Jetgo's reply above opens up further questions, such as how did the person who replied gain access twice to this 'open' computer ie their first reply re being to old and the subsequent reply?
How many other applications did this person access?
What other files did this person access?
How did this person gain access to this computer and the office it's located in?