Data authoring and ownership are at the heart of security. It is important to understand how ownership of PLM objects is defined before progressing to a description of policies and rules.
The security context selected at logon sets the ownership for new data created. For example, user John Doe logs on using a specific security context and is authorized to create a product root:

The product P5 when created is tagged with three ownership attributes:
This means that a variety of VPLM operations on data will only be authorized if the access rights corresponding to those operations are granted to the user.