Restoration Hardware 2012 Annual Report Download - page 87

Download and view the complete annual report

Please find page 87 of the 2012 Restoration Hardware annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 180

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180

operate our facilities and our customer service and sales operations in accordance with PCI or other industry
recommended practices. We intend to obtain compliance with PCI Data Security Standards and will incur
additional expenses to attain and maintain PCI compliance. Further, there is increased litigation over personally
identifiable information and we may be subject to one or more claims or lawsuits related to intentional or
unintentional exposure of our customer’s personally identifiable information. Even if we are compliant with such
standards, we still may not be able to prevent security breaches involving customer transaction data. Any breach
could cause consumers to lose confidence in the security of our website and choose not to purchase from us. If a
computer hacker or other criminal is able to circumvent our security measures, he or she could destroy or steal
valuable information or disrupt our operations. Any security breach could expose us to risks of data loss, fines,
litigation and liability and could seriously disrupt our operations and harm our reputation, any of which could
adversely affect our business. In addition to the possibility of fines, lawsuits and other claims, we could be
required to change our business practices or modify our service offerings in connection with the protection of
personally identifiable information, which could have a material adverse effect on our business.
In addition, states and the federal government have enacted additional laws and regulations to protect
consumers against identity theft, including laws governing treatment of personally identifiable information. We
collect and store personal information from consumers in the course of doing business. These laws have
increased the costs of doing business and, if we fail to implement appropriate safeguards or we fail to detect and
provide prompt notice of unauthorized access as required by some of these laws, we could be subject to potential
claims for damages and other remedies. If we were required to pay any significant amounts in satisfaction of
claims under these laws, or if we were forced to cease our business operations for any length of time as a result
of our inability to comply fully with any such law, our business, operating results and financial condition could
be adversely affected.
Material damage to, or interruptions in, our information systems as a result of external factors, staffing
shortages and difficulties in updating our existing software or developing or implementing new software could
have a material adverse effect on our business or results of operations.
We depend largely upon our information technology systems in the conduct of all aspects of our operations,
many of which we have only adopted and implemented within the past five years in connection with rebuilding
our supply chain and infrastructure. Such systems are subject to damage or interruption from power outages,
computer and telecommunications failures, computer viruses, security breaches and natural disasters. Damage or
interruption to our information systems may require a significant investment to fix or replace them, and we may
suffer interruptions in our operations in the interim. Management information system failures or
telecommunications system problems may disrupt operations. In addition, costs and potential problems and
interruptions associated with the implementation of new or upgraded systems and technology or with
maintenance or adequate support of existing systems could also disrupt or reduce the efficiency of our
operations. Any material interruptions or failures in our systems may have a material adverse effect on our
business or results of operations.
We also rely heavily on our information technology staff. If we cannot meet our staffing needs in this area,
we may not be able to fulfill our technology initiatives while continuing to provide maintenance on existing
systems.
We rely on certain software vendors to maintain and periodically upgrade many of these systems so that
they can continue to support our business. The software programs supporting many of our systems were licensed
to us by independent software developers. The inability of these developers or us to continue to maintain and
upgrade these information systems and software programs would disrupt or reduce the efficiency of our
operations if we were unable to convert to alternate systems in an efficient and timely manner.
We are vulnerable to various risks and uncertainties associated with our websites, including changes in
required technology interfaces, website downtime and other technical failures, costs and technical issues as we
31
Form 10-K