ii) Ali Akbar, a system administrator for a large corporation, is installing a new software package on the PC used by employee Sameer Ahmed. The company has not authorized Ali Akbar to read other people’s files (email, web-logs, files in the user’s home folders). However, in the course of installing the software, Ali Akbar accidentally comes across directories with files that have suspicious sounding names. He opens a few of the files and finds they contain child harassment. a. Was it right for Majid to access the user’s files? b. What should Majid do with the new piece of information?