Comcast 2010 Annual Report Download - page 27

Download and view the complete annual report

Please find page 27 of the 2010 Comcast annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 351

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351

Table of Contents
Comcast 2010 Annual Report on Form 10-K
22
Other Areas of Regulation
Intellectual Property and Piracy
Copyright, trademark, unfair competition, patent, trade secret
and Internet/domain laws of the United States and other
countries help protect our intellectual property rights. In
particular, piracy of programming and films through
unauthorized distribution of counterfeit DVDs, peer-to-peer
file sharing and other platforms presents challenges for our
cable programming, broadcast and filmed entertainment
businesses. The unauthorized reproduction, distribution or
display of copyrighted material over the Internet or through
other methods of distribution, such as through devices,
software or websites that allow the reproduction, viewing,
sharing and/or downloading of content by either ignoring or
interfering with the content’s security features and
copyrighted status, interferes with the market for copyrighted
works and disrupts our ability to exploit our content. The
extent of copyright protection and the use of technological
protections, such as encryption, are controversial.
Modifications to existing laws that weaken these protections
could have an adverse effect on our ability to license and sell
our programming.
In October 2008, the Prioritizing Resources and Organization
for Intellectual Property Act of 2007 (the “PRO-IP Act”) was
signed into law in the United States. The PRO-IP Act
increases both civil and criminal penalties for counterfeiting
and piracy of intellectual property associated with works of
music and film (among others); provides enhanced resources
to law enforcement agencies for enforcing intellectual
property rights; criminalizes the exportation of counterfeited
goods; and creates an “Intellectual Property Enforcement
Coordinator,” a Senate-confirmed Presidential appointee
responsible for developing government-wide enforcement
policy, coordinating the enforcement efforts of U.S.
departments and agencies and coordinating the preparation
of a plan to reduce counterfeit and infringing goods in the
U.S. and international supply chain. In September 2010, the
Combating Online Infringement and Counterfeits Act was
introduced by the Senate Judiciary Committee. The bill would
give the Department of Justice the power to shut down
websites found to be offering infringing content by requiring
domain name registrars to suspend the domain names of the
offending sites and taking other actions to prevent third
parties from providing certain services to such sites.
While many legal protections exist to combat piracy, laws in
the United States and internationally continue to evolve, as
do technologies used to evade these laws. NBCUniversal
has actively engaged in the enforcement of its intellectual
property rights, and it is likely that we will continue to expend
substantial resources to protect our content. The repeal of
laws intended to combat piracy and protect intellectual
property or weakening of such laws or enforcement in the
United States or internationally, or a failure of existing laws to
adapt to new technologies, could make it more difficult for us
to adequately protect our intellectual property rights,
negatively impacting their value and further increasing the
costs of enforcing our rights.
Privacy and Security Regulation
The Communications Act generally restricts the
nonconsensual collection and disclosure to third parties of
cable customers’ personally identifiable information by cable
operators. There are exceptions that permit such collection
and disclosure for rendering service, conducting legitimate
business activities related to the service, and responding to
legal requests. The Communications Act also provides
privacy protections for customer proprietary network
information, or CPNI, related to our digital phone services.
Several states and the District of Columbia have enacted
privacy laws that apply to cable services.
The FTC has begun to exercise greater authority over privacy
protections generally, using its existing authority over unfair
and deceptive practices and other public proceedings to
apply greater restrictions on the collection and use of
personally identifiable and other information relating to
consumers. In December 2010, the FTC staff issued a draft
recommendation that privacy rules should address consumer
concerns over the collection and use of personal and profiling
information, even in the absence of demonstrated consumer
harm. In a December 2010 report, the Commerce
Department also suggested an expansion of privacy
protections, although with greater reliance on enforceable
industry codes. Legislation has also been introduced in
Congress that would regulate the use of personal and
profiling information for advertising. In addition, the FTC is
reviewing its implementation of the Children’s Online Privacy
Protection Act (“COPPA”). COPPA imposes requirements on
website operators and online services that are aimed at
children under 13 years of age, that collect personal
information from children under 13 years of age or that
knowingly post personal information from children under 13
years of age. The FTC is considering whether to expand the
reach of its COPPA rules to interactive TV and online
behavioral advertising; such changes, if adopted, could have
an adverse impact on our businesses to the extent our
networks and websites offer content targeted to children and
teens.
We are also subject to state and federal rules and laws
regarding information security. Most of these rules and laws
apply to customer information that could be used to commit
identity theft. Substantially all of the U.S. states and the
District of Columbia have enacted security breach notification
laws. These laws generally require that a business give
notice to its customers whose financial account information
has been disclosed because of a security breach. The FTC is
applying the “red flag rules” in the Fair and Accurate Credit
Transactions Act of 2003 to both financial institutions and
creditors, and we may be considered to be a creditor under
the FTC’s interpretation of the rules.
We are also subject to state and federal “do not call” laws
regarding telemarketing and state and federal laws regarding
unsolicited