Crucial 2012 Annual Report Download - page 21

Download and view the complete annual report

Please find page 21 of the 2012 Crucial annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 298

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298

20
If our manufacturing process is disrupted, our business, results of operations or financial condition could be materially
adversely affected.
We manufacture products using highly complex processes that require technologically advanced equipment and continuous
modification to improve yields and performance. Difficulties in the manufacturing process or the effects from a shift in product
mix can reduce yields or disrupt production and may increase our per gigabit manufacturing costs. Additionally, our control
over operations at our IMFT, Inotera and MP Mask joint ventures is limited by our agreements with our partners. From time to
time, we have experienced disruptions in our manufacturing process as a result of power outages, improperly functioning
equipment and equipment failures. If production at a fabrication facility is disrupted for any reason, manufacturing yields may
be adversely affected or we may be unable to meet our customers' requirements and they may purchase products from other
suppliers. This could result in a significant increase in manufacturing costs or loss of revenues or damage to customer
relationships, which could materially adversely affect our business, results of operations or financial condition.
Breaches of our network security could expose us to losses.
We manage and store on our network systems, various proprietary information and sensitive or confidential data relating to
our operations. We also process, store, and transmit large amounts of data for our customers, including sensitive personal
information. Computer programmers and hackers may be able to gain unauthorized access to our network system and steal
proprietary information, compromise confidential information, create system disruptions, or cause shutdowns. These parties
may also be able to develop and deploy viruses, worms, and other malicious software programs that disrupt our operations and
create security vulnerabilities. Attacks on our network systems could result in significant losses and damage our reputation
with customers.
We are subject to counterparty default risks.
We have numerous arrangements with financial institutions that subject us to counterparty default risks, including cash
deposits, investments, foreign currency option and forward contracts, and capped-call contracts on our stock. As a result, we
are subject to the risk that the counterparty to one or more of these arrangements will default on its performance obligations. A
counterparty may default rapidly and without notice to us, which could limit our ability to take action to mitigate our exposure.
Additionally, our ability to mitigate our exposures may be constrained by the terms of our contractual arrangements or because
market conditions prevent us from taking effective action. If one of our counterparties becomes insolvent or files for
bankruptcy, our ability to recover any losses suffered as a result of that counterparty's default may be limited by the liquidity of
the counterparty or the applicable laws governing the bankruptcy proceeding. In the event of such default, we could incur
significant losses, which could adversely impact our business, results of operations or financial condition.
ITEM 1B. UNRESOLVED STAFF COMMENTS
None.