Reading data: recognizing a leak