13.4 Implementing Access Restrictions