Tagged how can data be stolen