For sensitive files and applications, does the computer system require additional access control? For example, dose the access control of each user ID limit him/her access? Are there additional layer(s) of access control for remote access (such as smart card, temporary PINs, biometrics, etc.)?