Rosetta Stone 2012 Annual Report Download - page 31

Download and view the complete annual report

Please find page 31 of the 2012 Rosetta Stone annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 155

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155

Table of Contents
efforts against software piracy, we lose significant revenue due to illegal use of our software and from counterfeit copies of our software. If piracy
activities increase, it may further harm our business.
We also expect that the more successful we are, the more likely that competitors will try to illegally use our proprietary information and develop
products that are similar to ours, which may infringe on our proprietary rights. In addition, we could potentially lose future trade secret protection for
our source code if any unauthorized disclosure of such code occurs. The loss of future trade secret protection could make it easier for third parties to
compete with our products by copying functionality. In addition, any changes in, or unexpected interpretations of, the trade secret and other intellectual
property laws in any country in which we operate may compromise our ability to enforce our trade secret and intellectual property rights. Costly and
time-consuming litigation could be necessary to enforce and determine the scope of our confidential information and trade secret protection. If we are
unable to protect our proprietary rights or if third parties independently develop or gain access to our or similar technologies, our business, revenue,
reputation and competitive position could be harmed.


Competitors and other third parties, including counterfeiters, purchase our trademarks and confusingly similar terms as keywords in internet search
engine advertising programs and in the header and text of the resulting sponsored link advertisements in order to divert potential customers to their
websites. Preventing such unauthorized use is inherently difficult. If we are unable to protect our trademarks and confusingly similar terms from such
unauthorized use, competitors and other third parties may continue to drive potential online customers away from our websites to competing and
unauthorized websites, which could harm our reputation and cause us to lose sales.

We own several federal trademark registrations, including registrations of the  mark, hold common law trademark rights and have
trademark applications pending in the U.S. and abroad for additional trademarks. Even if federal registrations and registrations in other countries are
granted to us, our trademark rights may be challenged. It is also possible that our competitors will adopt trademarks similar to ours, thus impeding our
ability to build brand identity and possibly leading to customer confusion. In fact, various third parties have registered trademarks that are similar to ours
in the United States and overseas. We could incur substantial costs in prosecuting or defending trademark infringement suits. If we fail to effectively
enforce our trademark rights, our competitive position and brand recognition may be diminished.

We have not registered our copyrights in all of our software, written materials, website information, designs or other copyrightable works. The
United States Copyright Act automatically protects all of our copyrightable works, but without a registration we cannot enforce those copyrights against
infringers or seek certain statutory remedies for any such infringement. Preventing others from copying our products, written materials and other
copyrightable works is important to our overall success in the marketplace. In the event we decide to enforce any of our copyrights against infringers,
we will first be required to register the relevant copyrights, and we cannot be sure that all of the material for which we seek copyright registration would
be registrable in whole or in part, or that once registered, we would be successful in bringing a copyright claim against any such infringers.
29