JCPenney 2015 Annual Report Download - page 10

Download and view the complete annual report

Please find page 10 of the 2015 JCPenney annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 177

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177

Table of Contents


We sell merchandise over the Internet through our website, www.jcpenney.com, and through mobile applications for smart phones and tablets. Our Internet
operations are subject to numerous risks, including rapid technological change and the implementation of new systems and platforms; liability for online and
mobile content; violations of state or federal laws, including those relating to online and mobile privacy and intellectual property rights; credit card fraud;
problems associated with the operation and security of our website, mobile applications and related support systems; computer viruses; telecommunications
failures; electronic break-ins and similar disruptions; and the allocation of inventory between our online operations and department stores. The failure of our
website or mobile applications to perform as expected could result in disruptions and costs to our operations and make it more difficult for customers to
purchase merchandise online. In addition, our inability to successfully develop and maintain the necessary technological interfaces for our customers to
purchase merchandise through our website and mobile applications, including user friendly software applications for smart phones and tablets, could result in
the loss of Internet sales and have an adverse impact on our results of operations.


Our operations are dependent upon the integrity, security and consistent operation of various systems and data centers, including the point-of-sale systems in
the stores, our Internet website and mobile applications, data centers that process transactions, communication systems and various software applications
used throughout our Company to track inventory flow, process transactions, generate performance and financial reports and administer payroll and benefit
plans.
We have implemented several products from third party vendors to simplify our processes and reduce our use of customized existing legacy systems and
expect to place additional applications into operation in the future. Implementing new systems carries substantial risk, including implementation delays, cost
overruns, disruption of operations, potential loss of data or information, lower customer satisfaction resulting in lost customers or sales, inability to deliver
merchandise to our stores or our customers, the potential inability to meet reporting requirements and unintentional security vulnerabilities. There can be no
assurances that we will successfully launch the new systems as planned, that the new systems will perform as expected or that the new systems will be
implemented without disruptions to our operations, any of which may cause critical information upon which we rely to be delayed, unreliable, corrupted,
insufficient or inaccessible.
We also outsource various information technology functions to third party service providers and may outsource other functions in the future. We rely on
those third party service providers to provide services on a timely and effective basis and their failure to perform as expected or as required by contract could
result in disruptions and costs to our operations.
Our vendors are also highly dependent on the use of information technology systems. Major disruptions in their information technology systems could result
in their inability to communicate with us or otherwise to process our transactions or information, their inability to perform required functions, or in the loss or
corruption of our information, any and all of which could result in disruptions to our operations. Our vendors are responsible for having safeguards and
procedures in place to protect the confidentiality, integrity and security of our information, and to protect our information and systems against unauthorized
access, disclosure or acquisition. Any failure in their systems to operate or in their ability to protect our information or systems could have a material adverse
impact on our business and results of operations.


We are in the process of insourcing certain business functions and may also need to continue to insource other aspects of our business in the future in order to
effectively manage our costs and stay competitive. We may also seek from time to time to relocate certain business functions to countries other than the
United States to access highly skilled labor markets and further control costs. There is no assurance that these efforts will be successful. Further, these actions
may cause disruptions that negatively impact our business. If we are ultimately unable to perform insourced functions better than, or at least as well as, our
current third party providers, our operating results could be adversely impacted.
10