ServiceMagic 2012 Annual Report Download - page 17

Download and view the complete annual report

Please find page 17 of the 2012 ServiceMagic annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 409

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409

Table of Contents
selected by our users. These technologies, applications and policies adversely impact our ability to generate search queries through our
Applications, which in turn adversely impacts our revenues. Technologies have also been introduced that can block the display of advertisements
on web pages and that provide users with the ability to opt out of our advertising products. Our failure to successfully modify our toolbars and
other Applications in a cost-effective manner in response to the introduction and adoption of these new technologies and applications could
adversely affect our business, financial condition and results of operations.
Our success also depends, in part, on our ability to develop and monetize mobile versions of our products and services. While most of our
users currently access our products and services through personal computers, users of (and usage volumes on) mobile devices, including tablets,
continue to increase relative to those of personal computers. While we have developed mobile versions of certain of our products and services
and intend to continue to do so in the future, we have limited experience with mobile applications, both in terms of development and
monetization. Moreover, mobile versions of our products and services that we develop may not be compelling to users and/advertisers. Even if
we are able to develop mobile applications that resonate with users and advertisers, the success of these applications is dependent on their
interoperability with various mobile operating systems, technologies, networks and standards that we do not control and any changes in any of
these things that compromise the quality or functionality of our products and services could adversely impact usage of our products and services
on mobile devices and, in turn, our ability to attract advertisers. Lastly, as the adoption of mobile devices becomes more widespread, the usage
of certain of our products and services may not translate to mobile devices, which shift could adversely affect our business, financial condition
and results of operations if we are unable to replace the related revenues.
The processing, storage, use and disclosure of personal data could give rise to liabilities as a result of governmental regulation, conflicting
legal requirements or differing views of personal privacy rights.
processing of search queries, the provision of online products and services, transactions with users and customers and advertising on our
websites. The sharing, use, disclosure and protection of this information are determined by the respective privacy and data security policies of
our various businesses. These policies are, in turn, subject to federal, state and foreign laws regarding privacy and the storing, sharing, use,
disclosure and protection of personal information and user data. For example, if an online service provider fails to comply with its privacy
policy, it could become subject to an investigation and proceeding brought by the U.S. Federal Trade Commission under the Federal Trade
Commission Act, as well as a private lawsuit under various U.S. federal and state laws. In general, personal information is increasingly subject to
legislation and regulation in numerous jurisdictions around the world, the intent of which is to protect the privacy of personal information that is
collected, processed and transmitted in or from the governing jurisdiction.
U.S. legislators and regulators may enact new laws and regulations regarding privacy and data security. In February 2012, the White House
released a proposed Consumer Privacy Bill of Rights, which is intended to serve as a framework for new privacy legislation. In March 2012, the
U.S. Federal Trade Commission released a staff report making recommendations for businesses and policy makers in the area of consumer
privacy. Similarly, new privacy laws and directives abroad, particularly in Europe, are being proposed and implemented. In addition, existing
privacy laws that were intended for brick-and-
mortar businesses could be interpreted in a manner that would extend their reach to our businesses.
New laws and regulations (or new interpretations of existing laws) in this area may make it more costly to operate our businesses and/or limit
our ability to engage in certain types of activities, such as targeted advertising, which could adversely affect our business, financial condition and
results of operations.
As privacy and data protection have become more sensitive issues, we may also become exposed to potential liabilities as a result of
differing views on the privacy of consumer and other user data collected by our businesses. Also, we cannot guarantee that our security
measures will prevent security breaches. In the case of security breaches involving personal credit card data, credit card companies could curtail
our ability to transact payments and impose fines for failure to comply with Payment Card Industry (PCI) Data Security Standards. The failure
of any of our businesses, or their various third party vendors and service providers, to comply with applicable privacy policies, federal, state or
foreign privacy laws and regulations or PCI standards and/or the unauthorized release of personal information or other user data for any reason
could adversely affect our business, financial condition and results of operations.
Our estimated income taxes could be materially different from income taxes that we ultimately pay.
in determining our provision for income taxes and related matters. In the ordinary course of our business, there are many transactions and
calculations where the ultimate tax determinations are uncertain or otherwise subject to interpretation. Our determination of our income tax
liability is always subject to review by applicable tax authorities and we
14