Comcast 2012 Annual Report Download - page 37

Download and view the complete annual report

Please find page 37 of the 2012 Comcast annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 301

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301

Table of Contents
We rely on network and information systems and other technologies, as well as key properties, and a disruption, cyber
attack, failure or destruction of such networks, systems, technologies or properties may disrupt our businesses.
Network and information systems and other technologies, including those related to our network management, customer service
operations and programming delivery, are critical to our business activities. Network and information systems-
related events, such as
computer hackings, cyber attacks, computer viruses, worms or other destructive or disruptive software, process breakdowns, denial
of service attacks, malicious social engineering or other malicious activities, or any combination of the foregoing, or power outages,
natural disasters, terrorist attacks or other similar events, could result in a degradation or disruption of our services, excessive call
volume to call centers or damage to our properties, equipment and data. These events also could result in large expenditures to
repair or replace the damaged properties, networks or information systems or to protect them from similar events in the future.
Further, any security breaches, such as misappropriation, misuse, leakage, falsification or accidental release or loss of information
maintained in our information technology systems, including customer, personnel and vendor data, could damage our reputation and
require us to expend significant capital and other resources to remedy any such security breach. We may provide certain
confidential, proprietary and personal information to third parties in connection with our businesses, and while we obtain assurances
that these third parties will protect this information, there is a risk that this information may be compromised. Moreover, the amount
and scope of insurance we maintain against losses resulting from any such events or security breaches may not be sufficient to
cover our losses or otherwise adequately compensate us for any disruptions to our businesses that may result, and the occurrence
of any such events or security breaches could have a material adverse effect on our businesses.
The risk of these systems-
related events and security breaches occurring has intensified, in part because we maintain certain
information necessary to conduct our businesses in digital form stored on cloud servers. In the ordinary course of our business, there
are frequent attempts to cause such systems-related events and security breaches, and we have experienced a few minor systems-
related events that, to date, have not resulted in any significant degradation or disruption to our network or information systems or
our services or operations. While we develop and maintain systems seeking to prevent systems-
related events and security
breaches from occurring, the development and maintenance of these systems is costly and requires ongoing monitoring and
updating as technologies change and efforts to overcome security measures become more sophisticated. Despite these efforts,
there can be no assurance that these events and security breaches will not occur in the future or not have an adverse effect on our
businesses.
Our businesses depend on using and protecting certain intellectual property rights and on not infringing the intellectual
property rights of others.
We rely on our intellectual property, such as patents, copyrights, trademarks and trade secrets, as well as licenses and other
agreements with our vendors and other third parties, to use various technologies, conduct our operations and sell our products and
services. Legal challenges to our intellectual property rights and claims of intellectual property infringement by third parties could
require that we enter into royalty or licensing agreements on unfavorable terms, incur substantial monetary liability or be enjoined
preliminarily or permanently from further use of the intellectual property in question or from the continuation of our businesses as
currently conducted. We may need to change our business practices if any of these events occur, which may limit our ability to
compete effectively and could have an adverse effect on our results of operations. Even if we believe any such
challenges or claims
are without merit, they can be time-consuming and costly to defend and divert management’
s attention and resources away from our
businesses. Moreover, if we are unable to obtain or continue to obtain licenses from our vendors and other third parties on
reasonable terms, our businesses could be adversely affected.
Comcast 2012 Annual Report on Form 10-K
34