Juno 2012 Annual Report Download - page 28

Download and view the complete annual report

Please find page 28 of the 2012 Juno annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 197

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197

Table of Contents
the particular payment plan, may be maintained to facilitate future payment card transactions. We rely on third-party and internally-developed encryption
and authentication technology to provide the security and authentication to effectively secure transmission of confidential information, including
payment card numbers. Advances in computer capabilities, new discoveries in the field of cryptography or other developments may result in the
technology used by us to protect transaction data being breached or compromised. Non-technical means, for example, actions by an employee, can also
result in a data breach. Under payment card rules and our contracts with our card processors, if there is a breach of payment card information that we
store, we could be liable to the banks that issue the payment cards for their related expenses and penalties. In addition, if we fail to follow payment card
industry security standards, even if there is no compromise of customer information, we could incur significant fines or lose our ability to give our
members and customers the option of using payment cards. If we were unable to accept payment cards, our businesses would be seriously harmed.
We may need to expend significant resources to protect against security breaches or to address problems caused by breaches. Security breaches,
including any breach related to us or the parties with which we have commercial relationships, could damage our reputation and expose us to a risk of
loss, litigation and possible liability. We cannot assure you that the security measures we take will be effective in preventing these types of activities. We
also cannot assure you that the security measures of our third-party vendors, including network providers, providers of customer and billing support
services, and other vendors, will be adequate. In addition to potential legal liability, these activities may adversely impact our reputation or our revenues
and may interfere with our ability to provide our products and services, all of which could adversely impact our business. In addition, the coverages
and/or limits of our insurance policies may not be adequate to reimburse us for losses caused by security breaches.


We are subject to a variety of international, federal, state, and local laws and regulations, including, without limitation, those relating to taxation,
bulk email or "spam," advertising, including, without limitation, targeted or behavioral advertising, user privacy and data protection, consumer
protection, antitrust, and unclaimed property. Compliance with the various laws and regulations, which in many instances are unclear or unsettled, is
complex. New laws and regulations, such as those being considered or recently enacted by certain states or the federal government related to automatic-
renewal practices, user privacy, targeted or behavioral advertising, floral-related fees and advertising, and taxation, could impact our revenues or certain
of our business practices or those of our advertisers. Any changes in the laws and regulations applicable to us, the enactment of any additional laws or
regulations, or the failure to comply with, or increased enforcement activity of, such laws and regulations, could significantly impact our products and
services, our costs, or the manner in which we or our advertisers conduct business, all of which could adversely impact our results of operations and
cause our business to suffer.



Our emails have historically generated the majority of the traffic on our online nostalgia websites and are the most important driver of member
activity for our online loyalty marketing service. A significant number of members of our online nostalgia and online loyalty marketing services elect to
opt-out of receiving certain types of emails. Without the ability to email these members, we have very limited means of inducing these members to return
to our websites and utilize our services. In addition,
27