Well, um. You could hang like a ninja from over their desk and peer over their shoulder,
You could grant yourself rights in ADC to their mailbox. You could use credentials that already have access, say blackberry/good/backup.
I'd say more, but I think I have said too much.
Robert Liebsch
Systems Psychologist,
Network Sociologist,
Security Pathologist,
User Therapist.