Access to systems and personal data is granted only to authorized personnel based on role and operational necessity. Users receive the minimum permissions required to perform assigned tasks.
Permissions are reviewed periodically and adjusted when roles change or access is no longer required.