We do the same, but instead rely on virtual tapes. That way we can set the retention period, and can retrieve the data for further investigation without "them" having deleted a disk data set.
BTW, we also added some "sanity check" processing before writing to tape. E.g. do we have at least nn records?, do the records make sense?, etc. If those tests fail, it generates an automatic e-mail so that we are alerted to fix the problem. Mike Walter Hewitt Associates Any opinions expressed herein are mine alone and do not necessarily represent the opinions or policies of Hewitt Associates. Brian Nielsen <[EMAIL PROTECTED]> Sent by: "The IBM z/VM Operating System" <IBMVM@LISTSERV.UARK.EDU> 05/01/2008 03:20 PM Please respond to "The IBM z/VM Operating System" <IBMVM@LISTSERV.UARK.EDU> To IBMVM@LISTSERV.UARK.EDU cc Subject Re: RSCS question On Wed, 30 Apr 2008 11:33:35 -0400, David Boyes <[EMAIL PROTECTED]> wrote: >It's also your best route to move files, print and monitoring data over >to other IBM OSes like z/OS (and non-IBM systems with a little help from >us) without human intervention. I recently setup an automated process to FTP to z/OS data extracted from DISKACNT's ACCOUNT files every day. No RSCS or human intervention required. Brian Nielsen The information contained in this e-mail and any accompanying documents may contain information that is confidential or otherwise protected from disclosure. If you are not the intended recipient of this message, or if this message has been addressed to you in error, please immediately alert the sender by reply e-mail and then delete this message, including any attachments. Any dissemination, distribution or other use of the contents of this message by anyone other than the intended recipient is strictly prohibited. All messages sent to and from this e-mail address may be monitored as permitted by applicable law and regulations to ensure compliance with our internal policies and to protect our business. E-mails are not secure and cannot be guaranteed to be error free as they can be intercepted, amended, lost or destroyed, or contain viruses. You are deemed to have accepted these risks if you communicate with us by e-mail.