Who needs data access? Not You!

With a little planning and care, we can find various ways to fulfill user requests without compromising the environment.