Rosetta Stone 2011 Annual Report Download - page 31

Download and view the complete annual report

Please find page 31 of the 2011 Rosetta Stone annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 241

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241

Table of Contents
We are subject to U.S. and foreign government regulation of online services which could subject us to claims, judgments, and remedies, including
monetary liabilities and limitations on our business practices.
We are subject to regulations and laws directly applicable to providers of online services. The application of existing domestic and international laws and
regulations to us relating to issues such as user privacy and data protection, data security, defamation, promotions, billing, consumer protection, accessibility,
content regulation, quality of services, and intellectual property ownership and infringement in many instances is unclear or unsettled. In addition, we will
also be subject to any new laws and regulations directly applicable to our domestic and international activities. Internationally, we may also be subject to laws
regulating our activities in foreign countries and to foreign laws and regulations that are inconsistent from country to country. We may incur substantial
liabilities for expenses necessary to defend litigation in connection with such regulations and laws or to comply with these laws and regulations, as well as
potential substantial penalties for any failure to comply.
We may be subject to legal liability for new web-based online services.
Rosetta Stone TOTALe enables individuals to exchange information and engage in various online activities on a domestic and an international basis. The
law relating to the liability of providers of online services for activities of their users is currently unsettled both within the U.S. and internationally. Claims
may be brought against us for defamation, negligence, copyright or trademark infringement, unlawful activity, tort, including personal injury, fraud, or other
theories based on the nature and content of information that may be posted online or generated by our users. Defense of any such actions could be costly and
involve significant time and attention of our management and other resources and may require us to change our business in an adverse manner.
In addition, the amount of data we store for our users on our servers (including personal information) will increase as we increase our web based
services. Any systems failure or compromise of our security that results in the release of our users' data could seriously limit the adoption of our products and
services as well as harm our reputation and brand and, therefore, our business. We may also need to expend significant resources to protect against security
breaches. The risk that these types of events could seriously harm our business is likely to increase as we expand the number of web based products and
services we offer as well as increase the number of countries where we operate.
Further, failure or perceived failure by us to comply with our policies, applicable requirements, or industry self-regulatory principles related to the
collection, use, sharing or security of personal information, or other privacy, data-retention or data-protection matters could result in a loss of user confidence
in us, damage to our brands, and ultimately in a loss of users, advertising partners, or affiliates, which could adversely affect our business.
Our possession and use of personal information presents risks and expenses that could harm our business. Unauthorized disclosure or manipulation of
such data, whether through breach of our network security or otherwise, could expose us to costly litigation and damage our reputation.
Maintaining our network security is of critical importance because our online e-commerce systems and our online administration tools for our
institutional business store proprietary and confidential customer, employee and other sensitive data, such as names, addresses, other personal information and
credit card numbers. Our call centers also process confidential customer data, which is provided to employees in the call centers. We and our vendors use
commercially available encryption technology to transmit personal information when taking orders. We use security and business controls to limit access and
use of personal information. However, third parties may be able to circumvent these security and business measures by developing and deploying viruses,
worms and other malicious software programs that are designed to attack or attempt to infiltrate our systems and networks. In addition, employee error,
malfeasance or other errors in the storage, use or transmission of personal information could
29