In this section, you will define three policies that use a requester's access token to limit data access.