In this section, you will define three policies that use a requester's access token to limit its access to data.