Siemens 2013 Annual Report Download - page 237

Download and view the complete annual report

Please find page 237 of the 2013 Siemens annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 372

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372

253 D. Consolidated Financial Statements
357 E. Additional Information
245 C. Compensation Report, Corporate Governance
statement pursuant to Section a of the
German Commercial Code, Takeover-relevant
information and explanatory report
246 C. Siemens AG ( Discussion on basis of
German Commercial Code)
250 C.Notes and forward-looking statements

We are subject to changes of regulations, laws and policies
concerning our products: As a diversified company with glob-
al businesses we are exposed to various product related regu-
lations, laws and policies influencing our processes. Recently,
some jurisdictions around the world have adapted certain reg-
ulations, laws and policies requiring us to extend our recycling
efforts, limit the sourcing and usage of certain raw materials
and request additional due diligences and disclosures on
sourcing and usage of the regulated raw materials. In particu-
lar, we must comply with U.S. legislation to improve transpar-
ency and accountability concerning the sourcing of “conflict
minerals” from mines located in the conflict zones of the Dem-
ocratic Republic of Congo (DRC) and its adjoining countries.
The term “conflict minerals” currently encompasses tantalum,
tin, tungsten (or their ores) and gold. Conflict minerals can be
found in a vast array of products. This U.S. legislation requires
manufacturers, such as us, to investigate and disclose their
use of any conflict minerals originating in the DRC or adjoining
countries. It also implements guidelines to assist the manufac-
turer in preventing, by way of performing due diligence in its
supply chain, any such sourcing from potentially financing or
benefitting armed groups in this area. We are currently work-
ing on an implementation strategy for the above-referenced
legislation. Since we operate within highly complex value
chains, we are required to undertake a significant due dili-
gence process requiring considerable investments of human
resources and finances in order to comply with the conflict
minerals due diligence and disclosure requirements. If our
(sub-) suppliers are unable or unwilling to provide us with re-
quested information and to take other steps to ensure that no
conflict minerals, financing or benefitting armed groups in the
DRC, are included in minerals or components supplied to us,
we may be forced to disclose information about the use of con-
flict minerals in our supply chain in filings with the SEC. In ad-
dition, since the applicability of the new conflict minerals leg-
islation is limited to companies publicly listed in the U.S., not
all of our competitors are required to comply with this legisla-
tion or engage in similar efforts to disclose the usage of con-
flict minerals. If we are unable to achieve sufficient confidence
throughout our supply chain, or if any of these risks or similar
risks associated with these kinds of regulations, laws and poli-
cies were to materialize, our business, financial condition, re-
sults of operations and reputation could be materially adverse-
ly affected.
C... OPERATIONAL RISKS
Our business, financial condition and results of operations
may be adversely affected by cost overruns or additional
payment obligations related to the management of our
long-term, fixed price or turnkey projects: We perform a
portion of our business, especially large projects, under long-
term contracts that are awarded on a competitive bidding
basis. Some of these contracts are inherently risky because we
may assume substantially all of the risks associated with com-
pleting a project and the post-completion warranty obliga-
tions. For example, we face the risk that we must satisfy tech-
nical requirements of a project even though we may not have
gained experience with those requirements before we win the
project. The profit margins realized on fixed-priced contracts
may vary from original estimates as a result of changes in
costs and productivity over their term. We sometimes bear the
risk of unanticipated project modifications, shortage of key
personnel, quality problems, financial difficulties of our cus-
tomers, cost overruns or contractual penalties caused by unex-
pected technological problems, unforeseen developments at
the project sites, unforeseen changes or difficulties in the reg-
ulatory or political environment, performance problems with
our suppliers, subcontractors and consortium partners or oth-
er logistical difficulties. Certain of our multi-year contracts also
contain demanding installation and maintenance require-
ments in addition to other performance criteria relating to tim-
ing, unit cost and compliance with government regulations
requirements, which, if not satisfied, could subject us to sub-
stantial contractual penalties, damages, non-payment and
contract termination. There can be no assurance that contracts
and projects, in particular those with long-term duration and
fixed-price calculation, can be completed profitably.
Increased IT security threats and higher levels of profes-
sionalism in computer crime could pose a risk to our sys-
tems, networks, products, solutions and services as well as
to those of our service providers: Our business portfolio in-
cludes a broad array of systems, networks, products, solutions
and services across our businesses that rely on digital technol-
ogies. We observe a global increase in IT security threats and
higher levels of professionalism in computer crime, which
pose a risk to the security of systems and networks and the
confidentiality, availability and integrity of data. We attempt to
mitigate these risks by employing a number of measures, in-
cluding employee training, comprehensive monitoring of our
networks and systems, and maintenance of backup and
protective systems such as firewalls and virus scanners. To the
extent we employ service providers, such as in the area of IT
infrastructure, we have contractual arrangements in place in
order to ensure that these risks are reduced in a similar man-
ner. Nonetheless, our systems, networks, products, solutions
and services, as well as those of our service providers remain
potentially vulnerable to attacks. Depending on their nature
and scope, such attacks could potentially lead to the leakage
of confidential information, improper use of our systems and
networks, manipulation and destruction of data, defective
products, production downtimes and supply shortages, which