Watch this video on YouTube
What should the information security manager recommend regarding an account with full administrative privileges over a production file that is accessible by a member of the software development team?