Juno 2013 Annual Report Download - page 19

Download and view the complete annual report

Please find page 19 of the 2013 Juno annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 339

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339

Table of Contents
As discussed in the preceding risk factor, we have been cooperating with the Attorneys General of various states in connection with their inquiries
and investigations of, among other things, the privacy policies of our Classmates.com business. Becoming subject to the regulatory and enforcement
efforts of the FTC, a state agency or other governmental authority could have a material adverse effect on our ability to collect demographic and personal
information from users, which, in turn, could have a material adverse effect on our marketing efforts, business, financial condition, results of operations,
and cash flows. In addition, the adverse publicity regarding the existence or results of an investigation could have an adverse impact on customers'
willingness to use our websites and services and thus could adversely impact our future revenues.
Our international businesses must also comply with data protection and privacy laws of the applicable jurisdictions. If we or any of the third-party
services on which we rely fail to transmit customer information and payment details in a secure manner, or if they otherwise fail to protect customer
privacy in online transactions or if they transfer personal information without complying with certain required conditions, then we risk being exposed to
civil and criminal liability, as well as claims from individuals alleging damages as a result of the alleged non-compliance. We may also be required to
alter our data collection and use practices. Any of the foregoing could have a material adverse effect on our business, financial condition, results of
operations, and cash flows.
Our business is subject to online security risks and a security breach or inappropriate access to, or use of, our networks, computer systems or
services or those of third-party vendors could expose us to liability, claims and a loss of revenue.
The success of our business depends on the security of our networks and, in part, on the security of the network infrastructures of our third-party
vendors. In connection with conducting our business in the ordinary course, we store and transmit member information, including personally
identifiable information. Unauthorized or inappropriate access to, or use of, our networks, computer systems or services, whether intentional,
unintentional or as a result of criminal activity, could potentially jeopardize the security of confidential information, including credit card information, of
our members and of third parties. A number of other websites have publicly disclosed breaches of their security, some of which have involved
sophisticated and highly targeted attacks on portions of their sites. Because the techniques used to obtain unauthorized access, disable or degrade
service, or sabotage systems change frequently and often are not recognized until launched against a target, we may be unable to anticipate these
techniques or to implement adequate preventative measures. If an actual or perceived breach of our security occurs, the perception of the effectiveness of
our security measures could be harmed and we could lose members or vendors. A party that is able to circumvent our security measures could
misappropriate our proprietary information or the information of our members, cause interruption in our operations, or damage our computers or those
of our members.
A significant number of our members authorize us to bill their payment card accounts (credit or debit) directly for all amounts charged by us. These
members provide payment card information and other personally identifiable information which, depending on the particular payment plan, may be
maintained to facilitate future payment card transactions. We rely on third-party and internally-developed encryption and authentication technology to
provide the security and authentication to effectively secure transmission of confidential information, including payment card numbers. Advances in
computer capabilities, new discoveries in the field of cryptography or other developments may result in the technology used by us to protect transaction
data being breached or compromised. Non-technical means, for example, actions by an employee, can also result in a data breach. Under payment card
rules and our contracts with our card processors, if there is a breach of payment card information that we store, we could be liable to the banks that issue
the payment cards for their related expenses and penalties. In addition, if we fail to follow payment card industry security standards, even if there is no
compromise of customer information, we could incur significant fines or lose our ability to give our
18