Skip to main content
FormulationIT & computing

Data security through permissions management

By 4 March 2025No Comments

In a PLM software like beCPG, collaboration is essential to ensure project success. However, it is sometimes necessary to restrict access to certain folders, fields, or spaces to enable secure collaboration. Proper permissions management protects sensitive information while also facilitating teamwork by assigning appropriate rights to each user.

Managing Permissions in Collaboration Spaces

In beCPG PLM, collaboration spaces are called “sites”. These sites allow a team to work on the same data or products within a dedicated space.

Each site member has specific rights:

  • Reader: Can view content.
  • Contributor: Can view and modify all content and create new content.
  • Collaborator: Can view, modify, create, and delete all content.
  • Manager: Can invite people.
  • Version Manager: Can move a branch/version into this site and view content.

These rights apply to all fields, folders, reports, and projects within the site. However, beCPG also allows for even more specific rules to be added to each of these elements.

Controlling Access to Specific Fields

Sometimes, it is necessary to hide certain product sheet information from specific users for confidentiality reasons. For example, financial or strategic data can be hidden from unauthorized users while remaining accessible to managers and administrators. This improves efficiency by ensuring that each user only has access to information relevant to their role, preventing them from being overwhelmed with unnecessary data.

Additionally, some fields may be visible but set to read-only for users without editing rights. This ensures that information remains intact and secure while still being available for consultation. For instance, restricting write access for the marketing team on fields managed by the R&D department helps prevent human errors by ensuring that only authorized personnel can modify sensitive or technical information.

Administrators manage this functionality with the ability to create security rules with three possible options.

This field access management can be applied broadly to all products. However, it can also be applied locally using the “Local Permission” button. This allows the use of conditional formulas to apply security rules to specific products.

Managing Folders in the Documents List

Managing folder permissions in the Documents List of entities is crucial for controlling access to critical documents within beCPG. With the permission management option, it is possible to apply specific rules to each folder.

Permissions defined at the product model level are automatically applied to all associated entities. This simplifies large-scale access rights management. Additionally, subfolders inherit the permissions of their parent folder, ensuring consistent and uniform permission management at all levels.

Protecting Sensitive Information in Technical Reports

Some technical sheets contain critical information that should only be accessible to certain team members.

Permissions on reports allow for fine-tuned control over who can access technical sheets. This protects sensitive information while enabling secure collaboration. By defining specific permissions, you can restrict access to technical sheets for finished products (FP), semi-finished products (SFP), or raw materials (RM) to certain users or groups.

Secure Project Management Through Permissions

Managing project permissions is essential for controlling who can view, modify, or manage different aspects of projects within beCPG. By setting specific access rights, you can restrict access to sensitive projects to specific groups or users while allowing limited visibility for others.

For example, a Reader can add or modify tasks only if they are assigned to them. This level of permission granularity ensures efficient project management while maintaining appropriate security and confidentiality.

In this case, Jérôme as a reader, cannot modify the task because it is not assigned to him:

Assigning appropriate rights protects sensitive information and facilitates teamwork. A structured approach to permissions ensures that each user has the necessary access, contributing to the overall success of your projects.

Contact us today to request a demonstration or a free trial!

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.