Rosetta Stone 2015 Annual Report Download - page 16

Download and view the complete annual report

Please find page 16 of the 2015 Rosetta Stone annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 155

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155

Table of Contents
Acquisitions, joint ventures and strategic alliances may have an adverse effect on our business.
We have made and may continue to make acquisitions or enter into joint ventures and strategic alliances as part of our long-term business strategy.
Such transactions may result in use of our cash resources, dilutive issuances of our equity securities, or incurrence of debt. Such transactions also involve
significant challenges and risks including that the transaction does not advance our business strategy, that we do not realize a satisfactory return on our
investment, that we experience difficulty integrating new technology, employees, and business systems, that we divert management's attention from our other
businesses or that we acquire undiscovered liabilities such as patent infringement claims or violations of the U.S. Foreign Corrupt Practices Act and similar
worldwide anti-bribery laws. It may take longer than expected to realize the full benefits, such as increased revenue, enhanced efficiencies, or more customers,
or those benefits may ultimately be smaller than anticipated, or may not be realized. These events and circumstances could harm our operating results or
financial condition.
We may incur significant costs related to data security breaches that could compromise our information technology network security, trade secrets and
customer data.
Threats to our information technology network security can take a variety of forms. Individual hackers and groups of hackers, and sophisticated
organizations or individuals may threaten our information technology network security. Cyber attackers may develop and deploy malicious software to
attack our services and gain access to our networks, data centers, or act in a coordinated manner to launch distributed denial of service or other coordinated
attacks. Cyber threats and attacks are constantly evolving, thereby increasing the difficulty of detecting and successfully defending against them. We may be
unable to anticipate these techniques or to implement adequate preventative measures in time. Cyber threats and attacks can have cascading impacts that
unfold with increasing speed across internal networks and systems. Breaches of our network, credit card processing information, or data security could disrupt
the security of our internal systems and business applications, impair our ability to provide services to our customers and protect the privacy of their data,
resulting in product development delays, could compromise confidential or technical business information harming our competitive position, result in theft
or misuse of our intellectual property or other assets, require us to allocate more resources to improved technologies, or otherwise adversely affect our
business.
Our possession and use of personal information presents risks and expenses that could harm our business. If we are unable to protect our information
technology network against service interruption or failure, misappropriation or unauthorized disclosure or manipulation of data, whether through breach
of our network security or otherwise, we could be subject to costly government enforcement actions and litigation and our reputation may be damaged.
Our business involves the collection, storage and transmission of personal, financial or other information that is entrusted to us by our customers and
employees. Our information systems also contain the Company's proprietary and other confidential information related to our business. Our efforts to protect
such information may be unsuccessful due to the actions of third parties, computer viruses, physical or electronic break-ins, catastrophic events, employee
error or malfeasance or other attempts to harm our systems. Possession and use of personal information in conducting our business subjects us to legislative
and regulatory obligations that could require notification of data breaches, restrict our use of personal information and hinder our ability to acquire new
customers or market to existing customers. Some of our commercial partners may receive or store information provided by us or our users through our
websites. If these third parties fail to adopt or adhere to adequate information security practices, or fail to comply with our online policies, or in the event of a
breach of their networks, our customers' data may be improperly accessed, used or disclosed. As our business and the regulatory environment evolve in the
U.S. and internationally, we may become subject to additional and even more stringent legal obligations concerning our treatment of customer information.
We have incurred, and will continue to incur, expenses to comply with privacy and security standards and protocols imposed by law, regulation, industry
standards or contractual obligations.
If our systems are harmed or fail to function properly or if third parties improperly obtain and use the personal information of our customers or
employees, we may be required to expend significant resources to repair or replace systems or to otherwise protect against security breaches or to address
problems caused by breaches. A major breach of our network security and systems could have serious negative consequences for our businesses, including
possible fines, penalties and damages, reduced customer demand for our products and services, harm to our reputation and brand and loss of our ability to
accept and process customer credit card orders. Any such events could have a material and adverse effect on our business, reputation or financial results. Our
insurance policies carry coverage limits, which may not be adequate to reimburse us for losses caused by security breaches.
Changes in regulations or customer concerns regarding privacy and protection of customer data, or any failure to comply with such laws, could adversely
affect our business.
Federal, state, and international laws and regulations govern the collection, use, retention, disclosure, sharing and security of data that we receive from
and about our customers. The use of consumer data by online service providers and advertising
15