Travelers 2009 Annual Report Download - page 73

Download and view the complete annual report

Please find page 73 of the 2009 Travelers annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 295

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295

complete. In addition, system development projects may not deliver the benefits we expect once they
are complete, or may be replaced or become obsolete more quickly than expected, which could result
in accelerated recognition of expenses. If we do not effectively and efficiently manage and upgrade our
technology portfolio, or if the costs of doing so are higher than we expect, our ability to provide
competitive services to new and existing customers in a cost effective manner and our ability to
implement our strategic initiatives could be adversely impacted.
If we experience difficulties with technology, data security and/or outsourcing relationships our
ability to conduct our business could be negatively impacted. While technology can streamline many
business processes and ultimately reduce the cost of operations, technology initiatives present certain
risks. Our business is highly dependent upon our employees’ ability to perform, in an efficient and
uninterrupted fashion, necessary business functions. A shut-down of, or inability to, access one or more
of our facilities, a power outage or a failure of one or more of our information technology,
telecommunications or other systems could significantly impair our ability to perform such functions on
a timely basis. In addition, because our information technology and telecommunications systems
interface with and depend on third-party systems, we could experience service denials if demand for
such service exceeds capacity or a third-party system fails or experiences an interruption. If sustained or
repeated, such a business interruption, system failure or service denial could result in a deterioration of
our ability to write and process new and renewal business, provide customer service, pay claims in a
timely manner or perform other necessary business functions. Computer viruses, hackers and other
external hazards could expose our data systems to security breaches. These increased risks, and
expanding regulatory requirements regarding data security, could expose us to data loss, monetary and
reputational damages and significant increases in compliance costs. As a result, our ability to conduct
our business might be adversely affected.
We outsource certain technology and business process functions to third parties and may do so
increasingly in the future. If we do not effectively develop, implement and monitor our outsourcing
strategy, third party providers do not perform as anticipated or we experience technological or other
problems with a transition, we may not realize productivity improvements or cost efficiencies and may
experience operational difficulties, increased costs and a loss of business. Our outsourcing of certain
technology and business process functions to third parties may expose us to enhanced risk related to
data security, which could result in monetary and reputational damages. In addition, our ability to
receive services from third party providers outside of the United States might be impacted by cultural
differences, political instability, unanticipated regulatory requirements or policies inside or outside of
the United States. As a result, our ability to conduct our business might be adversely affected.
Acquisitions and integration of acquired businesses may result in operating difficulties and other
unintended consequences. From time to time we may investigate and pursue acquisition opportunities
if we believe that such opportunities are consistent with our long-term objectives and that the potential
rewards of an acquisition exceed the risks. The process of integrating an acquired company or business
can be complex and costly, however, and may create unforeseen operating difficulties and expenditures.
For example, acquisitions may present significant risks, including:
the potential disruption of our ongoing business;
the ineffective integration of underwriting, claims handling and actuarial practices;
the uncertainty of an acquiree’s reserve estimates;
the diversion of management time and resources to acquisition integration challenges;
the loss of key employees;
the cultural challenges associated with integrating employees; and
the impact of an acquisition on our financial position and/or credit ratings.
61