A documented set of privacy requirements that defines what data is collected, how it is used, and how systems must handle personal or sensitive data.
A privacy baseline is a documented set of minimum, organization-wide requirements for how personal or otherwise sensitive data must be collected, processed, stored, shared, and retained across systems and processes. In industrial and manufacturing environments, it provides a consistent reference for designing and operating OT, IT, MES, ERP, and quality systems so that handling of identifiable or sensitive data aligns with applicable privacy expectations and regulations.
The privacy baseline typically defines what types of data are considered in scope (for example, employee identifiers, operator performance records, visitor logs, or customer-related production data), what purposes are allowed for using that data, who may access it, and what protections must be in place. It is expressed at a level that can be traced into system requirements, configurations, and procedures.
Although content varies by organization, a privacy baseline commonly includes:
In regulated manufacturing, the privacy baseline is used as a design and validation input for both new and legacy systems. It influences how MES and ERP are configured, how quality and deviation records store operator and patient-related data, and how shop floor intelligence tools log events and performance metrics. The baseline is typically referenced when:
A privacy baseline is related to, but distinct from, security baselines. Security baselines specify minimum technical and procedural controls to protect systems and data from unauthorized access, modification, or loss. The privacy baseline defines which data is permitted to exist in those systems, for what purposes, in what form, and who may see it.
In practice, the privacy baseline constrains how security controls are implemented. For example, it can define what identifiers may appear in logs, how long logs containing personal data may be retained, and under what conditions monitoring tools may capture screens or keystrokes. Both baselines are typically developed and maintained together, with traceability to system-level requirements and configurations.
When applied to long-lived equipment and legacy MES or ERP systems, a privacy baseline helps identify where existing data handling does not align with current expectations. This can drive compensating controls such as masking identifiers in reports, restricting access to certain screens, adjusting logging configurations, or introducing data brokers that filter or anonymize data before it is stored or exported.