Skip to main content

0.2 The "Walled Garden" of Information (Openness vs. Secrecy)

Information is both the primary driver of efficiency and the most significant vulnerability in a manufacturing enterprise. A robust quality system requires establishing a clear boundary — a Walled Garden — that maximizes the flow of process knowledge internally (enabling speed and continuous improvement) while enforcing absolute secrecy over confidential business and proprietary design data. This balance is mandatory for competitive advantage and legal defense.

0.2.1 The Mandate for Internal Openness (The Garden)

The default status for all internal process data and manufacturing documentation must be transparent. Restricting essential information leads directly to waste (Waiting) and flawed Root Cause Analysis (RCA).

Process Knowledge Flow

  • Standard Work: All Work Instructions (WIs), assembly procedures, and quality standards (e.g., IPC limits) must be openly accessible to personnel executing those steps.
  • Problem Solving Data: Data used for process analysis (e.g., SPC charts, live torque logs, Defect Paremeters, machine error codes) must be available across functional teams (Quality, Engineering, Operations). This enables timely cross-functional problem-solving (Gemba, Kaizen).
  • The MES Bridge: The Manufacturing Execution System (MES) must present WIs, assembly drawings, and current process status in a unified, accessible interface, ensuring all personnel are working from the same source of truth.

Physical Control (Clean Desk Mandate)

Internal data must be immediately secured when not in use to prevent visual leakage.

  • Clean Desk Policy: Documentation, build schedules, and test logs must be immediately put away or shielded. Confidential documents left unattended are a critical risk.
  • Screen Security: Computers must use automatic screen locking when unattended.

0.2.2 External Control (The Wall)

All data must be classified based on its criticality and sensitivity. Access must be governed by the Need-to-Know principle, ensuring individuals only see the data required for their role.

Information Hierarchy and Access Mandate

Digital data systems must enforce controls based on these tiers:

Tier

Sensitivity

Example Data

Access Control

Internal Process

Low Risk

WIs, Safety Procedures, Standard Work Time.

Restricted to production floor personnel.

Confidential IP

High (Proprietary Design)

Final PCB Gerber files, Schematics, Custom ASIC source code, Thermal modeling data.

Engineering, Design, and Executive authorization only.

Restricted/Financial

Extreme (Legal/Business)

Supplier pricing contracts, Forecast volumes, Financials, Employee HR records.

System-level or executive authorization only.

External Communication Protocol

Sharing proprietary information outside the organization is the highest risk.

  • Mandate: Confidential data (IP, Schematics, Pricing) may only be shared with customers or suppliers after a signed Non-Disclosure Agreement (NDA) is confirmed.
  • IP Protection: When communicating with suppliers, provide only the necessary information (e.g., only the dimensions of the crimp terminal, not the schematic of the mating board).
  • Visitor Protocol: All visitors must sign a visitor's log and be escorted. Visitors must be blocked from viewing screens, documents, or equipment containing Confidential data.

0.2.3 Audit and System Partitioning

The physical handling of confidential data must be linked to digital security controls.

  • Digital Partitioning: Highly sensitive IP (e.g., encryption keys, source code, final test source code) must be segregated and stored on physically or digitally partitioned systems, isolated from the general MES and production networks.
  • Data Redundancy: The Audit Trail must track all access attempts to Confidential or Restricted data, logging who accessed what and when.
  • Consequence: Violation of the information hierarchy is a critical breach of trust and a mandatory trigger for disciplinary and legal action.

Final Checklist

Mandate

Criteria

Verification Action

Internal Openness

Process knowledge (WIs, SPC data, torque logs) is transparent and readily accessible.

MES system verifies all current WIs are accessible to all operators on the line.

Classification

All data is categorized into a mandatory Information Hierarchy (Internal $\to$ Restricted).

Audit confirms high-level BOM and financial data are not accessible by general production staff.

IP Protection

Confidential data (Schematics, Source Code) is only shared after a signed NDA is confirmed.

Audit verifies internal personnel comply with the Need-to-Know access principle.

Physical Security

Clean Desk Policy is mandatory; screens auto-lock when unattended.

Visitors are always escorted and blocked from viewing critical data on the floor.

Integrity Protection

Highly sensitive data is stored on partitioned/isolated systems.

IT security audit confirms data is protected from unauthorized network egress.