Western Union 2014 Annual Report Download - page 166

Download and view the complete annual report

Please find page 166 of the 2014 Western Union annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 306

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306

2014 FORM 10-K
28
Breaches of our information security policies or safeguards could adversely affect our ability to operate and could damage
our reputation, business, financial condition and results of operations.
We collect, transfer and retain consumer, business, employee and agent data as part of our business. These activities are
subject to laws and regulations in the United States and other jurisdictions, see risk factor "Current and proposed regulation
addressing consumer privacy and data use and security could increase our costs of operations, which could adversely affect
our operations, results of operations and financial condition" below. The requirements imposed by these laws and regulations,
which often differ materially among the many jurisdictions, are designed to protect the privacy of personal information and
prevent that information from being inappropriately used or disclosed. We have developed and maintain technical and operational
safeguards designed to comply with applicable legal requirements. However, despite those safeguards, it is possible that hackers,
employees acting contrary to our policies or others could improperly access our systems or the systems of our business partners
and service providers and improperly obtain or disclose data about our consumers, business customers, agents and/or employees.
Further, because some data is collected and stored by third parties, it is possible that a third party could intentionally or
inadvertently disclose personal data in violation of law. Also, in some jurisdictions we transfer data related to our employees,
business customers, consumers, agents and potential employees to third-party vendors in order to perform due diligence and for
other reasons. It is possible that a vendor could intentionally or inadvertently disclose such data. Any data breach resulting in a
compromise of consumer, business, employee or agent data could require us to notify impacted individuals, and in some cases
regulators, of a possible or actual breach, expose us to regulatory enforcement action, including fines, limit our ability to provide
services, subject us to litigation and/or damage our reputation.
Interruptions in our systems, including as a result of cyber attacks, or disruptions in our workforce may have a significant
effect on our business.
Our ability to provide reliable service largely depends on the efficient and uninterrupted operation of our computer
information systems and those of our service providers. Any significant interruptions could harm our business and reputation
and result in a loss of consumers. These systems and operations could be exposed to damage or interruption from fire, natural
disaster, power loss, telecommunications failure, terrorism, vendor failure, unauthorized entry and computer viruses or other
causes, many of which may be beyond our control or that of our service providers. Further, we have been and continue to be
the subject of cyber attacks. These attacks are primarily aimed at interrupting our business, exposing us to financial losses, or
exploiting information security vulnerabilities. Historically, none of these attacks or breaches has individually or in the aggregate
resulted in any material liability to us or any material damage to our reputation, and disruptions related to cybersecurity have
not caused any material disruption to the Company's business, although there can be no assurance that a material breach will
not occur in the future. Although we have taken steps to prevent systems disruptions, our measures may not be successful and
we may experience problems other than system disruptions. We also may experience software defects, development delays,
installation difficulties and other systems problems, which would harm our business and reputation and expose us to potential
liability which may not be fully covered by our business interruption insurance. Our data applications may not be sufficient to
address technological advances, regulatory requirements, changing market conditions or other developments. In addition, any
work stoppages or other labor actions by employees, the significant majority of which are located outside the United States,
could adversely affect our business.