Salesforce.com 2010 Annual Report Download - page 16

Download and view the complete annual report

Please find page 16 of the 2010 Salesforce.com annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 326

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326

Table of Contents
ITEM 1A. RISK FACTORS
The risks and uncertainties described below are not the only ones facing us. Other events that we do not currently anticipate or that we currently deem
immaterial also may affect our results of operations, cash flows and financial condition.
Risks Related to Our Business and Industry
Defects or disruptions in our service could diminish demand for our service and subject us to substantial liability.
Because our service is complex and we have incorporated a variety of new computer hardware and software which is developed in-house and acquired
from third party vendors, our service may have errors or defects that users identify after they begin using it that could result in unanticipated downtime for our
subscribers and harm our reputation and our business. Internet-based services frequently contain undetected errors when first introduced or when new versions
or enhancements are released. We have from time to time found defects in our service and new errors in our existing service may be detected in the future. In
addition, our customers may use our service in unanticipated ways that may cause a disruption in service for other customers attempting to access their data.
Since our customers use our service for important aspects of their business, any errors, defects, disruptions in service or other performance problems with our
service could hurt our reputation and may damage our customers' businesses. If that occurs, customers could elect not to renew, or delay or withhold payment
to us, we could lose future sales or customers may make warranty or other claims against us, which could result in an increase in our provision for doubtful
accounts, an increase in collection cycles for accounts receivable or the expense and risk of litigation.
Interruptions or delays in service from our third-party data center hosting facilities could impair the delivery of our service and harm our business.
We currently serve our customers from third-party data center hosting facilities located in the United States and Singapore. Any damage to, or failure
of, our systems generally could result in interruptions in our service. As we continue to add data centers and add capacity in our existing data centers, we may
move or transfer our data and our customers' data. Despite precautions taken during this process, any unsuccessful data transfers may impair the delivery of
our service. Further, any damage to, or failure of, our systems generally could result in interruptions in our service. Interruptions in our service may reduce
our revenue, cause us to issue credits or pay penalties, cause customers to terminate their subscriptions and adversely affect our renewal rates and our ability
to attract new customers. Our business will also be harmed if our customers and potential customers believe our service is unreliable.
As part of our current disaster recovery arrangements, our production environment and all of our customers' data is currently replicated in near real-time
in a facility located on the east coast of the United States. Companies and products added through acquisition may be temporarily served through alternate
facilities. We do not control the operation of any of these facilities, and they are vulnerable to damage or interruption from earthquakes, floods, fires, power
loss, telecommunications failures and similar events. They may also be subject to break-ins, sabotage, intentional acts of vandalism and similar misconduct.
Despite precautions taken at these facilities, the occurrence of a natural disaster or an act of terrorism, a decision to close the facilities without adequate notice
or other unanticipated problems at these facilities could result in lengthy interruptions in our service. Even with the disaster recovery arrangements, our
service could be interrupted.
If our security measures are breached and unauthorized access is obtained to a customer's data or our data or our information technology systems,
our service may be perceived as not being secure, customers may curtail or stop using our service and we may incur significant legal and financial
exposure and liabilities.
Our service involves the storage and transmission of customers' proprietary information, and security breaches could expose us to a risk of loss of this
information, litigation and possible liability. These security
13