Proxy Access: A Sheep, or Wolf in Sheep's Clothing?