Rosetta Stone 2011 Annual Report Download - page 36

Download and view the complete annual report

Please find page 36 of the 2011 Rosetta Stone annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 241

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241

Table of Contents
and have instead sought to primarily protect our proprietary rights under laws affording protection for trade secrets, copyright and trademark protection of our
products, brands, trademarks and other intellectual property where available and appropriate. However, all of these measures afford only limited protection
and may be challenged, invalidated or circumvented by third parties. In addition, these protections may not be adequate to prevent our competitors or
customers from copying or reverse-engineering our products. Third parties could copy all or portions of our products or otherwise obtain, use, distribute and
sell our proprietary information without authorization. Third parties may also develop similar or superior technology independently by designing around our
intellectual property, which would decrease demand for our products. In addition, our patents may not provide us with any competitive advantages and the
patents of others may seriously impede our ability to conduct our business.
We protect our products, trade secrets and proprietary information, in part, by requiring all of our employees to enter into agreements providing for the
maintenance of confidentiality and the assignment of rights to inventions made by them while employed by us. We also enter into non-disclosure agreements
with our technical consultants, customers, vendors and resellers to protect our confidential and proprietary information. We cannot assure you that our
confidentiality agreements with our employees, consultants and other third parties will not be breached, that we will be able to effectively enforce these
agreements, that we will have adequate remedies for any breach, or that our trade secrets and other proprietary information will not be disclosed or will
otherwise be protected.
We rely on contractual and license agreements with third parties in connection with their use of our products and technology. There is no guarantee that
such parties will abide by the terms of such agreements or that we will be able to adequately enforce our rights, in part because we rely, in many instances, on
"click-wrap" and "shrink-wrap" licenses, which are not negotiated or signed by individual licensees. Accordingly, some provisions of our licenses, including
provisions protecting against unauthorized use, copying, transfer, resale and disclosure of the licensed software program, may be unenforceable under the
laws of several jurisdictions.
Protection of trade secret and other intellectual property rights in the markets in which we operate and compete is highly uncertain and may involve
complex legal questions. The laws of countries in which we operate may afford little or no protection to our trade secrets and other intellectual property rights.
Although we defend our intellectual property rights and combat unlicensed copying and use of software and intellectual property rights through a variety of
techniques, preventing unauthorized use or infringement of our intellectual property rights is inherently difficult. Despite our enforcement efforts against
software piracy, we lose significant revenue due to illegal use of our software and from counterfeit copies of our software. If piracy activities increase, it may
further harm our business.
We also expect that the more successful we are, the more likely that competitors will try to illegally use our proprietary information and develop products
that are similar to ours, which may infringe on our proprietary rights. In addition, we could potentially lose future trade secret protection for our source code if
any unauthorized disclosure of such code occurs. The loss of future trade secret protection could make it easier for third parties to compete with our products
by copying functionality. In addition, any changes in, or unexpected interpretations of, the trade secret and other intellectual property laws in any country in
which we operate may compromise our ability to enforce our trade secret and intellectual property rights. Costly and time-consuming litigation could be
necessary to enforce and determine the scope of our confidential information and trade secret protection. If we are unable to protect our proprietary rights or if
third parties independently develop or gain access to our or similar technologies, our business, revenue, reputation and competitive position could be harmed.
34