It is to be appreciated that respective entries in the address book can contain information such as e-mail addresses, configuration information for determining when to send a recipient an e-mail, interruptibility and non-interruptibility information regarding the recipient, available communication devices and/or systems, break-through privileges . . . .