Expedia 2013 Annual Report Download - page 32

Download and view the complete annual report

Please find page 32 of the 2013 Expedia annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 140

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140

security measures will prevent all possible security breaches or attacks. A party, whether internal or external, that
is able to circumvent our security systems could misappropriate user information or proprietary information or
cause significant interruptions in our operations. In the past, we have experienced “denial-of-service” type
attacks on our systems that have made portions of our websites unavailable for short periods of time as well as
unauthorized access of our systems and data. We may need to expend significant resources to protect against
security breaches or to address problems caused by breaches, and reductions in website availability could cause a
loss of substantial business volume during the occurrence of any such incident. Because the techniques used to
sabotage security change frequently, often are not recognized until launched against a target and may originate
from less regulated and remote areas around the world, we may be unable to proactively address these techniques
or to implement adequate preventive measures. Security breaches could result in negative publicity, damage to
reputation, exposure to risk of loss or litigation and possible liability due to regulatory penalties and sanctions.
Security breaches could also cause travelers and potential users to lose confidence in our security, which would
have a negative effect on the value of our brands. Failure to adequately protect against attacks or intrusions,
whether for their own systems or systems of vendors, could expose us to security breaches that could have an
adverse impact on financial performance. Finally, countries in other regions, most notably Asia and Latin
America, are increasingly implementing new privacy regulations, resulting in additional compliance burdens and
uncertainty as to how some of these laws will be interpreted.
Acquisitions, investments or significant commercial arrangements could result in operating and
financial difficulties.
We have acquired, invested in or entered into significant commercial arrangements with a number of
businesses in the past, and our future growth may depend, in part, on future acquisitions, investments or
significant commercial arrangements, any of which could be material to our financial condition and results of
operations. Certain financial and operational risks related to acquisitions, investments or significant commercial
arrangements that may have a material impact on our business are:
Use of cash resources and incurrence of debt and contingent liabilities in funding acquisitions,
including with regard to future payment obligations in connection with put/call rights, may limit other
potential uses of our cash, including stock repurchases, dividend payments and retirement of
outstanding indebtedness;
Amortization expenses related to acquired intangible assets and other adverse accounting
consequences, including changes in fair value of contingent consideration;
Expected and unexpected costs incurred in pursuing acquisitions, including identifying and performing
due diligence on potential acquisition targets that may or may not be successful;
Diversion of management’s attention or other resources from our existing businesses;
Difficulties and expenses in assimilating the operations, products, technology, privacy protection
systems, information systems or personnel of the acquired company;
Impairment of relationships with employees, suppliers and affiliates of our business and the acquired
business;
The assumption of known and unknown debt and liabilities of the acquired company;
Failure of the acquired company to achieve anticipated traffic, transactions, revenues, earnings or cash
flows or to retain key management or employees;
Failure to generate adequate returns on our acquisitions and investments, or returns in excess of
alternative uses of capital;
Entrance into markets in which we have no direct prior experience and increased complexity in our
business;
Challenges relating to the structure of an investment, such as governance, accountability and decision-
making conflicts that may arise in the context of a joint venture or majority ownership investment;
26