As the Information Security Manager, you've just been informed about a potentially new technology solution to be implemented in the company. Before approving its use, which step would you take to ensure the integrity of the data processed by this technology?