected !!