Every business has a lifecycle for its tools. Every startup, every new project, every idea starts with a blank sheet. More precisely—a blank electronic spreadsheet.
Launching a new sales vertical? Created a spreadsheet. Started hiring employees? Spreadsheet. Need to track orders? Naturally, Google Sheets or Excel. It’s fast, free, and familiar to everyone. At this stage, flexibility is your best friend. You can build processes literally on the fly: add columns, change formulas, and so on.

But then the business starts to grow.
It’s no longer just two people in the table, but ten. Then twenty. Managers, contractors, couriers, and accountants appear. Suddenly, the very flexibility that helped at the start begins to work against you. Questions arise that you hadn’t thought about before: “How do I forbid editing of a single cell?”, “How do I hide a column in Google Sheets from an intern but keep it for the manager?”, “Who deleted the margin calculation formula?”.
In this article, we will analyze in detail why attempts to turn Excel into a business management system are doomed to fail, why “hidden” data is actually open to everyone, and how modern tools like Tracy solve this problem at the architectural level.
As soon as the concepts of “confidentiality” or “zone of responsibility” appear in your process, the spreadsheet stops being a helper and becomes a source of risk.
Let’s look at two real examples from business. The situations are different, but the root of the problem is the same—the architecture of spreadsheet editors.
Imagine a successful chain of natural food stores. There is a main supplier (franchisor) and dozens of partner stores (franchisees). The product ordering process was organized as simply as possible: one large Google Sheets file.
How it worked: Every morning, the warehouseman updated the stock balances. Store representatives would enter the file, find their column, and put a number next to the desired item (e.g., “Cottage Cheese”).
What went wrong: Since Google Sheets is a space for collaboration, the principle “everyone sees everything” applies.
The Verdict: Google Sheets allows you to restrict editing, but it does not allow you to restrict the visibility of data at the column or row level for different users within a single file.
Let’s look at an example of an IT company using spreadsheets to maintain a candidate database. The hiring process is classic: screening with a recruiter, then a technical interview, and finally—an offer.
The Complexity: A spreadsheet is flat by nature. One row stores everything: contacts, resume links, salary expectations, and the recruiter's notes after the first conversation (e.g., “seemed a bit passive” or “very active, might not fit the team culture”).
The problem appeared specifically at the stage of handing the candidate over to the technical specialist.
If you give the Tech Lead access to the table, they inevitably see the desired salary figure and the recruiter’s subjective impressions before the interview begins. This instantly creates cognitive bias. Instead of an objective assessment of skills (“Hard Skills”), the interviewer subconsciously starts evaluating whether the person is “worth” that money or looking for confirmation of the recruiter’s doubts. The purity of the process is violated.
How they solved it in practice: To avoid this influence, the team effectively abandoned collaboration in the document at this stage. The recruiter turned into a “human clipboard”:
As a result, expensive specialists wasted hours of work time on mechanical data forwarding back and forth simply because they couldn’t set up a simple rule in the table: “The Tech Lead sees the resume but does not see the Salary column and HR comments”.
When business owners or managers face these problems, the first thing they do is go to a search engine with the query: “How to hide a column in Google Sheets from specific users” or “Excel data protection password".
The internet offers a multitude of solutions: from the “Protect Sheet” function to complex scripts. But from an information security perspective, most of these methods are an illusion of protection. Let’s break down why this doesn’t work.
Advanced Excel users know about the xlVeryHidden property, which can be activated via the code editor (VBA). Such a sheet disappears from the standard “Unhide” menu. Often, purchase price lists or salary calculation formulas are hidden there.
Why this isn’t protection:
=SecretSheet!A1 on a new clean sheet and drags it down, Excel will obediently show all the “secret” content.In cloud spreadsheets, users often try to create a system of “Master File” (where everything is) and “Client File” (where only a part is), connecting them with the IMPORTRANGE function.
It seems like a solution: you create a separate table for the manager that pulls data only from the necessary columns of the main table.
The Catch: When you first write the formula and click “Allow Access”, you create a permanent token of trust between File A and File B. The system doesn’t check who is looking at the file. It only checks the permission to connect the files. If the user has Editor rights in their “trimmed” file (which they need to submit reports), they can change the formula.
Instead of:
=IMPORTRANGE("Master_Key", “PublicData!A1:B10")
They write:
=IMPORTRANGE("Master_Key", “Salaries!A1:Z100")
And Google Sheets will download the entire salary database for them without question because “permission between files has already been granted”. The only way to avoid this is to give “View Only” access, but then the manager cannot work with the document. It’s a dead end.
Besides security, there is another fundamental problem with spreadsheets—they know nothing about your business process. For Excel or Google Sheets, the order status “New” and “Paid” is just text in a cell.
The spreadsheet will tolerate everything. But your business won’t. Searching for ways to restrict data entry or forbid moving to the next stage without filling in mandatory fields is another headache for integrators, usually solved by complex scripts that constantly break.
We created Tracy specifically for teams that have already outgrown the capabilities of standard tables but do not have the desire or resources to implement heavy and expensive ERP systems. Tracy combines the speed of a visual constructor with the clear logic of professional software.
At the core of the system are rules that you set yourself. You simply describe the logic of work: who exactly has the right to see or edit each specific field at each stage of the process. You also define transition conditions: what data must be filled in before the system allows the card to be moved further (for example, you cannot switch an order to “Shipped” without specifying the invoice number).



And the main difference “under the hood” is server-level access control. You no longer need to think about how to cleverly “hide” a column from an employee’s eyes. If a user, according to your rules, does not have the right to see certain data—the server simply does not send it to their app. No manipulations with page code or formula changes will work here.
Here is how this solves our cases:
Instead of a shared table where everyone elbows each other, you create an order management app in Tracy with clear visibility rules.

You no longer need to use messengers as a way to manage access control when working with candidates. Configure the system so that it automatically adapts the data display for each participant.

Tracy allows you to configure Stage Gating. You can set hard rules:
This turns chaos into a conveyor belt. The system leads the user by the hand and prevents them from making mistakes.
What about when you need to get information from someone outside—for example, to clarify order details with a client?
When working with spreadsheets, this usually turns into routine: you write to the client in a messenger, wait for an answer, and then the manager manually copies the text from the chat and pastes it into the corresponding cell of the file. This is a wasted time and a risk of mixing something up or forgetting to transfer it.
In Tracy, you can generate a unique link directly to a specific card. The client clicks on it and sees a simplified interface: for example, only the status of their order and a field for a comment or photo upload. They don’t need registration or access to your system. They simply enter data, and it instantly appears in the corresponding field of your record. No “broken telephone” and no manual text transfer.
Spreadsheets remain the indispensable standard for financial modeling and individual analytics. However, using them as a platform for operational processes involving finances and zones of responsibility creates unjustified operational risks. Trying to build a secure perimeter inside Excel is a fight against the file system architecture itself.
The query “how to hide a column in Google Sheets” arises not because you don't know the tool well, but because you have outgrown it.
Tracy allows you to build reliable internal tools as easily as you built tables, but without fear for data security. You get a system where everyone sees exactly as much as they should, and processes work like clockwork, not like improvisation.
Perhaps it’s time to move from situational visibility settings to systemic process management.
Dmytro Sikorskyi