Database data protection and monitoring
To ensure data integrity and consistency, you can enforce either business rules or data type rules. You can enforce business rules using the following methods:
- Referential constraints let you put controls (constraints) on data in files you define as having a mutual dependency. A referential constraint lets you specify rules to be followed when changes are made to files with constraints.
- Triggers let you run your own program to take any action or evaluate changes when files are changed. When predefined changes are made or attempted, a trigger program is run.
The system performs data type checking in certain instances to ensure, for example, that data in a numeric field is really numeric. In addition, the system protects data from loss using the following methods:
- Journaling and commitment control functions
- System-managed access path protection (SMAPP) support
Parent topic:
Database file concepts
Related concepts
Ensuring data integrity with referential constraints
Triggering automatic events in your database
Recovering and restoring your database