Autodesk 2011 Annual Report Download - page 91

Download and view the complete annual report

Please find page 91 of the 2011 Autodesk annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 176

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176

We rely on third-parties to provide us with a number of operational services, including hosting and delivery,
certain of our customer services operations as well as some of our operations; any interruption or delay in
service from these third parties, breaches of security or privacy, or failures in data collection could expose us
to liability, harm our reputation and adversely impact our financial performance.
We rely on hosted computer services from third parties for services that we provide our customers and
computer operations for our internal use. As we gather customer data and host certain customer data in third-
party facilities, a security breach could compromise the integrity or availability of customer data. In addition, our
operations could be negatively affected in the event of a security breach, and we could be subject to the loss or
theft of confidential or proprietary information, including source code. Unauthorized access to this data may be
obtained through break-ins, breach of our secure network by an unauthorized party, employee theft or misuse, or
other misconduct. We rely on a number of third party suppliers in the operation of our business for the provision
of various services and materials that we use in the operation of our business and production of our products.
Although we seek to diversify our third party suppliers, we may from time to time rely on a single or limited
number of suppliers, or upon suppliers in a single country, for these services or materials. The inability of such
third parties to satisfy our requirements could disrupt our business operations or make it more difficult for us to
implement our business strategy. If any of these situations were to occur, our reputation could be harmed, we
could be subject to third party liability, including under data protection and privacy laws in certain jurisdictions,
and our financial performance could be negatively impacted.
We regularly invest resources to update and improve our internal information technology systems. Should our
investments not succeed, or if delays or other issues with new or existing internal technology systems disrupt
our operations, our business could be harmed.
We rely on our network and data center infrastructure, internal technology systems and our websites for our
development, marketing, operational, support, sales, accounting and financial reporting activities. We are
continually investing resources to update and improve these systems and environments in order to meet the
growing requirements of our business and customers. Such improvements are often complex, costly and time
consuming. In addition, such improvements can be challenging to integrate with our existing technology systems,
or uncover problems with our existing technology systems. Unsuccessful implementation of hardware or
software updates and improvements could result in disruption in our business operations, loss of revenue, errors
in our accounting and financial reporting or damage to our reputation.
Our business may be significantly disrupted upon the occurrence of a catastrophic event.
Our business is highly automated and relies extensively on the availability of our network and data center
infrastructure, our internal technology systems and our websites. We also rely on hosted computer services from
third parties for services that we provide to our customers and computer operations for our internal use. The
failure of our systems or hosted computer services due to a catastrophic event, such as an earthquake, fire, flood,
weather event, telecommunications failure, power failure, cyber attack or war, could adversely impact our
business, financial results and financial condition. We have developed disaster recovery plans and maintain
backup systems in order to reduce the potential impact of a catastrophic event, however there can be no assurance
that these plans and systems would enable us to return to normal business operations.
ITEM 1B. UNRESOLVED STAFF COMMENTS
We have received no written comments regarding our periodic or current reports from the staff of the SEC
that were issued 180 days or more preceding the end of our 2011 fiscal year that remain unresolved.
ITEM 2. PROPERTIES
We lease 1,883,000 square feet of office space in 106 locations in the United States and internationally
through our foreign subsidiaries. In addition, we own 25,000 square feet of office space in two locations
25