ServiceMagic 2012 Annual Report Download - page 20

Download and view the complete annual report

Please find page 20 of the 2012 ServiceMagic annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 409

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409

Table of Contents
protection against competitors and similar technologies. In addition, no assurances can be given that third parties will not create new products or
methods that achieve similar results without infringing upon patents we own.
Despite these measures, our intellectual property rights may still not be protected in a meaningful manner, challenges to contractual rights
could arise or third parties could copy or otherwise obtain and use our intellectual property without authorization. The occurrence of any of
these events could result in the erosion of our brands and limitations on our ability to control marketing on or through the internet using our
various domain names, as well as impede our ability to effectively compete against competitors with similar technologies, any of which could
adversely affect our business, financial conditions and results of operations.
From time to time, we have been subject to legal proceedings and claims in the ordinary course of business, including claims of alleged
infringement of trademarks, copyrights, patents and other intellectual property rights held by third parties. In addition, litigation may be
necessary in the future to enforce our intellectual property rights, protect our trade secrets or to determine the validity and scope of proprietary
rights claimed by others. Any litigation of this nature, regardless of outcome or merit, could result in substantial costs and diversion of
management and technical resources, any of which could adversely affect our business, financial condition and results of operations. Patent
litigation tends to be particularly protracted and expensive.
Our success depends, in part, on the integrity of our systems and infrastructures and those of third parties. System interruptions and the lack
of integration and redundancy in our and third party information systems may affect our business.
To succeed, our systems and infrastructures must perform well on a consistent basis. From time to time, we may experience occasional
system interruptions that make some or all of our systems or data unavailable or that prevent us from providing products and services, which
could adversely affect our business. Moreover, as traffic to our websites, applications and online properties increases and the number of new
(and presumably more complex) products and services that we introduce continues to grow, we will need to upgrade our systems, infrastructures
and technologies generally to facilitate this growth. If we do not do so, users, customers and third parties with whom we do business may not be
able to access our products and services on an intermittent or prolonged basis, which could adversely affect the quality of their experiences. In
addition, we could experience inefficiencies and/or operational failures in connection with these efforts, which could have the same effect.
Moreover, even if we do not encounter any inefficiencies and/or operational failures in connection with these efforts, third parties with whom we
do business may not make the changes to their systems, infrastructures and technologies needed to access our products and services on a timely
basis, if at all. The occurrence of any of these events could adversely affect our business, financial condition and results of operations.
We also rely on third party computer systems, data centers, broadband and other communications systems and service providers in
connection with the provision of our products and services generally, as well as to facilitate and process certain transactions with our users and
customers. Any interruptions, outages or delays in our systems or those of our third party providers, or deterioration in the performance of these
systems, could impair our ability to provide our products and services and/or process certain transactions with users and customers. Furthermore,
data security breaches (as a result of actions taken by hackers or otherwise), fire, power loss, telecommunications failure, natural disasters, acts
of war or terrorism, acts of God and other similar events or disruptions may damage or interrupt computer, data, broadband or other
communications systems at any time. Any event of this nature could cause system interruptions, delays and loss of critical data, and could
prevent us from providing services to users and customers. While we have backup systems for certain aspects of our operations, our systems are
not fully redundant and disaster recovery planning is not sufficient for all eventualities. In addition, we may not have adequate insurance
coverage to compensate for losses from a major interruption.
In particular, our destination search websites may be adversely affected by fraudulent, surreptitious or other unwanted computer programs,
applications and activity that make changes to users' computers and interfere with the overall experience of our products and services, such as by
hijacking queries to these websites or altering or replacing search results generated. This type of interference often occurs without disclosure to
(or consent from) users, resulting in a negative experience that users may associate with us. These disruptive programs and applications may be
difficult or impossible to uninstall or disable, may reinstall themselves and may circumvent efforts to block or remove them.
In addition, downloadable applications through which we provide search services are also subject to attack by viruses, worms and other
malicious software programs, which could jeopardize the security of information stored in users' computers or in our systems and networks. No
assurances can be given that our efforts to combat these malicious applications will be successful and/or that our products and services will not
have (or will not be perceived to have) vulnerabilities in this regard.
17