Enom 2010 Annual Report Download - page 38

Download and view the complete annual report

Please find page 38 of the 2010 Enom annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 217

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217

Table of Contents
and intentional acts of vandalism, and to potential disruptions if the operators of these facilities have financial difficulties. Some of our systems are not fully
redundant, and our disaster recovery planning is currently underdeveloped and does not account for all eventualities. The occurrence of a natural disaster, a
decision to close a facility we are using without adequate notice for financial reasons or other unanticipated problems at our data centers could result in
lengthy interruptions in our service.
Furthermore, third-party service providers may experience an interruption in operations or cease operations for any reason. If we are unable to agree on
satisfactory terms for continued data center hosting relationships, we would be forced to enter into a relationship with other service providers or assume
hosting responsibilities ourselves. If we are forced to switch hosting facilities, we may not be successful in finding an alternative service provider on
acceptable terms or in hosting the computer servers ourselves. We may also be limited in our remedies against these providers in the event of a failure of
service. We also rely on third-party providers for components of our technology platform, such as hardware and software providers. A failure or limitation of
service or available capacity by any of these third-party providers could adversely affect our business, revenue, financial condition and results of operations.
If our security measures are breached and unauthorized access is obtained to a user's or freelance content creator's data, our service may be perceived as
not being secure and customers may curtail or stop using our service.
Our Content & Media and Registrar service offerings involve the storage and transmission of users', Registrar customers' and our freelance content
creators' personal information, such as names, social security numbers, addresses, email addresses and credit card and bank account numbers, and security
breaches could expose us to a risk of loss of this information, litigation and possible liability. Our payment services may be susceptible to credit card and
other payment fraud schemes, including unauthorized use of credit cards, debit cards or bank account information, identity theft or merchant fraud.
As nearly all of our products and services are Internet based, the amount of data we store for our users on our servers (including personal information)
has increased. If our security measures are breached or our systems fail in the future as a result of third-party action, employee error, malfeasance or
otherwise, and as a result, someone obtains unauthorized access to our users' and our freelance content creators' data, our reputation and brands will be
damaged, the adoption of our products and services could be severely limited, our business may suffer and we could incur significant liability. Because
techniques used to obtain unauthorized access or to sabotage systems change frequently and generally are not recognized until launched against a target, we
may be unable to anticipate these techniques or to implement adequate preventative measures. We may also need to expend significant resources to protect
against security breaches, including encrypting personal information, or remedy breaches after they occur, including notifying each person whose personal
data may have been compromised. The risk that these types of events could seriously harm our business is likely to increase as we expand the number of
Internet-based products and services we offer as well as increase the number of countries where we operate. If an actual or perceived breach of our security
measures occurs, the market perception of the effectiveness of our security measures and our reputation could be harmed and we could lose sales, advertisers,
freelance content creators and customers and potentially face costly litigation.
If we do not adequately protect our intellectual property rights, our competitive position and business may suffer.
Our intellectual property, consisting of trade secrets, trademarks, copyrights and patents, is, in the aggregate, important to our business. We rely on a
combination of trade secret, trademark, copyright and patent laws in the United States and other jurisdictions together with confidentiality agreements
36