The system then stores predetermined parameters for the completed task in a logfile, e.g. parameters such as date, time, and user's sign-on ID. If data were involved, the system may run an internal data integrity check to verify that the targeted application system can use the data.