: Document the steps taken to unpack the file. Note any passwords required or hidden files discovered within.
: Define the required improvement and the result of future infractions (e.g., "This is a written warning; next is termination").
: Provide a bulleted list of every file and folder inside the archive.