The DataSafe hardware reserves memory space for the hardware tags and propagates the tags whenever protected data,
or data derived from protected data, is used.
When an output request is made, the DataSafe hardware first checks to see if this output is allowed by the hardware tags associated with the requested data.