FAQ Tag: business glossary

  • How long must we retain digital work instruction records in aerospace MRO?

    There is no single, universal retention period for digital work instruction records in aerospace MRO. The required retention time depends on a mix of contract, regulatory, customer, and local legal requirements, and on what exactly you mean by “digital work instruction records.”

    Separate two things: the instruction vs. the execution record

    In aerospace MRO, you typically have at least two distinct digital artifacts:

    • The work instruction content: the controlled document or task card itself (e.g., OEM/AMM task, operator instructions, digital task card definition).
    • The execution / maintenance record: evidence that the work was performed, by whom, when, and using which revision of the instruction (sign-offs, e-signatures, timestamps, observations, NCR links, etc.).

    Retention obligations are usually driven by the execution / maintenance record and related configuration/traceability data, not by the work instruction content alone. However, you often need to retain the linked work instruction revision or be able to reconstruct it for traceability.

    Typical retention drivers in aerospace MRO

    Actual retention periods result from combining multiple drivers:

    • Contractual & OEM requirements
      Many OEMs and prime contractors specify record retention periods in contracts, repair station agreements, or quality clauses. It is common to see requirements such as “life of the aircraft/part plus X years,” “10 years minimum,” or specific durations for safety-critical components.
    • Regulatory requirements
      Civil aviation authorities (e.g., FAA, EASA, Transport Canada, CAA) require approved organizations (repair stations, Part 145, Part 21, CAMO, etc.) to retain maintenance and release-to-service records for specified minimum periods. These rules typically focus on maintenance records and airworthiness release records, not explicitly on internal work instruction content, but in practice you need enough information to demonstrate how the work was performed.
    • Customer & operator policies
      Airlines, defense operators, and lessors often impose stricter retention than regulators, driven by fleet life, leasing horizons, and potential incident investigations. For military work, additional defense and security requirements may apply.
    • Local law & liability
      Company law, product liability law, and limitation periods for civil claims vary by jurisdiction. Legal counsel may require retention long enough to defend against potential claims over the aircraft or component life.
    • Internal quality policy
      Your QMS (e.g., under AS9100) will include a documented policy for record retention. That policy must reflect the above drivers and be applied consistently, with clear justification.

    What most aerospace MROs actually do

    Practices vary, but in regulated aerospace maintenance you rarely see short retention periods. Common patterns include:

    • Maintenance / execution records (task completions, sign-offs, inspection results, deviations, concessions, etc.): retained for the life of the aircraft or component plus a defined margin (often 2–10 years), or a fixed minimum (often 10–30 years) when life is hard to define.
    • Work instruction revisions (internal task cards, digital work instructions, local work aids):
      • All superseded revisions that were ever used on released work are retained or reconstructable, to prove which instructions were in force when the work was done.
      • Retention duration is usually aligned with the associated maintenance records they support, not treated as a much shorter lifecycle.

    For long-lived platforms (commercial widebody, military, rotorcraft), multi-decade retention of critical maintenance records is common. Some organizations treat anything tied to airworthiness or configuration as effectively “indefinite” retention for practical purposes.

    Digital work instructions: specific considerations

    For digital work instructions and records, regulators and customers typically care about evidence rather than the specific technology. Key points:

    • Version control & traceability: You must be able to show which work instruction revision applied to a given job, and that it was approved. That normally means maintaining a historical archive or audit trail of revisions, not just the current version.
    • Linkage to maintenance records: Your MRO system, MES, or digital work instruction platform should capture the relationship between the work order / task and the instruction revision (e.g., a revision ID in the traveler or e-sign record).
    • Data integrity over decades: Retaining records for 10–30+ years requires planning for media obsolescence, database migrations, format readability, cybersecurity, and user access controls over technology generations.
    • Validation & audit trails: In a regulated environment, the system managing digital work instructions and e-signatures typically needs to be validated for intended use, with robust logs so you can demonstrate that instructions were controlled, not altered after the fact.

    Brownfield and coexistence with legacy systems

    In most aerospace MRO operations, digital work instructions coexist with legacy systems such as paper task cards, older MRO/MES systems, and multiple ERPs/QMS tools. Common realities:

    • Multiple record repositories: Some historical work may exist only in legacy systems or paper archives, while new work is executed digitally. Retention policy needs to cover all repositories consistently.
    • System replacement risk: Fully replacing legacy MRO or MES systems just to “clean up” retention often fails due to validation cost, downtime risk, data migration challenges, and qualification/approval impacts. Many organizations instead implement archive strategies that maintain access to legacy data while new work moves into modern platforms.
    • Controlled migrations: If you migrate digital work instructions or maintenance records, you must manage change control, data validation, and evidence that no records were lost or altered inappropriately.

    How to determine the right retention period for your site

    You should not rely on generic numbers without checking your specific context. A defensible approach usually includes:

    1. Map applicable requirements:
      • Regulatory rules for your approvals (e.g., FAA/EASA/other authority repair station or Part 145 requirements).
      • Contractual terms, OEM agreements, prime contractor quality clauses.
      • Customer/operator policies, especially for safety-critical or life-limited parts.
      • Local legal and liability considerations (with your legal team).
    2. Classify your records:
      • Differentiate maintenance execution records, configuration/traceability records, QMS records (NCR, CAPA, audits), and controlled document history (work instructions, procedures).
      • Assign retention rules per record class, with documented rationale.
    3. Align digital WI retention with maintenance records:
      • Ensure that the historical versions of digital work instructions remain available (or reconstructable) for as long as related maintenance records must be retained.
      • Document how you will maintain readability and integrity across system upgrades or replacements.
    4. Implement in systems & change control:
      • Configure retention and archival rules in your MRO/MES/EDMS/QMS systems.
      • Control any purge/archive processes through change control and periodic review.

    Bottom line

    There is no single mandated number that applies to all aerospace MRO organizations or jurisdictions. Many operators effectively retain digital work instruction history for as long as they retain the associated maintenance records, which often means 10–30+ years or life-of-aircraft/part plus a margin. The correct answer for your site must come from a documented retention policy based on your approvals, contracts, customers, and legal advice, and implemented consistently across both legacy and new digital systems.

  • How can we make ISO 22400 KPI calculations auditable?

    Making ISO 22400 KPI calculations auditable is less about the standard itself and more about how you define, implement, and govern the KPI logic in your systems. In regulated, brownfield plants, auditable KPIs require unambiguous definitions, reliable data capture, controlled calculation logic, and reproducible results backed by evidence.

    1. Start with precise, written KPI definitions

    ISO 22400 describes concepts and reference calculations, but each plant still makes choices. To be auditable, you should maintain a KPI definition sheet for each KPI that includes at least:

    • Name and identifier (e.g., ISO22400_OEE_V1, ISO22400_Availability_V2).
    • Scope: line, machine group, shift, product family, plant; plus time horizon (shift, day, week).
    • Exact formula, including units and references to the specific ISO 22400 clause or figure where applicable.
    • Time base definitions: what counts as planned time, operating time, planned/unplanned downtime, and which status codes map to each bucket.
    • Included and excluded events: e.g., warmup, maintenance, testing, changeovers, engineering trials, rework.
    • Data fields used: system, table, tag, or signal names (from MES, historian, PLC, ERP, QMS, etc.).
    • Aggregation rules: how you roll up across shifts, machines, or orders (e.g., weighted by planned time or output quantity).
    • Known limitations and assumptions: for example, how you handle missing machine states, partial cycles, or backfilled production counts.

    Auditors will challenge anything that is ambiguous or inconsistently applied across lines or plants. Written definitions are the baseline for repeatability.

    2. Make data lineage from KPI to raw signals traceable

    To be auditable, anyone should be able to start from a reported KPI value and trace back to:

    • The underlying time series of machine states and production counts.
    • The work orders, part numbers, and shift calendars involved.
    • The exact calculation logic and version that produced the result.

    Practical steps:

    • Retain time-stamped raw data from MES, SCADA/PLC, historian, and ERP at a resolution that supports reconstruction of events (for many KPIs, 1-second to 1-minute resolution is typical).
    • Maintain a data dictionary that maps source tags and fields (e.g., PLC bits, MES state codes, ERP order status) to KPI categories such as operating time, minor stop, changeover, scrap, or rework.
    • Record data transformations (e.g., state code reclassification, time bucket merging, filtering of obvious noise or outliers) with versioned logic.
    • Keep referential links between production events, work orders, batches, and KPIs (e.g., a KPI instance references specific order IDs and date ranges).

    If your KPI platform cannot show how a value was derived from raw data, auditors will treat it as a dashboard number rather than as reliable evidence.

    3. Put calculation logic under change control

    Many plants implement ISO 22400 KPIs in multiple places: historian scripts, MES reports, BI tools, or custom SQL. This is a common source of non-auditable discrepancies.

    To keep calculations auditable:

    • Centralize KPI logic as much as possible in a single, validated layer (e.g., MES or an analytics engine) and treat that as the system of record.
    • Apply formal change control to KPI definitions and logic: documented change requests, impact assessment, testing, approvals, and effective dates.
    • Version all calculation code and configurations (SQL, ETL flows, scripts, BI measures) in a repository where you can reconstruct the exact logic used on any historical date.
    • Document deviations from ISO 22400: if you implement a plant-specific variant of OEE or availability, label and document it as such rather than calling it “ISO 22400” without qualification.

    In regulated environments, ad hoc dashboard logic without version control is a major audit risk, even if the formulas are mathematically correct.

    4. Validate the full calculation pipeline

    In aerospace, pharma, and other regulated sectors, KPI numbers are often used to support capacity decisions, improvement programs, and sometimes compliance evidence. That makes the calculation pipeline itself subject to validation expectations.

    Consider a basic validation approach:

    • Define intended use: for example, “shift-level ISO 22400 availability and OEE for internal performance management, not used directly for product release decisions.”
    • Perform installation and operational checks: confirm data flows from each source (MES, historian, ERP) are complete, time-synchronized, and secure.
    • Develop test cases: use controlled historical periods where states and counts are known (e.g., a planned training day with a known stop pattern) and verify that your pipeline reproduces the expected KPI values.
    • Document limitations: for example, “Cycle counts on Line 3 prior to date X are underreported during minor stops due to PLC configuration; KPI values before that date are not fully comparable.”

    If your organization is subject to formal CSV or software validation expectations, your KPI tooling and data integration stack may fall in scope. Work with quality and IT to set appropriate validation depth.

    5. Ensure consistent handling of time, shifts, and calendars

    ISO 22400 KPIs such as availability, utilization, and OEE depend heavily on how you define planned time and schedule exceptions. These details are common audit failure points.

    • Use controlled calendars for shifts, holidays, and site-specific events, ideally managed in a master system (MES, HR, or scheduling tool) and propagated downstream.
    • Define standard rules for how you treat early starts, overtime, partial shifts, and overlap between shifts.
    • Classify schedule exceptions explicitly: e.g., planned maintenance, trials, and engineering work that should be removed from planned production time.
    • Synchronize time zones and clocks across OT and IT systems so that event sequences remain reconstructable.

    Auditable KPIs require that two analysts using the same rules and data can independently reproduce the same results for a given period.

    6. Design reports for drill-down and reproducibility

    Auditability also depends on practical usability. Reports and dashboards should support tracing a number back to its components.

    • Make drill-down supported: from monthly OEE to daily, shift-level, machine-level, and event-level views.
    • Show KPI components: for example, for OEE, separately display availability, performance, and quality, with their numerators and denominators.
    • Display applied filters and versions: time range, scope, excluded events, and KPI definition version.
    • Allow export of underlying event data for sampled periods to support manual recalculation and evidence reviews.

    If an auditor cannot inspect how a KPI changed when they adjust time filters or drill down into a particular machine or order, they will question its reliability.

    7. Manage coexistence with legacy MES, historians, and BI tools

    Most plants already calculate some form of OEE or ISO 22400-like KPIs in multiple systems. Full replacement is rarely realistic due to validation burden and downtime risk. Instead:

    • Pick one system as the KPI system of record for ISO 22400-aligned metrics, then document that all official numbers come from there.
    • Map and reconcile existing metrics in legacy tools to the new definitions; document differences (e.g., “Old_OEE includes planned maintenance as downtime; ISO22400_OEE excludes it.”).
    • Phase out non-comparable KPIs or clearly label them as legacy indicators to avoid mixing them with ISO 22400 KPIs in formal reports.
    • Implement interface tests to ensure data extracted from MES/ERP/historian into the KPI engine matches the source (record counts, sums, sample spot-checks).

    Auditability suffers when multiple conflicting KPI values exist for the same period without a clear explanation. Reconciliation and labeling are essential during transition.

    8. Capture governance, ownership, and training

    Even with robust technical controls, ISO 22400 KPI calculations will not be auditable unless people understand and follow the rules.

    • Assign ownership for each KPI (typically operations or industrial engineering) with clear responsibilities for definition, review, and continuous improvement.
    • Set a review cadence where KPI definitions, data quality, and observed anomalies are periodically checked and updated under change control.
    • Train key users (engineers, supervisors, analysts) on the definitions, typical pitfalls (e.g., double-counting, misclassified downtime), and how to respond to audit questions.
    • Maintain an evidence pack for each key KPI: definition documents, sample calculations, validation records, and recent change logs.

    9. What auditors will typically look for

    While specific expectations vary by regulator and customer, auditors reviewing ISO 22400-style KPIs used in decision-making commonly test:

    • Can you explain the formula and link it to ISO 22400 where applicable?
    • Can you trace a reported value back to raw data, with consistent time stamps and event records?
    • Is the calculation logic controlled and versioned, with documented changes and approvals?
    • Are there documented data quality controls and known limitations?
    • Can two people independently recalculate and match a sample KPI period using the same data and rules?

    If you can provide clear answers and evidence for these points, your ISO 22400 KPI calculations will generally be considered auditable, even in complex, mixed-vendor environments.

  • Who should be on a manufacturing KPI governance council?

    A manufacturing KPI governance council should include the people who own the process, the people who generate or steward the data, and the people who will be held accountable for acting on the metric. If one of those groups is missing, KPI definitions usually drift, reporting becomes political, and local workarounds take over.

    In most plants, the council should include:

    • Operations leadership, because they own throughput, schedule adherence, labor utilization, and day-to-day response.
    • Quality leadership, because many KPIs depend on how scrap, rework, defects, holds, deviations, and escapes are classified.
    • Manufacturing engineering or industrial engineering, because routing structure, cycle assumptions, standard work, and process changes affect KPI meaning.
    • IT and data/integration owners, because KPI reliability depends on source-system logic, interfaces, master data, timestamp quality, and reporting architecture.
    • Finance, if the council governs cost, variance, inventory, or cost-of-poor-quality metrics.
    • Planning or supply chain, if KPIs include schedule attainment, shortage impact, WIP aging, supplier performance, or queue behavior.
    • Site or business-unit leadership, to resolve cross-functional conflicts and approve standards that local teams may resist.
    • System owners for MES, ERP, QMS, historians, or data platforms that feed the governed KPIs.

    If the council is enterprise-wide, add representation from each major plant type or value stream. A single centralized team often misses real differences between discrete assembly, machining, batch processing, test, and repair operations. At the same time, letting every site define KPIs independently usually destroys comparability. The council has to manage that tradeoff directly.

    Who should not be the whole council

    No single function should dominate the group. A KPI council made up only of executives tends to approve metrics that look clean in slides but are weak operationally. A council made up only of analysts or IT teams often produces technically consistent numbers that do not match how the floor actually runs. A council made up only of site operators may optimize for local practicality while losing enterprise consistency.

    It is also a mistake to confuse stakeholders with decision-makers. Not everyone who consumes dashboards needs a vote on metric definitions. Keep the voting group limited, then bring in subject matter experts as needed for specific metrics.

    Typical roles and responsibilities

    The council works best when membership is paired with explicit responsibility:

    • Chair or sponsor to set priorities and break deadlocks.
    • KPI owners for each governed metric, usually from the business function accountable for outcomes.
    • Data owners or stewards for source-system definitions, transformations, and lineage.
    • Validation or quality representatives where reporting changes affect controlled processes, evidence, or decision support in a regulated environment.
    • Change control participants to review proposed definition changes, effective dates, impact analysis, and communication plans.

    Without named ownership, councils often discuss KPI problems repeatedly without fixing the underlying data, workflow, or definition issue.

    How big should it be?

    Usually 6 to 10 core members is enough. Larger groups become review forums instead of governance bodies. If you need broad input, create a smaller decision council and a wider working group underneath it.

    The right size depends on scope. A single-site KPI council can be leaner. A multi-site council with MES, ERP, QMS, and PLM dependencies usually needs more structured representation because changes in one system can alter reporting logic elsewhere.

    Brownfield reality

    In a brownfield environment, council membership should reflect the systems that actually exist, not the architecture leadership wishes it had. If KPI data comes from a mix of legacy ERP, partial MES coverage, spreadsheets, machine data, and QMS records, the council needs members who understand those boundaries. Otherwise, it will approve definitions that cannot be implemented consistently.

    This is also why full replacement is rarely the first answer. Replacing every execution and reporting system to standardize KPIs sounds clean, but in regulated and long-lifecycle operations it often fails under qualification burden, validation effort, integration complexity, downtime risk, and the need to preserve traceability across old and new records. In practice, the council usually has to govern KPI semantics across coexistence, not assume a reset.

    What the council should decide

    A KPI governance council is not just a dashboard review committee. It should decide:

    • which KPIs are official and which are local working metrics
    • the precise business definition for each KPI
    • source systems of record and fallback rules
    • calculation logic, inclusion and exclusion criteria, and effective dates
    • how changes are approved, tested, documented, and communicated
    • where site variation is allowed and where it is not
    • how exceptions, data quality issues, and disputed numbers are escalated

    If the council is not empowered to make those decisions, membership matters less because governance is not actually happening.

    Practical rule of thumb

    If a function can change the meaning of the metric, the availability of the data, or the action taken based on the result, it should be represented directly or through a named owner. If it only consumes the report, it does not necessarily need a seat.

    So the short answer is: include business owners, data owners, system owners, and decision-makers. Keep the group cross-functional, accountable, and small enough to govern definitions under change control. The exact roster depends on your KPI scope, plant diversity, and system landscape.

  • How do formula changes affect historical KPI traceability?

    They can affect it significantly.

    If a KPI formula changes and your system does not retain the prior formula version, effective date, source mappings, and calculation logic used at the time, then historical KPI traceability is weakened or lost. You may still have old numbers, but you may no longer be able to show exactly how they were produced.

    In a well-controlled setup, historical KPI traceability is maintained by versioning the KPI definition and preserving the calculation context for each reported result. That usually includes the formula version, unit and normalization rules, source systems, filters, aggregation logic, exception handling, and the approval or change record tied to the change.

    What should happen when a formula changes

    • Past results should remain linked to the formula version in effect when they were calculated.

    • The new formula should have a clear effective date or effective event.

    • Reports should make clear whether values are shown as originally calculated or retrospectively recalculated.

    • Any recalculation should be controlled, documented, and justified, not done silently.

    Without those controls, a trend line can become misleading. A performance shift may reflect a metric definition change rather than an operational change.

    Freeze versus recalculate

    There is no single correct approach for every plant or KPI.

    • Freeze historical results: Better for auditability and period-correct reporting. The tradeoff is weaker comparability across time if the definition changed materially.

    • Recalculate history using the new formula: Better for like-for-like analytics. The tradeoff is that originally reported values no longer match prior management reports, investigations, or quality records unless both versions are retained.

    • Keep both: Often the safest approach in regulated environments. One version supports historical evidence, and another supports normalized trend analysis. The cost is added governance, storage, reporting complexity, and user training.

    What matters in brownfield environments

    In mixed MES, ERP, historian, QMS, and BI stacks, formula traceability depends less on the dashboard than on upstream data lineage and change control. If one layer changes mappings, timestamps, units of measure, work center hierarchies, or exclusion rules, KPI history may shift even if the displayed formula text looks unchanged.

    This is a common failure mode in brownfield environments: the KPI appears stable, but source semantics changed across systems or interfaces. For example, a downtime KPI may move because event classification changed in MES, or a yield KPI may move because rework transactions began posting differently from ERP or QMS.

    That is why full replacement is often not the practical answer. In regulated, long-lifecycle operations, replacing all contributing systems to standardize KPI logic can fail due to qualification burden, validation cost, downtime risk, and integration complexity. In most cases, the workable approach is controlled coexistence: version the KPI definition, document source dependencies, and maintain traceable mappings across existing systems.

    Minimum controls needed

    • Version-controlled KPI definitions

    • Effective dates and change history

    • Traceable source-to-metric mappings

    • Documented business rules and exclusions

    • Approval workflow and change control records

    • Clear labeling of recalculated versus original values

    • Retention of prior outputs used in operational or quality decisions

    So the short answer is yes: formula changes can affect historical KPI traceability, and sometimes invalidate comparisons, unless your architecture and governance preserve formula versioning, lineage, and calculation context explicitly.

  • Do we need to replace our ERP or MES to standardize KPIs?

    No, not usually.

    In most regulated manufacturing environments, KPI standardization is primarily a data definition, governance, and integration problem, not a mandatory ERP or MES replacement project. You can often standardize KPIs across plants and programs while keeping existing systems in place.

    What you do need is a consistent measurement layer across those systems. That typically means agreeing on:

    • common KPI definitions and formulas
    • start and stop events for each metric
    • master data alignment for items, work centers, operations, shifts, and reason codes
    • time conventions, units of measure, and aggregation rules
    • system-of-record responsibilities for each data element

    If those basics are not controlled, replacing ERP or MES will not solve the underlying problem. It often just moves inconsistent logic into a newer platform.

    When replacement is not necessary

    You usually do not need full replacement if your current landscape can support reliable extraction, mapping, and reconciliation of the data needed for KPI calculation. That can be done through interfaces, a reporting layer, a manufacturing data model, or a governed analytics platform.

    This is especially true in brownfield environments where plants have mixed vendors, custom transactions, legacy integrations, and long-lived assets. In those cases, coexistence is often the lower-risk path.

    When replacement might still be justified

    Replacement can be reasonable, but usually for broader operational reasons, not just KPI standardization. Examples include:

    • the current system cannot expose required data reliably
    • core transactions are too inconsistent across sites to govern
    • customizations are unmaintainable
    • the platform cannot support needed traceability, audit trail, or change control expectations
    • vendor support, security posture, or infrastructure constraints create material operational risk

    Even then, replacement is a business and risk decision, not a KPI shortcut.

    Why full replacement often fails as a KPI strategy

    In regulated, long lifecycle operations, full replacement strategies often fail because the burden is larger than the KPI problem itself. Common obstacles include qualification and validation effort, downtime risk, retraining, re-integration with PLM, QMS, SCADA, historians, and supplier systems, plus the need to preserve traceability and evidence continuity during transition.

    A new ERP or MES may also force process changes that improve standardization in one area while breaking established local controls in another. If the plant cannot absorb the change, KPI consistency may get worse before it gets better.

    What usually matters more than the platform

    The practical path is to standardize semantics before standardizing software. That generally means:

    • define a controlled KPI catalog
    • assign data owners and approval rules
    • map each KPI to source transactions and equipment events
    • document plant-specific exceptions explicitly
    • version formulas and threshold logic under change control
    • validate calculations before using them for management decisions

    Without that discipline, cross-plant comparisons are often misleading, even when all sites run the same ERP or MES.

    Tradeoffs to expect

    A coexistence approach is usually faster and less disruptive, but it has tradeoffs. You may need to maintain translation logic between systems, resolve data latency, handle imperfect master data, and accept that some KPIs can only be standardized approximately until source processes improve.

    A replacement approach may reduce some long-term complexity, but it raises short-term implementation risk, validation effort, cutover risk, and adoption burden. In many aerospace-grade and similarly regulated environments, those costs are substantial.

    So the short answer is no: you do not usually need to replace ERP or MES to standardize KPIs. You do need governed definitions, trustworthy mappings, disciplined change control, and enough integration quality to make cross-system comparisons credible.

  • Why do our OEE numbers differ between plants even with the same formula?

    Because using the same OEE formula does not mean the plants are measuring the same thing.

    In most multi-plant environments, the gap is caused by differences in definitions, data capture, and operating context rather than the arithmetic itself. Two sites can both calculate Availability × Performance × Quality and still produce materially different numbers if they classify time, downtime, scrap, startup loss, rework, or planned stops differently.

    What usually causes the mismatch

    • Different time bases. One plant may calculate against scheduled production time, another against staffed time, and another may exclude meetings, preventive maintenance, changeovers, or engineering holds.

    • Different stop classifications. Microstops, waiting on material, first-piece inspection, tooling changes, quality holds, and operator breaks are often treated differently by site, line, or even shift.

    • Different ideal cycle assumptions. Performance depends heavily on the standard rate or ideal cycle time. If one plant uses engineered standards and another uses historical averages, the comparison is not equivalent.

    • Different quality counting rules. Some sites count only final scrap in Quality. Others include rework, yield loss at intermediate steps, or inspection rejects at different points in the routing.

    • Different automation levels. A highly instrumented line will capture short stops and speed loss that a manual line may never record consistently.

    • Different production models. High-mix, low-volume operations, batch processes, continuous processes, and heavily regulated inspection steps do not generate losses in the same pattern. OEE can still be useful, but direct cross-plant comparison may be misleading without context.

    • Different master data and routing discipline. Inaccurate work centers, obsolete cycle times, inconsistent part-family setup rules, and weak maintenance of routings will distort OEE even if plant teams believe the metric is standardized.

    • Different exclusion rules. Plants often remove special causes from reporting after the fact, such as customer holds, trial runs, validation batches, qualification work, or ERP scheduling gaps. Those choices change the number substantially.

    • Different system integration behavior. MES, SCADA, historians, machine gateways, ERP, and manual logs may not agree on order status, start and stop timestamps, scrap posting timing, or completed quantity. The formula only reflects the data it receives.

    Brownfield reality

    In mixed-vendor environments, cross-plant OEE differences are common. Plants often run different MES versions, different machine connectivity layers, different ERP posting patterns, and different local workarounds. That means the metric definition may look standardized in a slide deck while the source events are still inconsistent at the shop floor level.

    This is also why full replacement is often not the practical answer. Replacing every execution and reporting system to force metric consistency can fail due to validation cost, qualification burden, downtime risk, integration complexity, and the fact that long-lived equipment often cannot be modernized uniformly. In regulated operations, a controlled semantic alignment effort is usually more realistic than a wholesale platform reset.

    What to standardize if you want comparable OEE

    If the goal is true cross-plant comparison, standardize the operating definitions before debating the formula:

    • The production time model and what is included or excluded

    • A canonical event taxonomy for downtime, speed loss, startup loss, and quality loss

    • Rules for microstops, changeovers, preventive maintenance, inspection, and waiting states

    • The source of ideal cycle time or standard rate

    • How rework, scrap, and first-pass yield relate to Quality

    • How manual overrides are approved and traceable

    • Version control and change control for KPI definitions, routings, and master data

    • Data reconciliation rules across MES, ERP, historians, and machine data sources

    Without that governance, cross-site OEE becomes a local reporting convention, not a reliable enterprise KPI.

    What OEE can and cannot tell you

    OEE is useful for identifying loss within a given operating context. It is much less reliable as a raw leaderboard across plants with different product mix, labor models, inspection intensity, automation maturity, and data quality. A lower OEE does not automatically mean a plant is performing worse. It may mean that site records losses more honestly, runs more complex work, or includes regulated activities another plant excludes.

    So the short answer is yes, your numbers can differ even with the same formula, and that is normal when definitions, data readiness, and process discipline are not harmonized. If executive decisions depend on plant-to-plant comparison, standardize semantics, trace the data lineage, and validate the calculation logic by site before treating the output as comparable.