Enom 2010 Annual Report Download - page 39

Download and view the complete annual report

Please find page 39 of the 2010 Enom annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 217

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217

Table of Contents
and technical measures to protect our proprietary rights. As of December 31, 2010, we have been granted eight patents by the United States Patent and
Trademark Office, or USPTO, and we have 20 patent applications pending in the United States and other jurisdictions. Our patents expire between 2021 and
2027. We rely more heavily on trade secret protection than patent protection. To protect our trade secrets, we control access to our proprietary systems and
technology and enter into confidentiality and invention assignment agreements with our employees and consultants and confidentiality agreements with other
third parties. Effective trade secret, copyright, trademark and patent protection may not be available in all countries where we currently operate or in which we
may operate in the future. Some of our systems and technologies are not covered by any copyright, patent or patent application and, because of the relatively
high cost we would experience in registering all of our copyrights with the United States Copyright Office, we generally do not register the copyrights
associated with our content. We cannot guarantee that:
our intellectual property rights will provide competitive advantages to us;
our ability to assert our intellectual property rights against potential competitors or to settle current or future disputes will not be limited by our
agreements with third parties;
our intellectual property rights will be enforced in jurisdictions where competition may be intense or where legal protection may be weak;
any of the patents, trademarks, copyrights, trade secrets or other intellectual property rights that we presently employ in our business will not
lapse or be invalidated, circumvented, challenged or abandoned;
competitors will not design around our protected systems and technology; or
we will not lose the ability to assert our intellectual property rights against others.
We have from time to time become aware of third parties who we believe may have infringed or are infringing on our intellectual property rights. The
use of our intellectual property rights by others could reduce any competitive advantage we have developed and cause us to lose advertisers and website
publishers or otherwise cause harm to our business. Policing unauthorized use of our proprietary rights can be difficult and costly. In addition, it may be
necessary to enforce or protect our intellectual property rights through litigation or to defend litigation brought against us, which could result in substantial
costs and diversion of resources and management attention and could adversely affect our business, even if we are successful on the merits.
Confidentiality agreements with employees, consultants and others may not adequately prevent disclosure of trade secrets and other proprietary
information.
We have devoted substantial resources to the development of our proprietary systems and technology. Although we enter into confidentiality agreements
with our employees, consultants, independent contractors and other advisors, these agreements may not effectively prevent or provide remedies for
unauthorized disclosure of confidential information or unauthorized parties from copying aspects of our services or obtaining and using information that we
regard as proprietary. Others may independently discover or develop trade secrets and proprietary information, and in such cases we may not be able to assert
any trade secret rights against such parties. Costly and time-consuming litigation could be necessary to enforce and determine the scope of our proprietary
rights, and failure to obtain or maintain trade secret protection could reduce any competitive advantage we have and cause us to lose customers and
advertisers, or otherwise cause harm to our business.
37