Data | Integrity | and | Verification |
|
|
|
|
|
|
|
|
|
|
| |||||||
|
| Notice |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| ||
IBM computer systems contain mechanisms designed | to | reduce | the |
|
|
| |||||||||||||||
possibility | of | undetected | data | corruption | or |
| loss. | This |
| risk, | however, |
| |||||||||
cannot be eliminated. Users who experience | unplanned outages, | system |
| ||||||||||||||||||
failures, | power | fluctuations | or | outages, | or |
| component | failures must | verify |
| |||||||||||
the | accuracy | of | operations | performed | and | data | saved | or | transmitted | by | the | ||||||||||
system | at | or | near | the | time | of |
| the | outage | or failure. In addition, users must | |||||||||||
establish | procedures | to | ensure | that | there | is | independent | data | verification | ||||||||||||
before | relying | on | such | data in | sensitive | or | critical | operations. | Users | should | |||||||||||
periodically | check | the | IBM | support | websites |
| for | updated | information | and |
| ||||||||||
fixes | applicable | to | the | system | and | related | software. |
|
|
|
|
| |||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Data Integrity and Verificationxiii