Examples include inadvertent posting of public records, private phone numbers, identification numbers and the like, or intentional posting of email passwords, login credentials, credit card numbers, or other data that is intended to be used for fraud or hacking.