|“||the rights granted to users by the administrator or supervisor. Access rights determine the actions users can perform (e.g., read, write, execute, create and delete) on files in shared volumes or file shares on the server.||”|
|“||[t]he permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system, as defined by rules established by data owners and the information security policy.||”|
- ↑ Federal Information System Controls Audit Manual, at 556.
- ↑ ISACA, Cybersecurity Fundamentals Glossary (full-text).