Access controls are built on three key principles. List and define them briefly. And also explain how to apply these key principles on the smart phone devices GPS tracking system/software to mitigate the user personal information be exposed undesirably.