Yes. When necessary, granting and approving access requests
to Scoped Systems and Data is segregated in order to minimize the risks of errors, misuse or unauthorized access. Access requests must include the scope of the required access and a justification.