State unauthorized activities when performing duties on Information Systems?
1) Unauthorized access to sensitive data
2) Unauthorized modification of data
3) Unauthorized sharing of confidential information
4) Unauthorized installation of software