ADT 2012 Annual Report Download - page 105

Download and view the complete annual report

Please find page 105 of the 2012 ADT annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 194

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194

Our future growth is largely dependent upon our ability to successfully compete with new and existing
competitors by developing or acquiring new technologies that achieve market acceptance with acceptable
margins.
Our business operates in markets that are characterized by rapidly changing technologies, evolving industry
standards and potential new entrants. For example, a number of cable and other telecommunications companies
have introduced security services offerings, including interactive security services, that are competitive with our
products and services. If these services gain market acceptance, our ability to grow our business, in particular our
ADT Pulse offering, could be materially and adversely affected. Accordingly, our future success depends upon a
number of factors, including our ability to accomplish the following: identify emerging technological trends in
our target end-markets; develop, acquire and maintain competitive products and services; enhance our products
and services by adding innovative features that differentiate us from our competitors; and develop or acquire and
bring products and services to market quickly and cost-effectively. Our ability to develop or acquire new
products and services based on technological innovation can affect our competitive position and requires the
investment of significant resources. These acquisitions and development efforts divert resources from other
potential investments in our businesses, and they may not lead to the development of new technologies, products
or services on a timely basis. Moreover, as we introduce new products such as ADT Pulse, we may be unable to
detect and correct defects in the product or in its installation, which could result in loss of sales or delays in
market acceptance. New or enhanced products may not satisfy consumer preferences and potential product
failures may cause consumers to reject our products. As a result, these products may not achieve market
acceptance and our brand image could suffer. In addition, our competitors may introduce superior designs or
business strategies, impairing our brand and the desirability of our products and services, which may cause
consumers to defer or forego purchases of our products and services. In addition, the markets for our products
and services may not develop or grow as we anticipate. The failure of our technology, products or services to
gain market acceptance, the potential for product defects or the obsolescence of our products and services could
significantly reduce our revenue, increase our operating costs or otherwise adversely affect our business,
financial condition, results of operations or cash flows.
Failure to maintain the security of our information and technology networks, including personally
identifiable and other information could adversely affect us.
We are dependent on information technology networks and systems, including the Internet, to process,
transmit and store electronic information and, in the normal course of our business, we collect and retain
significant volumes of certain types of personally identifiable and other information pertaining to our customers
and employees, including video images of customer sites. The legal, regulatory and contractual environment
surrounding information security and privacy is constantly evolving and companies that collect and retain such
information are under increasing attack by cyber-criminals around the world. A significant actual or potential
theft, loss, fraudulent use or misuse of customer, employee or other personally identifiable data, whether by third
parties or as a result of employee malfeasance or otherwise, non-compliance with our contractual or other legal
obligations regarding such data or a violation of our privacy and security policies with respect to such data could
result in significant costs, fines, litigation or regulatory actions against us. Such an event could additionally result
in adverse publicity and therefore adversely affect the market’s perception of the security and reliability of our
services, which could result in lost sales and increased customer attrition. In addition, we depend on our
information technology infrastructure for business-to-business and business-to-consumer electronic commerce.
Security breaches of, or sustained attacks against, this infrastructure could create system disruptions and
shutdowns that could result in disruptions to our operations. Increasingly, our security and home/business
automation products and services are accessed through the Internet, and security breaches in connection with the
delivery of our services via the Internet may affect us and could be detrimental to our reputation, business,
operating results and financial condition. We cannot be certain that advances in criminal capabilities, new
discoveries in the field of cryptography or other developments will not compromise or breach the technology
protecting the networks that access our products and services. If any one of these risks materializes our business,
financial condition, results of operations and cash flows could be materially and adversely affected.
13