The supervisors would at the beginning of each shift switch to the system for that shift, for example, Shift 1 runs on System One C Hard Disk, shift 2 runs on System Two C Hard Disk and so on, guaranteeing the users that no one will be allowed access to their work, except the supervisors.