Assign permissions to gain access to the system and access the data in different levels. For example, the right to use the various functions,the right to browse class information, the right to browse priority information, the right to browse secrets reports, the right to edit information, the right to cancel data entry, etc.