. "Rather, they are provided access to the appropriate data (based on their roles and permissions) through applications and services, including both applications created in-house and packaged applications purchased through third-part" . . . .