Capital One 2013 Annual Report Download - page 37

Download and view the complete annual report

Please find page 37 of the 2013 Capital One annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 302

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

EMPLOYEES
A central part of our philosophy is to attract and retain a highly capable staff. We had 41,951 employees, whom
we refer to as “associates,” as of December 31, 2013. None of our associates are covered under a collective
bargaining agreement, and management considers our associate relations to be satisfactory.
ADDITIONAL INFORMATION
Geographic Diversity
Our consumer loan portfolios, including credit cards, are diversified across the United States with modest
concentration in California, Texas, New York, Florida, and Illinois. We also have credit card loans in the U.K.
and Canada. Our commercial loan portfolio is aligned to our branch footprint with concentrated in New York,
Texas, Louisiana and New Jersey with some broader diversification across the United States driven by our
specialty business. See “MD&A—Credit Risk Profile” and “Note 4—Loans” for additional information.
Technology/Systems
We leverage information technology to achieve our business objectives and to develop and deliver products and
services that satisfy our customers’ needs. A key part of our strategic focus is the development of efficient,
flexible computer and operational systems to support complex marketing and account management strategies, the
servicing of our customers, and the development of new and diversified products. We believe that the continued
development and integration of these systems is an important part of our efforts to reduce costs, improve quality
and provide faster, more flexible technology services. Consequently, we continuously review capabilities and
develop or acquire systems, processes and competencies to meet our unique business requirements.
As part of our continuous efforts to review and improve our technologies, we may either develop such
capabilities internally or rely on third party outsourcers who have the ability to deliver technology that is of
higher quality, lower cost, or both. Over time, we have increasingly relied on third party outsourcers to help us
deliver systems and operational infrastructure. These relationships include (but are not limited to): Total System
Services Inc. (“TSYS”) for processing services for our North American and United Kingdom portfolios of
consumer and small business credit card accounts, Fidelity Information Services (“FIS”) for the Capital One
banking systems and IBM Corporation for management of our North American data centers.
To protect our systems and technologies, we employ security, backup and recovery systems and generally require
the same of our third-party service providers. In addition, we perform, or cause to be performed, a variety of
vulnerability and penetration testing on the platforms, systems and applications used to provide our products and
services in an effort to ensure that any attacks on these platforms, systems and applications are unlikely to
succeed. Despite these controls, Capital One, along with several other U.S. financial services providers, was
targeted on several occasions with distributed denial-of-service (“DDOS”) attacks from sophisticated third
parties that succeeded, on a few occasions, in temporarily limiting our ability to service customers through online
platforms.
Intellectual Property
As part of our overall and ongoing strategy to protect and enhance our intellectual property, we rely on a variety
of protections, including copyrights, trademarks, trade secrets, patents and certain restrictions on disclosure,
solicitation, and competition. We also undertake other measures to control access to and distribution of our other
proprietary information. Despite these precautions, it may be possible for a third party to copy or otherwise
obtain and use certain intellectual property or proprietary information without authorization. Our precautions
may not prevent misappropriation or infringement of our intellectual property or proprietary information. In
addition, our competitors and other third parties also file patent applications for innovations that are used in our
17