Problem
A manager suspects an employee may be using an organizational computer to view and download certain illegal materials. The manager has asked the information technology manager for his advice regarding her suspicions about these materials. The IT manager states he can change the password to the user's account, and they can log in together over the weekend while the worker is out and view materials on the workstation. Is this an acceptable approach to determine whether criminal activity is occurring on the organization's computer?