How To Check Data Integrity In Information Security