GVHR » Topics » We are dependent upon technology services, and any damage, interruption, security breach or failure in our computer and telecommunications systems could adversely affect our existing client relationships and our ability to attract new clients.

These excerpts taken from the GVHR 10-K filed Mar 16, 2009.
We are dependent upon technology services, and any damage, interruption, security breach or failure in our computer and telecommunications systems could adversely affect our existing client relationships and our ability to attract new clients.

 

Our business could be interrupted and we may lose data as a result of damage to or disruption of our computer and telecommunications equipment and software systems from natural disasters, floods, fire, power loss, hardware or software malfunctions, penetration by computer hackers, terrorist acts, vandalism, sabotage, computer viruses, vendor performance failures or insolvency, and other causes. Our business involves the storage and transmission of sensitive information about our clients and their employees and any system or equipment failure or security breach we experience could adversely affect our clients’ businesses, and could expose us to a risk of loss of this sensitive information, damage to our goodwill and reputation, litigation and possible liability. If our security measures are breached as a result of third-party action, employee error, malfeasance or otherwise and, as a result, someone obtains unauthorized access to client data, our reputation will be damaged, our business may suffer and we could incur significant liability. The precautions that we have taken to protect ourselves and minimize the impact of such events (such as our disaster recovery plans and encryption of sensitive information) may not be adequate, and we may be unable to recover data used in our operations or prevent unauthorized access to our client and employee data. Techniques used to obtain unauthorized access or to sabotage systems change frequently and generally are not recognized until launched against a target. As a result, we may be unable to anticipate these techniques or implement adequate preventative measures. If an actual or perceived breach of our security occurs, the market perception of our security measures could be harmed, and we could lose sales and clients.

 

We are dependent upon technology services,
and any damage, interruption, security breach or failure
in our computer and telecommunications
systems could adversely affect our existing
client relationships and our ability
to attract new clients.



 



Our business could be
interrupted and we may lose data as a result of damage to or disruption of our
computer and telecommunications equipment and software systems from natural
disasters, floods, fire, power loss, hardware or software malfunctions,
penetration by computer hackers, terrorist acts, vandalism, sabotage, computer
viruses, vendor performance failures or insolvency, and other causes. Our
business involves the storage and transmission of sensitive information about
our clients and their employees and any system or equipment failure or security
breach we experience could adversely affect our clients’ businesses, and could
expose us to a risk of loss of this sensitive information, damage to our
goodwill and reputation, litigation and possible liability. If our security
measures are breached as a result of third-party action, employee error,
malfeasance or otherwise and, as a result, someone obtains unauthorized access
to client data, our reputation will be damaged, our business may suffer and we
could incur significant liability. The precautions that we have taken to
protect ourselves and minimize the impact of such events (such as our disaster
recovery plans and encryption of sensitive information) may not be adequate,
and we may be unable to recover data used in our operations or prevent
unauthorized access to our client and employee data. Techniques used to obtain
unauthorized access or to sabotage systems change frequently and generally are
not recognized until launched against a target. As a result, we may be unable
to anticipate these techniques or implement adequate preventative measures. If
an actual or perceived breach of our security occurs, the market perception of
our security measures could be harmed, and we could lose sales and clients.



 



We are dependent upon technology services,
and any damage, interruption, security breach or failure
in our computer and telecommunications
systems could adversely affect our existing
client relationships and our ability
to attract new clients.



 



Our business could be
interrupted and we may lose data as a result of damage to or disruption of our
computer and telecommunications equipment and software systems from natural
disasters, floods, fire, power loss, hardware or software malfunctions,
penetration by computer hackers, terrorist acts, vandalism, sabotage, computer
viruses, vendor performance failures or insolvency, and other causes. Our
business involves the storage and transmission of sensitive information about
our clients and their employees and any system or equipment failure or security
breach we experience could adversely affect our clients’ businesses, and could
expose us to a risk of loss of this sensitive information, damage to our
goodwill and reputation, litigation and possible liability. If our security
measures are breached as a result of third-party action, employee error,
malfeasance or otherwise and, as a result, someone obtains unauthorized access
to client data, our reputation will be damaged, our business may suffer and we
could incur significant liability. The precautions that we have taken to
protect ourselves and minimize the impact of such events (such as our disaster
recovery plans and encryption of sensitive information) may not be adequate,
and we may be unable to recover data used in our operations or prevent
unauthorized access to our client and employee data. Techniques used to obtain
unauthorized access or to sabotage systems change frequently and generally are
not recognized until launched against a target. As a result, we may be unable
to anticipate these techniques or implement adequate preventative measures. If
an actual or perceived breach of our security occurs, the market perception of
our security measures could be harmed, and we could lose sales and clients.



 



These excerpts taken from the GVHR 10-K filed Mar 17, 2008.

We are dependent upon technology services, and any damage, interruption, security breach or failure in our computer and telecommunications systems could adversely affect our existing client relationships and our ability to attract new clients.

        Our business could be interrupted and we may lose data as a result of damage to or disruption of our computer and telecommunications equipment and software systems from natural disasters, floods, fire, power loss, hardware or software malfunctions, penetration by computer hackers, terrorist acts, vandalism, sabotage, computer viruses, vendor performance failures or insolvency, and other causes. Our business involves the storage and transmission of sensitive information about our clients and their employees and any system or equipment failure or security breach we experience could adversely affect

25


our clients' businesses, and could expose us to a risk of loss of this sensitive information, damage to our goodwill and reputation, litigation and possible liability. If our security measures are breached as a result of third-party action, employee error, malfeasance or otherwise and, as a result, someone obtains unauthorized access to client data, our reputation will be damaged, our business may suffer and we could incur significant liability. The precautions that we have taken to protect ourselves and minimize the impact of such events (such as our disaster recovery plans and encryption of sensitive information) may not be adequate, and we may be unable to recover data used in our operations or prevent unauthorized access to our client and employee data. Techniques used to obtain unauthorized access or to sabotage systems change frequently and generally are not recognized until launched against a target. As a result, we may be unable to anticipate these techniques or implement adequate preventative measures. If an actual or perceived breach of our security occurs, the market perception of our security measures could be harmed, and we could lose sales and clients.

We are dependent upon technology services, and any damage, interruption, security breach or failure in our computer and telecommunications systems could adversely affect our existing client
relationships and our ability to attract new clients.





        Our business could be interrupted and we may lose data as a result of damage to or disruption of our computer and telecommunications equipment and software
systems from natural disasters, floods, fire, power loss, hardware or software malfunctions, penetration by computer hackers, terrorist acts, vandalism, sabotage, computer viruses, vendor performance
failures or insolvency, and other causes. Our business involves the storage and transmission of sensitive information about our clients and their employees and any system or equipment failure or
security breach we experience could adversely affect



25









our
clients' businesses, and could expose us to a risk of loss of this sensitive information, damage to our goodwill and reputation, litigation and possible liability. If our security measures are
breached as a result of third-party action, employee error, malfeasance or otherwise and, as a result, someone obtains unauthorized access to client data, our reputation will be damaged, our business
may suffer and we could incur significant liability. The precautions that we have taken to protect ourselves and minimize the impact of such events (such as our disaster recovery plans and encryption
of sensitive information) may not be adequate, and we may be unable to recover data used in our operations or prevent unauthorized access to our client and employee data. Techniques used to obtain
unauthorized access or to sabotage systems change frequently and generally are not recognized until launched against a target. As a result, we may be unable to anticipate these techniques or implement
adequate preventative measures. If an actual or perceived breach of our security occurs, the market perception of our security measures could be harmed, and we could lose sales and clients.





Wikinvest © 2006, 2007, 2008, 2009, 2010, 2011, 2012. Use of this site is subject to express Terms of Service, Privacy Policy, and Disclaimer. By continuing past this page, you agree to abide by these terms. Any information provided by Wikinvest, including but not limited to company data, competitors, business analysis, market share, sales revenues and other operating metrics, earnings call analysis, conference call transcripts, industry information, or price targets should not be construed as research, trading tips or recommendations, or investment advice and is provided with no warrants as to its accuracy. Stock market data, including US and International equity symbols, stock quotes, share prices, earnings ratios, and other fundamental data is provided by data partners. Stock market quotes delayed at least 15 minutes for NASDAQ, 20 mins for NYSE and AMEX. Market data by Xignite. See data providers for more details. Company names, products, services and branding cited herein may be trademarks or registered trademarks of their respective owners. The use of trademarks or service marks of another is not a representation that the other is affiliated with, sponsors, is sponsored by, endorses, or is endorsed by Wikinvest.
Powered by MediaWiki