Which of the following items are considered unauthorized usage of an NCH system or data:
a) Bypassing NCH security mechanisms
b) Transmitting NCH data through personally owned email accounts
c) Making alterations to systems without authorization from the IT department
d) All of the above