. . . "However, other types of users may attempt to access the collected information; a user may have privileged access to the collected information even though the user is not the owner of the personally identifiable information." .