LMN Corporation is preparing for an audit of its security and privacy controls. During the audit, the auditor requests access to sensitive data that is not normally accessible to auditors. Which of the following is the most appropriate course of action for LMN Corporation?