Rosetta Stone 2010 Annual Report Download - page 34

Download and view the complete annual report

Please find page 34 of the 2010 Rosetta Stone annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 153

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153

Table of Contents
with our employees, consultants and other third parties will not be breached, that we will be able to effectively enforce these agreements, that we will have
adequate remedies for any breach, or that our trade secrets and other proprietary information will not be disclosed or will otherwise be protected.
We rely on contractual and license agreements with third parties in connection with their use of our products and technology. There is no guarantee that
such parties will abide by the terms of such agreements or that we will be able to adequately enforce our rights, in part because we rely, in many instances, on
"click-wrap" and "shrink-wrap" licenses, which are not negotiated or signed by individual licensees. Accordingly, some provisions of our licenses, including
provisions protecting against unauthorized use, copying, transfer, resale and disclosure of the licensed software program, may be unenforceable under the
laws of several jurisdictions.
Protection of trade secret and other intellectual property rights in the markets in which we operate and compete is highly uncertain and may involve
complex legal questions. The laws of countries in which we operate may afford little or no protection to our trade secrets and other intellectual property rights.
Although we defend our intellectual property rights and combat unlicensed copying and use of software and intellectual property rights through a variety of
techniques, preventing unauthorized use or infringement of our intellectual property rights is inherently difficult. Despite our enforcement efforts against
software piracy, we lose significant revenue due to illegal use of our software. If piracy activities increase, it may further harm our business.
We also expect that the more successful we are, the more likely that competitors will try to illegally use our proprietary information and develop products
that are similar to ours, which may infringe on our proprietary rights. In addition, we could potentially lose future trade secret protection for our source code if
any unauthorized disclosure of such code occurs. The loss of future trade secret protection could make it easier for third parties to compete with our products
by copying functionality. In addition, any changes in, or unexpected interpretations of, the trade secret and other intellectual property laws in any country in
which we operate may compromise our ability to enforce our trade secret and intellectual property rights. Costly and time-consuming litigation could be
necessary to enforce and determine the scope of our confidential information and trade secret protection. If we are unable to protect our proprietary rights or if
third parties independently develop or gain access to our or similar technologies, our business, revenue, reputation and competitive position could be harmed.
Third-party use of our trademarks as keywords in internet search engine advertising programs may direct potential customers to competitors' websites,
which could harm our reputation and cause us to lose sales.
Competitors and other third parties purchase our trademarks and confusingly similar terms as keywords in internet search engine advertising programs
and in the header and text of the resulting sponsored link advertisements in order to divert potential customers to their websites. Preventing such unauthorized
use is inherently difficult. If we are unable to protect our trademarks and confusingly similar terms from such unauthorized use, competitors and other third
parties may continue to drive potential online customers away from our websites to competing websites, which could harm our reputation and cause us to lose
sales.
Our trademarks are limited in scope and geographic coverage and may not significantly distinguish us from our competition.
We own several federal trademark registrations, including the Rosetta Stone mark, hold common law trademark rights and have federal trademark
applications pending in the United States and abroad for additional trademarks. Even if federal registrations are granted to us, our trademark rights may be
challenged. It is also possible that our competitors will adopt trademarks similar to ours, thus impeding our ability to build brand identity and possibly leading
to customer confusion. In fact, various third parties have registered trademarks that are similar to ours in the United States and overseas. We could
32