Identifying what users have potential to have key data