Nokia 2012 Annual Report Download - page 34

Download and view the complete annual report

Please find page 34 of the 2012 Nokia annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 284

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284

Our operations rely on the efficient and uninterrupted operation of complex and centralized
information technology systems and networks. If a system or network inefficiency, malfunction
or disruption occurs, this could have a material adverse effect on our business and results of
operations.
Our operations rely on the efficient and uninterrupted operation of complex and centralized information
technology systems and networks, which are integrated with those of third parties. All information
technology systems are potentially vulnerable to damage, malfunction or interruption from a variety of
sources. We are increasingly relying on third parties for the provision of information technology
systems and networks; for instance in early 2013, we announced plans to streamline our IT
organization including the transfer of certain activities and employees to HCL Technologies and
TATA Consultancy Services. We may experience disruptions if our partners do not deliver as we have
planned or if we are unable to successfully and smoothly implement the plans to streamline our IT
organization.
We pursue various measures in order to manage our risks related to system and network malfunction
and disruptions, including the use of multiple suppliers and available information technology security.
However, despite precautions taken by us, any malfunction or disruption of our current or future
systems or networks such as an outage in a telecommunications network used by any of our
information technology systems, or a breach of our cybersecurity, such as a malicious attack, malware
or other event that leads to an unanticipated interruption or malfunction of our information technology
systems or networks or data leakages, could have a material adverse effect on our brand image,
business and results of operations. In addition, if we fail to successfully use our information technology
systems and networks, our operational efficiency or competitiveness could be impaired which could
have a material adverse effect on our business and results of operations. A disruption, for instance in
our mail, music or location-based services, could cause significant discontent among users of our
products resulting in claims or deterioration of our brand image.
Any cybersecurity breach or other factors leading to an actual or alleged loss, improper
disclosure or leakage of any personal or consumer data collected by us or our partners or
subcontractors, made available to us or stored in or through our products could have a
material adverse effect on our sales, results of operations, reputation and value of the Nokia
brand.
Although we endeavor to develop products that meet the appropriate security standards, including with
respect to data protection, we or our products and online services, marketing and developer sites may
be subject to breaches in our cybersecurity, including hacking, viruses, worms and other malicious
software, unauthorized modifications or illegal activities, that may cause potential security risks and
other harm to us, our customers or consumers and other end-users of our products. Cybersecurity
concerns may affect us disproportionately due to our brand recognition in mobile products. Due to the
very high volumes of many of our mobile products, and the evolving nature of services and map data,
such events or mere allegations of such events may have a material adverse effect on our business.
Additionally, we contract with multiple third parties in various jurisdictions who collect and use certain
data on our behalf, for instance for marketing purposes. Although we have processes in place
designed to ensure appropriate collection, handling and use of such data, third parties may use the
data inappropriately, breach laws in collecting, handling or using such data or leak such data. This
could lead to lengthy proceedings or fines imposed on us as well as adverse effects to our reputation
and brand value.
In connection with providing our products to our customers and consumers, certain customer feedback,
information on consumer usage patterns and other personal and consumer data is collected and stored
through our products, in particular with smartphones, either by the consumers or by us or our partners
or subcontractors. Our developer sites may also require certain data to be provided by the developers.
33