Data or information should be correct and appropriate at all times. Modification or destruction of data is not an option and hence such integrity breaches or possibilities must be rectified and deliver parameters that do not allow any data or information to be altered or destroyed in an unauthorized manner.