Yes, it is possible that that user remotely accessed the computer . But to see which files he accessed would require previously setting up auditing on specific files, so that it generates an audit log entry when that file is accessed. I would contact your company's IT Security department to look into this.