Once the user finds the required data, she/he/they need to know how can they be accessed, possibly including authentication and authorisation.