Cash America 2012 Annual Report Download - page 59

Download and view the complete annual report

Please find page 59 of the 2012 Cash America annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 208

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

34
technologies that are as good as or better than its technology. The Company’s failure to protect its software and other
proprietary intellectual property rights or to develop technologies that are as good as its competitors’ could put the
Company at a disadvantage to its competitors. Any such failures could have a material adverse effect on the Company’s
business.
The Company is subject to cyber security risks and security breaches and may incur increasing costs in an effort to
minimize those risks and to respond to cyber incidents.
The Company’s business involves the storage and transmission of users’ proprietary information, and security
breaches could expose it to a risk of loss or misuse of this information, litigation, and potential liability. The Company’s
e-commerce segment is entirely dependent on the secure operation of its websites and systems as well as the operation
of the internet generally. A number of companies have disclosed security breaches, some of which have involved
intentional attacks. The Company may not have the resources or technical sophistication to anticipate or prevent rapidly
evolving types of cyber attacks. Attacks may be targeted at the Company, its customers, or both. If an actual or
perceived breach of security occurs, customer and/or supplier perception of the effectiveness of the Company’s security
measures could be harmed and could result in the loss of customers, suppliers or both. Actual or anticipated attacks and
risks may cause the Company to incur increasing costs, including costs to deploy additional personnel and protection
technologies, train employees, and engage third party experts and consultants.
A person who is able to circumvent the Company’s security measures could misappropriate the Company’s or
its users’ proprietary information, cause interruption in its operations, damage its computers or those of its users, or
otherwise damage its reputation and business. Any compromise of security could result in a violation of applicable
privacy and other laws, significant legal and financial exposure, damage to the Company’s reputation, and a loss of
confidence in its security measures, which could harm its business.
Most of the Company’s customers provide personal information, including bank account information when
applying for consumer loans. The Company relies on encryption and authentication technology licensed from third
parties to provide the security and authentication to effectively secure transmission of confidential information,
including customer bank account and other personal information. Advances in computer capabilities, new discoveries in
the field of cryptography or other developments may result in the technology used by the Company to protect transaction
data being breached or compromised. Data breaches can also occur as a result of non-technical issues.
The Company’s servers are also vulnerable to computer viruses, physical or electronic break-ins, and similar
disruptions, including “denial-of-service” type attacks. The Company may need to expend significant resources to
protect against security breaches or to address problems caused by breaches. Security breaches, including any breach by
the Company or by persons with whom it has commercial relationships that result in the unauthorized release of its
users’ personal information, could damage its reputation and expose it to a risk of loss or litigation and possible liability.
In addition, many of the third-parties who provide products, services or support to the Company could also
experience any of the above cyber risks or security breaches, which could impact the Company’s customers and the
Company’s business and could result in a loss of customers, suppliers or revenue
Any of these events could result in a loss of revenue and could have a material adverse effect on the Company’s
business, prospects, results of operations and financial condition.