Controlled Use of Checkpoints

Your installation may have special procedures in place to control the use of checkpoints on DASD. Contact your system administrator to determine whether this is the case for your system. For more information about protecting checkpoint data sets on shared DASD see z/OS DFSMS Using Data Sets.