They have network connection,.. i.e. can use your resources just as you could.
If your resources, i.e. files, printers, etc,.. are accessible via a network connection and not secured then they potentially have access; they'd have to find them first.
Bookmarks