“company phone books, organizational charts, memos, company policy manuals, calendars of meetings, events and vacations, system manuals, printouts of sensitive data or login names and passwords, printouts of source code, disks and tapes, company letterhead and memo forms, and outdated hardware.” For Example: If the victim sold, his phone but he did not format his phone than the hacker can buy his phone and stall his information our social media account. Another example: If the victim threw the papers, into the garbage and these papers has an important information like (Figure 1) about his company than the hacker can take these papers and hack the company using the information in these papers.