22.6.12 Bypassing Control/Check Points