Cincinnati Bell 2012 Annual Report Download - page 94

Download and view the complete annual report

Please find page 94 of the 2012 Cincinnati Bell annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 216

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

and vandalism, and have disaster recovery plans available for disruption of services. The failure to address these
or other events may result in a disruption of services. In addition, any inability to meet service level
commitments or other performance standards could reduce the confidence of customers and could consequently
impair the Company’s ability to attract and retain customers, which would adversely affect both the Company’s
ability to generate revenues and operating results.
A few large customers account for a significant portion of the Company’s revenues and accounts receivable.
The loss or significant reduction in business from one or more of these large customers could cause operating
revenues to decline significantly and have a materially adverse long-term impact on the Company’s business.
As of December 31, 2012, the Company had receivables with one large customer that exceeded 10% of the
Company’s outstanding accounts receivable balance. Contracts with customers may not sufficiently reduce the
inherent risk that customers may terminate or fail to renew their relationships with the Company. As a result of
customer concentration, the Company’s results of operations and financial condition could be materially affected
if the Company lost one or more large customers or if services purchased were significantly reduced. If one or
more of the Company’s larger customers were to default on its accounts receivable obligations, the Company
could be exposed to potentially significant losses in excess of the provisions established. This could also
negatively impact the available capacity under the Receivables Facility.
The Company depends on a number of third-party providers, and the loss of, or problems with, one or more of
these providers may impede the Company’s growth or cause it to lose customers.
The Company depends on third-party providers to supply products and services. For example, many of the
Company’s information technology and call center functions are performed by third-party providers, and network
equipment is purchased from and maintained by vendors. In addition, almost half of the wireless towers used by
CBW are managed by a single independent service provider. Any failure on the part of suppliers to provide the
contracted services, additional required services, or additional products could impede the Company’s business
and cause financial results to suffer.
A failure of back-office information technology systems could adversely affect the Company’s results of
operations and financial condition.
The efficient operation of the Company’s business depends on back-office information technology systems.
The Company relies on back-office information technology systems to effectively manage customer billing,
business data, communications, supply chain, order entry and fulfillment and other business processes. A failure
of the Company’s information technology systems to perform as anticipated could disrupt the Company’s
business and result in a failure to collect accounts receivable, transaction errors, processing inefficiencies, and the
loss of sales and customers, causing the Company’s reputation and results of operations to suffer. In addition,
information technology systems may be vulnerable to damage or interruption from circumstances beyond the
Company’s control, including fire, natural disasters, systems failures, security breaches and viruses. Any such
damage or interruption could have a material adverse effect on the Company’s business.
The business could be negatively impacted by cybersecurity threats.
Cybersecurity threats could adversely affect the wireline or wireless networks, the electronic payment
system, or the corporate network. Such threats could result in disruption of customer service, unauthorized access
to or misappropriation of confidential customer data, or damage to our internal network. Preventative measures
in place to mitigate such risks include use of dedicated private networks, strong user names and passwords,
intrusion protection systems, anti-virus software, and encryption and authentication technology. Weekly system
scans are performed on the most critical systems to identify potential vulnerabilities. These events could disrupt
operations, result in a loss of customers, lead to adverse publicity, or require significant amounts of capital to
remedy the cybersecurity breach.
20
Form 10-K Part I Cincinnati Bell Inc.