Henry Schein 2013 Annual Report Download - page 36

Download and view the complete annual report

Please find page 36 of the 2013 Henry Schein annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 120

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

27
Cyber-security risks generally associated with our information systems and our technology products and services
could adversely affect our results of operations.
We rely on information systems (IS) in our business to obtain, rapidly process, analyze and manage data to,
among other things:
maintain and manage worldwide systems to facilitate the purchase and distribution of thousands of
inventory items from numerous distribution centers;
receive, process and ship orders on a timely basis;
manage the accurate billing and collections for thousands of customers;
process payments to suppliers; and
maintain certain of our customers’ electronic medical records.
A cyber-attack that bypasses our IS security systems causing an IS security breach may lead to a material
disruption of our IS business systems and/or the loss of business information resulting in adverse business impact.
Risks may include, among other things:
future results could be adversely affected due to the theft, destruction, loss, misappropriation or
release of confidential data or intellectual property;
operational or business delays resulting from the disruption of IS systems and subsequent clean-up
and mitigation activities; and
negative publicity resulting in reputation or brand damage with our customers, partners or industry
peers.
Our results of operations could be adversely affected if our IS systems are interrupted, damaged by unforeseen
events, cyber-attacks or fail for any extended period of time.
We develop products and provide services to our customers that are technology-based. A cyber-attack that
bypasses the security systems of our products or services causing a security breach and/or perceived security
vulnerabilities in our products or services could cause significant reputational harm. Actual or perceived
vulnerabilities may lead to claims against us by our customers and/or governmental agencies. Although our
customer license agreements typically contain provisions that eliminate or limit our exposure to such liability, there
is no assurance these provisions will withstand all legal challenges.
Failure to maintain the confidentiality of sensitive customer data in accordance with applicable regulatory
requirements, or to abide by electronic health data transmission standards, could also expose us to claims, fines and
penalties and costs for remediation. Additionally, legislative or regulatory action related to cyber-security may
increase our costs to develop or implement new technology products and services.
We have various insurance policies, including cyber liability insurance, covering risks and in amounts that we
consider adequate. There can be no assurance that the insurance coverage we maintain is sufficient or will be
available in adequate amounts or at a reasonable cost. Successful claims for misappropriation or release of
confidential or personal data brought against us in excess of available insurance or fines or other penalties assessed
or any claim that results in significant adverse publicity against us, could have an adverse effect on our business and
our reputation.