Sears 2015 Annual Report Download - page 10

Download and view the complete annual report

Please find page 10 of the 2015 Sears annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 132

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132

We rely extensively on computer systems to implement our integrated retail strategy, process transactions,
summarize results and otherwise manage our business. Disruptions in these systems could harm our ability to
run our business.
Given the significance of our online and mobile capabilities, our collection and use of data to create
personalized experiences, and the number of individual transactions we have each year, including in our stores, it is
critical that we maintain uninterrupted operation of our computer and communications hardware and software
systems, some of which are based on end-of-life or legacy technology, operate with minimal or no vendor support
and are otherwise difficult to maintain. Our systems are subject to damage or interruption from power outages,
computer and telecommunications failures, computer viruses, security breaches, catastrophic events such as fires,
tornadoes and hurricanes, and usage errors by our employees. Operating legacy systems subjects us to inherent costs
and risks associated with maintaining, upgrading and replacing these systems and retaining sufficiently skilled
personnel to maintain and operate the systems, demands on management time, and other risks and costs. Any
material interruption in our computer operations may have a material adverse effect on our business or results of
operations, including on our Shop Your Way® program and participation in or engagement with that program. We are
pursuing initiatives to transform our information technology processes and systems. These initiatives are highly
complex and include replacing legacy systems, upgrading existing systems, and acquiring new systems and
hardware with updated functionality. The risk of disruption is increased in periods when such complex and
significant systems changes are undertaken.
If we do not maintain the security of our member and customer, associate or company information, we could
damage our reputation, incur substantial additional costs and become subject to litigation.
Cyber-security risks such as malicious software and attempts to gain unauthorized access to data are rapidly
evolving. Techniques or software used to gain unauthorized access, and/or disable, degrade or harm our systems
may be difficult to detect or scope for prolonged periods of time, and we may be unable to anticipate these
techniques or put in place protective or preventive measures. These attempts to gain unauthorized access could lead
to disruptions in our systems, unauthorized release of confidential or otherwise protected information or corruption
of data. If individuals are successful in infiltrating, breaking into, disrupting, damaging or otherwise stealing from
the computer systems of the Company or its third-party providers we may have to make a significant investment to
fix or replace them, we may suffer interruptions in our operations in the interim, we may face costly litigation,
government investigations, government enforcement actions, fines and/or lawsuits, the ability for our members to
earn or redeem points in our Shop Your Way® program may be impacted or halted, and our reputation with our
members and customers may be significantly harmed. There is no guarantee that the procedures that we have
implemented to protect against unauthorized access to secured data are adequate to safeguard against all data
security breaches. A data security breach or any failure by us to comply with applicable privacy and information
security laws and regulations could result in a loss of customer or member confidence and negatively impact our
business, including our Shop Your Way® program, and our results of operations. As publicly announced on October
10, 2014, Kmart’s information technology team detected on October 9, 2014 that the Kmart store payment data
system had been criminally breached beginning in early September 2014, that the payment data systems at Kmart
stores were purposely infected with a new form of malware, and that debit and credit card numbers were potentially
compromised. The Company is defending a class-action lawsuit in the Northern District of Illinois alleging
violations relating to, and harm resulting from this incident.
We are subject to payment-related risks that could increase our operating costs, expose us to fraud or theft,
subject us to potential liability and potentially disrupt our business operations.
As a retailer who accepts payments using a variety of methods, including credit and debit cards, PayPal, and
gift cards, the Company is subject to rules, regulations, contractual obligations and compliance requirements,
including payment network rules and operating guidelines, data security standards and certification requirements,
and rules governing electronic funds transfers. The regulatory environment related to information security and
privacy is increasingly rigorous, with new and constantly changing requirements applicable to our business, and
compliance with those requirements could result in additional costs or accelerate these costs. For certain payment
methods, including credit and debit cards, we pay interchange and other fees, which could increase over time and
raise our operating costs. We rely on third parties to provide payment processing services, including the processing
10