12.4 Implementing Access Restrictions