. . . . "After logging in, a user could check on numerous types of information, with the specific information available to each user being dependent on the user's login authorization level." .