Data integrity limitations

Specify any precautions that an application might require for isolation levels, lock types, and logging.

Advise users whether the access method handles logging and data recovery. Notify users about parameters that they might set to turn logging on. For an example, see the following figure.

Provide the precise wording for the isolation levels that the access method supports. It is recommended that you use standard wording for isolation level. The following example shows the language to define the ways in which the qualifying data set might change in the transaction.
Figure 1: Sample language to describe isolation level
The access method fully supports the ANSI Repeatable Read level of
isolation. The user need not account for dirty reads or
nonrepeatable reads. It is recommended that you take precautions
against phantom reads.