Adobe 2008 Annual Report Download - page 35

Download and view the complete annual report

Please find page 35 of the 2008 Adobe annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 128

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128

35
disclosed or published without our authorization, and in these situations it may be difficult and or costly for us to enforce our
rights.
We also devote significant resources to maintaining the security of our products from malicious hackers who develop
and deploy viruses, worms, and other malicious software programs that attack our products. Nevertheless, actual or perceived
security vulnerabilities in our products could harm our reputation and lead some customers to seek to return products, to
reduce or delay future purchases, to use competitive products or to make claims against us. Also, with the introduction of
hosted services with some of our product offerings, our customers may use such services to share confidential and sensitive
information. If a breach of security occurs on these hosted systems, we could be held liable to our customers. Additionally,
such breaches could lead to interruptions, delays and data loss and protection concerns as well as harm to our reputation.
We may not realize the anticipated benefits of past or future acquisitions, and integration of these acquisitions may disrupt
our business and management.
We have in the past and may in the future acquire additional companies, products or technologies. We may not realize
the anticipated benefits of an acquisition and each acquisition has numerous risks. These risks include:
difficulty in assimilating the operations and personnel of the acquired company;
difficulty in effectively integrating the acquired technologies or products with our current products and
technologies;
difficulty in maintaining controls, procedures and policies during the transition and integration;
disruption of our ongoing business and distraction of our management and employees from other opportunities and
challenges;
difficulty integrating the acquired company’ s accounting, management information, human resources and other
administrative systems;
inability to retain key technical and managerial personnel of the acquired business;
inability to retain key customers, distributors, vendors and other business partners of the acquired business;
inability to achieve the financial and strategic goals for the acquired and combined businesses;
inability to take advantage of anticipated tax benefits as a result of unforeseen difficulties in our integration
activities;
incurring acquisition-related costs or amortization costs for acquired intangible assets that could impact our
operating results;
potential impairment of our relationships with employees, customers, partners, distributors or third-party providers
of technology or products;
potential failure of the due diligence processes to identify significant problems, liabilities or other shortcomings or
challenges of an acquired company or technology, including but not limited to, issues with the acquired company’ s
intellectual property, product quality or product architecture, revenue recognition or other accounting practices,
employee, customer or partner issues or legal and financial contingencies;
exposure to litigation or other claims in connection with, or inheritance of claims or litigation risk as a result of, an
acquisition, including but not limited to, claims from terminated employees, customers, former stockholders or
other third parties;
incurring significant exit charges if products acquired in business combinations are unsuccessful;
potential inability to assert that internal controls over financial reporting are effective;