Dish Network 2008 Annual Report Download - page 31

Download and view the complete annual report

Please find page 31 of the 2008 Dish Network annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 144

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144

21
Furthermore, any transition to a new supplier of set-top boxes could result in increased costs, resources and
development and customer qualification time. Any reduction in our supply of set-top boxes could significantly
delay our ability to ship set-top boxes to our subscribers and potentially damage our relationships with our
subscribers.
We rely on one or a limited number of vendors, and the inability of these key vendors to meet our needs could
have a material adverse effect on our business.
We have contracted with a limited number of vendors to provide certain key products or services to us such as
information technology support, billing systems, and security access devices. Our dependence on these vendors
makes our operations vulnerable to such third parties’ failure to perform adequately. In addition, we have
historically relied on a single source for certain items. If these vendors are unable to meet our needs because they
are no longer in business or because they discontinue a certain product or service we need, our business, financial
position and results of operations may be adversely affected. Our inability to develop alternative sources quickly
and on a cost-effective basis could materially impair our ability to timely deliver our products to our subscribers or
operate our business. Furthermore, our vendors may request changes in pricing, payment terms or other contractual
obligations between the parties which could cause us to make substantial additional investments.
Our programming signals are subject to theft, and we are vulnerable to other forms of fraud that could require us
to make significant expenditures to remedy.
Increases in theft of our signal, or our competitors’ signals, could in addition to reducing new subscriber activations,
also cause subscriber churn to increase. We use security access devices in our receiver systems to control access to
authorized programming content. Our signal encryption has been compromised in the past and may be
compromised in the future even though we continue to respond with significant investment in security measures,
such as security access device replacement programs and updates in security software, that are intended to make
signal theft more difficult. It has been our prior experience that security measures may be only effective for short
periods of time or not at all and that we remain susceptible to additional signal theft. We cannot assure you that we
will be successful in reducing or controlling theft of our programming content. During the third quarter of 2008, we
began implementing a plan to replace our existing security access devices to re-secure our system, which is expected
to take approximately nine to twelve months to complete. We cannot assure you that we will be successful in
reducing or controlling theft of our programming content and we may incur additional costs in the future if our
security access device replacement plan is not effective.
We are also vulnerable to other forms of fraud. While we are addressing certain fraud through a number of actions,
including terminating more than 60 retailers for violating DISH Network business rules, there can be no assurance
that we will not continue to experience fraud which could impact our subscriber growth and churn. The current
economic downturn may create greater incentive for signal theft and other forms of fraud, which could lead to
higher subscriber churn and reduced revenue.
We depend on third parties to solicit orders for DISH Network services that represent a significant percentage of
our total gross subscriber acquisitions.
A number of our retailers are not exclusive to us and may favor our competitors’ products and services over ours
based on the relative financial arrangements associated with selling our products and those of our competitors.
Furthermore, some of these retailers are significantly smaller than we are and may be more susceptible to current
uncertain economic conditions that will make it more difficult for them to operate profitably. Because our retailers
receive most of their incentive value at activation and not over an extended period of time, our interests in obtaining
and retaining subscribers through good customer service may not always be aligned with our retailers. It may be
difficult to better align our interests with our resellers’ because of their capital and liquidity constraints. Loss of one
or more of these relationships could have an adverse effect on our subscriber base and certain of our other key
operating metrics because we may not be able to develop comparable alternative distribution channels.