Methods uses to obtain personal or confidential information: • Stealing important documents from a mailbox. • Retrieving documents from a recycling bin or trash can. • Eavesdropping on telephone conversations. • Using social engineering and phishing.