Which of the following is one of the most common ways thieves steal corporate information