HP 2014 Annual Report Download - page 43

Download and view the complete annual report

Please find page 43 of the 2014 HP annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 196

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196

deploy viruses, worms, and other malicious software programs that attack our products or otherwise
exploit any security vulnerabilities of our products. In addition, sophisticated hardware and operating
system software and applications that we produce or procure from third-parties may contain defects in
design or manufacture, including ‘‘bugs’’ and other problems that could unexpectedly interfere with the
operation of the system. The costs to us to eliminate or alleviate cyber or other security problems,
bugs, viruses, worms, malicious software programs and security vulnerabilities could be significant, and
our efforts to address these problems may not be successful and could result in interruptions, delays,
cessation of service and loss of existing or potential customers that may impede our sales,
manufacturing, distribution or other critical functions.
We manage and store various proprietary information and sensitive or confidential data relating to
our business. In addition, our outsourcing services business routinely processes, stores and transmits
large amounts of data for our clients, including sensitive and personally identifiable information.
Breaches of our security measures or the accidental loss, inadvertent disclosure or unapproved
dissemination of proprietary information or sensitive or confidential data about us, our clients or
customers, including the potential loss or disclosure of such information or data as a result of fraud,
trickery or other forms of deception, could expose us, our customers or the individuals affected to a
risk of loss or misuse of this information, result in litigation and potential liability for us, damage our
brand and reputation or otherwise harm our business. We also could lose existing or potential
customers of outsourcing services or other IT solutions or incur significant expenses in connection with
our customers’ system failures or any actual or perceived security vulnerabilities in our products and
services. In addition, the cost and operational consequences of implementing further data protection
measures could be significant.
Portions of our IT infrastructure also may experience interruptions, delays or cessations of service
or produce errors in connection with systems integration or migration work that takes place from time
to time. We may not be successful in implementing new systems and transitioning data, which could
cause business disruptions and be more expensive, time-consuming, disruptive and resource intensive.
Such disruptions could adversely impact our ability to fulfill orders and respond to customer requests
and interrupt other processes. Delayed sales, lower margins or lost customers resulting from these
disruptions could reduce our expected revenue, increase our expenses, damage our reputation and
adversely affect our stock price.
Terrorist acts, conflicts, wars and geopolitical uncertainties may seriously harm our business and revenue,
costs and expenses and financial condition and stock price.
Terrorist acts, conflicts or wars (wherever located around the world) may cause damage or
disruption to our business, our employees, facilities, partners, suppliers, distributors, resellers or
customers or adversely affect our ability to manage logistics, operate our transportation and
communication systems or conduct certain other critical business operations. The potential for future
attacks, the national and international responses to attacks or perceived threats to national security,
and other actual or potential conflicts or wars have created many economic and political uncertainties.
In addition, as a major multinational company with headquarters and significant operations located in
the United States, actions against or by the United States may impact our business or employees.
Although it is impossible to predict the occurrences or consequences of any such events, if they occur,
they could result in a decrease in demand for our products, make it difficult or impossible to provide
services or deliver products to our customers or to receive components from our suppliers, create
delays and inefficiencies in our supply chain and result in the need to impose employee travel
restrictions. We are predominantly uninsured for losses and interruptions caused by terrorist acts,
conflicts and wars.
35