Symantec 2014 Annual Report Download - page 163

Download and view the complete annual report

Please find page 163 of the 2014 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 183

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183

It is possible that the investigation could lead to claims or findings of violations of the False Claims Act, and
could be material to our results of operations and cash flows for any period. Resolution of False Claims Act
investigations can ultimately result in the payment of between one and three times the actual damages proven by
the government, plus civil penalties in some cases, depending upon a number of factors. Considering the
preliminary stage of the negotiated resolution process with the government, our current estimate of the low end
of the range of estimated loss from this matter is $25 million, which we have recorded as an offset to Revenue.
We are also involved in a number of other judicial and administrative proceedings that are incidental to our
business. Although adverse decisions (or settlements) may occur in one or more of the cases, it is not possible to
estimate the possible loss or losses from each of these cases. The final resolution of these lawsuits, individually
or in the aggregate, is not expected to have a material adverse effect on our business, results of operations,
financial condition or cash flow.
Note 9. Stock Repurchases
The following table summarizes our stock repurchases:
Year Ended
March 28, 2014 March 29, 2013 March 30, 2012
(In millions, except per share data)
Total number of shares repurchased 21 49 51
Dollar amount of shares repurchased $ 500 $ 826 $ 893
Average price paid per share $ 23.87 $ 16.98 $ 17.62
Range of price paid per share $ 20.41 - 27.09 $ 13.09 - 22.27 $ 15.38 - 20.51
Through our stock repurchase programs we have repurchased shares on a quarterly basis since the fourth
quarter of fiscal 2004. During the fourth quarter of fiscal 2013, our board of directors authorized a new $1.0
billion stock repurchase program which commenced in fiscal 2014. Our active stock repurchase programs have
$658 million remaining authorized for future repurchases as of March 28, 2014, and neither program has an
expiration date.
Note 10. Segment Information
In the fourth quarter of fiscal 2013, we announced a new strategy and created three new business segments
which offer different products and services distinguished by customer needs. We also made changes in our
organizational structure. As of the first quarter of fiscal 2014, we modified our segment reporting structure to
more readily match the new operating structure based on information reviewed by our CODM. The three
reporting segments, which are the same as our operating segments, are as follows:
User Productivity & Protection: Our User Productivity & Protection segment focuses on making it
simple for customers to be productive and protected at home and at work. These products include our
Norton solutions, endpoint security and management, encryption, and mobile offerings.
Information Security: Our Information Security segment protects organizations so they can confidently
conduct business while leveraging new platforms and data. These products include our SSL,
authentication, mail & web security, data center security, data loss prevention, and information security
services offerings.
Information Management: Our Information Management segment focuses on backup and recovery,
archiving and eDiscovery, storage and high availability solutions, ensuring that our customers’ IT
infrastructure and mission-critical applications are protected, managed and available.
84