A manager suspects that employees are using company email in inappropriate ways. The manager instructs the system engineer to give him access to all email files on company PCs. The system engineer feels this may be viewed as a breach of trust, and that employees may feel this is an intrusion of privacy.