You need to use Access Security. First create a list of your users, then assign permissions to your users based on the level of access to the database they require.
For an excellent overview of Access security, go to: http://www.geocities.com/jacksonmacd
download the first file – Security Paper by Jack Macdonald. It’s a little long but it tells you everything you need to know.