Rayovac 2015 Annual Report Download - page 44

Download and view the complete annual report

Please find page 44 of the 2015 Rayovac annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 176

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176

Our IT systems have been, and will likely continue to be, subject to computer viruses or other malicious codes,
unauthorized access attempts, phishing and other cyber-attacks. We continue to assess potential threats and make
investments seeking to address these threats, including monitoring of networks and systems and upgrading skills,
employee training and security policies for the Company and its third-party providers. However, because the
techniques used in these attacks change frequently and may be difficult to detect for periods of time, we may face
difficulties in anticipating and implementing adequate preventative measures. To date, we have seen no material
impact on our business or operations from these attacks; however, we cannot guarantee that our security efforts will
prevent breaches or breakdowns to our or our third-party providers’ databases or systems. If the IT systems,
networks or service providers we rely upon fail to function properly, or if we or one of our third-party providers
suffer a loss, significant unavailability of or disclosure of our business or stakeholder information, and our business
continuity plans do not effectively address these failures on a timely basis, we may be exposed to reputational,
competitive and business harm as well as litigation and regulatory action. The costs and operational consequences
of responding to breaches and implementing remediation measures could be significant.
Our actual or perceived failure to adequately protect personal data could adversely affect our business,
financial condition and results of operations.
A variety of state, national, foreign, and international laws and regulations apply to the collection, use,
retention, protection, disclosure, transfer, and other processing of personal data. These privacy- and data
protection-related laws and regulations are evolving, with new or modified laws and regulations proposed and
implemented frequently and existing laws and regulations subject to new or different interpretations. Compliance
with these laws and regulations can be costly and can delay or impede the development of new products.
We historically have relied upon adherence to the U.S. Department of Commerce’s Safe Harbor Privacy
Principles and compliance with the U.S.-EU Safe Harbor Framework agreed to by the U.S. Department of
Commerce and the EU. The U.S.-EU Safe Harbor Framework, which established means for legitimizing the
transfer of personal data by U.S. companies from the European Economic Area, or EEA, to the U.S., recently
was invalidated by a decision of the European Court of Justice, or the ECJ. In light of the ECJ’s decision, we are
reviewing our business practices and may find it necessary or desirable to make changes to our personal data
handling to cause our transfer and receipt of EEA residents’ personal data to be legitimized under applicable
European law. Our actual or alleged failure to comply with applicable laws and regulations, or to protect personal
data, could result in enforcement actions and significant penalties against us, which could result in negative
publicity, increase our operating costs, subject us to claims or other remedies and have a material adverse effect
on our business, financial condition, and results of operations.
Public perceptions that some of the products we produce and market are not safe could adversely affect us.
On occasion, customers have alleged that some products failed to perform up to expectations or have caused
damage or injury to individuals or property. Public perception that any of our products are not safe, whether
justified or not, could impair our reputation, damage our brand names and have a material adverse effect on our
business, financial condition and results of operations. In addition, we rely on certain third party trademarks,
brand names and logos over which we do not have exclusive use of. Public perception that any such third party
trademarks, band names and logos used by us are not safe, whether justified or not, could have a material adverse
effect on our business, financial condition and results of operations.
If we are unable to negotiate satisfactory terms to continue existing or enter into additional collective
bargaining agreements, we may experience an increased risk of labor disruptions and our results of
operations and financial condition may suffer.
Approximately 16% of our total labor force is covered by collective bargaining agreements. There are
4 collective bargaining agreements that will expire during our fiscal year ending September 30, 2016, which
cover approximately 60% of the labor force under collective bargaining agreements, or approximately 10% of
30