Analyzing the access details