Adobe 2007 Annual Report Download - page 34

Download and view the complete annual report

Please find page 34 of the 2007 Adobe annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 124

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124

34
We may not be able to protect our intellectual property rights, including our source code, from third-party infringers, or
unauthorized copying, use, disclosure or malicious attack.
Although we defend our intellectual property rights and combat unlicensed copying and use of software and intellectual
property rights through a variety of techniques, preventing unauthorized use or infringement of our rights is inherently
difficult. We actively pursue software pirates as part of our enforcement of our intellectual property rights, but we
nonetheless lose significant revenue due to illegal use of our software. If piracy activities increase, it may further harm our
business.
Additionally, we take significant measures to protect the secrecy of our confidential information and trade secrets,
including our source code. If unauthorized disclosure of our source code occurs, we could potentially lose future trade secret
protection for that source code. The loss of future trade secret protection could make it easier for third parties to compete with
our products by copying functionality, which could adversely affect our revenue and operating margins. We also seek to
protect our confidential information and trade secrets through the use of non-disclosure agreements with our customers,
contractors, vendors, and partners. However there is a risk that our confidential information and trade secrets may be
disclosed or published without our authorization, and in these situations it may be difficult and or costly for us to enforce our
rights.
We also devote significant resources to maintaining the security of our products from malicious hackers who develop
and deploy viruses, worms, and other malicious software programs that attack our products. Nevertheless, actual or perceived
security vulnerabilities in our products could harm our reputation and lead some customers to seek to return products, to
reduce or delay future purchases, to use competitive products or to make claims against us. Also, with the introduction of
hosted services with some of our product offerings, our customers may use such services to share confidential and sensitive
information. If a breach of security occurs on these hosted systems, we could be held liable to our customers. Additionally,
such breaches could lead to interruptions, delays and data loss and protection concerns as well as harm to our reputation.
We may not realize the anticipated benefits of past or future acquisitions, and integration of these acquisitions may disrupt
our business and management.
We have in the past and may in the future acquire additional companies, products or technologies. We may not realize
the anticipated benefits of an acquisition and each acquisition has numerous risks. These risks include:
difficulty in assimilating the operations and personnel of the acquired company;
difficulty in effectively integrating the acquired technologies or products with our current products and technologies;
difficulty in maintaining controls, procedures and policies during the transition and integration;
disruption of our ongoing business and distraction of our management and employees from other opportunities and
challenges due to integration issues;
difficulty integrating the acquired company’ s accounting, management information, human resources and other
administrative systems;
inability to retain key technical and managerial personnel of the acquired business;
inability to retain key customers, distributors, vendors and other business partners of the acquired business;
inability to achieve the financial and strategic goals for the acquired and combined businesses;
incurring acquisition-related costs or amortization costs for acquired intangible assets that could impact our operating
results;
potential impairment of our relationships with employees, customers, partners, distributors or third-party providers of
technology or products;