Consistent Data Protection Requires a New Approach to Securing Access