The authorizations allowing users, applications or devices to perform operations like creating, modifying, removing or reading data or files in a system. These rights to access and handle information are defined by permissions set per policies instituted by data owners and overall information security governance. They outline what actions different entities can execute on various objects within the system.