Blackberry 2012 Annual Report Download - page 65

Download and view the complete annual report

Please find page 65 of the 2012 Blackberry annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 274

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274

Like many other companies, the Company has been in the past, and expects to be in the future, the target of attempts by unauthorized
third parties to breach security measures that the Company or its partners have implemented. If these security measures are breached,
or perceived to be breached, or if there is an inappropriate disclosure, unauthorized access or misdirection of confidential or personal
information, including as a result of a security breach relating to hardware or software, the Company could be exposed to litigation,
potential liability and regulatory sanctions. Even if the Company was not held liable, a security breach, inappropriate disclosure or
unauthorized access of confidential or personal information (or the perception that such a breach has occurred) could materially
damage the Company’s reputation, which is built in large measure on the security and reliability of the BlackBerry wireless solution,
and even the perception of security vulnerabilities in the Company’s products or services could lead some customers, particularly
governmental customers, to reduce or delay future purchases or to purchase competitive products or services. In addition, the
Company may be required to invest additional resources or change its products and services to protect itself against damage caused by
these actual or perceived disruptions or security breaches in the future and these actions may have a detrimental impact, for example
on cost, the user experience or compatibility with third party products and services. Since the techniques used to obtain unauthorized
access, disable or degrade service, or sabotage systems change frequently and often are not recognized until launched against a target,
or may not be identified until a later time, the Company may not be able to anticipate these techniques, to implement adequate
preventative measures or to remedy them in a timely manner. The risk that these types of events could seriously harm the Company’s
business may increase as the Company expands the number of web-based products and services that it offers, increases the number of
countries where the Company operates, and expands its ecosystem to offer third party products and services in conjunction with its
own.
The collection, storage, transmission, use and disclosure of user data and personal information could give rise to
liabilities or additional costs as a result of laws, governmental regulations and carrier and other customer requirements
or differing views of personal privacy rights.
The Company transmits and stores a large volume of data, including personal information, in the course of supporting its BlackBerry
wireless solution. This information is increasingly subject to legislation and regulations in numerous jurisdictions around the world
that is intended to protect the privacy and security of personal information as well as the collection, storage, transmission, use and
disclosure of such information. For example, on February 23, 2012, the White House released its much-anticipated report on data
privacy that focused on the use and handling of personal data by private-sector entities in commercial settings and, among other
things, encouraged the United States Congress to enact data privacy legislation. In addition, a number of leading companies in the
mobile communications industry, including the Company, recently agreed to privacy principles designed to prompt third-party
application developers to conspicuously post privacy policies with their applications.
57