Foot Locker 2011 Annual Report Download - page 27

Download and view the complete annual report

Please find page 27 of the 2011 Foot Locker annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 108

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108

Our freight cost is affected by changes in fuel prices through surcharges. Increases in fuel prices and
surcharges and other factors may increase freight costs and thereby increase our cost of sales. We enter
into diesel fuel forward and option contracts to mitigate a portion of the risk associated with the variability
caused by these surcharges.
Disruptions, failures or security breaches of our information technology infrastructure could harm
our business.
Information technology is a critically important part of our business operations. We depend on
information systems to process transactions, manage inventory, operate our websites, purchase, sell and
ship goods on a timely basis, and maintain cost-efficient operations. There is a risk that we could
experience a business interruption, theft of information, or reputational damage as a result of a cyber
attack, such as an infiltration of a data center, or data leakage of confidential information either internally
or at our third-party providers. We may experience operational problems with our information systems as
a result of system failures, viruses, computer ‘‘hackers’’ or other causes.
Our business involves the storage and transmission of customers’ personal information, consumer
preferences and credit card information. We invest in industry standard security technology to protect the
Company’s data and business processes against risk of data security breach and cyber attack. Our data
security management program includes identity, trust, vulnerability and threat management business
processes, as well as enforcement of standard data protection policies such as Payment Card Industry
compliance. We measure our data security effectiveness through industry accepted methods and
remediate critical findings. Additionally, we certify our major technology suppliers and any outsourced
services through accepted security certification measures. We maintain and routinely test backup systems
and disaster recovery, along with external network security penetration testing by an independent third
party as part of our business continuity preparedness.
While we believe that our security technology and processes are adequate in preventing security breaches
and in reducing cyber-security risks, given the ever increasing abilities of those intent on breaching
cyber-security measures and given our reliance on the security and other efforts of third-party vendors,
the total security effort at any point in time may not be completely effective and any such security breaches
and cyber incidents could adversely affect our business. Failure of our systems, including failures due to
cyber attacks that would prevent the ability of systems to function as intended could cause transaction
errors, loss of customers and sales, and could have negative consequences to our Company, our employees,
and those with whom we do business. Any security breach involving the misappropriation, loss or other
unauthorized disclosure of confidential information by the Company could also severely damage our
reputation, expose us to the risks of litigation and liability, and harm our business.
Risks associated with Digital operations.
Our digital operations are subject to numerous risks, including risks related to the failure of the computer
systems that operate our websites and mobile sites and their related support systems, including computer
viruses, telecommunications failures, and similar disruptions. Also, we may require additional capital in
the future to sustain or grow our digital commerce.
Business risks related to digital commerce include risks associated with the need to keep pace with rapid
technological change, Internet security risks, risks of system failure or inadequacy, governmental
regulation and legal uncertainties with respect to the Internet, and collection of sales or other taxes by
additional states or foreign jurisdictions. If any of these risks materializes, it could have a material adverse
effect on the Company’s business.
7