United States .. v
. Environmental Protection
Agency . .
Solid Waste arid
Emergency Response
(5305W)
EF*\530-F9B-027.
October 1998 -
: http://wwwLepa.gov/osw
3 EPA Preparing for the Year 2000:
Y2K
Computer programs and microchips have traditionally
been designed to display date code as the last two digits
of the year, e.g., 98 instead of 1998. Originally welcomed
as a cost- and space-saving feature, this programming step
•may trigger a broad range of problems as we enter the next
century. Many computers (and micnocMp-controlled
devices) will consider the year 2000 (or 00) as the year ;
1900 while others may not be able to switch from 99 to
';00atalL"•.'.-.,; .*-'/;•;v-V:':• • v' V "•• ,'.;.:.•! Jj-i'-J/-:,\;.
To date, these has been a tremendous amount of discus-
sion about Year 2000 (or Y2K) problems associated with
banking, utilities, defense systems, and manufacturing; •
however, relatively little public discoursehas focused on ;
Systemsdesigned to protect^eenvfaDmneniThe^waste •--;.
mamgement industries, generators,troatere, and lecyders
are!isvumerabletoY2Kd'isruptionsasany--witli
'
;., however, steps that you can take now to mitigate these
Recognizing the potential problem and assessing its
•impacts are essential to ensuring that your waste inanaige-
environment into the nextcehtuiy. ; ••: : .
Before checking specific components of jour system
for Y2K readiness, take time to plan your assessment.
Suggested steps include the following:
ttee of staff
Identify a staff member or a
members to take charge of the assessment
Youir technical support staff are ideal candidates, zis well
as employees who originally installed or implemented
components of your system. A . j ! ; v '•'•-"•
Inventory components of your system that
could be vulnerable to Y2K disruption. EqMp-
ment may include automated process control systems,
tracking software, or monitoring equipment run by
embedded computer chips. If your equipment was
purchased or upgraded recentiy it may be Y2K compliant,
Check with your supplier, installer; or equipnient
IViofitize the risks to your business Of each :
potential threat What are the financial and ;
* - i • .*•*,„". . " • , -* *•'••'• • •• " - ' ' '• - i
-------
What Are Potential
Problem Areas?
* •' - . -
vwste management equipment at your site that may
be threatened by Y2K disruption includes computer-
controUed or microchip-controlled systems. Check the
following equipment at your site for Y2K problems: ":
, Q Security systems s . . •
Q,Safely shutdown systems •
(e.g., automated freeboard control)
Q Automated leak detection devices ,
Q Groundwater monitoring • . '
. (e.g., data transmission to permitting facility)
' * t m . t • • J '
Q Laboratory analytical equipment
• Q Software used in automated reporting •
Q Reoad!l««^)ing, reporting, and tracking systems
„ Q Vfcste treatment operating equipment .-'•
Q EtectronicaDy controlled valves
Q Emissions monitoring equipment and control devices
(e.g., continuous emission monitors)
Q landfill gas flares. , .
• In addition, the Y2K readiness of business associates must
be considered. When planning your evaluation, consider
. .thefolowing:' • -..••-.. "/'."' ''..•. I- : ",;• ''•'.'
Q Those companies whose waste you manage
'• ' (generators) or who 'manage your waste .
* , * ,y * ' «• , ' "
Q Vendors and suppliers (e.g., lab supplies, . .
containers, or computer software) , •
, Q \A^ste transporters (to and from site)
- , <^ , - • ... .- .-• **•• -•""••• . •. .•'—.-'•
Q Loading and distribution systems : >
(fleet management,, route management, .
• collection, and scales) ' ' . :
Q External financial and insurance programs
(e.g., financial assurance data)
Q Communications providers
Q Utilities systems (electricity, natural gas,
water, sewage, grid stats, etc.). •„
Real Solutions
i •. •.'•.'.
Even though most waste manage- .
ment systems'employ moniitoring
. and control systems that ar? not date-
related, it's important to validate this
fact to maintain the public sconfi- •
dence m your companysal>ility to protect human health
arid the environnaent. Mission-critical systems can reach
beyond the realm of internal business operations; as
illustrated by the following real-life examples.
•. The operating system of a recycling facility shut down
; when the software prognun that it vised to regulate
. temperature control did not recognize the 366th' day of
a leap year. On New Year's Eve, 1996,660 process
control computers ceasedto operate on the stroke of ;•
'midnight. The system had to be ojxoated manually
until the source of the problem was located, during
which time equipment was damaged from overheating.
. The. damaged, equipment had to be replaced at a cost of.
• more than $1 million. Allthough this is a "leap year"
failure, it is a dramatic d(!monstratidnofthesoi1:of
problem that could cKxnir if computer programs fail to
recognize the year 2000. ; / ••"' •'•'''-_ .; : :;.•-''': ';•,,.,:*•';
*-A waste treatment fadHtjrperfonnecl a five^te simple
assessment that revealed date-sensiti'/e equipment such
, as incinerator control systems, lab testing equipment,
— gas chromatographs, alarm systems; and utilities. As a
result of this finding; this facility has; instituted a:,
; combination of centtcdiziid program Tnanagemeriit and •
local site management of Y2K assessments to ensure
uninterrupted operations when the Year 2000 arrives. '
------- |