. "For instance, the person responsible for maintaining the software on the system should not be able to access any data other than the software he is maintaining." . . .