Under defined circumstances, otherwise unauthorized individual(s) may be permitted ad hoc access to systems or information. For example: a senior executive who requires access (systems/information) in the course of an investigation. For assessments, this term may refer directly to scoped target data or systems.