Seagate 2014 Annual Report Download - page 33

Download and view the complete annual report

Please find page 33 of the 2014 Seagate annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 148

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148

TableofContents
programmersandhackersmaybeabletopenetrateournetworksecurityandmisappropriateorcompromiseourconfidentialinformationorthatofthird-parties,
createsystemdisruptions,orcauseshutdowns.Computerprogrammersandhackersalsomaybeabletodevelopanddeployviruses,worms,andothermalicious
softwareprogramsthatattackourproductsorotherwiseexploitanysecurityvulnerabilitiesofourproducts.Inaddition,sophisticatedhardwareandoperating
systemsoftwareandapplicationsthatweproduceorprocurefromthird-partiesmaycontaindefectsindesignormanufacture,including"bugs"andotherproblems
thatcouldunexpectedlyinterferewiththeoperationofthesystem.
Thecoststoustoeliminateoraddresstheforegoingsecurityproblemsandsecurityvulnerabilitiesbeforeorafteracyber-incidentcouldbesignificant.System
redundancymaybeineffectiveorinadequate,andourdisasterrecoveryplanningmaynotbesufficientforalleventualities.Ourremediationeffortsmaynotbe
successfulandcouldresultininterruptions,delays,orcessationofservice,andlossofexistingorpotentialcustomersthatmayimpedeoursales,manufacturing,
distribution,orothercriticalfunctions.Wecouldloseexistingorpotentialcustomersforoutsourcingservicesorotherinformationtechnologysolutionsin
connectionwithanyactualorperceivedsecurityvulnerabilitiesinourproducts.Inaddition,breachesofoursecuritymeasuresandtheunapproveddisseminationof
proprietaryinformationorsensitiveorconfidentialdataaboutusorourcustomersorotherthird-parties,couldexposeus,ourvendorsandcustomers,orotherthird-
partiesaffectedtoariskoflossormisuseofthisinformation,resultinlitigationandpotentialliabilityforus,damageourbrandandreputation,orotherwiseharm
ourbusiness.Inaddition,werelyincertainlimitedcapacitiesonthird-partydatamanagementproviderswhosepossiblesecurityproblemsandsecurity
vulnerabilitiesmayhavesimilareffectsonus.
Wearesubjecttolaws,rules,andregulationsintheU.S.andothercountriesrelatingtothecollection,use,andsecurityofuserdata.Inmanycases,theselaws
applynotonlytothird-partytransactions,butalsototransfersofinformationbetweenusandoursubsidiaries,andamongus,oursubsidiariesandotherpartieswith
whichwehavecommercialrelations.Ourabilitytoexecutetransactionsandtopossessandusepersonalinformationanddatainconductingourbusinesssubjects
ustolegislativeandregulatoryburdensthatmayrequireustonotifyvendors,customersoremployeesofadatasecuritybreach.Wehaveincurred,andwill
continuetoincur,significantexpensestocomplywithmandatoryprivacyandsecuritystandardsandprotocolsimposedbylaw,regulation,industrystandards,or
contractualobligations.Theselaws,protocolsandstandardscontinuetodevelopandmaybeinconsistentfromjurisdictiontojurisdiction.Complyingwith
emergingandchanginginternationalrequirementsmaycauseustoincursubstantialcostsorrequireustochangeourbusinesspractices.Ifwefailtocomplywith
applicablefederal,stateorinternationalprivacy-relatedordataprotectionlawswemaybesubjecttoproceedingsbygovernmentalentitiesandincurpenaltiesor
significantlegalliability.
Ourinternationaloperationssubjectustorisksrelatedtodisruptionsinforeignmarkets,currencyexchangefluctuations,longerpaymentcycles,seasonality,
limitationsimposedbyavarietyoflegalandregulatoryregimes,potentialadversetaxconsequences,increasedcosts,ourcustomers'creditandaccessto
capital,health-relatedrisks,andaccesstopersonnel.
Wehavesignificantoperationsinforeigncountries,includingmanufacturingfacilities,salespersonnelandcustomersupportoperations.Wehave
manufacturingfacilitiesinChina,Malaysia,NorthernIreland,SingaporeandThailand,inadditiontothoseintheUnitedStates.Asubstantialportionofourclient
computediskdriveassemblyoccursinourfacilityinChina.
Ourinternationaloperationsaresubjecttoeconomicrisksinherentindoingbusinessinforeigncountries,includingthefollowing:
DisruptionsinForeignMarkets.Disruptionsinfinancialmarketsandthedeteriorationoftheunderlyingeconomicconditionsinthepastinsome
countries,includingthoseinAsia,havehadanimpactonoursalestocustomerslocatedin,orwhoseend-usercustomersarelocatedin,these
countries.
30