Techniques are provided for controlling data access to maintain data integrity.
A request is received to perform an action on a data element. The request is analyzed
based on at least one data access rule associated with the data element. This analysis
further utilizes a data structure model associated with the data element. The request
is approved if the request satisfies the data access rule. The request is rejected
if the request does not satisfy the data access rule.