July 13, 2012
Mr. James Rosenberg
Senior Assistant Chief Accountant
United States Securities and Exchange Commission
Division of Corporation Finance
Mail Stop 4720
100 F Street NE
Washington, D.C. 20549
RE: File Number 001-02189
Dear Mr. Rosenberg:
In follow-up to a phone discussion between Jennifer Riegel of the SEC and Greg Linder, Vice President and Controller, Abbott Laboratories, we have expanded our response to comment #1 in your letter of May 30, 2012. Our expanded response is included in the attachment to this letter.
As per your request, Abbott acknowledges that we are responsible for the adequacy and accuracy of the disclosure in the filing; staff comments or changes to disclosure in response to staff comments do not foreclose the Commission from taking any action with respect to the filing; and Abbott may not assert staff comments as a defense in any proceeding initiated by the Commission or any person under the federal securities laws of the United States.
Very truly yours,
/s/ Thomas C. Freyman |
|
|
Thomas C. Freyman |
|
|
Executive Vice President, Finance |
|
|
and Chief Financial Officer |
|
|
Enclosure
Form 10-K for the Fiscal Year Ended December 31, 2011
Risk Factors
“Other factors can have a material adverse effect on Abbott’s future profitability and financial condition,” page 14
1. We reviewed your response to comment 1 in our letter dated April 18, 2012. In your response, you note that you depend on well-developed information technology systems to operate your business. In future filings, beginning with your next Form 10-Q, please provide a separate discussion of the risks posed to your operations from your dependence upon your technology systems and the risks posed to your business or operations by cyber attacks. If you have experienced any cyber attacks in the past, please state that fact in order to provide the proper context. You may include language that indicates that the attacks were mitigated.
Response:
In future filings, beginning with our next Form 10-Q, we will provide a separate discussion of the risks posed to our operations from our dependence on our technology systems and from cyber attacks. Our information technology systems have been and are expected to continue to be the target of malware and other cyber attacks and we will include such a statement in the discussion of this risk. To date, no cyber attack has had a material effect on our operations due in part to the implementation of proactive security and other protective measures.