Any user who can see data can simply copy/paste it. Trust your users or not. If not, don't let them work with the data at all. The only reasonable thing you can do is set logging to a level that lets you see all requests that were handled by the SAS system, so you can at least make a valid attempt to find out who accessed the relevant data at a given time, if something was leaked.
... View more