In addition to determining who is allowed to access a file, users can decide what type
of operations a person is allowed to perform on a file. For example, one may have
read-only access, while another may have read-and-write privileges. As a final measure,
the operating system gives the user auditing capabilities that automatically keep
track of who uses files and how the files are used.