While physically verifying encryption can be done, it is time- consuming (client tracing, inspecting files on TSM volumes, attempting recall without key). A wise thing to do at the administrative level is to employ a management class whose name includes indication of encryption, and to set up client Include specs which use this class name. Then, once stored on the TSM server, querying for the management class name from the client or server will clearly indicate that encryption was at least intended, if not actually realized.
Richard Sims
