Capital One 2013 Annual Report Download - page 47

Download and view the complete annual report

Please find page 47 of the 2013 Capital One annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 302

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

Similar to other large corporations, we are exposed to operational risk that can manifest itself in many ways, such
as errors related to failed or inadequate processes, inaccurate models, faulty or disabled computer systems, fraud
by employees or persons outside of our company and exposure to external events. In addition, we are heavily
dependent on the strength and capability of our technology systems which we use to manage our internal
financial and other systems, interface with our customers and develop and implement effective marketing
campaigns. We also depend on models to measure risks, estimate certain financial values, determine pricing on
certain products, assess capital adequacy and calculate regulatory capital levels. If we implement or design our
models poorly or use inaccurate assumptions in our models, business decisions based on the output of the models
may be adversely affected. Moreover, information we disclose to investors and our regulators based on poorly
designed or implemented models could be inaccurate. Some decisions our regulators make, including those
related to our capital distribution plans, may be adversely impacted if they perceive the quality of our models to
be insufficient.
Our ability to develop and deliver new products that meet the needs of our existing customers and attract new
ones and to run our business in compliance with applicable laws and regulations depends on the functionality and
reliability of our operational and technology systems. Any disruptions, failures or inaccuracies of our operational
and technology systems and models, including those associated with improvements or modifications to such
systems and models, could cause us to be unable to market and manage our products and services, manage our
risk or to report our financial results in a timely and accurate manner, all of which could have a negative impact
on our results of operations.
In some cases, we outsource the maintenance and development of operational and technological functionality to
third parties. These third parties may experience errors or disruptions that could adversely impact us and over
which we may have limited control. Any increase in the amount of our infrastructure that we outsource to third
parties may increase our exposure to these risks.
In addition, our ongoing investments in infrastructure, which may be necessary to maintain a competitive
business, integrate acquisitions and establish scalable operations, may increase our expenses. Further, as our
business develops, changes or expands, additional expenses can arise as a result of a reevaluation of business
strategies, management of outsourced services, asset purchases or other acquisitions, structural reorganization,
compliance with new laws or regulations or the integration of newly acquired businesses. As cybersecurity
threats continue to evolve, we may also be required to expend significant additional resources to continue to
modify or strengthen our protective security measures, investigate and remediate any vulnerabilities of our
information systems and infrastructure or invest in new technology designed to mitigate security risks. If we are
unable to successfully manage our expenses, our financial results will be negatively affected.
We Could Incur Increased Costs or Reductions In Revenue Or Suffer Reputational Damage And Business
Disruptions In the Event Of The Theft, Loss or Misuse Of Information, Including As A Result Of A Cyber-
Attack.
Our products and services involve the gathering, storage and transmission of sensitive information regarding our
customers and their accounts. Our ability to provide such products and services, many of which are web-based,
relies upon the management and safeguarding of information, software, methodologies and business secrets. To
provide these products and services, we use information systems and infrastructure that we and third party
service providers operate. We also have arrangements in place with retail partners and other third parties where
we share and receive information about their customers who are or may become our customers. As a financial
institution, we also are subject to and examined for compliance with an array of data protection laws, regulations
and guidance, as well as to our own internal privacy and information security policies and programs. If our
information systems or infrastructure experience a significant disruption or breach, it could lead, depending on
the nature of the disruption or breach, to unauthorized access to personal or confidential information of our
customers in our possession or unauthorized access to our proprietary information, software, methodologies and
business secrets. In addition, if our partners, retailers or other market participants experience a disruption or
27