Comcast 2013 Annual Report Download - page 42

Download and view the complete annual report

Please find page 42 of the 2013 Comcast annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 335

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335

Table of Contents
intended to legitimize some of these practices. There can be no assurance as to whether the courts will ultimately invalidate these
practices or the pending legislation will be enacted, or how any such rulings or legislation would ultimately affect our businesses.
Piracy and other unauthorized uses of content are made easier, and the enforcement of intellectual property rights more
challenging, by technological advances allowing the conversion of programming, films and other content into digital formats, which
facilitates the creation, transmission and sharing of high-
quality unauthorized copies. In particular, piracy of programming and films
through unauthorized distribution on DVDs, peer-to-
peer computer networks and other platforms continues to present challenges
for our cable networks, broadcast television and filmed entertainment businesses. While piracy is a challenge in the United States,
it is particularly prevalent in many parts of the world that lack developed copyright laws, effective enforcement of copyright laws and
technical protective measures like those in effect in the United States. If any U.S. or international laws intended to combat piracy
and protect intellectual property rights are repealed or weakened or are not adequately enforced, or if the legal system fails to adapt
to new technologies that facilitate piracy, we may be unable to effectively protect our rights, and the value of our intellectual
property may be negatively impacted and our costs of enforcing our rights may increase. See “Business –
Legislation and
Regulation – Other Areas of Regulation – Intellectual Property” above for additional information.
We rely on network and information systems and other technologies, as well as key properties, and a disruption, cyber
attack, failure or destruction of such networks, systems, technologies or properties may disrupt our businesses.
Network and information systems and other technologies, including those related to our network management, customer service
operations and programming delivery, are critical to our business activities. Network and information systems-
related events, such
as computer hackings, cyber attacks, computer viruses, worms or other destructive or disruptive software, process breakdowns,
denial of service attacks, malicious social engineering or other malicious activities, or any combination of the foregoing, or power
outages, natural disasters, terrorist attacks or other similar events, could result in a degradation or disruption of our services,
excessive call volume to call centers or damage to our properties, equipment and data. These events also could result in large
expenditures to repair or replace the damaged properties, networks or information systems or to protect them from similar events in
the future. Further, any security breaches, such as misappropriation, misuse, leakage, falsification or accidental release or loss of
information maintained in our information technology systems, including customer, personnel and vendor data, could damage our
reputation and require us to expend significant capital and other resources to remedy any such security breach. We may provide
certain confidential, proprietary and personal information to third parties in connection with our businesses, and while we obtain
assurances that these third parties will protect this information, there is a risk that this information may be compromised. Moreover,
the amount and scope of insurance we maintain against losses resulting from any such events or security breaches may not be
sufficient to cover our losses or otherwise adequately compensate us for any disruptions to our businesses that may result, and the
occurrence of any such events or security breaches could have a material adverse effect on our businesses.
The risk of these systems-
related events and security breaches occurring continues to intensify, in part because we maintain
certain information necessary to conduct our businesses in digital form stored on cloud servers. In the ordinary course of our
business, there are frequent attempts to cause such systems-
related events and security breaches, and we have experienced a
few minor systems-
related events that, to date, have not resulted in any significant degradation or disruption to our network or
information systems or our services or operations. While we develop and maintain systems seeking to prevent systems-
related
events and security breaches from occurring, the development and maintenance of these systems is costly and requires ongoing
monitoring and updating as technologies change and efforts to overcome security measures become more sophisticated. Despite
these efforts, there can be no assurance that these events and security breaches will not occur in the future or will not have an
adverse effect on our businesses.
37
Comcast 2013 Annual Report on Form 10
-
K