Electronic Arts 2010 Annual Report Download - page 100

Download and view the complete annual report

Please find page 100 of the 2010 Electronic Arts annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 200

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200

prohibitions against the circumvention of technological protection measures to protect copyrighted works are
often under scrutiny by courts and governing bodies. The repeal or weakening of laws intended to combat piracy,
protect intellectual property and prohibit the circumvention of technological protection measures could make it
more difficult for us to adequately protect against piracy. These factors could have a negative effect on our
growth and profitability in the future.
If one or more of our titles were found to contain hidden, objectionable content, our business could suffer.
Throughout the history of our industry, many video games have been designed to include certain hidden content
and gameplay features that are accessible through the use of in-game cheat codes or other technological means
that are intended to enhance the gameplay experience. However, in several cases, hidden content or features have
been found to be included in other publishers’ products by an employee who was not authorized to do so or by an
outside developer without the knowledge of the publisher. From time to time, some hidden content and features
have contained profanity, graphic violence and sexually explicit or otherwise objectionable material. In a few
cases, the Entertainment Software Ratings Board (“ESRB”) has reacted to discoveries of hidden content and
features by reviewing the rating that was originally assigned to the product, requiring the publisher to change the
game packaging and/or fining the publisher. Retailers have on occasion reacted to the discovery of such hidden
content by removing these games from their shelves, refusing to sell them, and demanding that their publishers
accept them as product returns. Likewise, consumers have reacted to the revelation of hidden content by refusing
to purchase such games, demanding refunds for games they have already purchased, and refraining from buying
other games published by the company whose game contained the objectionable material.
We have implemented preventative measures designed to reduce the possibility of hidden, objectionable content
from appearing in the video games we publish. Nonetheless, these preventative measures are subject to human
error, circumvention, overriding, and reasonable resource constraints. In addition, to the extent we acquire a
company without similar controls in place, the possibility of hidden, objectionable content appearing in video
games developed by that company but for which we are ultimately responsible could increase. If a video game
we published were found to contain hidden, objectionable content, the ESRB could demand that we recall a game
and change its packaging to reflect a revised rating, retailers could refuse to sell it and demand we accept the
return of any unsold copies or returns from customers, and consumers could refuse to buy it or demand that we
refund their money. This could have a material negative impact on our operating results and financial condition.
In addition, our reputation could be harmed, which could impact sales of other video games we sell. If any of
these consequences were to occur, our business and financial performance could be significantly harmed.
If we ship defective products, our operating results could suffer.
Products such as ours are extremely complex software programs, and are difficult to develop, manufacture and
distribute. We have quality controls in place to detect defects in the software, media and packaging of our
products before they are released. Nonetheless, these quality controls are subject to human error, overriding, and
reasonable resource constraints. Therefore, these quality controls and preventative measures may not be effective
in detecting defects in our products before they have been reproduced and released into the marketplace. In such
an event, we could be required to recall a product, or we may find it necessary to voluntarily recall a product,
and/or scrap defective inventory, which could significantly harm our business and operating results.
Breaches of our security measures and unintended disclosures of our intellectual property or our customer
data could adversely affect our business.
We take measures to prevent our source code and other confidential information from unauthorized access. A
security breach that results in the disclosure of our source code, other confidential assets, or pre-release software
could lead to piracy of our software or otherwise compromise our product plans. When we conduct business
online directly with consumers, we may be the victim of fraudulent transactions, including credit card fraud,
which presents a risk to our revenues and potentially disrupts service to our customers. As we increase our online
businesses, we are also collecting and storing an increasing amount of customer data, some of it personally
identifiable information including credit card data. It is possible that our security controls over customer data
22