Full control. The user can read, write, delete, rename, move, and modify the security profile of the dataset. This is the highest level of access.