After identifying illegal activity on a small business computer, a business owner asks the office secretary to log into the system to retrieve various files. Which of the following aspects of procedural forensic analysis were violated in this scenario?
A. Data preservation
B. Proper channel reporting
C. Initial response identification
D. Tracking of documentation