A regular user with privileged access may sometimes violate the need and misuse the privileges as well.
They respond anecdotally from a position of superiority, confident with their privileged access to information, their influence on policy and their status in society.
You still need a way to enforce a low-privileged access policy on inbound messages, and that is usually through MCAUSER.
They did so because the eateries were given privileged access to the wealthy New Yorkers who had been given the card free.