Use impersonation for support only. All actions are audited. Never use to access sensitive data beyond support needs.