Frequent examples of the latter include permitting certain users to switch their log-in to an ???oracle??? ID or a ???backup??? ID. Since such ID's often have expanded and critical functions and data available to them, it is also important to watch for such activity as this as well.