TripAdvisor 2013 Annual Report Download - page 40

Download and view the complete annual report

Please find page 40 of the 2013 TripAdvisor annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 184

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184

caused by breaches, and reductions in website availability could cause a loss of substantial business volume
during the occurrence of any such incident. Because the techniques used to sabotage security change frequently,
often are not recognized until launched against a target and may originate from less regulated and remote areas
around the world, we may be unable to proactively address these techniques or to implement adequate preventive
measures. Security breaches could result in negative publicity, damage to reputation, exposure to risk of loss or
litigation and possible liability due to regulatory penalties and sanctions. Security breaches could also cause
travelers and potential users to lose confidence in our security, which would have a negative effect on the value
of our brand. Failure to adequately protect against attacks or intrusions, whether for our own systems or systems
of vendors, could expose us to security breaches that could have an adverse impact on financial performance.
We also face risks associated with security breaches affecting third parties conducting business over the
Internet. Much of our business is conducted with third party marketing affiliates, which may generate travel
reservations through our infrastructure or through our systems. In addition, we frequently use third parties to
process credit card payments. A security breach at such third party could be perceived by consumers as a security
breach of our systems and could result in negative publicity, damage our reputation, expose us to risk of loss or
litigation and possible liability and subject us to regulatory penalties and sanctions. In addition, such third parties
may not comply with applicable disclosure requirements, which could expose us to liability.
If the businesses we have acquired or invested in do not perform as expected or we are unable to effective
integrate acquired businesses, our operating results and prospects could be harmed.
We have acquired a number of businesses in the past, and our future growth may depend, in part, on future
acquisitions, any of which could be material to our financial condition and results of operations. Certain financial
and operational risks related to acquisitions that may have a material impact on our business are:
Use of cash resources and incurrence of debt and contingent liabilities in funding acquisitions may
limit other potential uses of our cash, including stock repurchases, dividend payments and retirement of
outstanding indebtedness;
Use of cash resources and incurrence of debt and contingent liabilities in funding acquisitions may
limit other potential uses of our cash, including stock repurchases, dividend payments and retirement of
outstanding indebtedness;
Amortization expenses related to acquired intangible assets and other adverse accounting
consequences;
Expected and unexpected costs incurred in identifying and pursuing acquisitions, and performing due
diligence on potential acquisition targets that may or may not be successful;
Diversion of management’s attention or other resources from our existing business;
Difficulties and expenses in integrating the operations, products, technology, privacy protection
systems, information systems or personnel of the acquired company;
Impairment of relationships with employees, suppliers and affiliates of our business and the acquired
business;
The assumption of known and unknown debt and liabilities of the acquired company;
Failure of the acquired company to achieve anticipated traffic, revenues, earnings or cash flows or to
retain key management or employees;
Failure to generate adequate returns on acquisitions and investments;
Entrance into markets in which we have no direct prior experience and increased complexity in our
business;
Impairment of goodwill or other intangible assets such as trademarks or other intellectual property
arising from acquisitions; and
Adverse market reaction to acquisitions.
30