Theme Article: Computing and Capitalism

Distributing Liability: The Legal and Political Battles of Y2K

Dylan Mulvin London School of Economics and Political Science

Abstract—In 1999 the United States Congress passed the Y2K Act, a major—but temporary—effort at reshaping American tort law. The Act strictly limited the scope and applicability of lawsuits related to liability for the . This article excavates the process that led to the Act, including its unlikely signature by President Clinton. The history presented here is based on a reconsideration of the Y2K crisis as a major episode in the history of computing. The Act, and the Y2K crisis more broadly, expose the complex interconnections of software, code, and law at the end of the 20th century, and, taken seriously, argue for the appreciation of the role of liability in the history of technology.

& It’s almost a betrayal. After being told for The United States’ “Y2K Act” of 1999 took years that technology is the path to a highly drastic steps to protect American companies evolved future, it’s come as something of a shock to discover that a computer system is from lawsuits related to the Year 2000 Problem not a shining city on a hill - perfect and ever (the “Y2K bug”).3 Among other changes, the new - but something more akin to an old Act gave all companies ninety days to solve any farmhouse built by bit over decades by Y2K malfunctions, capped punitive damages, and non-union carpenters.1 stipulated that legal and financial responsibility –– Ellen Ullman, “The Myth of Order” Wired, would have to be distributed proportionately April 1999 among any liable companies. These changes shielded larger and richer companies from law- It’s the bug that finally gives lawyers the opportunity to rule the world, 2 suits where their role was deemed marginal while simultaneously increasing the burden of proof on –– Evelyn Ashley, at a meeting of the Ameri- any potential claimants. can Bar Association, 1998 The lead-up to the year 2000 was marked by urgent warnings about the potential damage of Digital Object Identifier 10.1109/MAHC.2020.2973630 Y2K errors and the unpredictable harm and suffer- Date of publication 27 April 2020; date of current version ing resulting from the interweaving of computing 4 21 August 2020. technology with everyday life. As one response

26 1058-6180 ß 2020IEEE PublishedbytheIEEEComputerSociety IEEE Annals of the History of Computing to these fears, the Y2K Act was meant to stave off a “Tort law” refers to the adjudication of civil potential crisis in liability and insurance claims. suits where the law provides a framework for the Beyond this, the Act was a major policy feat and a remedy of a “wrong.” In practice, tort law exposes significant gain for proponents of tort reform, i.e., prevailing social norms about what constitutes an limits on the scope and applicability of liability. unacceptable wrong and what constitutes fair From a historical perspective its passage provides compensation for being wronged. As Lochlann useful insight into the role that legal liability, torts, Jain argues and insurance play in the political management Tort laws hold a peculiarly vital place in the and mitigation of technological breakdown. United States, given–undoubtedly as a result This article approaches the history of comput- of––the lack of universal health care coverage, the dearth of regulatory bodies... ing through the largely forgotten process that and the particular qualities of money, which brought the Y2K Act into law. Passage of the Act can mutate in purpose from compensation was opposed by entrenched political interests, to punishment.6 including American trial attorneys, consumer advocates, and many members and officials within Thus, plaintiffs “earn” compensation for being the Democratic Party. The eventual success of the wronged and the state plays the pivotal role of Act’s passage involved unflinching support from defining certain wrongs and stipulating under the Republican Party and intense lobbying from which conditions compensation (punishment) their allies within American industry. Among might be limited. Lawrence Friedman argues that the most vociferous in their support were the one of the grand changes in 20th century Ameri- US Chamber of Commerce and a coalition can society and, with it, American law, was the of technology companies, who exercised their greater demand for legal justice seen in the law of increased political clout. The episode also torts: included a lengthy courtship, as both major Amer- ican political parties sought to use Y2K as an A general expectation of justice, and a opportunity to align themselves with a newly pow- general expectation of recompense for 7 erful tech industry. Despite vowing to veto the bill injuries and loss. that became the Y2K Act, President Clinton’s sig- nature marked what several commentators In the 19th century American law was far described as an unprecedented act of tort reform. more favorable to businesses over individuals From the vantage point of the present, the Y2K and workers. By contrast, 20th century torts gen- crisis is often dismissed as a false alarm and a erally embraced the principle that the liable had product of hysteria and misinformation. Taken to accept responsibility, coinciding with a higher 8 seriously, however, the crisis can better be under- level of labor and consumer organisation. In stood as a major episode in the history of comput- other words, in different eras liability law either ing, the management of infrastructure, and the acted as a safety net for corporations or for con- grassroots effort to educate diverse publics in the sumers and workers. The beneficiary in either contingency of technology. As the controversy case won protection through political clout. surrounding the passage of the Y2K Act shows, the The law of torts can condition the ways tech- crisis also exposed the complex interconnections nologies are developed, built, and used. Since of software, code, and law. This article approaches uncertainty can stanch capital and limits on liabil- the Y2K Act as the convergence of two stories ity can accelerate how an industry invests capital, about Y2K and late-20th century American politics, the legal coding of a market economy can deter- capitalism, and the distribution of responsibility. mine which assets are “placed on steroids.”9 The first story is one of technological malfunction Against the backdrop of what Tom Streeter has and its repair, in which the unpredictable but called a “corporate liberal technology policy” lia- potentially dire consequences of Y2K-related bility for computing’s ills became a new political breakdown compelled a global effort at software obstacle.10 The Y2K crisis presented a challenge 5 and hardware remediation. The second story is a to the social expectations surrounding both liabil- story of the normal functioning of American tort ity and the normal functioning of technology. By law and the ways that this functioning threatened the mid-, it had seemed that liability for the stability of an American industry. computer-caused injury was a “nonstarter” and

July-September 2020 27 Computing and Capitalism

claims of economic were similarly ineffective.11 cascading system failures. As Edwards indicates, The Year 2000 Problem tested these presumptions the discomfiting nature of the crisis, for experts, by recasting the categories of injury, negligence, was connected to the dread of its worst case sce- and consumer in the context of the increasing narios, and, just as importantly, its profound everydayness of computerized infrastructure. uncertainty. Only the naı¨ve and the cavalier pre- The history of the Y2K Act provides a roadmap for tended to know exactly what would happen. As writing the history of computing through the lens Stephen Graham and Nigel Thrift argued, “during of legal responsibility and risk management. the Y2K crisis, even computer and software engi- neers often had little idea of the full archaeological sedimentation of decades worth of software within YEAR 2000 PROBLEM their computer networks.”15 Leading up to the year 2000, news outlets, gov- The uncertainty of Y2K errors was augmented ernments, and experts from across technical and by speculations about its root causes. Though financial industries warned that the world might blame is often singularly attributed to the six-digit experience widespread computer failures due to a format, the widely distributed antecedents to the common coding practice originating from the late Y2K crisis include economic imperatives, bureau- 1950s and early 1960s. In programming languages cratic decisions, haphazard coding techniques, a from this period, including FORTRAN and COBOL, lack of managerial oversight, and scant attention 16 programmers could choose to represent dates in paid to software maintenance. All of these fac- six digits instead of eight: DD-MM-YY, or, often: tors (among others, surely) contributed to the use YY-MM-DD. The representation of the century as of six digits as a de facto standard. For instance, two digits created unknown but potentially cata- six-digit dates were provided as the reference for- strophic consequences if computers still running mat within the data division of the revised COBOL 17 older software, or employing embedded chips, specifications for 1961 and were enshrined as were forced to reckon with a century field contain- standard bureaucratic practice in 1968 when the ing only “00.”12 National Bureau of Standards published the Fed- Writing in 1998 Paul Edwards used the occasion eral Information Processing Standards Publication 18 of the Year 2000 Problem to discuss the ways 4. The twin uses of six-digit dates within coding “computers have become, as it were, the infra- manuals and government guidelines helped structure of our infrastructure.”13 Unlike other, cement them as a norm but (mostly) went uncom- traditional infrastructures, Edwards argued, com- mented upon for decades to come. puter infrastructures operated at a “meta- In the typical story about the Y2K crisis, the level” that pervaded social institutions through choice to compress century dates is often attrib- “internetworks.” While earlier glitches and break- uted to the cost of computer memory in the downs had exposed the internetworking of, say, 1960s. The choice to remove two additional dig- financial industries or military systems, the Y2K its is less controversial if we imagine the savings crisis threatened chaos at a potentially global scale of eliminating those digits across thousands or millions of entries within a single government or The results are unpredictable. Spectacular business database—like those of the Social Secu- breakdowns in everything from military rity Administration, an insurer, or a bank. Others command-control systems to Internal Revenue Service tax computations are argue that the cost of memory in the 1960s was highly likely. Microprocessors embedded in inflated by IBM through their practice of bun- everything from automobiles to elevators dling cheaper CPUs with a small amount of mem- may fail. Rumor has it that some airlines are ory, and charging more for additional memory, not accepting flight reservations for January 19 1, 2000, for fear of major confusion in the for which their profit margin was much higher. worldwide air traffic control system.14 Regardless of the target of blame there is no sin- gle cause of Y2K but rather a range of causes The structure of the Year 2000 problem was related to the representation of dates in digital almost perfect for generating anxiety: it combined systems and in formal standards. a definite date with indefinite dangers and the The first warnings about two-digit century internetworking of computers made it virtually dates came in the early 1970s. , a com- impossible to adequately model the fallout of puter programmer, member of CODASYL, and a

28 IEEE Annals of the History of Computing longtime employee of IBM, Univac, General Elec- the records of the Center for Y2K and Society––a tric, and , claimed to be the first Cas- group of concerned citizens, convinced that the sandra of potential problems, writing in the fallout of Y2K errors would be disastrous––and Honeywell Computer Journal in 1971: the International Y2K Cooperation Center––an organization funded by the World Bank and com- The 4 digits of “year” may be reduced to 2 mitted to assuaging fear and uncertainty. Both digits for “year of the century”, or to 1 digit for “year of the decade.” It should be organizations contain evidence of self-reflection obvious, however, that extreme caution from the post-2000 period. And although their pre- should be exercised in using these dictions about January 1, 2000 diverged, both options for mechanical processing.20 groups claimed that the process of Y2K prepara- tion was a unique experience of collective Bemer later repeated this warning in Interface action.25 Some have also recently suggested that Age in February 1979, with more specificity: the organized response to the threat of Y2K is a don’t drop the first two digits for computer potential model for organizing in response to cli- processing, unless you take extreme care, mate change.26 remembering that it’s only the “year of the Y2K, then, is a fascinating historiographic century”. Otherwise the program may fail from ambiguity in the year 2000.21 challenge. Although we now know what did not happen—global infrastructural chaos—we can Beyond Bemer’s alerts, there were only scat- never be certain about what may have hap- tered warnings about impending Year 2000 pened. Although Y2K errors did not lead to Problems in the 1970s and 1980s. Though some infrastructural collapse, there were still conse- rang alarm bells––Peter De Jager’s 1993 article, quences of broken code. In the United Kingdom, “Doomsday 2000,” in Computerworld stands out–– Y2K errors in the PathLAN system at Sheffield’s it was not until the mid-1990s that Y2K started to Northern General Hospital led to 154 expectant receive widespread coverage.22 The Bank of Amer- mothers receiving incorrect results for prenatal ica offered a plaque to the first employee to find a tests. At least two terminations were carried out Year 2000 problem in the 1980s, but did not start because of the dating error.27 Despite such inci- remediating their own code until 1996.23 By the dents, Y2K is widely remembered as a punchline late 1990s, however, a true “Y2K crisis” had taken to the 1990s and an artifact of millenarian hyste- hold, with the Gartner Group predicting as much ria. Louis Menand recently referred to the crisis as $600 billion in worldwide repair costs— as a “nutty cocktail of digital overthink and although the actual total may have been much Luddite .”28 This view is too sim- lower.24 In response to the threat of uncertainty, plistic. Not only does it ignore the effort to governments, corporations, community groups, remediate potentially hazardous code, and the and nongovernmental organizations launched actual costs of computing errors, it misses the massive repair programs, as well as educational fact that Y2K was a significant moment of crisis campaigns meant to prepare populations for infra- planning and management. The crisis also structural malfunction. served the invaluable purpose of exposing the Post-2000 analysis often treats the fear sur- perception of the “near immortality of computer rounding Y2K as hyped-up Fear, Uncertainty, and software” and the intricate networks of technical Doubt (FUD). But another view, that of the anti- and legal responsibility implicated by computer FUD, treats the remediation effort as a period of systems.29 The elusive nature of computing worldwide software repair, hardware replace- errors has been noted by historians of comput- ment, and public computer literacy campaigning ing (Volmar & Dick 2018); however, we need to meant to train individuals in understanding the understand how this elusiveness plays out nature of the crisis. Researching the crisis over beyond patches and repair. In some cases, mal- recent years, I have been struck by buoyant post- function seeps out into the legal sphere, where mortem memos and reports: celebrations of inter- solutions take a different form. The political bat- departmental cooperation and the acceptance tles over Y2K liability, then, record the seepage that the lack of largescale breakdown would mean of computing malfunction, and the desperate that the preparatory efforts would never be fully desire to control some––any––dimension of its appreciated. The Charles Babbage Institute holds aftermath.

July-September 2020 29 Computing and Capitalism

THE LAWSUIT PROBLEM had been filed in connection with Y2K malfunc- In July 1997, the Michigan-based supermarket tions: these included six claims against Intuit Inc. Produce Palace filed a lawsuit against the manu- for older versions of Quicken, and claims against facturer of its new cash register system, TEC Symantec Corp. for its Norton AntiVirus software. America. At the core of the complaint was the There were also claims from stockholders made claim that the TEC registers would crash and against companies that the claimants argued, remain inoperable for as many as five hours after exaggerated their ability to generate Y2K-related attempting to process credit cards with expira- business.32 There was growing evidence that 30 tion dates after 1999. In other words, Produce demonstrated that any technical repair effort Palace claimed that the register system was not existed alongside a growing legal fight, which for Y2K compliant. Produce Palace v. TEC was memo- technology companies and their insurers, repre- rialized as the first Y2K lawsuit. sented a massive hazard, and for trial attorneys, Produce Palace asserted claims against a lucrative opportunity.33 TEC for breach of warranty, violation of the It is in this context that liability became the Magnuson–Moss Warranty Act, violation of the focal point of debate. In to legal liability Michigan state consumer protection act, breach for malfunction and breakdown, there was fear of duty of good faith, negligence, misrepresenta- of a “second order” liability fight between insur- 31 tion, and breach of contract. TEC claimed that ers and speculation that engineers could be held they had no contract and no warranty with Pro- liable for any failures in equipment they had duce Palace. TEC promptly cross-claimed against specified—even if they had no role in its installa- All American Cash Register, the vendor who tion or upkeep.34 As Y2K approached, insurers installed the system, and counter-sued Produce sought to limit their coverage for errors associ- Palace, claiming the lawsuit was frivolous. Many ated with Year 2000 Problems. In one policy carve- months later, after a judge had dismissed several out proposed by the American Association of of Palace’s claims, the parties settled for $250 000, Insurance Services, it was suggested that the with TEC paying $240 000 and All American paying “insurer will not pay for property damage, per- the remaining $10 000. sonal injury, or advertising injury resulting from Despite the settlement and the judge’s dismiss- the failure of any electronic data processing als, Produce Palace v. TEC seemed to indicate two equipment or to correctly rec- emerging realities: first, that potential year 2000 ognize any encoded, abbreviated, or encrypted problems would be mundane and quotidian just date or time.”35 This exclusion was so broad that as much as they might be catastrophic, second, it could be interpreted to include not only Y2K that even a relatively small computer system (like errors, but any fault related to the encoding and one for processing payments in a grocery store) interpretation of stored dates and times. could expose a tangle of responsibility, as a range In the growing legal literature from the of intermediaries were involved in the manufac- period, Palace and the subsequent lawsuits aug- ture, installation, and ongoing upkeep of both the ured a “looming definitional battle” over the key hardware and software. This meant that pinpoint- liability categories of tangible property and ing blame for a malfunctioning system could physical injury, alongside knotty questions of become both a technical challenge and a legal con- causation.36 Writing in the Emory Law Journal Jef- test. And yet, despite this ambiguity, TEC found frey Stempel argued that the determination of a itself paying out a settlement for a system that it physical injury threshold and the locus of causa- had not installed to a grocery store with which it tion would likely be most prominent: did not have a contract. Perhaps most conspicuously, then, Produce For example, in a case like Produce Palace, where Y2K problems caused the cash registers Palace showed that within the complex arrange- to freeze and become inoperative, was there ment of software companies, hardware manufac- “physical injury” to the cash registers and turers, vendors, and contractors, the costs of related supermarket equipment? Most courts Y2K errors might inevitably redound upon com- would probably say yes. Even though the injury is not initially apparent to the eye, it is panies that could most easily afford to pay settle- clear that the equipment is not working once ments. This was borne out in the lawsuits that the twenty-first century credit card is scanned followed. By September 1998, at least 16 lawsuits into the system. The malfunction of the

30 IEEE Annals of the History of Computing cash registers at that point is like a engineers have long seen as the core of the Y2K machine that stops working because of a problem.”38 Together with the ambiguity about broken rod inside. The owner cannot see how matters of causation and injury would be it, but the machine clearly has something concretely broken.37 assessed, the unknown ceiling of potential liti- gation costs set the stage for the debate surround- This is a familiar gesture for historians of com- ing the Y2K Act. puting as the passage speaks directly to an attempt to emphasize and illustrate the material- Y2K ACT ity of computing through comparison to more While legal experts spent much of 1998 specu- obviously physical technologies (a register is like lating about the fallout of Y2K-related litigation, a machine, and an error is like a broken rod). This and Y2K lawsuits continued to be filed, Republican use of similes can render invisible and distrib- lawmakers and their allies were preparing legisla- uted processes as something legible and compre- tion that would strictly delimit potential torts. In hensible. The concerns over injury and causation February of 1999 reported: predated the Y2K Act but already highlighted what would soon become the central focus of the Worried that the year 2000 computer debate around the Act: namely, who determines problem will set off an avalanche of causation for an error in a networked and interde- lawsuits, a powerful industry coalition yesterday drafted a legislative proposal pendent computer system? How can we judge aimed at limiting litigation and reducing whether a physical injury is “palpable” and liability damages in the event of business “detectable” when the breakdown of technology breakdowns.39 must be interpreted through phenomena like crashes and freezes? And how should responsi- That “powerful industry coalition” was led by bility (technical and monetary) be distributed the U.S. Chamber of Commerce and a group of among all of the stakeholders involved in such roughly ninety industry representatives, including intricate systems? the National Association of Manufacturers, the In addition to these sticky legal questions National Federation of Independent Business, and surrounding cause, injury, and evidence, per- the National Retail Federation.40 Together, the coa- haps the most important indication of the loom- lition had prepared a series of legislative demands ing threat of Y2K lawsuits was their potential during the early weeks of 1999—demands that expense. The Gartner Group at one point pre- would constitute the framework of the prospective dicted that punitive and compensatory damage Y2K Act over coming months. A spokesperson for claims could cost as much as $1 trillion, which the Chamber’s Institute for Legal Reform (a leading eclipsed their estimate for the cost of technical organization in the promotion of tort reform) repair. But in an early warning of the legal costs claimed, “The idea is to take away the legal lottery associated with Y2K, Gartner research director and the encouragement for plaintiffs’ lawyers to Lou Marcoccio said he had seen estimates as turn this into a big windfall.”41 As Jake Tapper wrote high as $3 trillion, while also stating simply that at the time, “The [Chamber] has always wanted to “Nobody really knows.” The unknown ceiling on legally limit the amount plaintiffs can be awarded, litigation and damage payouts mirrored the his- and it saw Y2K litigation reform as a first step tory of Y2K bugs, from the indeterminacy of the toward fighting what Chamber president Thomas J. crises’ origins and the uncertain threats to infra- Donohue calls ‘avaricious trial attorneys.’”42 structure and social order. The and Democrats in Congress As the year 2000 approached, the news media opposed the legislation and were supported by coverage of Y2K problems started to merge the the Association of Trial Lawyers of America technological risks with the legal quagmire, with (ATLA), and by consumer advocates, who saw each being plagued by the difficulty of tracing efforts at even temporary tort limitation as the causes in interdependent systems. As one com- thin edge of the wedge for a bigger reform proj- mentator described the situation in 1998, the legal ect. They claimed that existing liability laws pro- ramifications of computer failure came into focus tected consumers and employees from hazards as “lawyers [awakened] to the same sense of ubiq- and negligence, and that the threat of lawsuits uity, unpredictability and entanglement that raised standards and encouraged vigilance. The

July-September 2020 31 Computing and Capitalism

president of the ATLA claimed that any tort Doerr.51 Gore—and the White House—it seemed, reform would act as a disincentive for actual would have to choose between a traditional ally in Y2K repairs and claimed that the industry pro- the ATLA and an emergent ally in the tech industry. posal would “take away the rights of the people As one commentator put it, “This is one of the few they hurt to do anything about it.”43 segments of the business community that hasn’t The Democrats were also supported by small- reflexively gone Republican... Now the Republi- but-growing interest from members of the tradi- cans have started to wake up and say, ‘We want tional and technology press. Early in the legislative the high-tech community to be ours.’”52 process, editorials ran in local newspapers across To court the technology industry, the Republi- the country, from the Seattle Post-Intelligencer, “Let cans derided the ATLA by touting the economic high-tech firms face Y2K problems,”44 The Tennes- success of the booming computer industry and by sean, “Y2K bug begets bad bills,”45 to the Bangor challenging Gore to ignore their new political role. Daily News, who decried the “grand gouge” that The Republican Chairman of the Congressional liability protection represented.46 Likewise in his Campaign Committee stated plainly, with regards column in the February 9 issue of Computerworld, to the legislation: “Gore is scared to death... You the magazine’s editor-in-chief, Paul Gillin, argued, have to choose between friends....Thisone “Users should oppose [tort reform] efforts with all wedges them.”53 In response, one of Gore’s spokes- their power.”47 As for blame for Y2K, Gillin singled people agreed that the issue was a political instru- out “the vendors that capriciously ignored warn- ment, and that the Republicans were “trying to ings from as long ago as the late 70s and that now create a wedge issue with the explicit desire to are trying to buy a free pass from Congress.”48 inflict ...political damage on the vice president.”54 In 1998, the trial attorneys saw the uncertain For historians of computing, the political manoeu- outcomes of Y2K rollover “as a business oppor- vrings of this debate are key. Not only was Y2K lia- tunity.”49 By 1999, though, the crisis had become bility being leveraged to put Al Gore and the DNC the basis of a retaliation against trial attorneys in an awkward position, the perception was that and their clients, and the uncertainty of Y2K the entire process was a courtship of the tech became a beachhead for larger tort reform aspi- industry as a new and powerful ally.55 As reported rations. The hinge in both cases was the infra- in The Washington Post: structural entanglement of legacy code and embedded systems, and the challenge of defin- This is not just about Al Gore, it’s really about the future of the parties,” another Republican ing blame and injury in interdependent systems. strategist said. “Right now, the political parties Both halves of this debate were opportunistic, are out of date, aligned along issues and an treating the need to protect either consumers or approach to the economy that is 30 years old. businesses as a warrant for the redistribution of Soon, the political alignment is going to be expressed in a division between old responsibility and liability. and new. This [high-tech industry] is a If this seemed like a fairly typical story of parti- group that is up for grabs.56 san Washington lobbying there was still one novel variable. The strengthening technology industry The subsequent debate about the Y2K Act threatened to scramble existing allegiances. The needs to be understood, then, as a complex knot industry’s immediate commercial interests fit with of political, legal, and technological interests. Yes, the plan to limit liability, and the Semiconductor this was a debate about Y2K preparations and an Industry Association and the Information Technol- opportunistic attempt at tort reform. But it was ogy Association of America had both joined in the also a contest to win the favor of the technology Republican coalition’s legislative planning process. lobby—which meant the parties had to wager on However, the presumptive nominee for the Demo- the industry’s future economic and political clout. crats in the 2000 presidential election was Vice Liability, its applicability, and its distribution, President Al Gore, whose early and instrumental became the territory for this contest to play out. support of the internet had positioned him as a booster of information technologies and a friend to Silicon Valley interests.50 Gore was the target of DEBATE BEGINS early and frequent lobbyingeffortsfromthetech The legislative battle began in earnest in March industry, including the venture capitalist John 1999, with the Senate moving to limit potential

32 IEEE Annals of the History of Computing liability with bill S. 96. A subsequent bill in the users and, perhaps, by setting up special House of Representatives, H.R. 775, went even fur- courts to adjudicate claims. Congress can also clarify the liability of companies once it ther than the Senate bill in making changes to exist- 57 becomes clear how widespread the problem ing law. In testimony given to the House Judiciary really is. But before the new year, the Committee, the White House cautioned against tak- Government should not use the millennium ing major actions that “would increase public con- bug to overturn longstanding liability practices. A potential crisis is no time to cern about our nation’s readiness.”58 In other abrogate legal rights.61 words, observing a growing movement to limit the scope of liability, the Administration’s first gambit Although the White House continued to prom- was to argue that potential legislation might give ise a veto of the bill, their position became more the impression that the country was unprepared difficult to maintain. What had begun as routine for Y2K, which would run counter to their public partisan jockeying and maneuvering now became position that the country was well on its way to a public debate about the role of computer tech- Y2K compliance. Nonetheless, the Senate moved nology in everyday life and the determination of forward with S. 96, “The Y2K Act,” sponsored by responsibility should that technology fail. Republican Senators John McCain and Bill Frist, The push-back strategy was partially led from which included the legislative demands of the the office of Vice President Gore’s Chief Domes- industry lobby. tic Policy Advisor, David Beier. On June 10, 1999 By April the White House’s congressional sup- Beier and White House Chief of Staff John Pode- port had weakened, with Senator Ron Wyden stat- sta met with John Doerr and a group of “Silicon ing he would support a compromise bill that Valley executives” to discuss liability reform.62 amended S. 96—and various members of congress In the lead-up to the meeting, Beier laid out brief- supporting alternative plans. The New Democratic ing material for Podesta: Coalition was also seeking to align itself with Silicon Valley, with Rep. Calvin Dooley stating, “It’s impor- My guess is that what they are interested in is whether we are serious about vetoing the tant for Democrats to demonstrate to one of the Senate bill. If we say we will, then that will be the most rapidly growing sectors of the economy that story in the tech community and the press.... we understand the problems they are facing.”59 With the administration adamant that they would I assume there will be lot of whining and complaining about our position. I think we veto the Senate or House bills, they offered their need to lean into a negotiate or we will do support for an amendment by Senators John Kerry what we promised mode. [sic]63 and Charles Robb that would encourage all parties to seek negotiated settlements (a potential boon to Simultaneously, Gore’s office was leading trial attorneys).60 Kerry’s compromise was based a negotiations with the “Year 2000 Coalition”––the carve-out requested by the tech industry. The new title for the consortium of industry associa- exception relied on the Year 2000 Readiness Disclo- tions––and their Republican supporters in Con- sure Act, a separate piece of legislation that had gress. In the Vice President’s talking points, there passed in 1998 and was already viewed as a shield is an attempt to reconcile his precarious position: for many businesses. Kerry’s amendment to S. 96 We recognize that actual or potential Y2K would protect companies against some liability failures may result in frivolous litigation. claims if it could be shown they had tried in good And we recognize that the high technology industry is most likely to be the target of faith to fix all potential errors and to communicate frivolous litigation... known risks to their clients and customers. The conflict came to a head in June 1999, when But we also must be practical. We cannot let McCain made some concessions and gained bipar- your goal be held hostage by those with a broader tort reform agenda.64 tisan support. But the Republican coalition had not clearly won over the public or its proxies in the The “your” of this statement is directed at Sili- media. In the first of two New York Times editorials con Valley lobbyists, and Gore’s strategy was to about the debate the paper writes: portray Y2K tort limits as a Trojan Horse, at once Government can certainly help by providing an attempt to “create an issue with which to hurt loans, subsidies and expertise to computer the Vice President and the Democratic party” and

July-September 2020 33 Computing and Capitalism

an attempt to “create a precedent that would be cannot be sued. The Act also created a formula by impossible for us to avoid in future debates.”65 Of which plaintiffs would have to demonstrate the course, neither of these goals were a secret and share of each defendant’s responsibility for any had been expressed frequently by Republican law- Y2K breakdowns. Tort laws, as part of what Katha- makers themselves. But this tactical analysis lacked rina Pistor calls, “the code of capital,” map and the urgency of claims related to Y2K—either techni- delineate responsibility; they also shape what, if cal or financial—and did little to corroborate the any, form of justice is made available for wrongdo- brinksmanship of the President’s threatened veto. ing. As the complexity and interdependence of While Gore’s office and the White House fought computing became a pretext for rewriting tort law, for the support of the tech industry and threat- the Y2K Act became an instrument for suspending ened a veto of the Senate bill, they were inundated the normal legal standard of responsibility. with complaints from the legal lobby, citizens’ The Act and its legislative process foreshad- rights organizations, and much of the mainstream owed future debates about the state’s relationship press. Beier’s records are full of supportive press in managing and mitigating harm from the entan- clippings, recommendations from the American glement of computing with everyday life. The Y2K Bar Association, and pleas from Ralph Nader’s crisis exposed the inseparability of computer lobby group Public Citizen. But by the end of June, infrastructure from the standard operating condi- 1999 the legislative momentum was clearly behind tions of public order. For their part, proponents of the Y2K act, with only the President’s threatened the Y2K Act exploited the complexity of large com- veto holding it back. In conference negotiations, puterized systems to redistribute responsibility the White House attempted to gain concessions for technical failure—a redistribution that would regarding proportional liability and punitive caps. come to characterize the early 21st century’s inter- The administration’s talking points explicitly high- action between business interests, new technolo- light negotiating principles that were a “HIGH gies, and consumer rights. TECH PRIORITY” (caps in original),66 though it is unclear if this notation was for the benefit of all the conferees or just the Democrats involved. In CONCLUSION the end, however, they obtained only minor The Y2K Act represents a peculiar moment in changes and the Senate passed an amended ver- the history of computing. With hindsight, the sion of the House bill that incorporated S. 96, and passage of the Act appears to have signaled a sent it to President Clinton. confrontation with the distribution of responsi- bility for technological systems. The Act’s pas- sage also makes it clear that the willingness to DEBATE ENDS ascribe responsibility or blame for computing’s On July 20, 1999, President Clinton reneged on ills has always been limited—and specifically his threat and signed the Y2K Act into law. The Y2K limited by state interventions in the normal busi- Act was a major feat of tort limitation—but tempo- ness of corporate enterprise. Both the front- and rary. In addition to a ninety-day grace period to fix backstage negotiations over the Y2K Act fore- any errors, the Y2K Act compelled most law- shadowed the mounting importance of the tech suits to be heard in Federal Court, and capped lobby within American policy-making processes. punitive damages against small companies at Liability presents a potentially rich avenue of three times the amount awarded for compensa- research for those interested in the history of tory damages or $250 000 (whichever was less). technology and political negotiations over respon- Perhaps most importantly for historians of sibility. Some have argued that the legalization computing seeking to understand legal and politi- and formation of limited liability corporations was cal encounters with computer infrastructure in the a crucial development in modern capitalism.67 1990s, the Act provided strict rules by which Likewise, recent debates about tech company cause, responsibility, and proportional liability responsibility, the governance of the web, and the would be adjudicated. The Act suspended “joint management of online content have frequently and several liability,” which typically makes any turned to the limits on liability and responsibility defendant liable for the entire judgment when stipulated in Section 230 of the Communications other defendants are unable to pay their share or Decency Act.68 We might question, then, how our

34 IEEE Annals of the History of Computing histories of computing might be reinflected 5. P. E. Ceruzzi, A History of Modern Computing. through histories of liability and its limitations. Cambridge, MA, USA: MIT Press, 2003; J. W. For those now reckoning with the history of Cortada, IBM: The Rise and Fall and Reinvention of computing in the 1990s (especially in the global aGlobalIcon. Cambridge, MA, USA: MIT Press, north) the decade can be seen as a hinge that con- 2019. nects the relatively open architecture of the inter- 6. S. S. L. Jain, Injury. Princeton, NJ, USA: Princeton net with the commercial interests of those hosting Univ. Press, 2006. content—and the conflict of these two models for a 7. L. M. Friedman, Total Justice. New York, NY, USA: networked society. The story of the Y2K Act Russell Sage Foundation, 1985, p. 5, emphasis in exposes a different aspect of this history. It centers original; See also: L. Nader, The Life of the Law: the emerging importance of Silicon Valley as a Anthropological Projects. Berkeley, CA: Univ. coherent bloc of political actors and the many California Press, 2002. ways that state, corporate, and civil society institu- 8. L. Nader, The Life of the Law: Anthropological Projects. tions thought about and mitigated their reliance on Berkeley, CA, USA: Univ. California Press, 2002. legacy code. The episode helps clarify how 9. K. Pistor, The Code of Capital: How the Law Creates moments of legal and technological reorganization are negotiated through liability; it is also a Wealth and Inequality. Princeton, NJ, USA: Princeton reminder that as we face renewed calls for technol- Univ. Press, 2019. ogy firms to take responsibility for social ills, that 10. T. Streeter, “The moment of Wired,” Crit. Inquiry, we have been down this road before, and that the vol. 31, no. 4, pp. 755–779, 2005. ways we distribute responsibility will have far- 11. R. Calo, “Open robotics,” Maryland Law Rev., vol. 70, reaching consequences. pp. 571–613, 2010. 12. The Century Dates Problem is not the only issue with ACKNOWLEDGMENTS the year 2000. Other issues included the representation of September 9, 1999 (9/9/99), a date I would like to thank the editors of this special that some programs used to perform self-diagnostics, issue, two anonymous reviewers, Marc Aidinoff, and February 29, 2000, which many programs did not Amy Hasinoff, and Gili Vidan for their help and include. Year 2000 problems are certainly not the only generosity during the preparation of this article. calendar-based errors, either. The (mis) implementation of time has often led to system & REFERENCES malfunction, and the most threatening of potential 1. E. Ullman, “The myth of order,” Wired, vol. 7, no. 4, errors is the so-called 2038 problem, and the pp. 126–129, Apr. 1999. calculation of dates beyond the capacity of 32-bit 2. B. J. Feder and A. Pollack, (1998, December 27), storage (the deadline would be: 03:14:07 UTC on 19 Computers and year 2000: A race for security (and January 2038). The problem is consistently referred to against time). . [Online]. Available: as Y2K-like, or Unix Y2K. See: R. L. Bland, “Defusing https://archive.nytimes.com/www.nytimes.com/library/ the millennium bomb,” Civil Eng., vol. 68, no. 6, pp. tech/98/12/biztech/articles/27millennium.html 48–51, 1998; S. Gibbs, (2014, December 17). Is the 3. Though widely referred to as a “bug” Year 2000 problems the new Y2K bug? The Guardian. were, mostly, not bugs. In the strictest sense bugs are [Online]. Available: https://www.theguardian.com/ unintended errors and behaviors; coding century dates technology/2014/dec/17/is-the-year-2038-problem- as two digits was a design choice. Despite this the-new-y2k-bug distinction, Year 2000 problems were widely described 13. P. N. Edwards, “Y2K,” p. 11. and represented as bugs and, in using my actors’ terms 14. Ibid., p. 8. here, I have sometimes adopted this nomenclature. 15. S. Graham and N. Thrift, “Out of order,” Theory, 4. P. N. Edwards, “Y2K: Millennial reflections on computers Culture Soc., vol. 24, no. 3, pp. 1–25, 2007, p. 12. as infrastructure,” History & Technol.,vol.15,no.1/2,pp. 16. N. Ensmenger, The Computer Boys Take Over, p. 224. 7–29, 1998; N. Ensmenger, “Software as history 17. “Revised specifications for a common business embodied,” IEEE Ann. History Comput.,vol.31,no.1,pp. oriented language,” in Proc. Conf. Data Syst. Lang. 86–88, Jan./Mar. 2009; N. Ensmenger, The Computer Records, Box: 25, Folder: 4, Charles Babbage Institute Boys Take Over.Cambridge,MA,USA:MITPress,2010. Archives, 1961.

July-September 2020 35 Computing and Capitalism

18. The publication states: “ is represented 25. International Y2K Cooperation Center Records (CBI by a numeric code of six consecutive positions that 153) and the Center for Y2K and Society Records (CBI represent (from left to right, in high to low order 155), at the Charles Babbage Institute, University of sequence) the Year, the Month and the Day, as Minnesota, Minneapolis. identified by the .” Federal 26. The comparison between Y2K and is information processing standards publication 4, frequent. Farhad Manjoo has made the case twice: F. National Bureau of Standards, 1968. Manjoo, (2017, July 19) How Y2K offers a lesson for fighting 19. This was one component of the US Justice climate change. New York Times.[Online].Available: Department’s anti-trust claim against IBM, lasting from https://www.nytimes.com/2017/07/19/technology/y2k- 1969–1981. The case was eventually dismissed. lesson-climate-change.html; F. Manjoo, (2009, November Richard Delamarter (an economist and expert witness 12) How our response to Y2K reveals what we’ll do about for the Justice Department) claims that IBM used its global warming and swine flu. Slate Magazine.[Online]. monopoly status to artificially inflate the cost of Available: https://slate.com/technology/2009/11/ memory in the 1960s. See: R. T. DeLamarter, Big Blue. -then-how-our-response-to-y2k-reveals-what- New York: Dodd, Mead and Company, 1986. Cortada, well-do-about-global-warming-and-swine-flu.html IBM; R. D. Williams and B. T. Smyth, Law of the Year 27. M. Wainwright, (2001, September 14) NHS faces huge 2000 Problem. Gaithersburg, MD, USA: Aspen Law damages bill after millennium bug error. The and Business, 1999. Guardian. [Online]. Available: https://www. 20. R. W. Bemer, “What’s the date?” Honeywell theguardian.com/uk/2001/sep/14/martinwainwright Comput. J., vol. 5, no. 4, 1971, p. 208. Emphasis 28. L. Menand, “Thinking sideways,” New Yorker, vol. 91, added. no. 6, pp. 73–75, 2015. 21. Bemer claimed that his awareness of the century digits 29. E. Ullman, “The myth of order,” p. 126. problems came from his work with IBM installing a 30. J. W. Stempel, “A mixed bag for chicken little: database system for the Church of Latter-Day Saints Analyzing year 2000 claims and insurance coverage,” (LDS). LDS were early adopters and their computerized Emory L. J., vol. 48, pp. 169–266, 1999. genealogy database needed records that spanned 31. Produce Palace Int’l v. TEC-Am. Corp., Civ. No. 97-P- multiple centuries—A perspective on database 20134 (Mich. Cir. Ct., Macomb Cty., filed July 11, 1997); management that stood in stark juxtaposition with see also, . W. Chamberlin, “To the millennium: emerging contemporary practices. P. Sullivan, 2004, June 25 issues for the year 2000 and cyberspace,” Notre Dame J. “Computer pioneer Bob Bemer, 84,” Washington Post,p. Ethics & Public Policy,vol.13,pp.131–177,1999. B06; R. W. Bemer, “Time and computer,” Interface Age, 32. A. Dunn, (1998, September 8) Year 2000 bug likely to vol. 4, no. 2, pp. 74–79, 1978. infest courtrooms. Los Angeles Times, A1; C. W. 22. P. De Jager, “Doomsday 2000,” Computerworld, Chamberlin, “To the millennium: emerging issues for vol. 27, no. 36, pp. 105–109, 1993. Another the year 2000 and cyberspace,” significant exception: J. T. Murray and M. J. 33. At a conference for lawyers organized in San Francisco in Murray, Computers in Crisis. New York, NY,USA: November 1997, sessions were organized around the Petrocelli Books, 1984. potential liability of computing companies, consultants, landlords, financial institutions, and insurance companies, 23. B. J. Feder and A. Pollack, (1998, December 27) and there was a preview of potential lawsuits and defences. Computers and year 2000: A race for security (and C. Simon, “Threat of computer glitch,” p. B12. against time). 34. J.W. Stempel, “A mixed bag for chicken little;” 24. The $500–600 billion figure from Gartner was widely R. Bland, “Defusing the millennium bomb.” cited. See C. Simon, “Threat of computer glitch in 35. See J. W. Stempel, p. 262. See also: S. D. Esters, 2000 has lawyers seeing dollar signs,” Wall Street J., (1997, September 22) AAIS introduces Y2K Nov. 1997, p. B12. A more sober and specific figure endorsements. National Underwriting, p. 8. from Morgan Stanley estimated that in the US, “overall 36. Stempel, p. 249. spending for public and private entities would range 37. Emphasis added. Ibid. from $78 billion to $89 billion.” See: S. Barr, (1999, 38. Dunn, “Year 2000 bug likely to infest courtrooms,” A1. February 3) Industry’s ‘Fix’ for Y2K liability. The 39. S. Barr, “Industry’s ‘fix’,” p. A15. Washington Post, p. A15. 40. Ibid.

36 IEEE Annals of the History of Computing 41. Jim Wooten quoted in Barr, “Industry’s fix,” p. A15. 56. T. B. Edsall and S. Barr, “Battle lines on Y2K liability,” 42. J. Tapper, (1999, April 30) The millennium bug bill p. A02. Brackets in original but emphasis added. battle. Salon. [Online]. Available: https://www.salon. 57. The House version, which the Senate eventually passed com/1999/04/30/senate_y2k/ after substituting its own provisions, had stricter caps on 43. Mark S. Mandell quoted in Barr, “Industry’s fix,” p. A15. damages and included a cap on attorneys’ fees. 44. (1999, March 3) Let high-tech firms face Y2k 58. “Chronology,” in David W. Beier Files, Box: 55, problems. editorial. Seattle Post-Intelligencer. National Archives, Washington, DC, 1999. 45. (1999, April 11) Y2K bug begets bad bills. editorial. 59. T. B. Edsall and S. Barr, “Battle lines on Y2K liability The Tennessean. catch gore in cross-fire,” p. A02. 46. P. Tebbets, (1999, March 23) Triple gouge of Y2K. Bangor 60. “Statement of administration policy, April 27 1999,” in Daily News.NewsclippingsarefromtheNationalArchives’ David W. Beier Files, Box: 55, National Archives, collection, “Records of the office of domestic policy (office Washington, DC, 1999. of the vice president) David W. Beier files,” Box 55. 61. (1999, April 26) “Liability for the millennium bug,” New 47. P. Gillin, (1999, February 8) Y2K escape clause. York Times. p. A20. Computerworld, p. 38. 62. “Memorandum for John Podesta, gene sperling, David 48. Ibid. Beier; re. meeting with silicon valley execs,” in David 49. C. Simon, “Threat of computer glitch,” p. B12. W. Beier Files, Box: 55, National Archives, Washington, 50. J. Abbate, ‘‘Privatizing the internet: competing visions DC, 1999. and chaotic events, 1987–1995,’’ IEEE Ann. History 63. “Email from David Beier to Sarah Rosen, re. briefing Comput., vol. 32, no. 1, pp. 10–22, Jan./Mar. 2010. material for podesta,” in David W. Beier Files, Box: 55, 51. T. B. Edsall and S. Barr, (1999, May 7) Battle lines on National Archives, Washington, DC, 1999. Y2K liability catch gore in cross-fire. The Washington 64. “Y2K liability reform; talking points, June 10, 1999,” in Post. p. A02. David W. Beier Files, Box: 55, National Archives, 52. Rob Atkinson, quoted in T.B. Edsall, (1999, June 13) Washington, DC, 1999. GOP vies for backing of high-tech leaders; Party aims 65. Ibid. to exploit Y2K vote, CEO summit. The Washington 66. “Principles for Y2K litigation reform, June 16, 1999,” in Post. p. A18. David W. Beier Files, Box: 55, National Archives, 53. T. B. Edsall and S. Barr, “Battle lines,” p. A02. Washington, DC, 1999. 54. Ibid. 67. K. Forbes, “Limited liability and the development of the 55. According to www.opensecrets.org, which compiles business corporation,” J. Law, Econ. Org., vol. 2, no. 1, Federal Election Commission data, in the 1997–1998 pp. 163–177, 1986; (1999, December 25) The key to election cycle lawyers and law firms donated $45.7 industrial capitalism: Limited liability.The Economist, million to Democrats and $17.2 million to Republicans pp. 111–112. (a 73/27% split). In contrast, the electronics manufac- 68. R. Tushnet, “Power without responsibility: Intermediaries turers and equipment lobby donated $7.1 million to and the first amendment,” George Washington Law Republicans, and $4.8 million to democrats (60/40%), Rev., vol. 76, no. 4, pp. 986–1016, 2008. and the computer software lobby $1.7 million to Demo- crats and $2.1 to Republicans (45/55%). The so-called internet lobby had donated less than a hundred thou- sand dollars to either party. “Lawyers & Lobbyists” [Online]. Available: https://www.opensecrets.org/ industries/indus.php?Ind K “Electronics Manufactur- ¼ ing & Equipment” [Online]. Available: https://www. opensecrets.org/industries/indus.php?ind B12 ¼ þþ “Computer Software” [Online]. Available: https://www. opensecrets.org/industries/indus.php?ind C5120 ¼ “Internet” [Online]. Available: https://www. opensecrets.org/industries/indus.php?ind B13 ¼ þþ

July-September 2020 37