Anyone will be able to look at the calendar for the resource, for scheduling purposes. This is not a security risk as long as users do not attach sensitive information to meeting requests.