Wells Fargo 2015 Annual Report Download - page 129

Download and view the complete annual report

Please find page 129 of the 2015 Wells Fargo annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 273

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273

respect to an insured loan, we might incur higher credit losses if
replacement coverage is not obtained. For example, in October
2011, PMI Mortgage Insurance Co. (PMI) was seized by its
regulator. Although only a limited amount of loans and
securities held in our portfolios had PMI insurance support, we
cannot be certain that any future financial difficulties or credit
downgrades involving one of our mortgage insurance company
providers will not materially adversely affect our mortgage
business and/or financial results. We also have investments in
municipal bonds that are guaranteed against loss by bond
insurers. The value of these bonds and the payment of principal
and interest on them may be negatively affected by financial
difficulties or credit downgrades experienced by the bond
insurers.
For more information, refer to the “Balance Sheet Analysis
– Investment Securities” and “Risk Management – Credit Risk
Management– Liability for Mortgage Loan Repurchase Losses”
sections in this Report.
OPERATIONAL AND LEGAL RISK
A failure in or breach of our operational or security
systems or infrastructure, or those of our third party
vendors and other service providers, including as a
result of cyber attacks, could disrupt our businesses,
result in the disclosure or misuse of confidential or
proprietary information, damage our reputation,
increase our costs and cause losses. As a large financial
institution that serves over 70 million customers through 8,700
locations, 13,000 ATMs, the Internet, mobile banking and other
distribution channels across the U.S. and internationally, we
depend on our ability to process, record and monitor a large
number of customer transactions on a continuous basis. As our
customer base and locations have expanded throughout the U.S.
and internationally, and as customer, public, legislative and
regulatory expectations regarding operational and information
security have increased, our operational systems and
infrastructure must continue to be safeguarded and monitored
for potential failures, disruptions and breakdowns. Our business,
financial, accounting, data processing systems or other operating
systems and facilities may stop operating properly or become
disabled or damaged as a result of a number of factors including
events that are wholly or partially beyond our control. For
example, there could be sudden increases in customer
transaction volume; electrical or telecommunications outages;
degradation or loss of public internet domain; climate change
related impacts and natural disasters such as earthquakes,
tornados, and hurricanes; disease pandemics; events arising
from local or larger scale political or social matters, including
terrorist acts; and, as described below, cyber attacks. Although
we have business continuity plans and other safeguards in place,
our business operations may be adversely affected by significant
and widespread disruption to our physical infrastructure or
operating systems that support our businesses and customers.
Information security risks for large financial institutions
such as Wells Fargo have generally increased in recent years in
part because of the proliferation of new technologies, the use of
the Internet and telecommunications technologies to conduct
financial transactions, and the increased sophistication and
activities of organized crime, hackers, terrorists, activists, and
other external parties, including foreign state-sponsored parties.
Those parties also may attempt to fraudulently induce
employees, customers, or other users of our systems to disclose
confidential information in order to gain access to our data or
that of our customers. As noted above, our operations rely on the
secure processing, transmission and storage of confidential
information in our computer systems and networks. Our
banking, brokerage, investment advisory, and capital markets
businesses rely on our digital technologies, computer and email
systems, software, and networks to conduct their operations. In
addition, to access our products and services, our customers may
use personal smartphones, tablet PC’s, and other mobile devices
that are beyond our control systems. Although we believe we
have robust information security procedures and controls, our
technologies, systems, networks, and our customers’ devices may
become the target of cyber attacks or information security
breaches that could result in the unauthorized release, gathering,
monitoring, misuse, loss or destruction of Wells Fargo’s or our
customers’ confidential, proprietary and other information, or
otherwise disrupt Wells Fargo’s or its customers’ or other third
parties’ business operations. For example, various retailers have
reported they were victims of cyber attacks in which large
amounts of their customers’ data, including debit and credit card
information, was obtained. In these situations we generally incur
costs to replace compromised cards and address fraudulent
transaction activity affecting our customers.
Third parties with which we do business or that facilitate
our business activities, including exchanges, clearing houses,
financial intermediaries or vendors that provide services or
security solutions for our operations, could also be sources of
operational and information security risk to us, including from
breakdowns or failures of their own systems or capacity
constraints.
To date we have not experienced any material losses relating
to cyber attacks or other information security breaches, but there
can be no assurance that we will not suffer such losses in the
future. Our risk and exposure to these matters remains
heightened because of, among other things, the evolving nature
of these threats, the prominent size and scale of Wells Fargo and
its role in the financial services industry, our plans to continue to
implement our Internet banking and mobile banking channel
strategies and develop additional remote connectivity solutions
to serve our customers when and how they want to be served,
our expanded geographic footprint and international presence,
the outsourcing of some of our business operations, and the
current global economic and political environment. For example,
Wells Fargo and other financial institutions continue to be the
target of various evolving and adaptive cyber attacks, including
malware and denial-of-service, as part of an effort to disrupt the
operations of financial institutions, potentially test their
cybersecurity capabilities, or obtain confidential, proprietary or
other information. As a result, cybersecurity and the continued
development and enhancement of our controls, processes and
systems designed to protect our networks, computers, software
and data from attack, damage or unauthorized access remain a
priority for Wells Fargo. We are also proactively involved in
industry cybersecurity efforts and working with other parties,
including our third-party service providers and governmental
agencies, to continue to enhance defenses and improve resiliency
to cybersecurity threats. As cyber threats continue to evolve, we
may be required to expend significant additional resources to
continue to modify or enhance our protective measures or to
investigate and remediate any information security
vulnerabilities.
Disruptions or failures in the physical infrastructure or
operating systems that support our businesses and customers, or
cyber attacks or security breaches of the networks, systems or
devices that our customers use to access our products and
services could result in customer attrition, financial losses, the
inability of our customers to transact business with us, violations
Wells Fargo & Company
127