The depth of access that a user or program has is usually determined by the user's role, or by the specific permissions that have been granted to them. For example, a user with a low level of access may only be able to view data, while a user with a high level of access may be able to view, modify, and delete data.
Determining the appropriate depth of access for users and programs is critical to protect the security of an organisation's data.