Yes. When necessary, approving and implementing access requests to Scoped Systems and Data is segregated in order to minimize the risks of errors, misuse or unauthorized access. Access requests must include the scope of the required access and a justification.