
| Data | Integrity | and | Verification | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | |||||||
| 
 | 
 | Notice | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | |
| 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | ||
| IBM computer systems contain mechanisms designed | to | reduce | the | 
 | 
 | 
 | |||||||||||||||
| possibility | of | undetected | data | corruption | or | 
 | loss. | This | 
 | risk, | however, | 
 | |||||||||
| cannot be eliminated. Users who experience | unplanned outages, | system | 
 | ||||||||||||||||||
| failures, | power | fluctuations | or | outages, | or | 
 | component | failures must | verify | 
 | |||||||||||
| the | accuracy | of | operations | performed | and | data | saved | or | transmitted | by | the | ||||||||||
| system | at | or | near | the | time | of | 
 | the | outage | or failure. In addition, users must | |||||||||||
| establish | procedures | to | ensure | that | there | is | independent | data | verification | ||||||||||||
| before | relying | on | such | data in | sensitive | or | critical | operations. | Users | should | |||||||||||
| periodically | check | the | IBM | support | websites | 
 | for | updated | information | and | 
 | ||||||||||
| fixes | applicable | to | the | system | and | related | software. | 
 | 
 | 
 | 
 | 
 | |||||||||
| 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
Data Integrity and Verificationxiii
