Recovering from a Data Corruption Failure