Consider the following scenario:
- You grant User A the Full Access permission to User B’s mailbox in a Microsoft Exchange Server 2010 environment.
- User B creates some meetings or some appointments.
- User A tries to view the free/busy information of User B.