HP 2013 Annual Report Download - page 41

Download and view the complete annual report

Please find page 41 of the 2013 HP annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 204

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204

executives, engineers, skilled solutions providers in the IT support business and qualified sales
representatives are critical to our future, and competition for experienced employees in the IT industry
can be intense. In order to attract and retain executives and other key employees in a competitive
marketplace, we must provide a competitive compensation package, including cash- and share-based
compensation. Our share-based incentive awards include stock options, restricted stock units and
performance-based restricted units, some of which contain conditions relating to HP’s stock price
performance and HP’s long-term financial performance that make the future value of those awards
uncertain. If the anticipated value of such share-based incentive awards does not materialize, if our
share-based compensation otherwise ceases to be viewed as a valuable benefit, if our total
compensation package is not viewed as being competitive, or if we do not obtain the shareholder
approval needed to continue granting share-based incentive awards in the amounts we believe are
necessary, our ability to attract, retain, and motivate executives and key employees could be weakened.
The failure to successfully hire executives and key employees or the loss of any executives and key
employees could have a significant impact on our operations. Further, changes in our management
team may be disruptive to our business, and any failure to successfully transition and assimilate key
new hires or promoted employees could adversely affect our business and results of operations.
System security risks, data protection breaches, cyber attacks and systems integration issues could disrupt our
internal operations or information technology services provided to customers, and any such disruption could
reduce our expected revenue, increase our expenses, damage our reputation and adversely affect our stock
price.
Experienced computer programmers and hackers may be able to penetrate our network security
and misappropriate or compromise our confidential information or that of third-parties, create system
disruptions or cause shutdowns. Computer programmers and hackers also may be able to develop and
deploy viruses, worms, and other malicious software programs that attack our products or otherwise
exploit any security vulnerabilities of our products. In addition, sophisticated hardware and operating
system software and applications that we produce or procure from third-parties may contain defects in
design or manufacture, including ‘‘bugs’’ and other problems that could unexpectedly interfere with the
operation of the system. The costs to us to eliminate or alleviate cyber or other security problems,
bugs, viruses, worms, malicious software programs and security vulnerabilities could be significant, and
our efforts to address these problems may not be successful and could result in interruptions, delays,
cessation of service and loss of existing or potential customers that may impede our sales,
manufacturing, distribution or other critical functions.
We manage and store various proprietary information and sensitive or confidential data relating to
our business. In addition, our outsourcing services business routinely processes, stores and transmits
large amounts of data for our clients, including sensitive and personally identifiable information.
Breaches of our security measures or the accidental loss, inadvertent disclosure or unapproved
dissemination of proprietary information or sensitive or confidential data about us, our clients or
customers, including the potential loss or disclosure of such information or data as a result of fraud,
trickery or other forms of deception, could expose us, our customers or the individuals affected to a
risk of loss or misuse of this information, result in litigation and potential liability for us, damage our
brand and reputation or otherwise harm our business. We also could lose existing or potential
customers of outsourcing services or other IT solutions or incur significant expenses in connection with
our customers’ system failures or any actual or perceived security vulnerabilities in our products and
services. In addition, the cost and operational consequences of implementing further data protection
measures could be significant.
Portions of our IT infrastructure also may experience interruptions, delays or cessations of service
or produce errors in connection with systems integration or migration work that takes place from time
to time. We may not be successful in implementing new systems and transitioning data, which could
33