American Home Shield 2009 Annual Report Download - page 18

Download and view the complete annual report

Please find page 18 of the 2009 American Home Shield annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 297

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297

Table of Contents
other intellectual property infringement against us, or any other successful challenge to the use of our intellectual property, could subject us to damages or
prevent us from providing certain services under our recognized brand names, which could have a material adverse effect on our financial position, results of
operations and cash flows.
Disruptions or security failures in our information technology systems could create liability for us and/or limit our ability to effectively monitor,
operate and control our operations and adversely affect our operating results.
Our information technology systems facilitate our ability to monitor, operate and control our operations. Any disruption in or failure of our information
technology systems to operate as expected could, depending on the magnitude of the problem, adversely affect our financial position, results of operations and
cash flows by limiting, among other things, our capacity to monitor, operate and control our operations effectively. If our disaster recovery plans do not work
as anticipated, or if the third party vendor to which we have outsourced certain information technology services fails to fulfill its obligations to us, our
operations may be adversely impacted. In addition, because our systems contain information about individuals and businesses, our failure to maintain the
security of the data we hold, whether the result of our own error or the malfeasance or errors of others, could harm our reputation or give rise to legal
liabilities relating to violations of privacy laws or otherwise, which may lead to lower revenues, increased costs and other material adverse effects on our
financial position, results of operations and cash flows.
If we fail to protect the security of personal information about our customers, we could be subject to costly government enforcement actions or
private litigation and our reputation could suffer.
We rely on commercially available systems, software, tools and monitoring to provide security for processing, transmission and storage of confidential
customer information, such as payment card and personal information. The systems currently used for transmission and approval of payment card
transactions, and the technology utilized in payment cards themselves, all of which can put payment card data at risk, are determined and controlled by the
payment card industry, not by us. Improper activities by third parties, advances in computer and software capabilities and encryption technology, new tools
and discoveries and other events or developments may facilitate or result in a compromise or breach of our systems. Any compromises, breaches or errors in
application could cause interruptions in our operations, damage to our reputation and customers' willingness to purchase our services, result in a violation of
applicable laws, regulations, orders and agreements and subject us to costs and liabilities which could have a material adverse effect on our financial position,
results of operations and cash flows.
We are subject to various restrictive covenants that could adversely impact our operations.
From time to time, we enter into noncompetition agreements that restrict us from entering into lines of business or operating in certain areas into which
we may desire to expand our business. We also are subject to various non-solicitation and no hire covenants that may restrict our ability to solicit potential
customers or employees. To the extent that such restrictive covenants prevent us from taking advantage of business opportunities, or we fail to comply with
them, our operations may be adversely impacted.
16