Windstream 2014 Annual Report Download - page 90

Download and view the complete annual report

Please find page 90 of the 2014 Windstream annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 216

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

14
Increases in broadband usage may cause network capacity limitations, resulting in service disruptions or reduced capacity for
customers.
Video streaming services and peer-to-peer file sharing applications use significantly more bandwidth than traditional Internet
activity such as web browsing and email. As utilization rates and availability of these services continue to grow, our high-speed
Internet customers may use much more bandwidth than in the past. If this occurs, we could be required to make significant capital
expenditures to increase network capacity to avoid service disruptions or reduced capacity for customers.
Alternatively, we may choose to implement reasonable network management practices to reduce the network capacity available
to bandwidth-intensive activities during certain times in market areas experiencing congestion, and these actions could negatively
affect customer experience and increase customer churn.
While we believe demand for these services may drive high-speed Internet customers to pay for faster broadband speeds, we may
not be able to recover the costs of the necessary network investments. This could result in an adverse impact to our results of
operations and financial condition.
Disruptions and congestion in our networks and infrastructure may cause us to lose customers and incur additional expenses.
Our customers depend on reliable service over our network. Some of the risks to our network infrastructure include physical
damage to lines, security breaches, capacity limitations, power surges or outages, software defects and disruptions beyond our
control, such as natural disasters and acts of terrorism. From time to time in the ordinary course of business, we will experience
disruptions in our service due to factors such as cable damage, inclement weather and service failures of our third party service
providers. Additionally, we could face disruptions due to capacity limitations as a result of changes in our customers’ high-speed
Internet usage patterns. These patterns have changed in recent years, for example through the increased usage of video, resulting
in a significant increase in the utilization of our network.
We could experience more significant disruptions in the future. Disruptions may cause interruptions in service or reduced capacity
for customers, either of which could cause us to lose customers or incur additional expenses or capital expenditures. Such results
could adversely affect our results of operations and financial condition.
Disruptions in our data centers could cause service interruptions for customers using advanced data services.
Many of our advanced data products are supported by our data center infrastructure, including offerings such as colocation services,
cloud computing, managed services and disaster recovery services. Risks to our data center infrastructure include, but are not
limited to, natural disasters, security breaches, power surges or outages, or acts of terrorism.
If a disruption occurs in one of our data centers, our customers could lose access to information critical to running their businesses,
which could result in a loss of customers. We may also incur significant operating or capital expenditures to restore service. As a
result, disruptions could affect our results of operations and financial condition.
Cyber security incidents could have a significant operational and financial impact.
We store customers’ proprietary business information in our facilities through our colocation, managed services and cloud
computing services. In addition, we maintain certain sensitive customer information in our financial and operating systems. While
we have implemented data security polices and other internal controls to safeguard and protect against misuse or loss of this
information, if their data were compromised through a cyber security incident, it could have a significant impact on our results of
operations and financial condition. Additionally, we have implemented network and data security policies and other internal
controls to safeguard and protect against malicious interference with our networks and information technology infrastructure and
related systems and technology, as well as misappropriation of data and other malfeasance, but we cannot eliminate the risk
associated with these types of occurrences. While we continue to adapt to new threats, increasing incidents of unsuccessful and
successful “cyber attacks”, such as computer hacking, dissemination of computer viruses and denial of service attacks, as well as
misappropriation of data, pose growing risks of a significant effect on our results of operations and financial condition and we
cannot fully predict the evolution of such threats.