Yahoo 2012 Annual Report Download - page 34

Download and view the complete annual report

Please find page 34 of the 2012 Yahoo annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 144

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144

The systems through which we provide our products and services are highly technical, complex, and
interdependent. Design errors might exist in these systems, or might be introduced when we make
modifications, which might cause service malfunctions or require services to be taken offline while corrective
responses are developed.
Despite our implementation of network security measures, our servers are vulnerable to computer viruses,
worms, hacking, physical and electronic break-ins, router disruption, sabotage or espionage, and other
disruptions from unauthorized access and tampering, as well as coordinated denial-of-service attacks. We may
not be in a position to promptly address attacks or to implement adequate preventative measures if we are
unable to immediately detect such attacks. Such events could result in large expenditures to investigate or
remediate, to recover data, to repair or replace networks or information systems, including changes to security
measures, to deploy additional personnel, to defend litigation or to protect against similar future events, and
may cause damage to our reputation or loss of revenue.
We rely on third-party providers over which we have little or no control for our principal Internet connections
and co-location of a significant portion of our data servers, as well as for our payment processing capabilities
and key components or features of certain of our products and services. Any disruption of the services they
provide us or any failure of these third-party providers to handle higher volumes of use could, in turn, cause
delays or disruptions in our services and loss of revenue. In addition, if our agreements with these third-party
providers are terminated for any reason, we might not have a readily available alternative.
Prolonged delays or disruptions to our service could result in a loss of users, damage to our brands, legal costs or
liability, and harm to our operating results.
Our international operations expose us to additional risks that could harm our business, operating results, and
financial condition.
In addition to uncertainty about our ability to continue to generate revenue from our foreign operations and
expand our international market position, there are additional risks inherent in doing business internationally
(including through our international joint ventures), including:
tariffs, trade barriers, customs classifications and changes in trade regulations;
difficulties in developing, staffing, and simultaneously managing a large number of varying foreign operations
as a result of distance, language, and cultural differences;
stringent local labor laws and regulations;
longer payment cycles;
credit risk and higher levels of payment fraud;
profit repatriation restrictions and foreign currency exchange restrictions;
political or social unrest, economic instability, repression, or human rights issues;
geopolitical events, including natural disasters, acts of war and terrorism;
import or export regulations;
compliance with U.S. laws such as the Foreign Corrupt Practices Act, and local laws prohibiting bribery and
corrupt payments to government officials;
antitrust and competition regulations;
potentially adverse tax developments;
seasonal volatility in business activity and local economic conditions;
economic uncertainties relating to European sovereign and other debt;
20