Far more likely they’ll detect the foreign hardware plugged in to the device (assuming it allows new devices to be added at all) than someone in IT randomly coming across some sent emails - could’ve been to a client for all they know.
However, if someone is suspicious and ASKS IT to pull the logs it should be pretty easy to see. But if it’s gotten to that point, you’re still better off having the emails than not.
Far more likely they’ll detect the foreign hardware plugged in to the device (assuming it allows new devices to be added at all) than someone in IT randomly coming across some sent emails - could’ve been to a client for all they know.
However, if someone is suspicious and ASKS IT to pull the logs it should be pretty easy to see. But if it’s gotten to that point, you’re still better off having the emails than not.