Blackberry 2013 Annual Report Download - page 72

Download and view the complete annual report

Please find page 72 of the 2013 Blackberry annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 235

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235

Company’s products and services may provide opportunities for competitors or limit industry growth. For example, a change to the
regulatory classification of the Company’s products and services, such as content, taxation, and licensing requirements, could place
regulatory obligations commonly reserved for licensed telecommunications carriers or broadcasters on the Company. The impact of
these potential obligations vary based on the jurisdiction, but any such changes could impact whether the Company enters, maintains
or expands its presence in a particular market, and whether the Company must dedicate additional resources to comply with these
obligations.
Various countries have enacted laws and regulations, adopted controls, license or permit requirements, and restrictions on the export,
import, and use of products or services that contain encryption technology. In addition, from time to time, governmental agencies
have proposed additional requirements for encryption technology, such as requiring the escrow and governmental recovery of private
encryption keys. Restrictions on the sale or distribution of products or services containing encryption technology may prevent the
Company from selling or distributing the BlackBerry wireless solution in certain markets or may require the Company to make
changes to the encryption technology that is embedded in its products or services to comply with such restrictions. Government
restrictions, or changes to the Company’s products or services to comply with such restrictions, could delay or prevent the acceptance
and use of the Company’s products and services. Likewise, restrictions or perceived restrictions may adversely affect the marketing
and sales resources that network carriers and distributors may dedicate to the Company’s products and services.
Some of the Company’s competitors do not have the same level of encryption in their technology and some competitors may be
subject to less stringent controls on the export, import, and use of encryption technologies in certain markets. Also, several countries
have adopted legislation authorizing the circumvention of encryption measures in limited circumstances. These legislative provisions
could potentially be used by competitors to attempt to reverse engineer or find vulnerabilities in the Company’s products and services.
As a result, these competitors may be able to compete more effectively than the Company can in those markets. In addition, the
United States, Canada and other countries have imposed export controls that prohibit the export of encryption technology to certain
countries, entities and individuals. The Company’s failure to comply with export, import, and use laws and regulations concerning
encryption technology could subject the Company to sanctions and penalties, including fines, and suspension or revocation of export
or import privileges.
In addition, governments are increasingly imposing requirements on entities like the Company to facilitate controls over the content
that users have access to on their mobile devices. Examples include content filtering laws or laws designed to prevent a company’s
products or services from being used to infringe third party intellectual property such as copyright in artistic performances. Also,
numerous jurisdictions impose content filtering requirements to prevent access to content deemed restricted based on the norms and
laws of that particular jurisdiction. Furthermore, the Company may be required to pay copyright levies on products and services used
by consumers to copy or stream copyrighted works. Non-compliance with these legal requirements could result in fines,
imprisonment of local executives, and sanctions on the import and/or use of the Company’s products or services.
65