Nokia 2009 Annual Report Download - page 20

Download and view the complete annual report

Please find page 20 of the 2009 Nokia annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 264

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264

result of actual or perceived errors or defects in the map database. In addition, the business
customers may require us to correct defective data, which can be costly, or pay penalties if quality
requirements or service level agreements are not satisfied.
Our mobile devices and related accessories are also subject to counterfeiting activities in certain
markets. Counterfeit products may erode our brand due to poor quality. Such activities may affect us
disproportionately due to our leading market position in mobile devices. Furthermore, our products
and services are increasingly used together with hardware, software or service components that have
been developed by third parties, whether or not we have authorized their use with our products and
services. However, such components, such as batteries or software applications and content, may not
be compatible with our products and services and may not meet our and our customers’ and
consumers’ quality, safety, security or other standards. Additionally, certain components or layers that
may be used with our products may enable our products and services to be used for objectionable
purposes, such as to transfer content that might be illegal, hateful or derogatory. The use of our
products and services and their combinations with incompatible or otherwise substandard hardware,
software or software components, or for purposes that are inappropriate, is largely outside of our
control and could harm the Nokia brand.
Although we endeavor to develop products and services that meet the appropriate security standards,
such as data protection, we or our products and services and their combinations may be subject to
hacking, viruses, worms and other malicious software, unauthorized modifications or illegal activities
that may cause potential security risks and other harm to us, our customers or consumers and other
endusers of our products and services. This may affect us disproportionately due to our leading
market position in mobile devices, many of which feature industry leading thirdparty software,
solutions and services, as hackers tend to focus their efforts on the most popular products and
services. Due to the very high volumes of many of our mobile devices, such events or mere
allegations of such events may have a material adverse effect on our business.
In connection with providing our products and services and their combinations to our customers and
consumers, in particular with converged mobile devices, certain customer feedback, information on
consumer usage patterns and other personal and consumer data is collected and stored through our
products and services and their combinations either by the consumers or by us. Loss, improper
disclosure or leakage of any personal or consumer data collected by us, made available to us or stored
in or through our products and services could result in liability to us and harm our reputation and
brand. In addition, governmental authorities may use our products or services and their combinations
to access the personal data of individuals without our involvement, for example, through socalled
lawful intercept capability of network infrastructure. Even perceptions that our products and services
and their combinations do not adequately protect personal or consumer data collected by us, made
available to us or stored in or through our products and services or that they are being used by third
parties to access personal or consumer data could impair our sales or our reputation and brand value.
We are a global company and have sales in most countries of the world and, consequently,
our sales and profitability are dependent on the development of the mobile and fixed
communications industry in numerous diverse markets, as well as on general economic
conditions globally and regionally.
Our sales and profitability depend materially on the development of the mobile and fixed
communications industry in numerous diverse markets in terms of the number of new mobile
subscribers and the number of existing subscribers who upgrade or replace their existing mobile
devices and the growth of the investments made by mobile network operators and service providers.
In certain low penetration markets, in order to support a continued increase in mobile subscribers,
we continue to be dependent on our own and mobile network operators’ and distributors’ ability to
increase the sales volumes of lower cost mobile devices and on mobile network operators to offer
affordable tariffs and tailored mobile network solutions designed for a low total cost of ownership. In
highly penetrated markets, we are more dependent on our own and mobile network operators’
18