Rosetta Stone 2012 Annual Report Download - page 30

Download and view the complete annual report

Please find page 30 of the 2012 Rosetta Stone annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 155

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155

Table of Contents



Our intellectual property is important to our success. We believe our trademarks, copyrights, trade secrets, pending patents, trade dress and designs
are valuable and integral to our success and competitive position. To protect our proprietary rights, we rely on a combination of patents, copyrights,
trademarks, trade secret laws, confidentiality procedures, contractual provisions and technical measures.
We have five issued patents in the United States and two foreign patents. We have several patent applications on file in the United States and other
countries. However, we do not know whether any of our pending patent applications will result in the issuance of patents or whether the examination
process will require us to narrow our claims. Even if patents are issued from our patent applications, which are not certain, they may be contested,
circumvented or invalidated in the future. Moreover, the rights granted under any issued patents may not provide us with proprietary protection or
competitive advantages, and, as with any technology, competitors may be able to develop similar or superior technologies now or in the future. In
addition, we have not emphasized patents as a source of significant competitive advantage and have instead sought to primarily protect our proprietary
rights under laws affording protection for trade secrets, copyright and trademark protection of our products, brands, trademarks and other intellectual
property where available and appropriate. However, all of these measures afford only limited protection and may be challenged, invalidated or
circumvented by third parties. In addition, these protections may not be adequate to prevent our competitors or customers from copying or reverse-
engineering our products. Third parties could copy all or portions of our products or otherwise obtain, use, distribute and sell our proprietary
information without authorization. Third parties may also develop similar or superior technology independently by designing around our intellectual
property, which would decrease demand for our products. In addition, our patents may not provide us with any competitive advantages and the patents
of others may seriously impede our ability to conduct our business.
We protect our products, trade secrets and proprietary information, in part, by requiring all of our employees to enter into agreements providing for
the maintenance of confidentiality and the assignment of rights to inventions made by them while employed by us. We also enter into non-disclosure
agreements with our technical consultants, customers, vendors and resellers to protect our confidential and proprietary information. We cannot assure
you that our confidentiality agreements with our employees, consultants and other third parties will not be breached, that we will be able to effectively
enforce these agreements, that we will have adequate remedies for any breach, or that our trade secrets and other proprietary information will not be
disclosed or will otherwise be protected.
We rely on contractual and license agreements with third parties in connection with their use of our products and technology. There is no guarantee
that such parties will abide by the terms of such agreements or that we will be able to adequately enforce our rights, in part because we rely, in many
instances, on "click-wrap" and "shrink-wrap" licenses, which are not negotiated or signed by individual licensees. Accordingly, some provisions of our
licenses, including provisions protecting against unauthorized use, copying, transfer, resale and disclosure of the licensed software program, may be
unenforceable under the laws of several jurisdictions.
Protection of trade secret and other intellectual property rights in the markets in which we operate and compete is highly uncertain and may involve
complex legal questions. The laws of countries in which we operate may afford little or no protection to our trade secrets and other intellectual property
rights. Although we defend our intellectual property rights and combat unlicensed copying and use of software and intellectual property rights through a
variety of techniques, preventing unauthorized use or infringement of our intellectual property rights is inherently difficult. Despite our enforcement
28