How should we control access to user data?

strategy (29), eng-strategy-book (18)