Humana 2011 Annual Report Download - page 30

Download and view the complete annual report

Please find page 30 of the 2011 Humana annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 160

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160

We depend on independent third parties for significant portions of our systems-related support, equipment,
facilities, and certain data, including data center operations, data network, voice communication services and
pharmacy data processing. This dependence makes our operations vulnerable to such third parties’ failure to
perform adequately under the contract, due to internal or external factors. A change in service providers could
result in a decline in service quality and effectiveness or less favorable contract terms which may adversely affect
our operating results.
We rely on our agreements with customers, confidentiality agreements with employees, and our trade
secrets and copyrights to protect our proprietary rights. These legal protections and precautions may not prevent
misappropriation of our proprietary information. In addition, substantial litigation regarding intellectual property
rights exists in the software industry, including litigation involving end users of software products. We expect
software products to be increasingly subject to third-party infringement claims as the number of products and
competitors in this area grows.
Our business plans also include becoming a quality e-business organization by enhancing interactions with
customers, brokers, agents, providers and other stakeholders through web-enabled technology. Our strategy
includes sales and distribution of health benefit products through the Internet, and implementation of advanced
self-service capabilities, for internal and external stakeholders.
A cybersecurity attack that bypasses our information technology, or IT, security systems causing a security
breach may lead to a material disruption of our information technology business systems and/or the loss of
business information. If a cybersecurity attack were to be successful, we could be adversely affected due to the
theft, destruction, loss, misappropriation or release of confidential data or intellectual property, operational or
business delays resulting from the disruption of our IT systems, or negative publicity resulting in reputation or
brand damage with our customers, brokers, agents, providers, and other stakeholders.
There can be no assurance that our IT process will successfully improve existing systems, develop new
systems to support our expanding operations, integrate new systems, protect our proprietary information, defend
against cybersecurity attacks, or improve service levels. In addition, there can be no assurance that additional
systems issues will not arise in the future. Failure to adequately protect and maintain the integrity of our
information systems and data, or to defend against cybersecurity attacks, may result in a material adverse effect
on our results of operations, financial position, and cash flows.
Our business may be materially adversely impacted by CMS’s adoption of the new coding set for
diagnoses.
CMS has adopted a new coding set for diagnoses, commonly known as ICD-10, which significantly expands
the number of codes utilized. We may be required to incur significant expenses in implementing the new coding
set. If we do not adequately implement the new coding set, our results of operations, financial position and cash
flows may be materially adversely affected.
We are involved in various legal actions and governmental and internal investigations, including, without
limitation, an ongoing internal investigation and litigation and government requests for information related to
certain aspects of our Florida subsidiary operations, any of which, if resolved unfavorably to us, could result
in substantial monetary damages. Increased litigation and negative publicity could increase our cost of doing
business.
We are or may become a party to a variety of legal actions that affect our business, including employment
and employment discrimination-related suits, employee benefit claims, breach of contract actions, securities laws
claims, and tort claims.
20