. . . "III. Customer User-Level Security & Permissions As described earlier in this section, data security and access is an important consideration in the present invention." . .