Carbonite 2011 Annual Report Download - page 28

Download and view the complete annual report

Please find page 28 of the 2011 Carbonite annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 186

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186

Table of Contents
Confidentiality agreements with employees and others may not adequately prevent disclosure of our trade secrets and proprietary information.
Failure to protect our proprietary information could make it easier for third parties to compete with our solutions and harm our business.
We have devoted substantial resources to the development of our proprietary technologies and related processes. In order to protect our
proprietary technologies and processes, we rely in part on trade secret laws and confidentiality agreements with our employees, licensees, independent
contractors, and other advisors. These agreements may not effectively prevent disclosure of confidential information and may not provide an adequate
remedy in the event of unauthorized disclosure of confidential information. In addition, others may independently discover our trade secrets, in which
case we would not be able to assert trade secret rights, or develop similar technologies and processes. Further, laws in certain jurisdictions may afford
little or no trade secret protection, and any changes in, or unexpected interpretations of, the intellectual property laws in any country in which we operate
may compromise our ability to enforce our intellectual property rights. Costly and time-consuming litigation could be necessary to enforce and
determine the scope of our proprietary rights, and failure or inability to obtain or maintain trade secret protection or otherwise protect our proprietary
rights could adversely affect our business.
Our use of “open source” software could negatively affect our ability to sell our solutions and subject us to possible litigation.
A portion of the technologies licensed by us to our customers incorporates so-called “open source” software, and we may incorporate open source
software in the future. Such open source software is generally licensed by its authors or other third parties under open source licenses. These licenses
may subject us to certain unfavorable conditions, including requirements that we offer our solutions that incorporate the open source software for no
cost, that we make publicly available source code for modifications or derivative works we create based upon, incorporating, or using the open source
software, and/or that we license such modifications or derivative works under the terms of the particular open source license. Additionally, if a third
party software provider has incorporated open source software into software that we license from such provider, we could be required to disclose any of
our source code that incorporates or is a modification of such licensed software. If an author or other third party that distributes open source software
that we use or license were to allege that we had not complied with the conditions of the applicable license, we could be required to incur significant
legal expenses defending against such allegations and could be subject to significant damages, enjoined from the sale of our solutions that contained the
open source software, and required to comply with the foregoing conditions. Any of the foregoing could disrupt the distribution and sale of our solutions
and harm our business.
We rely on third party software, including server software and licenses from third parties to use patented intellectual property, that is required to
develop and provide our solutions.
We rely on software licensed from third parties to develop and offer our solutions, including server software from Microsoft and other patented
third-party technologies. In addition, we may need to obtain future licenses from third parties to use intellectual property associated with the
development of our solutions, which might not be available to us on acceptable terms, or at all. Any loss of the right to use any software required for the
development and maintenance of our solutions could result in delays in the provision of our solutions until equivalent technology is either developed by
us, or, if available from others, is identified, obtained, and integrated, which could harm our business. Any errors or defects in third party software could
result in errors or a failure of our solutions, which could harm our business.
If we are unable to protect our domain names, our reputation, brand, customer base, and revenue, as well as our business and operating results,
could be adversely affected.
We have registered domain names for websites, or URLs, that we use in our business, such as www.carbonite.com. If we are unable to maintain
our rights in these domain names, our competitors or other third parties could capitalize on our brand recognition by using these domain names for their
own benefit. In
25