Incredimail 2012 Annual Report Download - page 35

Download and view the complete annual report

Please find page 35 of the 2012 Incredimail annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 345

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345

United States
The U.S. CAN-
SPAM Act of 2003 is intended to regulate spam and create criminal penalties for unmarked and unsolicited email
advertisements, sexually-
oriented material and emails containing fraudulent headers. The U.S. Uniting and Strengthening America by Providing
Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001, or the Patriot Act, is intended to give the government greater
ability to conduct surveillance on the Internet by allowing it in certain cases to intercept communications regarding terrorism and compromises
to national security. The U.S. Digital Millennium Copyright Act ("DMCA") is intended to reduce or shield the liability of online service
providers for displaying content posted and created by third parties that contain copyright infringing materials, if the provider complies with
certain policies, registers a DMCA agent with the U.S Copyright Office and adopts a "take-
down" policy that is enforced. We offer such online
provider services where our users can share images and other user-
generated content. While the DMCA has provided relatively strong protection
to providers from claims of copyright infringement based upon user-
generated content, there have been some recent cases and actions that
attempt to erode these protections. Therefore, to the extent that the immunity provided by the DMCA weakens, we could face the potential for
claims of copyright infringement based upon such content.
The Children’
s Online Privacy Protection Act of 1998, and the Prosecutorial Remedies and Other Tools to End Exploitation of Children
Today Act of 2003 (“COPPA”),
are intended to restrict the distribution of certain materials deemed harmful to children and impose additional
restrictions on the ability of online services to collect user information from minors without verifiable parental or guardianship consent. In
December 2012, the FTC issued new rules under COPPA that strengthen existing restrictions on the online collection and use of personal
information about children under the age of 13. The new regulations will have a significant impact on the operation of websites, applications,
plug-
ins, and other online services and may make it more difficult to provide online content directed toward children. Because of the nature of
our business includes, among other things, the placement of cartoon “emoticons”
in emails, we anticipate that our services could attract a
significant number of users who would fall into the regulated class. Accordingly, our business could be adversely affected by the new rules. In
addition, the Protection of Children from Sexual Predators Act of 1998 requires electronic communication service and remote computing service
providers to report to law enforcement agencies any knowledge of facts or circumstances from which a violation of specified offenses involving
child pornography is apparent Because our services enable users to upload photographs to the internet and share them with others, we could be
subject to liability unless our procedures adequately identify and report such violations of the law.
Almost all the states in the United States have data security breach laws that impose various requirements on service providers to report
to state attorneys general and send notices to affected consumers in the event of a breach of security of network and computer systems that
compromise a user’s personal financial and other information, such as social security numbers and financial information.
In addition, some state laws govern internet activity generally. For example, the California Online Privacy Protection Act which applies
to any Internet website and mobile application that can be accessed or downloaded by California residents regulates information collected about
users.
The Massachusetts Office of Consumer Affairs and Business Regulation established data security regulations (201 CMR 17.00 et seq.)
which became effective on March 1, 2010. They require any company which possesses the personal information of a Massachusetts resident to
adopt and implement a comprehensive written information security program. The program must include technical, physical, and administrative
safeguards for the protection of personal information owned, licensed, received, stored, maintained, processed, or otherwise accessed by the
company. State legislation could require us to modify our business practices and could potentially subject us to liability.
The Stop Online Piracy Act (SOPA) was introduced in Congress in 2012 to expand the ability of U.S. law enforcement officials to fight
online trafficking in copyrighted intellectual property and counterfeit goods. Provisions include the requesting of court orders to bar advertising
networks and payment facilities from conducting business with infringing websites, and search engines from linking to the websites, and court
orders requiring Internet service providers
to block access to the websites. While SOPA was not passed by Congress due to overwhelming public
opposition, substitute legislation is being proposed, and if passed, could impact content sharing on our products and increase administrative costs
that would be incurred to comply with the law.
29