The "Year 2000" (Y2K) Computer Problem
Guideline For Businesses To Draft
A Contingency Plan
April 1999
Advanced Information And Telecommunications
Society Promotion Headquarters
Conference To Promote Y2K Measures
(Government Of Japan)
- This guideline may be copied freely, and its contents may be altered without restrictions.
- So that this guideline will be read widely throughout industry, it is being made available from the home pages of central government agencies, including the official Residence Of the Prime Minister, the Ministry of International Trade and Industry, the Small and Medium Enterprise Agency, the Ministry of Transport and the Ministry of Posts and Telecommunications; the Japan Small Business Corporation; the Central Federation of Societies of Commerce and Industry,Japan; the Japan Chamber of Commerce and Industry; and the National Federation of Small Business Associations.
- Hard copies can also be obtained upon request from the Japan Small Business Corporation,Chambers of Commerce and Industry and the National Federation of Small Business Associations.
Preface
- The "Advanced Information and Telecommunications Society Promotion Headquarters" was, in response to the initiative of Prime Minister Obuchi, established in September of last year with a view to deal with issues related to the Y2K problem. It comprises all Cabinet ministers, with the Prime Minister serving as its Headquarters' Director, and it has already decided upon an "Action plan" to deal with the Y2K computer bug problem. Measures in accordance with this plan are, at present, under implementation by central government agencies, special corporations, regional public organizations, and private organizations.
- This action plan calls for the government, regional public organizations and industries to conduct thorough inspections, including simulation tests, with a view to determine as to whether computer systems will function normally, and also to formulate contingency plans, in order to deal with such problems as system stoppages and malfunctioning.
- Prime Minister Obuchi issued a directive in January of this year that a guideline for industry is to be prepared, in order to assist them in formulating contingency plans for the case that problems caused by the Y2K computer bug do occur.
This directive was followed by the establishment of a "Working Subgroup of the Y2K Advisors' Conference", which comprises representatives of both, public and private organizations. It held a series of 5 conferences, at which the details were elaborated upon.
- This led to the establishment of a "Conference to Promote Y2K Measures" comprising Vice-ministers of central government agencies, which is headed by the Deputy-Ministers of central government agencies. This body has issued a "Guideline for Businesses to Draft A Contingency Plans to Deal with the Y2K Problem".
- We would be delighted, if industry managers and employees concerned with this problem alike utilize this guideline to the extent ever possible, and make their best efforts in dealing thoroughly with the Y2K problem.
This Guideline's Target Group Companies
* Small and medium size enterprises(SMEs) are the target group
- This guideline is designed mainly for SMEs that should draft and/or revise an existing contingency plan, but it is also helpful for other types of businesses.
* All businesses should be prepared
- "The Y2K problem" is something that mankind will experience for the first time in its history. The contingency plan is designed in a way so that your company will be in a position to prepare for and to confirm how to address this problem properly when an unexpected incident occurs, and to subsequently continue normal operations. All companies should, therefore, prepare a "contingency plan", and they should expect the unexpected.
- Please use the check lists contained in Chapter 5 for scrutinizing the prevailing status quo in the drafting of your company's contingency plan.
Misunderstandings about the Contingency Plan
Please read carefully the following sentences. If your own perception coincides with one of those ideas, you must by all means read this manual thoroughly.
It will enable you to be well prepared for the Y2K problem.
- We will draft a contingency plan, although we have not, in relation to the Y2K problem, undertaken any specific investigation of or adjustment in our company's computer system and equipment with a microcomputer inside.
- We do not need a contingency plan, since we have already, in relation to the Y2K problem, implemented the investigation, adjustment and testing of the computer system and equipment containing a microcomputer; and we have confirmed that there is no problem.
- We do not need to draft a contingency plan until just before the year 2000, since we still have plenty of time.
- Our computer system does not use date transactions.
It will, therefore, not be affected by the problem.
- We have drafted preventative manuals, and we train and implement measures against accidents on a daily basis. We do not need, therefore, to prepare a new contingency plan for the Y2K problem.
- I do not belong to the Information Division of the company.
It is the responsibility of that division to take care of the problem.
- It is a plan that large-scale companies have to prepare. SMEs do not have to take such complex measures.
Contents
Introduction
To Business Managers
This Guideline's Target Readers
Misunderstandings About The Contingency Plan
- What Is The Contingency Plan For The Y2K Problem?
1-1 What Is The Y2K Problem?
1-2 What Needs To Be Implemented Prior To The Contingency Plan?
1-3 When Should The Contingency Plan Be Drafted?
1-4 To What Extent Should The Social Infrastructure Find Consideration
- Ten Steps For Drafting The Contingency Plan
Outline Of The Procedure For Drafting The Contingency Plan
Step 1 | Select The Respective Operations To Be Subjected To The Contingency Plan (Selecting Targeted Operations) |
Step 2 | State The Flow Of The Targeted Operations (Clarifying The Flow Of Operations) |
Step 3 | List The Management Resources To Be Used In The Targeted Operations (Listing The Resources To Be Used) |
Step 4 | Investigate The Prevailing Status Of The Countermeasures Adopted Against The Y2K Problem For Each Resource And Simulate Occurrence Of The Problem For Each Resource (Scenario Simulation) |
Step 5 | Define And Specify The Details Of The Countermeasures To Be Adopted Against Occurrence Of The Problem (Defining And Detailed Specification Of The Countermeasures) |
Step 6 | Define The Structure And Roles In The Headquarters (Defining Of Structure And Roles In The Headquarters) |
Step 7 | Prepare An Action Plan Covering The Danger Days (Drafting Of An Action Plan For The Danger Days) |
Step 8 | Prepare An Action Plan Addressing The Problems' Occurrence (Formation Of Action Plan Addressing The Problems' Occurrence) |
Step 9 | List The Emergency Contacts Within The Company (Organizing In-house Contacts) |
Step 10 | Prepare A Preparatory Plan Covering The Resources Necessary For Implementing The Countermeasures |
GOAL | Document The Plan (End of Drafting The Contingency Plan) |
- Steps To Be Taken After Having Drafted The Contingency Plan
3-1 Approve And Budget The Plan (Approval And Budgeting Of The Plan)
3-2 Implement Prior To Countermeasures Advance Preparations
(Implementation Of Advance Preparations)
3-3 Review And Revise The Plan (Review and Revision Of The Plan)
3-4 Educate And Train (Implementation Of Education And Training)
- Sample Of A Contingency Plan
(A Simulated Case Of A Company, Which Designed The Plan In Accordance With This Guidebook)
- Checksheets
- Worksheets
- Glossary
Introduction
To Business Managers
- This guideline was designed mainly to provide instructions to the personnel in charge of drafting a contingency plan on the methods for preparing such a plan.
However, such plan has to be drafted under the responsibility of business owners.
- The Year 2000 Computer Problem (thereafter referred to as the Y2K problem) is not simply a problem of a computer system and equipment containing a microcomputer (thereafter referred to as microcomputer equipment), but it is an issue related to business management in the sense that it determines, whether normal business operations are affected, when an unexpected incident occurs.
- It should be normal to adopt all measures for adjusting computer systems and microcomputer equipment. However, there is a chance that you will be affected by an unexpected incident, because today's companies' activities depend on other companies and computer systems and microcomputer equipment connected with each other through networks.
- You must, therefore, undertake a thorough adjustment of the computer systems and microcomputer equipment in your company and appoint a person, who is in charge. This will enable you to comprehend adequately the influence of the problem, and to prepare a plan to continue normal operations, in case an unexpected incident occurs.
This Guideline's Target Readers
This guideline(Guideline for Businesses To Draft A Contingency Plan) is targeted at,but not necessarily limited to, the following readers:
- Business owners, who wish to understand the outline of the contingency plan addressing the Y2K problem
Please refer to the Sections "To Business Managers" and "Misunderstandings about the Contingency Plan"
- System supervisors, who need, in order to deal with the Y2K problem, information regarding the planning, installation, adjustment and testing of current computer systems and microcomputer equipment.
Please refer to Chapter 1 onwards.
- The person(s) in charge of the Y2K problem, and/or the sales personnel, who are assigned to provide information inside the company and to outsiders in response to requests regarding the problem
Please refer to Chapter 1 and understand the conditions of engagement of your company. Keep yourself up-to-date about the latest information as and when progress is made on the contingency plan as well as adjustments of computer systems and microcomputer equipment.
Misunderstandings About the Contingency Plan
Please read the following sentences carefully. If your own perception coincides with one of those ideas, you must by all means read this guideline thoroughly.
It will enable you to be well prepared for the Y2K problem.
- We will draft a contingency plan, although we have not, in relation to the Y2K problem, undertaken any specific investigation of or adjustment in our company's computer system and microcomputer equipment.
You must start the investigation addressing the problem, and adjust the computer systems and microcomputer equipment of your company immediately. The affects of the problem will not end after January 1st, 2000, but will continue forever after that day, if you fail to implement the corrections.
However, you may be able to avoid the risk of not being able to continue operations after the year 2000, if you make continuous efforts to adjust the system and such equipment.
- We do not need the contingency plan, since we have already, in relation to the Y2K problem, implemented the investigation, adjustment and testing of our company's computer system and microcomputer equipment; and we have confirmed that there is no problem.
The contingency plan should be prepared, even after the system and microcomputer equipment of your company were adjusted. It is possible, in spite of all the efforts made, that one fails to recognize something or makes a mistake in the adjustment. Your company may cause, in such a case, damage to your client or partner. Even though your own system and microcomputer equipment do not have any problems, your company's operations may be affected by lack of preparedness of your client or partner in addressing the Y2K problem.
Therefore, even if you have already taken action to prevent any problems with your computer systems and microcomputer equipment, you still need to prepare the contingency plan for dealing with an unexpected incident.
- We do not need to prepare the contingency plan until just before the year 2000, since we still have plenty of time.
It is possible that the Y2K problem will occur before January 1st, 2000. For instance, a computer system, which makes a purchase order, the payment of which is due after that date, may already cause a problem before that date.
Therefore, one has to be ready by preparing the contingency plan for"the presumed day, on which the problem may occur".
- Our computer system does not use date transactions. It will, therefore, not be affected by the problem.
Even if nothing is controlled by the date within the computer system, microcomputer equipment, such as product line or controlling equipment, may cause the problem. You must confirm first of all that all the equipment, including microcomputer equipment, is not controlled by date. If you use microcomputer equipment, you must investigate and adjust the system with the support of the manufacturer or the vender, and draft a contingency plan simulating the possible occurrence of the problem when using the equipment.
- We have drafted preventative manuals, and we train and implement measures against accidents on a daily basis. We do not need, therefore, to draft a new contingency plan for the Y2K problem.
The ideas determined in an ordinary preventative manual, and plans regarding the initial organization, structure of emergency contacts, and restoration measures are considerably helpful at the time of contingency plan preparation. However, the Y2K problem differs significantly from incidents, such as natural disasters, since it is possible to identify the date, on which the problem will occur, and hence to prepare a definite plan to prevent its occurrence.
The Y2K problem also differs significantly from usual natural disasters, since it will occur on a nation-wide scale (not limited to a certain area) at almost the same time. Duplication or a backup to ensure the computer systems' reliability may not function after the incident has occurred. A contingency plan addressing the Y2K problem is, therefore, needed in addition to an ordinary preventative plan.
- I do not belong to the Information Division of the company. It is the responsibility of that division to prepare the contingency plan.
It is normally the case that a company's Information Division is responsible for adjusting the computer system to make it compatible with the Y2K problem.
However, it is you, who will be affected, when the problem occurs in the computer system and microcomputer equipment, because you are executing your duties using the system.
In most cases, those, who use the system for executing their daily duties, and not the people in the Information Division, are knowledgeable about the contents of their duties and they understand more about the possible implications involved. The Information Division and the actual users should, therefore, cooperate in preparing the contingency plan, which will determine the preventative measures and the course of action needed when the problem occurs in the computer system and microcomputer equipment.
- It is a plan that large-scale companies have to establish. SMEs do not have to take such complex measures.
Regardless of the size of the company, if they use computers at all, they should have a contingency plan to minimize the possible damages, which may be caused by the Y2K problem.
You will understand when reading this guidebook, that the contents of a contingency plan could be simple or complex, depending on the scale, type of business, and field or policy of the company's owner. The managers of SMEs should also be aware of the problem, and draft a plan, which is compatible with the condition of the company.
1. What Is The Contingency Plan For The Y2K Problem?
What Is The Y2K Problem?
1-1 What Is The Y2K Problem?
- It implies various problems and ripple effects, as a computer treats usually the last two digits of a year as an identifier (for example"98"for the year 1998). According to the system, the year 2000 will be identified as "00", which will potentially cause various problems.
- This problem does not occur only with computers themselves. Microcomputer equipment are used in various machines and plants in a company or a factory. Some microcomputer equipment has a software program inside, and the system might be controlled by date.
- The purpose of this guideline is not to explain the technical details of the Y2K problem, which will be left to be specified by other documentation. The above mentioned problems have occurred already with some computers well in advance of the year 2000.
- The mistake of a date controlled transaction may cause abnormalities in purchase order systems between your company and the clients, or in lines in a factory. Your business could suffer substantial damage, if you do not take any precautions against the Y2K problem.
What Needs To Be Implemented Prior To The Contingency Plan?
1-2 What Needs To Be Implemented Prior To The Contingency Plan?
- The more you adopt precautionary measures, the more you can reduce the probability of occurrence of the problem.
- It is most important to undertake a general inspection of all kinds of property (computer systems, producing equipment, and so on) used in your company and the possibilities, with which that property may be affected by the Y2K problem, and then to render the computer systems and microcomputer equipment compatible with the problem.
- If you do not know how to undertake such general inspection, you can refer first to the "General Inspection Items for Public Enterprises in Relation to the Y2K Problem" published by the Action Plan of the Government, or refer to various check lists, which other companies provide, and then start the inspection. You may contact a toll free telephone number (0120-200-451), which has been set up for you, if you are a SME.
Please do call that number. You will be provided with any kind of advice, since that special toll free number has been established for assisting in dealing with the Y2K problem.
- After having undertaken a thorough action plan to prevent the occurrence of the problem, the contingency plan is to be prepared for dealing with an emergency situation affecting the priority operations in your company; and it then has to be implemented.
When Should The Contingency Plan Be Drafted
1-3 Schedule For Drafting The Contingency Plan
- It is desirable to complete the first version of the plan well in advance, probably before June 1999, and not in the last part of the year.
* When should one draft the initial contingency plan?
- It is not only on January 1st, 2000, that the "Y2K" problem occurs. Various institutions and companies have already specified certain dates before January 1st, 2000, which may be potentially hazardous.
- A specific time frame will also be necessary, in order to organize the supply of materials and resources for plan implementation.
* Is it enough to make the plan just once?
- It is difficult to establish a highly sophisticated contingency plan in just one time. It is necessary, therefore, to observe and monitor carefully the progress of the initial plans of your own company and that of your clients/partners. Also, the first possible date of the problem, as well as the mobility of the social infrastructure, should be taken into account in preparing gradually a concrete and sophisticated plan.
To What Extent Should The Social Infrastructure Find Consideration?
1-4 Idea About The Social Infrastructure
- Each important institution in the area of the social infrastructure, such as electricity, gas, and water supply and sewerage, communication and public transportation, have implemented countermeasures at an early stage. It is, therefore, generally considered so far that these parts of the social infrastructure may not, due to the Y2K problem, cause any significant damage to business operations or the lives of people. However, the institutions, which are responsible for the important social infrastructure, are still in the process of updating their efforts in dealing with the problem, in order to raise their credibility. All of us should be aware of the latest information, when we prepare our contingency plan.
* Can we expect that the social infrastructure will not be affected?
- The contingency plan should be designed as an action plan that counters "an un expected incident". Therefore, it is necessary that we include plans in case problems arise caused by interruptions in the social infrastructure, which may in turn cause obstacles for the continuation of business operations.
- It is possible that confusion may result or disruptions arise from the social infrastructure, due to a natural disaster, if not the Y2K problem. Companies, the operation of which may be affected significantly by this confusion in the social infrastructure, should prepare power generating equipment, industrial water, fuel, and so on, in order to cope with such situations. It is realistic to implement countermeasures against disruptions in the social infrastructure, which are based on such daily preparations. One does not have to restrict this idea solely to the Y2K problem.
* Method for confirming the progress achieved by the social infrastructure in implementing countermeasures
- It is necessary during contingency plan preparation to confirm the on-going progress, which has been achieved in the implementation of countermeasures against problems, which may arise from the social infrastructure, which your company utilizes.
- The most common method is to make phone calls to the related institutions, and there is also the means of using the Internet to check the home page of the enterprises. The Internet shows often detailed documentation of their continuing realization of countermeasures against the Y2K problem. This may provide you with more information than a simple phone inquiry, and you will be able to continually update your own information.
- You will be able to check, whether the institution, which is in charge of the public utility your company uses, has made a home page concerning progress achieved in implementing countermeasure against the Y2K problem. You may also refer to the general home page created by the association or institution, not only by one of them, to show their engagement and progress on the issue.
Figure 1-4-1, List of Home Pages, of the main industrial organizations, local governments, and the central governmental agencies regarding the Y2K problem [INSERT Figure 1-4-1]
2. Ten Steps For Drafting the Contingency Plan Outline of the Procedure For Drafting the Contingency Plan
The following steps should be observed in drafting the contingency plan for the Y2K problem (Figure 2-0-1 refers). Concrete explanations are provided for on each of these steps in the following pages.
Establishment Of The Fictitious X Company
- This guideline establishes a fictitious company as an illustrative example so that guideline users can have the image of a concrete case.
- Although the types of businesses may differ, the basic idea is common to every company. Please use the idea when you prepare your own plan.
Figure 2-0-2, Main characters of this guideline and structural flow chart of X Company business environment
[ STEP 1 ] Selecting The Target Operations
[ STEP 1 ] Select The Respective Operations To Be Subjected To The Contingency Plan
2-1 Selection Of The Operations
- The main purpose of the contingency plan is to avert that your company gets into a position where it becomes unable to continue business (especially, the vital business operations of your company) due to the Y2K issue.
- The operations, which must be protected by all means, should take priority over other operations.
- In order to minimize the loss when an incident occurs, it is meaningful for all those companies, which can afford the time, to work out as well the contingency plan for the other lower priority operations.
- In general, the operations (which should be secured in the first place) are typically among the operations listed in the following Figure (Figure 2-1-1 refers). However, it depends also on the environment and the management strategy of the company. The proprietor should, therefore, select the operations.
- Decide upon the operations, for which your company will prepare the contingency plan.
[ Procedure ]
- Identify the main operations of your company by using Worksheet No. 1.
- Categorize each operation into one of the three ranks (A/B/C) according to their importance (priority) for your company.
- Select the target operations taking your company's prevailing status into consideration. For example, the contingency plan should be worked out for A rank operations, and the plan would likewise be made, if time permits, for B and C rank operations.
<The example of Company X>
- X Company selected the A rank operations, using the worksheet. It placed the "A" on operations of "receiving orders" from customers, "producing goods" and then "delivering" to the customers as "the operations, which should be secured on a priority basis", and it decided to prepare the contingency plan covering these operations. (Operations: "receiving orders", "purchase", "production", "shipment/delivery")
[ STEP 2 ] Clarifying The Flow Of Operations
[ STEP 2 ] State The Flow Of The Targeted Operations
2-2 Clarifying The Flow of the Targeted Operations
- Write down the specific flow of the operations, which were selected in STEP 1.
- The management resources (in-house resources, outside resources) used in the main operations will become evident by writing down the flow of operations.
[ Procedure ]
- Write down the procedure of the selected operations as specifically as possible (See Worksheet No. 2). For example, if the selected operation is receiving orders, write down the details of the functions, which you will carry out after you have received orders from customers.
- Next, write down what kind of management resources (machinery, equipment, and systems for example) are used in each function. (See Worksheet No. 2).
- Write down every resource in case that more than two resources are used in the same operation (for example, write down both telephone and system, if orders are received, depending on the type of customers, by the way of either telephone or any system.).
[ Note・Important Point ]
- If the person(s), who is/(are) drafting the contingency plan do not know the details of the operations, he/she/they should obtain them from the people, who are actually undertaking the operations, or let them complete the worksheet.
- You should record the name of the service, which your company receives, as 'delivery from supplier a Company', if there is an outside resource (for example, supply or door-to-door delivery service from other companies) involved in the operation.
- It is timesaving to use it as the basis, if there is any material, such as an operational flowchart. It is also appropriate to record the necessary items into that material, instead of into the worksheet.
<The example of Company X>
- X Company selected "receiving orders", "purchase", "production", and "shipment/ delivery" as the operations, for which the contingency plan is to be drafted, and the company prepared the following figures.
1. Receiving orders
Worksheet No. 2-(1)
[ Note ]
Procedure Serial No.: Serial numbers for every operational procedure.
Operational Procedure: Detailed accounts of operational procedures
Resource: The resources (equipment) used in the operational procedure
Resource Serial No.: Serial numbers for the resources used. The same number is attached to the same resource.
Notice: Comments, if necessary.
2. Purchasing
Worksheet No. 2-(2)
3. Production
Worksheet No. 2-(3)
4. Shipment/Delivery
Worksheet No. 2-(4)
Figure 2-2-4 List of operational procedures
[ STEP 3 ] Listing The Resources To Be Used
[ STEP 3 ] List The Management Resources To Be Used In The Targeted Operations
2-3 Listing of Resources
- Make a list of the management resources, which were clarified under the operational procedures in STEP 2.
- The list will clarify the management resources (both, in-house and outside of the company), for which the contingency plan will be prepared.
[ Procedure ]
- Complete Worksheet No. 3, by selecting the resources from Worksheet No. 2 in using 'Resource Serial No'.
- Write down the location of the resource, whether it exists in- or out house, such as that of suppliers, consignment services, social infrastructure. Write down the name of the provider of services.
- The significance of the resources will differ depending on the operation itself.
Fill in every operation, in which the resource is used, because it will become necessary to decide on the measures (later).
[ Note · Important Point ]
- The name of providers of services are supposed to have been identified already by the teams, which have implemented the preventive measures against the Y2K problem. It is timesaving to use their information.
<The example of the Company X>
Worksheet No. 3
Figure 2-3-1 The List of Resources
[ Note ]
- Resource Serial No., Resource, Operation: Is the same as that in Worksheet No.2
- Location: In-house, if the resource belongs to the company; outside, if the resource does not belong to the company
- The providers of services: The name of the providers of services, such as the vendor of equipment and service industry.
[ STEP 4 ] Scenario Simulation
[ STEP 4 ] Investigate The Prevailing Status Of The Countermeasures Adopted Against The Y2K Problem For Each Resource And Simulate Occurrence Of The Problem For Each Resource
2-4 Scenario Simulation
1) Establishing The Allowable Stand Still Periods
- The ways to cope with the disruptions triggered by the Y2K problems as well as the levels of urgency will differ for each of the individual resources. It is necessary to define the frequency of use of the resources and the stand still period over which operations will be hampered.
- Based on 'The List of Resources' identified in STEP 3, identify 'the frequency of use' and 'the allowable stand still period', taking the character of the operations into full account.
[ Procedure ]
- Develop Worksheet No. 3, which was completed under STEP 3, into Worksheet No. 4 taking into full account the type of operations.
- Complete "frequency of use" assuming the operations of each resource.
- Define the allowable stand still period by referring to the "frequency of use" and write it down.
<The example of the Company X>
Worksheet No. 4
[ Note ]
- Resource Serial No., Resource, Operation: Are the same as in Worksheet No. 3.
- Frequency of use: The frequency of use of the resource taking into full account the type of the operations.
- Allowable stand still period: The stand still period over which operations will be hampered.
2) Investigation of Existing Measures
- It should be checked, whether the management resources, which have been studied in STEP 1, 2, and 3 so far, will be obstructed by the Y2K problems, or not. The existing measures against the problems should be, if they will be affected negatively, surveyed by collecting information.
- There are two reasons, why the existent measures should be checked.
1) Depending on the current measures, the underlying assumptions for the period of operational stand still caused by the Y2K problems will be changed.
Countermeasures against the problems will be changed accordingly, because they are based on the assumptions for the operational stand still period.
2) With regard to the resources, for which development of measures has been delayed, it may be necessary, besides measures against them, to determine a way to alleviate the effects of the problems.
[ Procedure ]
- Collect information on the measures against Y2K problems from the provider of services of each resource (Manufacturer, Vendor, Other Companies, and so on.)
- Try to utilize openly accessible information (Mass-media and Internet home page).
- It is timesaving to ask the in-house team, which has already implemented the preventive measures against the Y2K problem, to provide their information.
- Obtain the information on the results of the trial connection test from the aforesaid team preparing measures for the Y2K problem.
- Write down the results of the investigation in Worksheet No. 5.
[ Note · Important Point ]
- Remove at this stage the resources, which have apparently nothing to do with Y2K related problems, from the list of resources. (The aforesaid team might also have this information)
<The example of Company X>
Worksheet No. 5
[ Note ]
- Resource Serial No., Resource, Provider of Services : Are the same as in Worksheet No. 3.
- Date: The date, the measures have been investigated. Relation: The relation with Y2K related problems. Yes: The resource has certain relations with the problems. No: The resource has no relation with the problems (The box is slashed).
- Measure: Results of the investigation on how the measures to cope with possible disruptions are being implemented.
3) Scenario Simulation
It is necessary to establish the probability for disruptions to occur, and it is also necessary to establish the duration needed for recovery in case of breakdown, in order to draft the specific plan for each resource.
Prepare, based on the measures implemented so far to deal with Y2K related problems, which are confirmed in Section 2, a scenario for each resource (the probability of the occurrence of trouble ).
[ Procedure ]
- Assume and write down in Worksheet No.6 a probability for the occurrence of trouble for each resource, which you confirmed in Section 2, and categorize it into 4 groups, namely very big, big, middle, and small, by referring to the existing measures as well as the target period needed for recovery.
- Assume and write down, based on the obtained information, the period needed for recovery in case of breakdown.
[ Note · Important Point ]
- The probability of occurrence of trouble is assessed to be high, when progress in the realization of measures ( its implementation, trail test, and so on) is slow.
- Also, the probability of trouble is assessed to be high, because of a lack of awareness, that is when the implemented measure is not so much in the domain of public knowledge. On the contrary, any company, which has prepared the contingency plan, explained its progress in implementing measures, and announced the target period for recovery, is considered to have a low probability for being disrupted in operations.
- The period for recovery means the time span needed to replace it with equipment, to which the necessary changes have been made, or with substitute equipment, when the resource is microcomputer equipment.
<The example of Company X>
Worksheet No. 6
Figure 2-4-3 The List of Problem Occurrence Simulation
[ Note ]
- Resource Serial No., Resource, Provider of Services, Measure (implemented), Target period: They are the same as those in Worksheet No. 5.
- Probability (VB: very big, B: big, M: middle, S: small) : The expected chance of the occurrence of problems in reference to "Measure" and the "Target period".
- Day: The expected time span needed for recovery in reference to "Measure" and the "Target period".
[ STEP 5 ] Defining And Detailed Specification Of The Countermeasures
[ STEP 5 ] Define And Specify The Details Of The Countermeasures To Be Adopted Against Occurrence Of The Problem
2-5. Defining and Detailed Specification of the Countermeasures
1) Define the countermeasures
- You should decide on the countermeasures to be adopted, taking into account the scenarios for problem occurrence at each resource (probability and stand still period) identified in Section 3 of STEP 4, as well as the allowable stand still period for every resource identified in Section 1 of STEP 4.
- The selected operations are basically defined as those, which must by no means be interrupted. It is necessary to continue operations by adopting alternative operations.
- Means should be worked out to ease the effect of the problems on the operations, if the resource can not be substituted for.
- If there are more than two measures, then there is a need to decide, which should be adopted, by taking into account the cost and effectiveness of the measures.
[ Procedure ]
- Decide upon the measures for each resource by taking into account the problem scenarios (probability and stand still period) identified in Section 3 of STEP 4 as well as the allowable stand still period of each resource identified in Section 1 of STEP 4.
- Write down the types and outlines of measures in Worksheet No. 7.
[ Note · Important Point ]
- Loss of a database in the system will have a tremendous effect on the whole management. It is essential to prepare backup data in advance, in order to ease the effect.
- It is effective to ensure a support system among suppliers in case of emergency,
in order to prevent shortage of supply on the occasion of any disruption.
- It may be necessary to provide downgraded or simplified service, because it is somewhat implied by the alternative operations. Such type of operations should be decided upon, taking into account the complexity and the volume of work. (For example, accounting with a fixed rate, making the amount even, and so on).
<The example of Company X>
Worksheet No. 7
[ Note ]
- Resource Serial No., Resource, Possibility of Occurrence, and Expectation of Duration: Are the same as in Worksheet No.6
- Allowable Stand Still Period: The same with No.4 (Write the shortest term in the same resource)
- Alternative measure "Implementation":
Y: If the alternative measure will be implemented.
N: If the alternative measure will not be implemented.
"Content": The specific plan
- Other measure "Implementation":
Y: If the alternative measure will be implemented.
N: If the alternative measure will not be implemented.
- "Type of measure", "Content": The kind of measure and specific plan.
2) Specification of the countermeasures
- Detail the operational working procedures, in order to implement the measures.
- The procedures should be described specifically in an instruction book, since alternative manual work will be done by people, who are unaccustomed to such work.
- In detailing procedures, the necessary resources needed for the alternative plan (equipment, handwritten slips and ledgers, and so on) will become clear.
[ Procedure ]
- Complete Worksheet No. 8 with the detailed operational working procedures, which have been selected to be implemented with the alternative plan (refer to Section 1 of STEP 5) among all the operations contained in Worksheet No. 2, which you completed in STEP 2.
- At the same time, write down 'the necessary resources' (equipment, material, furniture, list, and so on), which will be required for the work.
[ Note · Important Point ]
- Complete the Worksheet No.8 as well, when it is necessary to detail the procedures (mainly for operational works) of the measures (to minimize the effect of problems) besides alternative operations determined in Section 1 of STEP 5.
<The example of Company X>
Worksheet No. 8
Figure 2-5-2 List for Specifying the Countermeasures
[ Note ]
- Operation : The same as in Worksheet No. 2.
- Operation Procedure Serial No., Operation Procedure: The same as in Worksheet No. 2.
- Resource : The same as in Worksheet No. 2.
- Measure : Taken from Worksheet No. 7, using 'Resource' as a keyword.
- Order : Serial number.
- The Person in Charge : The person, who is in charge of operations.
- Procedure: The detail of operations.
- Necessary resource: All equipment, materials and devices necessary for work.
[ STEP 6 ] Defining Of The Structure Of And Roles In Headquarters
[ STEP 6 ] Define The Structure Of And Roles In Headquarters
2-6 Defining Of The Structure Of And Roles In Headquarters
- An Emergency Headquarters is to be established with the view to mobilize the strength of the full company to deal with a problem immediately after it has occurred, and also to permit rapid judgment to be made. For these purposes, it is necessary to establish a thorough system so that all information will be gathered by such Headquarters, immediate management decisions can be sought, and appropriate directions for action given.
- There will be a critical delay in taking action, if time is required for deliberations over whether or not to establish an Emergency Headquarters after a problem occurs. It is important to decide on the criteria for establishing an Emergency Headquarters in advance so that it can become operational quickly.
- Whether or not the Emergency Headquarters is in a position to function effectively depends critically on gathering accurate information rapidly. For this purpose, this Headquarters should be organized so as to permit direct communication, without interference by others, between the on-site people and top management. (If information must pass through mid-level intermediaries, not only will it take too long to reach top management, but there is danger that it will be manipulated.)
[ Procedure ]
- Decide on the functions, divisions, and responsibilities for the Y2K problem in your company's Emergency Headquarters, and enter them into Worksheet No.9.
- Include an organizational chart, names of responsible people, and names of whom to contact into Worksheet No. 10.
[ Note · Important Point ]
- It is important to have all of the equipment needed to gather and analyze information in place at the location where the Emergency Headquarters will be located, and to give orders in advance.
- The Emergency Headquarters will be located under normal circumstances inside Company Headquarters, but it must also be taken into account that Company Headquarters functions might be paralyzed. It is necessary to prepare for an alternate Emergency Headquarters location elsewhere, for example at a company branch office, if necessary.
- If a company has widely separated branches, then each branch should have its own Emergency Headquarters, with a General Headquarters within the Company Headquarters.
<Example of Company X>
Worksheet No. 9
[ Notes ]
- Functions: The structure of the Emergency Headquarters.
- Responsible Divisions: Divisions (persons) responsible for the functions.
- Roles: Responsible items.
<Example of Company X>
Worksheet No. 10
Figure 2-6-2 Organizational Chart of Emergency Headquarters Dealing with the Y2K Problem
[ STEP 7 ] Drafting Of An Action Plan Addressing The Problem's Occurrence
2-7 Drafting Of An Action Plan For "Danger Days"
1) Designating "Danger Days"
- Days, on which serious problems could occur in your company, should be thought of as important management days. The problems could affect not only your own systems and equipment, but also your customers' and even the social infrastructure.
- January 1st, 2000 is not the only a day, on which the Y2K bug can occur. Problems occur only when your chips and software are in operation. It is necessary to take measures to deal with possible problems the first time your systems and equipment operate in 2000.
- The dates given in Figure 2-7-1 below are commonly thought of as days, on which problems can occur. These days, and the days on which systems and equipment will first operate in your company in 2000, should be designated as days, on which problems are likely to occur.
[ Procedure ]
- Designate, based on reference information and the particular circumstances in your company, "danger days" in Worksheet No. 11, such as the ones given in the figure below.
[ Note · Important Point ]
- In some cases, "danger days" have already been designated by a team assigned to carry out preventive measures for simulated tests. In such a case, those days should also be designated as "danger days".
<Example of Company X>
Worksheet No. 11
[ Note ]
- Company X does its billing once a month in nighttime batch processing. Since its system will start operating for the first time in 2000, Monday, January 17th, has already been designated as a "danger day".
2) Drafting Of An Action Plan For "Danger Days"
- Having a plan of action for the danger days will permit rapid response to the problem, if a problem should occur.
- Decide on and write down the details of your company's actions to be taken on the danger days, which you designated in Section 1 of STEP 7.
[ Procedure ]
- Prepare Worksheet No. 12 for each of the "danger days" designated in Section 1 of STEP 7.
- For each of the "danger days" and each resource that is affected, decide on, and write down, what items have to be checked, who will be responsible for performing the checks, and when and where the work will be done.
- Decide on, and write down, the criteria for deciding whether a problem exists during the checks, and the channels through which notices of problems are to be circulated.
[ Note · Important Point ]
- Companies that have overseas branches can use the time difference to detect in part problems of systems and microcomputer equipment early, and take quick action to prevent the whole system from being shut down.
- Checking output on the danger days, such as the operational results (results of system management or products) by sampling will enable you to remove the cause of the problem before its impact affects your customers or business partners, and to respond quickly to the problem, which it has caused, although one can not see it at a glance.
- Whether or not it is necessary for someone to report to work on a "danger day" that is not an official working day, such as New Year's Day, to perform checks will vary from one company to another, depending on the type of industry the way the company operates, the probability of a problem occurring, and management's policy. Decide on whether or not it will be necessary for someone to report for work in your company, considering these factors.
<Example of Company X> (January 1st, 2000)
Worksheet No. 12-(1)
[ Notes ]
- Resource ID number and Resource name: These are to be copied from Worksheet No. 6.
- Work to be performed: Whether or not there will be work that day, and if so, the nature of the work is to be entered.
- Check method: Enter the method by which the check is to be performed.
- Employee responsible for check, Work time and Work place: Enter the name of the person responsible for doing the work, when it is to be done and where it is to be done.
- Criterion for assessing that a problem has occurred: Enter the specific criterion for assessing that a problem has occurred.
- Route for circulating notice of problem: Enter the channel by which notice is to be circulated, if a problem should be rediscovered.
<Example of Company X>(January 4th, 2000)
Worksheet No. 12-(2)
Figure 2-7-4 Plan for Action on Danger Days
[ STEP 8 ] Formulation Of An Action Plan Addressing The Problems' Occurrence
[ STEP 8 ] Prepare An Action Plan Addressing The Problems' Occurrence
2-8 Plan Of Action If A Problem Should Occur
- If a problem should occur, having a plan of action that clearly defines each person's responsibilities will permit rapid response and minimize losses due to ripple effects caused by the problem.
- There will be in the action plan some actions that will change depending on the timing with which they are taken. Consider the actions to be taken at each of the important transition times: [initial action], [allowable time limit of system stoppage], [time of restoration from the trouble], and [between initial action and allowable time limit of system stoppage]. It is important to decide in advance on the timing of the various actions.
[ Procedure ]
- Prepare Worksheet No. 13 for each of the resources designated in Worksheet No. 6.
- The actions, which each responsible employee is to take at each of the points in time [initial action], [allowable time limit of system stoppage], [time of restoration from the trouble], and [between initial action and allowable time limit of system stoppage] should be decided upon and written down.
- The "allowable time limit of system stoppage" is the time entered in Worksheet No. 4. It is expected that there will be many cases, in which it is essential to take action before this time.
[ Note · Important Point ]
- A separate sheet shall be prepared for each person detailing his/her specific responsibilities, if a more specific action plan is necessary.
<Example of Company X>
Worksheet No. 13
Figure 2-8-1 Plan for Action When a Problem Occurs
[ Notes ]
- Responsibility, Responsible Division and Responsible employee: Enter these into the worksheet.
- Initial action, Time between initial action and allowable time limit of system stoppage, Allowable time limit of system stoppage and System restoration time: Enter the action plan for each point in time from immediately after the problem occurs until the system is restored.
[ STEP 9 ] Organizing In-house Contacts
[ STEP 9 ] List The Emergency Contacts Within The Company
2-9 Organizing In-house Contacts
1) Prepare A System For In-house Contacts
- It is necessary to prepare a list of contact information for key company employees, including Emergency Headquarters' members, and employees, who would be involved in restoring the system to normal and switching to alternate interim means of doing the work.
- It is also important to determine the schedules on the designated "danger days" of these key employees.
[ Procedure ]
- Using Worksheet No. 14, list the contact information for key company employees, who would be involved in crisis management.
- Contact information should include secondary contact information, such as mobile telephone numbers.
- This worksheet should also be used to supervise schedules on designated "danger days".
[ Note · Important Point ]
- The list must include top management officials (or alternates), who have the necessary authority to make in an emergency decisions quickly.
<Example of Company X>
Worksheet No. 14
[ Notes ]
- General category: Enter the responsibility at Emergency Headquarters' level.
- Detailed: Enter the responsibility on a detailed level.
- Name: Enter the name of the responsible person.
- Primary contact: Enter the person's primary contact information, such as home telephone number or mobile telephone number.
- Time and place of whereabouts on the designated "danger date": Enter the person's schedule (whereabouts) on each designated "danger date".
2) List Contact Information For Service Providers.
- If an emergency occurs, it will become necessary to quickly contact service providers for each resource (manufacturer, vendor, external service provider, and so on) for help in determining the cause of the trouble, information on the prospects for system restoration and starting the restoration work.
- For this reason, it is necessary to prepare for each resource a list of contact information on the service providers.
[ Procedure ]
- Enter the contact information on the service providers into Worksheet No. 14, which were obtained in the survey of service providers carried out in Section 2 of STEP 4.
[ Note · Important Point ]
- If a problem actually occurs, service providers should be contacted from the Emergency Headquarters, NOT from the work site. (This procedure permits all of the relevant information to be coordinated at Emergency Headquarters.)
- If a problem occurs in a resource, which is used by many industries, such as the social infrastructure, there is danger that the public contact office of the industry concerned will be deluged with inquiries to the point that normal telephone contact will be obstructed. For this reason it is necessary to designate a single person to be responsible for contacting that service provider and, if the line is busy, to wait for a while before attempting to contact them again.
<Example of Company X>
Worksheet No. 15
Figure 2-9-2 List of Contact Information for Service Providers
[ Notes ]
- Resource ID Number, Resource name and Name of service provider: Enter these from Worksheet No. 6.
- Responsible Division and Name of responsible individual: Enter the names of the responsible Division and the responsible individual.
- Contact information: Enter the contact telephone number.
[ STEP 10 ] Plan For Resources To Deal With The Emergency
[ STEP 10 ] Prepare A Preparatory Plan Covering The Resources Necessary For Implementing The Countermeasures
2-10 Plan For Resources To Deal With The Emergency
- Organize the equipment, supplies, records, and so on the detailed emergency plan sheet which was prepared in Section 2 of STEP 5, and prepare a plan.
- In some cases, the plan for dealing with an emergency will involve not only a plan for switching to alternate means of doing the work, but also a plan for reduced operations that require advance preparation (Section 1 of STEP 5). Such plans should also be included in the list.
- Depending on the kind of preparation involved, it might sometimes be necessary to place orders with suppliers and wait up to several months for delivery. It is important to make such preparations well in advance so that there will be no difficulty in meeting any deadline.
- It is necessary to begin preparations well in advance to allow time for training, including dry runs.
[ Procedure ]
- Copy the "Necessary resources" section of Worksheet No.8 that was prepared in Section 2 of STEP 5, into Worksheet No. 16.
- Copy the "Operations reduction plan" section of Worksheet No. 7 that was prepared in Section 1 of STEP 5 into Worksheet No. 16.
- Designate a time limit for preparations and the responsible Divisions and individuals.
- Use the "Progress" column in Worksheet No. 16 to monitor the progress of preparations.
[ Note · Important Point ]
- If the system data base is to be used as a source record and printed out, portions of the data base that are updated every day could become meaningless as time passes after the data are printed out. An example is the inventory supervision records. It is necessary to obtain the latest versions immediately before the designated "danger days" (for example after work is finished on the immediately preceding work day).
<Example of Company X>
Worksheet No. 16
Figure 2-10-1 List of Resource Preparation Plan
[ Notes ]
- Preparation ID number: Numbers are assigned for administrative purposes. In this example, a different series of identification numbers is assigned to operations to be performed for work reduction.
- Purpose: Whether a particular operation is for switching to an alternate means of working or for work reduction is entered, in order to make it easier to distinguish among the purposes of the operation.
- Procedural step number: Enter the procedural step number of every step that will use resources.
- Remarks: Enter the necessary quantities, and so on. If additional details are needed, they might best be entered on a separate appended sheet.
[ GOAL ] Document The Plan
[ GOAL ] Document The Plan
2-11 Document The Plan
- Prepare a "contingency plan" that incorporates all of the details prepared thus far as a completed document.
- After the plan that was prepared has received the approval of management, distribute it to the relevant Divisions and company employees.
- Double check to make sure that everybody who needs to have a copy of the plan, receives one.
- It is also necessary to consider producing crisis management manuals that contain only those items from the danger management plan that will be needed to permit employees at their work stations to respond effectively in case of a crisis.
- There should be one for supervisors that includes the crisis response policies, responsibilities of supervisors and specific actions, which they will be required to take; and another for ordinary employees that contains basic precautions and simplified descriptions of the roles that each employee must play.
[ Procedure ]
- Organize the contents of the worksheets prepared in accordance with this guideline, referring to Chapter 4 (Example of A Contingency Plan), into a formally written Contingency Plan.
- It is also possible to prepare from the basic Contingency Plan detailed plans, for example for alternate work procedures, as separate documents.
3. Steps To Be Taken After Having Drafted The Contingency Plan
Approve And Budget The Plan
3-1 Approval And Budgeting Of The Plan
- Once the plan has been formulated, it must be approved by the CEO and then announced within the company in the name of the CEO. Announcing it in the CEO's name will put all employees on notice that the plan is official and that it must be implemented. It also serves to inform employees that the company is determined to deal effectively with the Y2K bug problem and make it into the 21st century.
- A budget must be provided for, at the same time, for preparatory measures, employee training and awareness activities. It is important that this matter be approved by the CEO as a special budget. If budgeting is left to the Divisions, there is a danger that preparations will be incomplete.
Implement Advance Preparations Prior To Countermeasures
3-2 Implementation Of Advance Preparations
- Implement the prior preparations planned in STEP 10 (Plan For Resources To Deal With The Emergency).
- Check the progress of the preparations periodically to make sure that all of the preparations will be completed in time.
Review And Revise The Plan
3-3 Review And Revision Of The Plan
- It is necessary to review the Contingency Plan that has been prepared within appropriate time intervals.
- Information regarding the readiness of systems and microcomputer equipment, and the situation regarding customers and the social infrastructure, as well as information concerning the probability of a problem occurring, will be announced from time to time, as the year 2000 approaches. It is possible that it will become necessary to strengthen elements of the plan; conversely, it might become possible to relax elements of the plan.
- It is important to review and revise your contingency plan into an upgraded version that focuses on the most serious risks, as updated information becomes available.
- Aside from substantive developments regarding the Y2K bug problem and preparations, it is possible that, for example, reassignments of employees might make it necessary to change the names of responsible individuals in the plan. It is necessary to update the plan based on the latest information, and make sure that the updated information is distributed to all employees.
Educate And Train
3-4 Implementation Of Education And Training
- It is necessary that the plan be executed effectively in case an emergency occurs. An armchair theory is meaningless. It is important to train employees for the realization of the plan.
- Training makes all employees aware of their roles and responsibilities.
- Training also exposes inadequacies in the Contingency Plan, making it possible to revise the plan as it becomes necessary.
- Training is an activity that makes all employees aware of their roles as well as the purpose of the Contingency Plan, using the Contingency Plan and the Crisis Management Manuals based on it. Hold explanatory meetings and implement exercises using electronic media to accomplish these purposes.
- Training can be divided into desktop training and practical training. Desktop training involves members of the Emergency Headquarters, who assemble and simulate their responses to an actual emergency. The advantages of doing this are that it does not take much time, and it is possible to simulate a variety of scenarios. Practical training tests the ability of the individuals, who will have to respond to the crisis to do their respective jobs, using actual equipment. In particular, if the plan calls for some jobs that are normally computerized to be done manually on an emergency basis, it is likely that the people, who have to do the work, will not be accustomed to doing it manually, and that they will need practice.
4. Sample Of A Contingency Plan
Sample Of A Contingency Plan (Example Of Company X)
4. Sample Of A Contingency Plan
- An example of a Contingency Plan of the hypothetical Company X, which is based on this guidelines, is presented below. This example is for reference only. The actual content and format must be matched to the circumstances of your company.
Contingency Plan for the Y2K Problem
Month Day, 1999
Company X; K.K.
<Contents>
1. Purpose of the Contingency Plan
2. Operations that are affected by the Plan
3. Resources that are affected by the Plan
4. Anticipation of problems that might occur
5. Policy toward dealing with the problems
6. Designation of "danger days"
7. Establishment of the system and role of an Emergency Headquarters
8. Action plan for the designated "danger days"
9. Action plan for when a problem occurs
10. Plan for prior preparations
11. Employee training
12. Revision of the plan
Annex)
Annex 1: List of affected work operations
Annex 2: Detailed plans to be carried out when a problem occurs
Annex 3: List of emergency contact telephone numbers within the company
Annex 4: List of telephone numbers of service providers
1. Purpose of the Contingency Plan
This plan aims at keeping the core operations of this company going in case the computer Y2K bug problem connected with the year 2000 occurs, and it aims at minimizing the damage to this company by restoring to normal affected operations.
2. Affected operations
This plan aims mainly at the following core operations of this company.
1) Order receiving
2) Purchasing
3) Production, and
4) Shipping and delivery.
3. Resources that are affected
The plan concerns the management resources listed below, which are essential for carrying out the core operations listed above, which are vulnerable to being affectedby the Y2K bug problem. It includes both, in-house resources and external resources (other companies, with which we do business, and the social infrastructure).
Figure 4-3-1 List of Affected Resources
4. Anticipation of problems that might occur
The problems that can be anticipated in the resources, which are addressed in this plan, as well as the time span over which they would stop functioning, if a problem occurs, are listed below.
Figure 4-4-1 List of Anticipated Problems
5. Policy regarding actions to be taken, if a problem occurs
The actions that are to be taken in case a problem occurs in any of the resources covered by this plan are described below. These actions include not only the actions to be taken after the occurrence of a problem, but also the actions to be taken in advance, in order to minimize the impact of a problem, if one should occur.The preventive actions, which were taken in advance, in order to prevent problems from occurring in the first place, have been omitted here, because they are covered in the separate "Plan to deal with the Y2K bug problem".
1) Basic policy
The resources that are affected by this plan are essential to the conduct of business.It is necessary, in principle, to prepare a plan for continuing the conduct of businessby alternate means, if necessary. It is necessary for the case of all those resources, in which the probability of a problem occurring is considered very high, to take specific action with a view to reduce the impact, and it is as well necessary to prepare a plan for continuing the conduct of business by alternate means.
2) Policies regarding actions to be taken for each affected resource
The following actions shall be taken for each affected resource.
Figure 4-5-1 List of Actions to be taken
6. Designation Of "Danger Days"
In contrast to ordinary disasters, it is possible to anticipate the days, on which the Y2K bug problem is likely to occur. This hypothetical company has designated the following "danger days", on which there is a relatively high probability of problems occurring, and it is conducting checks and making preparations with emphasis on these dates.
Figure 4-6-1 List of Designated "Danger Dates"
7. Establishment And Role Of The Emergency Headquarters
An Emergency Headquarters is to be established so that, when a problem occurs, the whole company can be mobilized and swift judgment exercised.
1) Location at which Emergency Headquarters is to be established
The Emergency Headquarters shall be established in the conference room next to the President's office on the 3rd floor of the Company Headquarters building. If it is impossible for the Emergency Headquarters located there to function, then the Factory Director's office on the 1st floor of the factory shall be used as an alternate location.
2) Criteria for establishing the Emergency Headquarters
The Emergency Headquarters shall be established in the following cases.
(1) From the start to the end of business on all designated "danger dates".
(2) If a problem occurs in any of the resources covered by this plan.
3) Organization of the Emergency Headquarters
The Emergency Headquarters shall be organized as illustrated in the following Figure 4-7-1.
4) Functions of And Roles within Emergency Headquarters
The functions and roles of each member of the Emergency Headquarters are as indicated in the following Figure 4-7-2..
Figure 4-7-2 Functions and Roles within the Emergency Headquarters
8. Action Plan For The Designated "Danger Dates"
Checks related to the designated "danger dates", on which there is a high probability of a problem occurring, should be performed according to the following schedule.
1) January 1st, 2000
Action Plan for Designated "Danger Dates" (1)
Figure 4-8-2
2) January 4th, 2000
Action Plan for Designated "Danger Dates" (2)
3) The remaining items in this document have been omitted here.
9. Plan For Action When A Problem Occurs
If a problem occurs in any of the resources covered by this plan, the responsible individuals shall deal with it according to the following procedure.
1) Resource ID Number S4 (Order receiving supervision system)
Figure 4-9-1 Plan for Action when a Problem Occurs
2) Additional items in this listing are omitted here.
10. Plan For Advance Preparations
The operations listed below shall be carried out, in order to prepare the resources, for which there is a need to respond to problems as set forth in this plan.
Figure 4-10-1 List of Plans for Preparation of Resources
11. Employee Training
1) Employee Awareness Education
Based on this plan, a "Y2K Bug Danger Response Manual" with regular employees as the target group should be prepared and distributed, in order to deepen understanding of the Contingency Plan. In addition, regular employees must be made thoroughly aware of the necessary precautions.
2) Employee Training
Training based on this plan shall be conducted according to the following schedule.
(1) Emergency Headquarters simulation drill
Date: Month X Day X
Participants: Emergency Headquarters members
Detailed plan: A desktop simulation drill shall be implemented, which envisions the occurrence of an actual problem.
(2) Alternate means of operation drill
Date: Month X Day X to Month Y Day Y
Participants: Divisions involved in implementing the alternate means of operations
Detailed plan: The procedure shall be tested that would be used to switch to alternate means of operations, should a problem occur, as well as the actual use of the alternate means of operations.
12. Revision Of This Plan
This plan shall be reviewed in Month X taking into full account the progress that hasbeen achieved in taking the necessary measures with regard to each resource and the probability of each type of problem occurring, and the response plan shall be strengthened or relaxed as indicated.
<Annex>
Annex 1: List of affected operational procedures
1) Order receiving operation
2) Purchasing operations
Items on this list are omitted here.
1) Order receiving and ordering systems (inventory checking)
Annex 3: List of Emergency Contacts
Annex 4: List of Contact Numbers of Service Providers
Annex Figure 4 List of Contact Numbers of Service Providers
5. Checksheets
The checksheets are for the purpose of scrutinizing relevant conditions in your company, and for using the results of this process in your Contingency Plan.
6. Worksheets
6. Worksheets
The following worksheets have been designed for use in the Contingency Plan.
They are used in this guidelines as design samples for the X Corporation. Utilize those worksheets for designing your company's own Contingency Plan. The shadowed areas in the worksheets suggest that you can copy the last results into those areas.
7. Glossary
7. Glossary (in the Japanese alphabetical order)
- Designated "danger date" ... A date, on which there is a risk that a problem will occur in a resource that is being used. Also referred to as a ZERO-DAY.
- Maximum allowable stoppage ("stand still"; "out-of-order") time ... The maximum allowable time, after a problem occurs in a resource and the resource stops functioning, after which operations must be resumed. Determined by the frequency with which the resource is used.
- Impact reduction strategy ... A strategy formulated in advance, in order to minimize the loss, if a problem should occur.
- Service provider ... A manufacturer or vendor, which provides a system or equipment to one's own company, or an industry or business entity that provides a service, such as electricity or communications, is referred to in this guideline by the generic term "Service Provider".
- Resource ... Systems, equipment, services, social infrastructure, and so on that are used in business operations, are referred to in this guideline under the generic term "Resource" or "Business Resource".
- Progress in taking action ... Progress in taking preventive action to prevent the Y2K bug from occurring in a given resource or in taking other appropriate action (including the formulation of a Contingency Plan). The probability of a problem occurring in that resource and the time required after the problem occurs until the system is restored can be anticipated to some extent by checking on such progress.
- Alternate means of operations ... Means of operations, which are used as a substitute for a resource, in which a problem occurs, causing that resource to stop functioning.
- Vendor ... A business that supplies computer systems or other equipment to our company.
- Simulation test ... Testing of a resource, in which the Y2K bug might occur; the operation is tested by setting the date to a "danger date".
- Occurrence of a problem ... The occurrence of a condition, in which a resource cannot continue to function normally, with the Y2K bug being the cause of this problem. This is distinguished from a condition in which, if a system stops operating or an error occurs, one can at least expect some kind of output from the system.
- Preventive action against the Y2K problem... Actions that are taken in advance, in order to prevent the Y2K bug from occurring in a business resource. This refers specifically to such actions as having software or hardware modified or replaced, or running a simulation test.
Back