HP 2011 Annual Report Download - page 29

Download and view the complete annual report

Please find page 29 of the 2011 HP annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 182

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182

System security risks, data protection breaches, cyber-attacks and systems integration issues could disrupt our
internal operations or information technology services provided to customers, and any such disruption could
reduce our expected revenue, increase our expenses, damage our reputation and adversely affect our stock
price.
Experienced computer programmers and hackers may be able to penetrate our network security
and misappropriate or compromise our confidential information or that of third parties, create system
disruptions or cause shutdowns. Computer programmers and hackers also may be able to develop and
deploy viruses, worms, and other malicious software programs that attack our products or otherwise
exploit any security vulnerabilities of our products. In addition, sophisticated hardware and operating
system software and applications that we produce or procure from third parties may contain defects in
design or manufacture, including ‘‘bugs’’ and other problems that could unexpectedly interfere with the
operation of the system. The costs to us to eliminate or alleviate cyber or other security problems,
bugs, viruses, worms, malicious software programs and security vulnerabilities could be significant, and
our efforts to address these problems may not be successful and could result in interruptions, delays,
cessation of service and loss of existing or potential customers that may impede our sales,
manufacturing, distribution or other critical functions.
We manage and store various proprietary information and sensitive or confidential data relating to
our business. In addition, our outsourcing services business routinely processes, stores and transmits
large amounts of data for our clients, including sensitive and personally identifiable information.
Breaches of our security measures or the accidental loss, inadvertent disclosure or unapproved
dissemination of proprietary information or sensitive or confidential data about us or our clients,
including the potential loss or disclosure of such information or data as a result of fraud, trickery or
other forms of deception, could expose us, our customers or the individuals affected to a risk of loss or
misuse of this information, result in litigation and potential liability for us, damage our brand and
reputation or otherwise harm our business. We also could lose existing or potential customers for
outsourcing services or other information technology solutions or incur significant expenses in
connection with our customers’ system failures or any actual or perceived security vulnerabilities in our
products. In addition, the cost and operational consequences of implementing further data protection
measures could be significant.
Portions of our IT infrastructure also may experience interruptions, delays or cessations of service
or produce errors in connection with systems integration or migration work that takes place from time
to time. We may not be successful in implementing new systems and transitioning data, which could
cause business disruptions and be more expensive, time consuming, disruptive and resource-intensive.
Such disruptions could adversely impact our ability to fulfill orders and interrupt other processes.
Delayed sales, lower margins or lost customers resulting from these disruptions have adversely affected
in the past, and in the future could adversely affect, our financial results, stock price and reputation.
The revenue and profitability of our operations have historically varied, which makes our future financial
results less predictable.
Our revenue, gross margin and profit vary among our products and services, customer groups and
geographic markets and therefore will likely be different in future periods than our current results. Our
revenue depends on the overall demand for our products and services. Delays or reductions in IT
spending could materially adversely affect demand for our products and services, which could result in
a significant decline in revenues. Overall gross margins and profitability in any given period are
dependent partially on the product, service, customer and geographic mix reflected in that period’s net
revenue. Competition, lawsuits, investigations and other risks affecting those businesses therefore may
have a significant impact on our overall gross margin and profitability. Certain segments have a higher
fixed cost structure and more variation in gross margins across their business units and product
portfolios than others and may therefore experience significant operating profit volatility on a quarterly
21