{"id":35831,"date":"2008-03-26T16:35:41","date_gmt":"2008-03-26T21:35:41","guid":{"rendered":"https:\/\/content.findlaw-admin.com\/ability-legal\/uncategorized\/suggestions-on-how-to-prepare-for-the-year-2000.html"},"modified":"2008-03-26T16:35:41","modified_gmt":"2008-03-26T21:35:41","slug":"suggestions-on-how-to-prepare-for-the-year-2000","status":"publish","type":"corporate","link":"https:\/\/corporate.findlaw.com\/law-library\/suggestions-on-how-to-prepare-for-the-year-2000.html","title":{"rendered":"Suggestions on How to Prepare for the Year 2000"},"content":{"rendered":"<section class=\"fl-gutenberg-byline\">\n    <div class=\"fl-gutenberg-byline-content\">\n                    <p><em>This article was edited and reviewed by <a href=\"https:\/\/www.findlaw.com\/company\/our-team.html\" rel=\"noopener\">FindLaw Attorney Writers<\/a><\/em><\/p>\n\n                | Last reviewed\n        <time>\n                            May 10, 2026\n                    <\/time>\n    <\/div>\n\n    \n    <details class=\"fl-gutenberg-byline-toggle fl-gutenberg-byline-legally-reviewed\">\n        <summary>\n            <i class=\"fl-gutenberg-byline-icon\" aria-hidden=\"true\"><\/i>\n            Legally Reviewed\n        <\/summary>\n\n        <div class=\"fl-gutenberg-byline-toggle-content\">\n            <p><em>This article has been written and reviewed for legal accuracy, clarity, and style by <a href=\"https:\/\/www.findlaw.com\/company\/our-team.html\" rel=\"noopener\">FindLaw\u2019s team of legal writers and attorneys<\/a> and in accordance with <a href=\"https:\/\/www.findlaw.com\/company\/company-history\/editorial-policy.html\" rel=\"noopener\">our editorial standards<\/a>.<\/em><\/p>\n\n        <\/div>\n    <\/details>\n\n    <details class=\"fl-gutenberg-byline-toggle fl-gutenberg-byline-fast-checked\">\n        <summary>\n            <i class=\"fl-gutenberg-byline-icon\" aria-hidden=\"true\"><\/i>\n            Fact-Checked\n        <\/summary>\n\n        <div class=\"fl-gutenberg-byline-toggle-content\">\n            <p><em>The last updated date refers to the last time this article was reviewed by FindLaw or one of our <a href=\"https:\/\/www.findlaw.com\/company\/our-team\/contributing-authors.html\" rel=\"noopener\">contributing authors<\/a>. We make every effort to keep our articles updated. For information regarding a specific legal issue affecting you, please <a href=\"https:\/\/lawyers.findlaw.com\/?fli=bylinelink\" rel=\"noopener\">contact an attorney in your area<\/a>.<\/em><\/p>\n\n        <\/div>\n    <\/details>\n<\/section>\n\n\n\n<div class=\"rxbodyfield\" xmlns:o=\"urn:www.microsoft.com\/office\" xmlns:st1=\"urn:www.microsoft.com\/smarttags\" xmlns:w=\"urn:www.microsoft.com\/word\" xmlns:x=\"urn:www.microsoft.com\/excel\"><div style=\"margin-left: 2em\"><font color=\"#000080\"><font size=\"+1\">What is Y2K? Although it may have many names &#8212; Y2K, the Millennium Bug, the year 2000 problem &#8212; they all mean the same thing. The year 2000 problem is caused by a &quot;shortcut&quot; used in many computers and microchips. Years ago, to conserve memory space, programmers used two numbers to record the year &#8212; for example, 72 would mean 1972. Why is this a problem? Well, unfortunately, computers and microchips that still use a two-number year will, on January 1, 2000, recognize 00 not as 2000 but as 1900. This could cause them to either shut down or generate incorrect data. In our electronic information-dependent society, that could be a big problem.<\/font><\/font><\/div><div style=\"margin-left: 2em\"><font color=\"#000080\"><font size=\"+1\">The date conversion problem can be experienced on a number of different times, including January 1, 2000. A partial list of problem dates is <a href=\"http:\/\/www.fcc.gov\/year2000\/dates.html\" rel=\"noopener\">attached<\/a>. There may be many other dates on which the Y2K bug is felt, according the specific circumstances of each individual. Keep broad vision of when the date conversion might effect you.<\/font><\/font> <p><font color=\"#000080\"><font size=\"+1\">Members of the communications industry are encouraged to share the results of their efforts. While the sharing of information can greatly expedite response time, it also raises some legal questions concerning liability. Some of these questions may be directed to the <a href=\"http:\/\/www.usdoj.gov\/atr\/index.html\" rel=\"noopener\">Antitrust Division<\/a> of the US Department of Justice which has already authorized the sharing of some Year 2000 information.<\/font><\/font><\/p><p><font color=\"#000080\"><font size=\"+1\">This document is designed to set forth general suggestions for the communications industry on how to approach and address this situation systematically. These suggestions are general, not definitive. Individuals should take these suggestions and flexibly apply them to their own unique situations, seeking counsel from experts, from their peers, and from the many other sites referenced in this document.<\/font><\/font><\/p><\/div><p\/><hr color=\"#800000\" noshade=\"noshade\" size=\"10\" width=\"50%\"\/><h2><u><font color=\"#800000\"><font size=\"+3\">S<\/font>tep One: Inventory<\/font><\/u><\/h2><ul><li><font color=\"#000080\"><font size=\"+1\">Inventory your communications system. Attempt to keep a broad vision in order to anticipate each component which could influence the ability of your system to work. It may helpful to break your system down as follows:<\/font><\/font><\/li><\/ul><div style=\"margin-left: 2em\"><ul><li><font color=\"#000080\"><font size=\"+1\"><i>Communications:<\/i> systems or components that directly affect communications transmission or reception (<i>e.g.<\/i>, computer switches, routers, amplifiers) including equipment directly integrated into your system such as personal computers.<\/font><\/font><\/li><\/ul><\/div><div style=\"margin-left: 2em\"><ul><li><font color=\"#000080\"><font size=\"+1\"><i>Support:<\/i> operations support and administrative systems (<i>e.g.<\/i>, maintenance, billing, parts ordering).<\/font><\/font><\/li><\/ul><\/div><div style=\"margin-left: 2em\"><ul><li><font color=\"#000080\"><font size=\"+1\"><i>Auxiliary:<\/i> systems or components such as payroll, human resources, security and alarm control systems, and air conditioning.<\/font><\/font><\/li><\/ul><\/div><ul><li><font color=\"#000080\"><font size=\"+1\">Also consider your suppliers, business partners, and utilities. While making your inventory, be sure to collect the part numbers of your equipment; different versions of the same component can experience difference levels of problems. The part number can help specify whether yours is the model which will or will not experience difficulties.<\/font><\/font><\/li><\/ul><center><hr color=\"#800000\" noshade=\"noshade\" size=\"10\" width=\"50%\"\/><\/center><h2><u><font color=\"#800000\"><font size=\"+3\">S<\/font>tep Two: Assessment<\/font><\/u><\/h2><ul><li><font color=\"#000080\"><font size=\"+1\">Define the problem. Select or draft a standard for the operational goal of your company.<\/font><\/font><ul><li><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">Determine the nature and the extent of the problem.<\/font><\/font><\/font><\/font><\/li><\/ul><ul><li><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">Consult with manufacturers. Many manufacturers now have web sites providing detailed information for the equipment that they produce. Linked below is a partial list of communications equipment manufacturers with links to their Y2K pages where possible.<\/font><\/font><\/font><\/font><\/li><\/ul><ul><li><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">Determine the nature of the risk. Distinguish those components and systems that pose the risk of critical failure and those that pose the risk of merely annoying failure. Be sensitive that some failures will be critical to your network and other failures, while only being annoying to your network, could be a critical loss to users (<i>i.e.<\/i>, loss of services to the disabled, impeding their access to public safety).<\/font><\/font><\/font><\/font><\/li><\/ul><ul><li><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">Identify the anticipated date of problems for each component. For some systems, the problem can experienced in advance of the year 2000 due to the calculation of such data as expiration dates. Other systems may experience problems well after January 1, 2000.<\/font><\/font><\/font><\/font><\/li><\/ul><p><font color=\"#000080\"><font size=\"+1\"\/><\/font><\/p><hr color=\"#800000\" noshade=\"noshade\" size=\"10\" width=\"50%\"\/><h2><font color=\"#000080\"><font size=\"+1\"><u><font color=\"#800000\"><font size=\"+3\">S<\/font>tep Three: Remediation<\/font><\/u><\/font><\/font><\/h2><ul><li><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">Remediation may include any method of addressing the Y2K date conversion problem, including repair, replacement, retirement, or avoidance.<\/font><\/font><\/font><\/font><\/li><\/ul><ul><li><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">Develop a plan to respond to the problem, with a strict time line for when each phase must be completed (be sure to afford sufficient time for testing and for unexpected events).<\/font><\/font><\/font><\/font><\/li><\/ul><ul><li><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">The remaining time for remediation is a significant factor. Your plan may need to incorporate a priority of action, responding to critical systems first and dealing with lessor risks later. If not every problem can be fixed in time, alternative plans for how to survive the date conversion may need to be considered. Be aware that as we approach January 1, 2000, the resources available to respond will be in ever greater demand and possibly shorter supply.<\/font><\/font><\/font><\/font><\/li><\/ul><ul><li><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">Consider the necessity of synchronized solutions. Generally communications equipment exist as a part of networks or larger systems. Fixes implemented in one component or system must successfully work with other connected components or systems. Efforts between business partners, competitors, peers, and consumers may need to be coordinated. For example, a remediation based on one set of assumptions may not be compatible with a remediation based on another set of assumptions. In addition, certain remediation must be conducted in certain chronological order. Anticipate that some actions may have to be taken in response to certain problems before other actions are taken.<\/font><\/font><\/font><\/font><\/li><\/ul><ul><li><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">Deploy your plan.<\/font><\/font><\/font><\/font><\/li><\/ul><p><font color=\"#000080\"><font size=\"+1\"\/><\/font><\/p><hr color=\"#800000\" noshade=\"noshade\" size=\"10\" width=\"50%\"\/><h2><font color=\"#000080\"><font size=\"+1\"><u><font color=\"#800000\"><font size=\"+3\">S<\/font>tep Four: Unit Testing<\/font><\/u><\/font><\/font><\/h2><ul><li><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">Testing is done in two steps. Unit testing occurs when individual components in isolation are tested. Integrated testing occurs when components are carefully reintroduced into their systems in order to ensure compatibility.<\/font><\/font><\/font><\/font><\/li><\/ul><ul><li><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">Testing is vital to the implementation of a Y2K strategy. Experts suggest devoting 50 percent of your overall effort to testing. Testing permits you to uncover overlooked areas of difficulty. One auto company which felt confident about its level of compliance tested one of its plants only to discover that the factory doors would not unlock. Testing should be considered for all equipment, including equipment that is thought to be problem free, especially where that equipment is considered critical.<\/font><\/font><\/font><\/font><\/li><li style=\"list-style: none\"><font color=\"#000080\"><font size=\"+1\"><br\/><\/font><\/font><\/li><li><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">Be aware that a fix implemented in one part of a system can have ramifications throughout the rest of the system. According to Bellcore, a new defect is introduced into software code with every 4.5 fixes. In addition, in the best of situations, 5 percent of defects are not discovered until after testing has been completed and the code has been made operational. Be prepared to test for and respond to the effect that fixes will have on systems.<\/font><\/font><\/font><\/font><\/li><\/ul><ul><li><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">If testing cannot be completed on all systems, an order or priority should be developed with the most critical systems being tested first.<\/font><\/font><\/font><\/font><\/li><\/ul><ul><li><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">Testing should be done with care to ensure that the testing itself results in no harm to the system or individuals.<\/font><\/font><\/font><\/font><\/li><\/ul><p><font color=\"#000080\"><font size=\"+1\"\/><\/font><\/p><hr color=\"#800000\" noshade=\"noshade\" size=\"10\" width=\"50%\"\/><h2><font color=\"#000080\"><font size=\"+1\"><u><font color=\"#800000\"><font size=\"+3\">S<\/font>tep Five: Integration &amp; System Testing<\/font><\/u><\/font><\/font><\/h2><ul><li><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">Once remediated and tested, equipment must carefully be integrated back into a system. You should take care to ensure that equipment that works in isolation also works when plugged back in. If the format of data has changed for a piece of equipment, than any other piece of equipment with which it works must be able to understand that new format.<\/font><\/font><\/font><\/font><\/li><\/ul><ul><li><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">Integration also involves &quot;synchronized implementation.&quot; This means that where two systems work together and exchange data, a change in data format in one system must occur <i>at the same time as<\/i> a change in a data format in the other. This may mean working with the companies with whom you interconnect to ensure that upgrades are conducted at the same time and will be compatible.<\/font><\/font><\/font><\/font><\/li><\/ul><ul><li><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">Once your preparations are complete, be sure to maintain a &quot;clean&quot; environment. Do not integrate any untested component, hardware, or software into your system.<\/font><\/font><\/font><\/font><\/li><\/ul><p><font color=\"#000080\"><font size=\"+1\"\/><\/font><\/p><hr color=\"#800000\" noshade=\"noshade\" size=\"10\" width=\"50%\"\/><h2><font color=\"#000080\"><font size=\"+1\"><u><font color=\"#000080\"><font size=\"+3\">C<\/font>ontingency Plans<\/font><\/u><\/font><\/font><\/h2><div style=\"margin-left: 2em\"><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">Contingency planning is critical to preparing for the year 2000. Your equipment might not accept the Y2K date change quite as anticipated. A failure may result from something overlooked or not within your control. Have a contingency plan in place so that your staff can efficiently, flexibly, and quickly respond to unexpected events before they become critical. For example, some companies are planning to operate at full staff during the initial period of the Y2K date change in order to be able to respond to problems, requesting that employees take New Years Eve leave at an alternative time. Know what actions FCC rules require in the event of service interruption (<i>i.e.<\/i>, contacting the appropriate authorities such as the FAA or the Coast Guard ).<\/font><\/font><\/font><\/font><p><font color=\"#000080\"><font size=\"+1\"><font color=\"#000080\"><font size=\"+1\">It goes without saying that the communications industry will play a vital role in <i>other people&#39;s<\/i> contingency planning. The ability to utilize telecommunications to coordinate responses and provide information will be critical. The communications industry should be prepared to respond with the greatest of speed to any difficulties in order to ensure that all other members of our communities can also timely respond to the problems which they experience.<\/font><\/font><\/font><\/font><\/p><\/div><p><font color=\"#000080\"><font size=\"+1\"\/><\/font><\/p><hr color=\"#800000\" noshade=\"noshade\" size=\"10\" width=\"50%\"\/><p><font color=\"#000080\"><font size=\"+1\"><b><u><font color=\"#FF0000\">Disclaimer:<\/font><\/u><\/b> These suggestions are general, not definitive. Individuals should take these suggestions and flexibly apply them to their own unique situations, seeking counsel from experts and from their peers.<\/font><\/font><\/p><p><font color=\"#000080\"><font size=\"+1\"\/><\/font><\/p><hr width=\"100%\"\/><font color=\"#000080\"><font size=\"+1\"><br\/><font size=\"-1\">Last Updated: January 8, 1999<\/font><br\/> <i><font size=\"-1\">http:\/\/www.fcc.gov\/year2000\/y2kguide.html<\/font><\/i><\/font><\/font><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>What is Y2K? Although it may have many names &#8212; Y2K, the Millennium Bug, the year 2000 problem &#8212; they all mean the same thing. The year 2000 problem is caused by a &#8220;shortcut&#8221; used in many computers and microchips. Years ago, to conserve memory &#8230;<\/p>\n","protected":false},"template":"","meta":{"_acf_changed":false,"_stopmodifiedupdate":true,"_modified_date":"","_cloudinary_featured_overwrite":false},"corporate_categories":[6500,6497,6516],"class_list":["post-35831","corporate","type-corporate","status-publish","hentry","corporate_categories-law-library__communications-law","corporate_categories-law-library","corporate_categories-law-library__science-computers-technology-law"],"acf":[],"_links":{"self":[{"href":"https:\/\/corporate.findlaw.com\/legal-api\/wp-json\/wp\/v2\/corporate\/35831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/corporate.findlaw.com\/legal-api\/wp-json\/wp\/v2\/corporate"}],"about":[{"href":"https:\/\/corporate.findlaw.com\/legal-api\/wp-json\/wp\/v2\/types\/corporate"}],"wp:attachment":[{"href":"https:\/\/corporate.findlaw.com\/legal-api\/wp-json\/wp\/v2\/media?parent=35831"}],"wp:term":[{"taxonomy":"corporate_categories","embeddable":true,"href":"https:\/\/corporate.findlaw.com\/legal-api\/wp-json\/wp\/v2\/corporate_categories?post=35831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}