In the case of the service, we would take those data fields and run them through our classified intelligence databases looking for hits, whether on the name or on other data that may have been provided as part of the application.
On February 16th, 2012. See this statement in context.