. . "This is done through implementing access controls, permissions, privileges, and other elements, depending on the systems involved." . . .