You nedd to use Access user-level security. Unfortunately, it is fairly
complicated, with lots of traps for the unwary. Plan on taking at least a
few weeks to get a basic understanding of it. Locate, download & study the
Access Security FAQ. Read it carefully (several times), then experiement on
some throw-away copies of your database. Then you will be able to define
different users (Tom, Jane, whatever), with each user having a specific
level of access to the database.
HTH,
TC