. . . "For example, access to certain kinds of data or programming privileges may be limited or there may be card duplication conflicts with other end-users on the system." .