GE 2015 Annual Report Download - page 145

Download and view the complete annual report

Please find page 145 of the 2015 GE annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 252

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252

RISK FACTORS
GE 2015 FORM 10-K 117
Intellectual property - Our intellectual property portfolio may not prevent competitors from independently developing
products and services similar to or duplicative to ours.
Our patents and other intellectual property may not prevent competitors from independently developing or selling products and services
similar to or duplicative of ours, and there can be no assurance that the resources invested by us to protect our intellectual property will
be sufficient or that our intellectual property portfolio will adequately deter misappropriation or improper use of our technology. We could
also face competition in some countries where we have not invested in an intellectual property portfolio. We also face attempts to gain
unauthorized access to our IT systems or products for the purpose of improperly acquiring our trade secrets or confidential business
information. The theft or unauthorized use or publication of our trade secrets and other confidential business information as a result of
such an incident could adversely affect our competitive position and the value of our investment in research and development. We may
be unable to secure or retain ownership or rights to use data in certain software analytics or services offerings. In addition, we may be
the target of aggressive and opportunistic enforcement of patents by third parties, including non-practicing entities. Regardless of the
merit of such claims, responding to infringement claims can be expensive and time-consuming. If GE is found to infringe any third-party
rights, we could be required to pay substantial damages or we could be enjoined from offering some of our products and services. Also,
there can be no assurances that we will be able to obtain or renew from third parties the licenses we need in the future, and there is no
assurance that such licenses can be obtained on reasonable terms.
OPERATIONAL RISKS
Operational risk relates to risks arising from systems, processes, people and external events that affect the operation of our
businesses. It includes product life cycle and execution; product safety and performance; information management and data protection
and security, including cyber security; supply chain and business disruption; and other risks, including human resources and reputation.
Operations - We may face operational challenges that could have a material adverse effect on our business, reputation,
financial position and results of operations, and we are dependent on maintenance of existing product lines, market
acceptance of new product and service introductions and product and service innovations for continued revenue and
earnings growth.
We produce highly sophisticated products and provide specialized services for both our and third-party products that incorporate or use
leading-edge technology, including both hardware and software. While we have built extensive operational processes to ensure that our
product design, manufacture and servicing, and other services that we provide, meet the most rigorous quality standards, there can be
no assurance that we or our customers or other third parties will not experience operational process failures or other problems,
including through cyber attacks and other intentional acts, that could result in potential product, safety, regulatory or environmental
risks. Despite the existence of crisis management or business continuity plans, operational failures or quality issues, including as a
result of organizational changes, attrition or labor relations, could have a material adverse effect on our business, reputation, financial
position and results of operations. For projects where we take on the full scope of engineering, procurement, construction or other
services, the potential risk is greater that operational, quality or other issues at particular projects could adversely affect *(¶V results of
operations. In addition, the markets in which we operate are subject to technological change and require skilled talent. Our long-term
operating results depend substantially upon our ability to continually develop, introduce, and market new and innovative products and
services, to modify existing products and services, to customize products and services, to respond to technological change and to
deliver products, services and outcomes in line with our projected performance and/or cost estimates.
Cybersecurity - Increased cybersecurity requirements, vulnerabilities, threats and more sophisticated and targeted computer
crime could pose a risk to our systems, networks, products, solutions, services and data.
Increased global cybersecurity vulnerabilities, threats and more sophisticated and targeted cyber-related attacks pose a risk to the
security of *(¶V and its FXVWRPHUV¶ SDUWQHUV¶ VXSSOLHUV¶ and third-party service SURYLGHUV¶ products, systems and networks and the
confidentiality, availability and integrity of *(¶V and its FXVWRPHUV¶ data. While we attempt to mitigate these risks by employing a number
of measures, including employee training, monitoring and testing, and maintenance of protective systems and contingency plans, we
remain potentially vulnerable to additional known or unknown threats. We also may have access to sensitive, confidential or personal
data or information in certain of our businesses that is subject to privacy and security laws, regulations and customer-imposed controls.
Despite our efforts to protect sensitive, confidential or personal data or information, we may be vulnerable to material security breaches,
theft, misplaced or lost data, programming errors, employee errors and/or malfeasance that could potentially lead to the compromising
of sensitive, confidential or personal data or information, improper use of our systems, software solutions or networks, unauthorized
access, use, disclosure, modification or destruction of information, defective products, production downtimes and operational
disruptions. In addition, a cyber-related attack could result in other negative consequences, including damage to our reputation or
competitiveness, remediation or increased protection costs, litigation or regulatory action.
GE 2015 FORM 10-K 117