. "names or other credentials to people without verifying the person???s identity as well as avoid complying with e-mail or phone-based requests for such information." . . .