. . . . "Therefore, in a system including a management computer, a first storage device, and a second storage device, a change in the amount of access from a host computer to the first storage device is monitored when the second storage device is allowed to maintain copy data of the first storage device by a remote data copy operation." .