Google 2013 Annual Report Download - page 19

Download and view the complete annual report

Please find page 19 of the 2013 Google annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 96

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96

13GOOGLE INC.

ITEM1A.RiskFactors
Regulatory authorities around the world are considering a number of legislative and regulatory proposals concerning data protection.
In addition, the interpretation and application of consumer and data protection laws in the U.S., Europe and elsewhere are often
uncertainandinux.Itispossiblethattheselawsmaybeinterpretedandappliedinamannerthatisinconsistentwithourdata
practices.Ifso,inadditiontothepossibilityofnes,thiscouldresultinanorderrequiringthatwechangeourdatapractices,
whichcouldhaveanadverseeectonourbusinessandresultsofoperations.Complyingwiththesevariouslawscouldcauseus
to incur substantial costs or require us to change our business practices in a manner adverse to our business.
We face a number of manufacturing and supply chain risks that, if not properly managed, could adversely impact our

We face a number of risks related to manufacturing and supply chain management. For instance, the products we sell may have
quality issues resulting from the design or manufacture of the product, or from the software used in the product. Sometimes,
these issues may be caused by components we purchase from other manufacturers or suppliers. If the quality of our products
does not meet our customers’ expectations or our products are found to be defective, then our sales and operating earnings,
and ultimately our reputation, could be negatively impacted.
Werelyonthirdpartiestomanufacturemanyofourassembliesandnishedproducts,andwehavethird-partyarrangementsfor
thedesignofsomecomponentsandparts.Ourbusinesscouldbenegativelyaectedifwearenotabletoengagethirdparties
with the necessary capabilities or capacity on reasonable terms, or if those we engage fail to meet their obligations (whether due to
nancialdicultiesorotherreasons),ormakeadversechangesinthepricingorothermaterialtermsofourarrangementswiththem.
In the past, Motorola, like many electronics manufacturers, has experienced supply shortages and price increases driven by raw
materialavailability,manufacturingcapacity,laborshortages,industryallocations,naturaldisastersandsignicantchangesin
thenancialorbusinessconditionofitssuppliers.Workaroundplanstoaddressshortageshaveentailedinthepast,andcould
entail in the future, increased freight costs for expedited shipments. We cannot assure you that we will not experience shortages
or other supply chain disruptions in the future or that they will not negatively impact our operations. In addition, some of the
components we use in our products are available only from a single source or limited sources, and we cannot assure you that we
wouldbeabletondreplacementvendorsonfavorabletermsoratallintheeventofasupplychaindisruption.
Additionally, because many of our supply contracts have volume-based pricing or minimum purchase requirements, if the volume
of our hardware sales decreases or does not reach projected targets, we could face increased materials and manufacturing
costsorothernancialliabilitiesthatcouldmakeourhardwareproductsmorecostlyperunittomanufactureandthereforeless
competitiveandnegativelyimpactournancialresults.Further,certainofourcompetitorsmaynegotiatemorefavorablecontractual
terms based on volume and other commitments that may provide them with competitive advantages and may impact our supply.
We also require our suppliers and business partners to comply with law and company policies regarding workplace and employment
practices, environmental compliance and intellectual property licensing, but we do not control them or their practices. If any of
them violates laws or implements practices regarded as unethical, we could experience supply chain disruptions, canceled orders,
terminations of or damage to key relationships, and damage to our reputation. If any of them fails to procure necessary license
rights to third-party intellectual property, legal action could ensue that could impact the salability of our products and expose us
tonancialobligationstothirdparties.
TheDodd-FrankWallStreetReformandConsumerProtectionActincludesdisclosurerequirementsregardingtheuseof“conict”
mineralsminedfromtheDemocraticRepublicofCongoandadjoiningcountries(DRC)andproceduresregardingamanufacturer’s
eortstopreventthesourcingofsuch“conict”minerals.SECrulesimplementingtheserequirementsmayhavetheeectof
reducingthepoolofsupplierswhocansupplyDRC“conictfree”componentsandparts,andwemaynotbeabletoobtainDRC
conictfreeproductsorsuppliesinsucientquantitiesforouroperations.Sinceoursupplychainiscomplex,wemayface
reputationalchallengeswithourcustomers,stockholdersandotherstakeholdersifweareunabletosucientlyverifytheorigins
forthe“conict”mineralsusedinourproducts.
If our security measures are breached, or if our services are subject to attacks that degrade or deny the ability of users to
access our products and services, our products and services may be perceived as not being secure, users and customers

Our products and services involve the storage and transmission of users’ and customers’ proprietary information, and security breaches
expose us to a risk of loss of this information, litigation, and potential liability. We experience cyber attacks of varying degrees on a regular
basis, and as a result, unauthorized parties have obtained, and may in the future obtain, access to our data or our users’ or customers’
data. Our security measures may also be breached due to employee error, malfeasance, or otherwise. Additionally, outside parties
may attempt to fraudulently induce employees, users, or customers to disclose sensitive information in order to gain access to our
dataorourusers’orcustomers’data.Anysuchbreachorunauthorizedaccesscouldresultinsignicantlegalandnancialexposure,
damagetoourreputation,andalossofcondenceinthesecurityofourproductsandservicesthatcouldpotentiallyhaveanadverse
eectonourbusiness.Becausethetechniquesusedtoobtainunauthorizedaccess,disableordegradeservice,orsabotagesystems
change frequently and often are not recognized until launched against a target, we may be unable to anticipate these techniques or
to implement adequate preventative measures. If an actual or perceived breach of our security occurs, the market perception of the
eectivenessofoursecuritymeasurescouldbeharmedandwecouldloseusersandcustomers.
contents