Chrysler 2015 Annual Report Download - page 22

Download and view the complete annual report

Please find page 22 of the 2015 Chrysler annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 288

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288

22 2015 | ANNUAL REPORT
Risk Factors
A disruption or security breach in our information technology systems could disrupt our business and adversely impact
our ability to compete.
A significant malfunction, disruption or security breach compromising the operation of our information technology
systems could damage our reputation, disrupt our business and adversely impact our ability to compete.
Our ability to keep our business operating effectively depends on the functional and efficient operation of our
information, data processing and telecommunications systems, including our vehicle design, manufacturing, inventory
tracking and billing and payment systems. A significant or large-scale malfunction or interruption of any one of our
computer or data processing systems could adversely affect our ability to manage and keep our operations running
efficiently, and damage our reputation if we are unable to track transactions and deliver products to our dealers and
customers. A malfunction or security breach that results in a wider or sustained disruption to our business could have
a material adverse effect on our business, reputation, financial condition and results of operations.
In addition to supporting our operations, we use our systems to collect and store confidential and sensitive data,
including information about our business, our customers and our employees. As our technology continues to evolve,
we anticipate that we will collect and store even more data in the future and that our systems will increasingly use
remote communication features that are sensitive to both willful and unintentional security breaches. Much of our
value is derived from our confidential business information, including vehicle design, proprietary technology and
trade secrets, and to the extent the confidentiality of such information is compromised, we may lose our competitive
advantage and our vehicle sales may suffer. We also collect, retain and use personal information, including data we
gather from customers for product development and marketing purposes, and data we obtain from employees. In the
event of a breach in security that allows third parties access to this personal information, we are subject to a variety
of ever-changing laws on a global basis that require us to provide notification to the data owners, and that subject us
to lawsuits, fines and other means of regulatory enforcement. Our reputation could suffer in the event of such a data
breach, which could cause consumers to purchase their vehicles from our competitors. Ultimately, any significant
compromise in the integrity of our data security could have a material adverse effect on our business.
We may not be able to adequately protect our intellectual property rights, which may harm our business.
Our success depends, in part, on our ability to protect our intellectual property rights. If we fail to protect our
intellectual property rights, others may be able to compete against us using intellectual property that is the same
as or similar to our own. In addition, there can be no guarantee that our intellectual property rights are sufficient to
provide us with a competitive advantage against others who offer products similar to ours. Despite our efforts, we
may be unable to prevent third parties from infringing our intellectual property and using our technology for their
competitive advantage. Any such infringement and use could adversely affect our business, financial condition or
results of operations.
The laws of some countries in which we operate do not offer the same protection of our intellectual property rights as
do the laws of the U.S. or Europe. In addition, effective intellectual property enforcement may be unavailable or limited
in certain countries, making it difficult for us to protect our intellectual property from misuse or infringement there.
Our inability to protect our intellectual property rights in some countries may harm our business, financial condition or
results of operations.
We are subject to risks relating to international markets and exposure to changes in local conditions.
We are subject to risks inherent to operating globally, including those related to:
exposure to local economic and political conditions;
import and/or export restrictions;
multiple tax regimes, including regulations relating to transfer pricing and withholding and other taxes on
remittances and other payments to or from subsidiaries;
foreign investment and/or trade restrictions or requirements, foreign exchange controls and restrictions on the
repatriation of funds; and
the introduction of more stringent laws and regulations.