Apple has an extremely strict set of internal confidentiality measures. The development and debugging of all confidential products must be carried out on this basis. Employees suspected of information leakage will be investigated by the company. In a report, Business Insider gave eight striking extreme examples.
"Forget what your husband did"
A woman named Kim Scheinberg told a real story on Quora: since her husband JK was involved in Mac OS R & D, she was told by Apple to forget everything about how her husband made the PC run Mac OS. Their house is even completely reset to meet Apple's security standards.
Silence on Jobs' health problems
During his lifetime, Steve Jobs fought against pancreatic cancer. Because Steve Jobs maintained the interests of the company, especially its shareholders, the company had been shut down on Steve Jobs's health for a long time. The New York Times once wrote that this method of confidentiality is unknown.
Even developers cannot see the real face of the iPad
In 2011, an iPad developer revealed that the environment in which they were engaged in iPad software development was: a windowless house with a door lock modified. Enter the name and social security number.
What's even more amazing is that Apple drilled holes in its desk and asked developers to lock the iPad on the desk with a bicycle lock. Apple even embedded the iPad into a special framework, therefore, developers cannot see anything except the screen and interface. In addition, Apple also takes photos of the wood grain on each iPad and wooden table. Once the message is leaked, the source of the leakage can be traced through the wood grain features.
Strict control over Foundry
Reuters compared Apple's foundry Foxconn to an industrial bastion in a report.
A Foxconn employee revealed that employees of the company needed to swipe their cards to confirm their identities. The security guards even used metal detectors to check each employee. Once an employee carrying a metal object and leaves, they would inform the police.
It is said that Reuters reporters were even attacked by two security guards during unannounced visits.
Select multiple suppliers to avoid risks
To ensure sole control of all information, Apple chooses multiple vendors and allows them to take responsibility for different products to monitor which company the leak originated from, Reuters reported.
Separated teams
Inside AppleAccording to the book, apple must ensure that everyone in the room has the right to be informed of the contents of the theme conference. Even internally, employees in different departments do not know what others are doing.
Rebuilding the office? Important projects are coming
Once a carpenter appears in an apple office, the employee will begin a major project.
Normally, transparent glass walls in the past will become frosted and there will be no windows. Employees call it "imprison houses ".
ITrack central tracing and monitoring system
An anonymous Apple employee told Quora that all Apple's prototypes are labeled with a serial number monitored by a central tracing system named iTrack. The prototype must be locked when it is not used, and obtaining the prototype is also limited.
In addition to the front-end, the most sensitive areas of the company, such as the industrial design room, are equipped with surveillance cameras. In addition, employees can only discuss product information within these sensitive areas and cannot take a further step.