Certain areas or functionalities may be subject to limited access. This often means that only eligible individuals or groups will have the ability to utilize these resources. Causes of restricted access can vary widely protecting sensitive information to ensuring system stability. Users who attempt to gain unauthorized access may face consequences.