The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.