. . . "This may be performed in response to, for example, receiving user names, e-mail addresses or other indicia suitable for identifying a user or group of users." . .