How an individual Accesses Their Private Information