Depending on their roles and tasks, people receive appropriate physical access, logical access, and data access permissions. In this way, on the one …