Comcast 2013 Annual Report Download - page 34

Download and view the complete annual report

Please find page 34 of the 2013 Comcast annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 335

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335

Table of Contents
personal information and new data security and data retention requirements, and also expand the scope of COPPA to reach third-
party service providers that knowingly collect personal information through a child-directed website or service.
We are also subject to state and federal regulations and laws regarding information security. Most of these regulations and laws
apply to customer information that could be used to commit identity theft. Substantially all of the U.S. states and the District of
Columbia have enacted security breach notification laws. These laws generally require that a business give notice to its customers
whose financial account information has been disclosed because of a security breach. In addition, we maintain an identity theft
program that incorporates the guidance provided under the FTC’s “red flag rules,”
which are designed to detect the warning signs of
identity theft. The FTC and state attorneys general also have initiated efforts to increase and enforce transparency requirements
about the collection and use of consumer information, even in de-
identified form. These requirements may require ongoing review
of new and rapidly evolving technologies and methods for delivering content and advertising to ensure that appropriate notice is
given to consumers and consent is obtained where required.
In February 2013, the President directed the National Institute of Standards and Technology, in cooperation with other federal
agencies and owners and operators of U.S. critical infrastructure to develop a voluntary framework that provides a prioritized,
flexible, repeatable, performance-based, and cost-
effective approach to cyber risk, which was released in February 2014. It is a
compendium of existing, cross-
sector cyber defense processes, practices, and protocols that can help companies identify, assess,
and manage their cyber risks and vulnerabilities. Additionally, there are pending legislative proposals that could impose new
requirements on owners and operators of critical infrastructure. We cannot predict what proposals may ultimately be adopted or
how such requirements, if any, would affect our businesses.
We are also subject to state and federal “do not call”
laws regarding telemarketing and state and federal laws regarding unsolicited
commercial emails, as well as FCC regulations relating to automated telemarketing calls, texts or SMS messages. Additional and
more restrictive requirements may be imposed if and to the extent that state or local authorities establish their own privacy or
security standards or if Congress enacts new privacy or security legislation.
Advertising Restrictions
Legislation has been introduced and reports from various government agencies have been issued from time to time urging that
restrictions be placed on advertisements for particular products or services, including prescription drugs and the marketing of food
or violent entertainment to children, and on the deductibility of advertising expenses. We are unable to predict whether such reports
would result in legislative proposals, whether legislative proposals may be adopted, or, if adopted, what impact they would have on
our businesses.
Environmental Matters
Certain of our business operations are subject to environmental laws and regulations and involve air emissions, wastewater
discharges, and the use, disposal and cleanup of toxic and hazardous substances. Any failure to comply with environmental
requirements could result in monetary fines, civil or criminal sanctions, third-
party claims or other costs or liabilities. We have been
responsible for the cleanup of environmental contamination at some of NBCUniversal’s current and former facilities and at off-
site
waste disposal locations, although our share of the cost of such cleanups to date has not been material. In addition, the California
Attorney General and the Alameda County, California District Attorney are investigating whether certain of our waste disposal
policies, procedures and practices are in violation of the California Business and Professions Code and the California Health and
Safety Code. See Item 3, Legal Proceedings, in this Part I for more information.
29
Comcast 2013 Annual Report on Form 10
-
K