Capital One 2012 Annual Report Download - page 44

Download and view the complete annual report

Please find page 44 of the 2012 Capital One annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 311

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311

and during that time we will rely on the ability of the applicable HSBC entities to provide these services. The
complexities and requirements of these arrangements will increase the operational risk associated with the
transition and integration of the business, and this increased risk could lead to unanticipated expenses,
disruptions to our operations or other adverse consequences.
Similar to other large corporations, we are exposed to operational risk that can manifest itself in many ways, such
as errors related to failed or inadequate processes, inaccurate models, faulty or disabled computer systems, fraud
by employees or persons outside of our company and exposure to external events. In addition, we are heavily
dependent on the strength and capability of our technology systems which we use to manage our internal
financial and other systems, interface with our customers and develop and implement effective marketing
campaigns. We also depend on models to measure risks, estimate certain financial values and determine pricing
on certain products. Our ability to develop and deliver new products that meet the needs of our existing
customers and attract new ones and to run our business in compliance with applicable laws and regulations
depends on the functionality and reliability of our operational and technology systems. Any disruptions, failures
or inaccuracies of our operational and technology systems and models, including those associated with
improvements or modifications to such systems and models, could cause us to be unable to market and manage
our products and services, manage our risk or to report our financial results in a timely and accurate manner, all
of which could have a negative impact on our results of operations.
In some cases, we and the businesses we are acquiring outsource the maintenance and development of
operational and technological functionality to third parties. These third parties may experience errors or
disruptions that could adversely impact us and over which we may have limited control. Any increase in the
amount of our infrastructure that we outsource to third parties may increase our exposure to these risks.
In addition, our on-going investments in infrastructure, which may be necessary to maintain a competitive
business, integrate recent acquisitions, such as ING Direct and the 2012 U.S. card acquisitions, and establish
scalable operations, may increase our expenses. Further, as our business develops, changes or expands, additional
expenses can arise as a result of a reevaluation of business strategies, management of outsourced services, asset
purchases or other acquisitions, structural reorganization, compliance with new laws or regulations or the
integration of newly acquired businesses. If we are unable to successfully manage our expenses, our financial
results will be negatively affected.
We Could Incur Increased Costs or Reductions In Revenue Or Suffer Reputational Damage And Business
Disruptions In the Event Of The Theft, Loss or Misuse Of Information, Including As A Result Of A Cyber-
Attack.
Our products and services involve the gathering, storage and transmission of sensitive information regarding our
customers and their accounts. Our ability to provide such products and services, many of which are web-based,
relies upon the management and safeguarding of information, software, methodologies and business secrets. To
provide these products and services, we use information systems and infrastructure that we and third party
service providers operate. We also have arrangements in place with retail partners and other third parties where
we share and receive information about their customers who are or may become our customers. As a financial
institution, we also are subject to and examined for compliance with an array of data protection laws, regulations
and guidance, as well as to our own internal privacy and information security policies and programs. If
unauthorized persons were somehow to get access to personal, confidential or proprietary information, including
customer information, in our possession or to our proprietary information, software, methodologies and business
secrets, it could result in significant legal and financial exposure, supervisory liability, damage to our reputation
or a loss of confidence in the security of our systems, products and services that could adversely affect our
business.
Information security risks for large financial institutions like us have generally increased in recent years in part
because of the proliferation of new technologies, the use of the Internet and telecommunications technologies to
25