Incredimail 2012 Annual Report Download - page 18

Download and view the complete annual report

Please find page 18 of the 2012 Incredimail annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 345

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345

Our financial performance may be materially adversely affected by information technology, insufficient cyber security and other
business disruptions.
Our business is constantly challenged and may be impacted by disruptions, including information technology attacks or failures.
Cybersecurity attacks, in particular, are evolving and include, but are not limited to, malicious software, attempts to gain unauthorized access to
data, and other electronic security breaches that could lead to disruptions in systems, unauthorized release of confidential or otherwise protected
information and corruption of data, and overloading our servers and systems with communications and data. Unidentified groups recently hacked
numerous internet websites and servers, including our own, for various reasons, political, commercial and other. Given the unpredictability of
the timing, nature and scope of such disruptions, we could potentially be subject to substantial system downtimes, operational delays, other
detrimental impacts on our operations or ability to provide products and services to our customers, the compromising of confidential or
otherwise protected information, destruction or corruption of data, security breaches, other manipulation or improper use of our systems and
networks, financial losses from remedial actions, loss of business or potential liability, and/or damage to our reputation, any of which could have
a material adverse effect on our cash flows, competitive position, financial condition or results of operations. Although these attacks, while
causing certain difficulties, have not had a material effect on our business, financial condition or results of operations, there can be no assurance
that such incidents will not have a material adverse effect on us in the future.
New laws and regulations applicable to e-
commerce, Internet advertising, privacy and data collection and protection, and uncertainties
regarding the application or interpretation of existing laws and regulations, could harm our business.
Our business is conducted through the Internet and therefore, among other things, we are subject to the laws and regulations that apply
to e-
commerce and online businesses around the world. These laws and regulations are becoming more prevalent in the United States, Europe,
Israel and elsewhere and may impede the growth of the Internet or other online services. These regulations and laws may cover taxation, user
privacy, data collection and protection, pricing, content, copyrights, electronic contracts and other communications, Internet advertising
(including monitoring and tracking consumer behavior), consumer protection, the provision of online payment services, broadband residential
Internet access, and the characteristics and quality of products and services.
Many areas of the law affecting the Internet remain largely unsettled, even in areas where there has been some legislative action. For
example, there is a degree of uncertainty regarding the level of enforceability of various laws of countries in which our products are being used.
This uncertainty can be compounded when services hosted in one jurisdiction are directed at users in another jurisdiction. Therefore, it is
difficult to determine whether and how existing laws, such as those governing intellectual property, privacy and data collection and protection,
libel, marketing, data security and taxation, apply to the Internet and our business. In February 2012, the Obama Administration unveiled a
"Consumer Privacy Bill of Rights" (the "CPBR"). While the CPBR is not binding, the Obama Administration supports Federal legislation that
will adopt the principles set forth in the CPBR. Even without legislation, the Obama Administration intends to initiate processes that use these
rights as a template for codes of conduct that are enforceable by the U.S. Federal Trade Commission (the "FTC"). The U.S. Commerce
Department prepared a report recommending a "framework" to protect people from a burgeoning personal data-
gathering industry and
fragmented U.S. privacy laws that cover certain types of data but not others. New laws and regulations may seek to impose additional burdens or
restrictions on companies conducting business over the Internet. In Europe particularly, there is a major overhaul of the current European Data
Privacy framework which appears more prescriptive and ambitious and, over the course of the next 12 months, we will begin to understand the
impact of this new proposed regulation, which may demand further change in the way we conduct business and interact with our customers in
Europe. With other national governments also taking steps to enshrine consumer rights (e.g., the U.K. government has proposals to consolidate
all consumer protections into a single new "Consumer Bill of Rights"), the level of consumer protections we face as a business is set to increase.
We are unable to accurately predict the nature of the limitations that may be imposed.
Certain laws and regulations in Israel have recently been adopted or amended, including without limitation, guidelines and requirements
in respect of onward transfer, outsourcing, protection of personally identifiable information and employee related privacy restrictions in the
workplace. Although we strive to comply with such requirements and guidelines, it is possible that such requirements and guidelines may be
interpreted and applied in a manner that is inconsistent with our data collection and preservation practices.
There is currently also uncertainty in relation to the passing of relatively recent online laws. For example, legislation has been enacted
to regulate the use of "cookie" technology. In Europe there is a patchwork of implementation and, in some countries there remains limited
guidance defining good practice. Further, despite the expiration of deadlines for such implementation, some Member States are yet to implement
the relevant Directive and bring their laws into compliance. Upon installation of our software, certain cookies generated by us and our
advertisers are placed on our customers’
computers. It has been argued that Internet protocol addresses and cookies are intrinsically personally
identifiable information that is subject to privacy standards. We cannot assure you that our current policies and procedures would meet these
restrictive standards.
14