Which of the following items are considered unauthorized usage of an NCH system or data: a) Bypassing NCH security mechanisms b) Transmitting NCH data through personally owned email accounts c) Making alterations to systems without authorization from the IT department d) All of the above