The sales user has access privileges to client and product information.
This user has access privileges to all of these modules at any time.
Violations of this principle can also occur when an individual collects additional access privileges over time.
And once he gets your identity, he has to have more access privileges to find out personal information about you.
Modern Unix systems use user groups to control access privileges.
Of course, the user has to have access privileges.
This guy, apparently, has a lot of access privileges.
So they had that person's machine send email to other people within Google who did have the access privileges on their machines.
He could check the real address inside the system, but not without the access privileges they had taken away.
It does not include sites that require a password or other access privilege.