Rosetta Stone 2012 Annual Report Download - page 23

Download and view the complete annual report

Please find page 23 of the 2012 Rosetta Stone annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 155

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155

Table of Contents
We may also need to grow, reconfigure or relocate our data centers in response to changing business needs, which may be costly and lead to unplanned
disruptions of service.


We are subject to regulations and laws directly applicable to providers of online services. The application of existing domestic and international
laws and regulations to us relating to issues such as user privacy and data protection, data security, defamation, promotions, billing, consumer
protection, accessibility, content regulation, quality of services, and intellectual property ownership and infringement in many instances is unclear or
unsettled. In addition, we will also be subject to any new laws and regulations directly applicable to our domestic and international activities.
Internationally, we may also be subject to laws regulating our activities in foreign countries and to foreign laws and regulations that are inconsistent
from country to country. We may incur substantial liabilities for expenses necessary to defend litigation in connection with such regulations and laws or
to comply with these laws and regulations, as well as potential substantial penalties for any failure to comply.


 enables individuals to exchange information and engage in various online activities on a domestic and an international
basis. The law relating to the liability of providers of online services for activities of their users is currently unsettled both within the United States and
internationally. Claims may be brought against us for defamation, negligence, copyright or trademark infringement, unlawful activity, tort, including
personal injury, fraud, or other theories based on the nature and content of information that may be posted online or generated by our users. Defense of
any such actions could be costly and involve significant time and attention of our management and other resources and may require us to change our
business in an adverse manner.
In addition, the amount of data we store for our users on our servers (including personal information) will increase as we increase our Cloud based
offerings. Any systems failure or compromise of our security that results in the release of our users' data could seriously limit the adoption of our
products and services as well as harm our reputation and brand and, therefore, our business. We may also need to expend significant resources to
protect against security breaches. The risk that these types of events could seriously harm our business is likely to increase as we expand the number of
web based products and services we offer as well as increase the number of countries where we operate.
Further, failure or perceived failure by us to comply with our policies, applicable requirements, or industry self-regulatory principles related to the
collection, use, sharing or security of personal information, or other privacy, data-retention or data-protection matters could result in a loss of user
confidence in us, damage to our brands, and ultimately in a loss of users, advertising partners, or affiliates, which could adversely affect our business.
Hackers develop and deploy viruses, worms, and other malicious software programs that attack our products and services and gain access to our
networks and data centers. Groups of hackers may also act in a coordinated manner to launch distributed denial of service attacks, or other coordinated
attacks. Sophisticated organizations or individuals may launch targeted attacks using novel methods to gain access to computers running our software.
These threats may result in breaches of our network or data security, disruptions of our internal systems and business applications, impairment of our
ability to provide services to our customers, product development delays, harm to our competitive position from the compromise of confidential
business information, or other negative impacts on our business.
21