. "Thus, after performing a single log-on, a user may access, via a wireless device or other communication device, any information to which he/she is entitled." . . .