der vertrauliche Daten umfasst und/oder die Privatsphäre von Dritten verletzt oder beeinträchtigt;You need to watch out to take the BOM into account in scripts or method code that quickly system documents that get started with a BOM. For example, when sample matching at the start of the file that commences using a BOM you need extra code to che