When information or communications appear to be contrary to expectations, one should verify the correctness of the data or message with the person believed to have originated it.Use of personal computing systems or devices - Authorized Users are responsible for the security and integrity of information stored on Resources, including hardware and software.