On a regular schedule every document that publicly accessible is downloaded and verified for leaks of sensitive information. This is the most common leak vector as there are staging servers that are used for testing, and other locations that are used for internal and external share of documents.