Home
Jump to Risk Factors
Jump to Industries
Jump to Exposures
Jump to Event Codes
Jump to Wiki Summary

Industries
Asset Management and Custody Banks
Electronic Equipment and Instruments
Data Processing Services
Telecommunications Equipment
Exposures
Express intent
Intelligence
Political reform
Military
Provide
Regime
Cooperate
Judicial
Crime
Rights
Event Codes
Agree
Yield to order
Accident
Promise
Veto
Release or return
Grant
Solicit support
Yield
Host meeting
Demand
Collaborate
Sports contest
Accuse
Vote
Acknowledge responsibility
Riot
Consult
Sanction
Reward
Human death
Reject
Wiki Wiki Summary
Copyright infringement Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works. The copyright holder is typically the work's creator, or a publisher or other business to whom copyright has been assigned.
Arithmetic Arithmetic (from Ancient Greek ἀριθμός (arithmós) 'number', and τική [τέχνη] (tikḗ [tékhnē]) 'art, craft') is an elementary part of mathematics that consists of the study of the properties of the traditional operations on numbers—addition, subtraction, multiplication, division, exponentiation, and extraction of roots. In the 19th century, Italian mathematician Giuseppe Peano formalized arithmetic with his Peano axioms, which are highly important to the field of mathematical logic today.
Special Activities Center The Special Activities Center (SAC) is a division of the Central Intelligence Agency responsible for covert operations and paramilitary operations. The unit was named Special Activities Division (SAD) prior to 2015.
Met Operations Met Operations, also known as Met Ops, is one of the four business groups which forms the Metropolitan Police Service. It was created during the 2018-19 restructuring of the service, amalgamating many of its functions from the Operations side of the Specialist Crime & Operations Directorate formed in 2012, with the Specialist Crime side of that Directorate placed under the new Frontline Policing Directorate.
Liability insurance Liability insurance (also called third-party insurance) is a part of the general insurance system of risk financing to protect the purchaser (the "insured") from the risks of liabilities imposed by lawsuits and similar claims and protects the insured if the purchaser is sued for claims that come within the coverage of the insurance policy.\nOriginally, individual companies that faced a common peril formed a group and created a self-help fund out of which to pay compensation should any member incur loss (in other words, a mutual insurance arrangement).
E-commerce Commerce is the exchange of goods and services, especially on a large scale.\n\n\n== Etymology ==\nThe English-language word commerce has been derived from the Latin word commercium, from com ("together") and merx ("merchandise").
Electronic business Electronic business (or "Online Business" or "e-business") is any kind of business or commercial transaction that includes sharing information across the internet. Commerce constitutes the exchange of products and services between businesses, groups, and individuals and can be seen as one of the essential activities of any business.
Requirements analysis In systems engineering and software engineering, requirements analysis focuses on the tasks that determine the needs or conditions to meet the new or altered product or project, taking account of the possibly conflicting requirements of the various stakeholders, analyzing, documenting, validating and managing software or system requirements.Requirements analysis is critical to the success or failure of a systems or software project. The requirements should be documented, actionable, measurable, testable, traceable, related to identified business needs or opportunities, and defined to a level of detail sufficient for system design.
Management Management (or managing) is the administration of an organization, whether it is a business, a non-profit organization, or a government body. It is the art and science of managing resources of the business.
Project management Project management is the process of leading the work of a team to achieve all project goals within the given constraints. This information is usually described in project documentation, created at the beginning of the development process.
Agile management Agile management is the application of the principles of Agile software development to various management processes, particularly project management. Following the appearance of the Manifesto for Agile Software Development in 2001, Agile techniques started to spread into other areas of activity.
Network management Network management is the process of administering and managing computer networks. Services provided by this discipline include fault analysis, performance management, provisioning of networks and maintaining quality of service.
Waste management Waste management (or waste disposal) includes the processes and actions required to manage waste from its inception to its final disposal.\nThis includes the collection, transport, treatment and disposal of waste, together with monitoring and regulation of the waste management process and waste-related laws, technologies, economic mechanisms.
Women Management Women Management is a modeling agency based in New York. Founded by Paul Rowland in 1988, Women also has two sister agencies, Supreme Management and Women 360 Management, which is also part of the Women International Agency Chain.
Emergency management Emergency management, also called emergency response or disaster management, is the organization and management of the resources and responsibilities for dealing with all humanitarian aspects of emergencies (prevention, preparedness, response, mitigation, and recovery). The aim is to prevent and reduce the harmful effects of all hazards, including disasters.
Mergers and acquisitions In corporate finance, mergers and acquisitions (M&A) are transactions in which the ownership of companies, other business organizations, or their operating units are transferred or consolidated with other entities. As an aspect of strategic management, M&A can allow enterprises to grow or downsize, and change the nature of their business or competitive position.
Electronic The field of electronics is a branch of physics and electrical engineering that deals with the emission, behaviour and effects of electrons using electronic devices. Electronics uses active devices to control electron flow by amplification and rectification, which distinguishes it from classical electrical engineering, which only uses passive effects such as resistance, capacitance and inductance to control electric current flow.
Electronic music Electronic music is a genre of music that employs electronic musical instruments, digital instruments, or circuitry-based music technology in its creation. It includes both music made using electronic and electromechanical means (electroacoustic music).
Electronic warfare Electronic warfare (EW) is any action involving the use of the electromagnetic spectrum (EM spectrum) or directed energy to control the spectrum, attack an enemy, or impede enemy assaults. The purpose of electronic warfare is to deny the opponent the advantage of—and ensure friendly unimpeded access to—the EM spectrum.
Competitor analysis Competitive analysis in marketing and strategic management is an assessment of the strengths and weaknesses of current and potential competitors. This analysis provides both an offensive and defensive strategic context to identify opportunities and threats.
Competition Competition is a rivalry where two or more parties strive for a common goal which cannot be shared: where one's gain is the other's loss (an example of which is a zero-sum game). Competition can arise between entities such as organisms, individuals, economic and social groups, etc.
Competitors for the Crown of Scotland When the crown of Scotland became vacant in September 1290 on the death of the seven-year-old child Queen Margaret, 13 claimants to the throne came forward. Those with the most credible claims were John Balliol, Robert Bruce, John Hastings and Floris V, Count of Holland.
Competitor backlinking Competitor backlinking is a search engine optimization strategy that involves analyzing the backlinks of competing websites within a vertical search. The outcome of this activity is designed to increase organic search engine rankings and to gain an understanding of the link building strategies used by business competitors.By analyzing the backlinks to competitor websites, it is possible to gain a benchmark on the number of links and the quality of links that is required for high search engine rankings.
Competitor Group Competitor Group, Inc. (CGI) is a privately held, for-profit, sports marketing and management company based in Mira Mesa, San Diego, California.
List of Dancing with the Stars (American TV series) competitors Dancing with the Stars is an American reality television show in which celebrity contestants and professional dance partners compete to be the best dancers, as determined by the show's judges and public voting. The series first broadcast in 2005, and thirty complete seasons have aired on ABC. During each season, competitors are progressively eliminated on the basis of public voting and scores received from the judges until only a few contestants remain.
List of female fitness and figure competitors This is a list of female fitness and figure competitors.\n\n\n== A ==\nJelena Abbou\n\n\n== B ==\nLauren Beckham\nAlexandra Béres\nSharon Bruneau\n\n\n== C ==\nNatalie Montgomery-Carroll\nJen Cassetty\nKim Chizevsky\nSusie Curry\n\n\n== D ==\nDebbie Dobbins\nNicole Duncan\n\n\n== E ==\nJamie Eason\nAlexis Ellis\n\n\n== F ==\nAmy Fadhli\nJaime Franklin\n\n\n== G ==\nAdela García \nConnie Garner\nElaine Goodlad\nTracey Greenwood\nOksana Grishina\n\n\n== H ==\nMallory Haldeman\nVanda Hădărean\nJen Hendershott\nSoleivi Hernandez\nApril Hunter\n\n\n== I ==\n\n\n== J ==\nTsianina Joelson\n\n\n== K ==\nAdria Montgomery-Klein\nAshley Kaltwasser\n\n\n== L ==\nLauren Lillo\nMary Elizabeth Lado\nTammie Leady\nJennifer Nicole Lee\nAmber Littlejohn\nJulie Lohre\nJenny Lynn\n\n\n== M ==\nTimea Majorová\nLinda Maxwell\nDavana Medina\nJodi Leigh Miller\nChisato Mishima\n\n\n== N ==\nKim Nielsen\n\n\n== O ==\n\n\n== P ==\nVicky Pratt\nElena Panova\nChristine Pomponio-Pate\nCathy Priest\n\n\n== Q ==\n\n\n== R ==\nMaite Richert\nCharlene Rink\nKelly Ryan\n\n\n== S ==\nErin Stern\nCarol Semple-Marzetta\nKrisztina Sereny\nTrish Stratus (Patricia Anne Stratigias)\n\n\n== T ==\nKristi Tauti\nJennifer Thomas\n\n\n== U ==\n\n\n== V ==\nLisa Marie Varon\n\n\n== W ==\nLatisha Wilder\nTorrie Wilson\nLyen Wong\nJenny Worth\nNicole Wilkins\n\n\n== Y ==\n\n\n== Z ==\nMarietta Žigalová\nMalika Zitouni\n\n\n== See also ==\nList of female bodybuilders\n\n\n== References ==\nThere has been a rise in the number of women wanting to compete as fitness models.
Round-robin tournament A round-robin tournament (or all-play-all tournament) is a competition in which each contestant meets every other participant, usually in turn. A round-robin contrasts with an elimination tournament, in which participants are eliminated after a certain number of losses.
Lawsuit A lawsuit is a proceeding by a party or parties against another in the civil court of law. The archaic term "suit in law" is found in only a small number of laws still in effect today.
Intellectual property Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others.
TRIPS Agreement The Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) is an international legal agreement between all the member nations of the World Trade Organization (WTO). It establishes minimum standards for the regulation by national governments of different forms of intellectual property (IP) as applied to nationals of other WTO member nations.
Intellectual property in China Intellectual property rights (IPRs) have been acknowledged and protected in China since the 1980s. China has acceded to the major international conventions on protection of rights to intellectual property.
Regulation Regulation is the management of complex systems according to a set of rules and trends. In systems theory, these types of rules exist in various fields of biology and society, but the term has slightly different meanings according to context.
Regulation A In the United States under the Securities Act of 1933, any offer to sell securities must either be registered with the United States Securities and Exchange Commission (SEC) or meet certain qualifications to exempt it from such registration. Regulation A (or Reg A) contains rules providing exemptions from the registration requirements, allowing some companies to use equity crowdfunding to offer and sell their securities without having to register the securities with the SEC. Regulation A offerings are intended to make access to capital possible for small and medium-sized companies that could not otherwise bear the costs of a normal SEC registration and to allow nonaccredited investors to participate in the offering.
Formula One regulations The numerous Formula One regulations, made and enforced by the FIA and later the FISA, have changed dramatically since the first Formula One World Championship in 1950. This article covers the current state of F1 technical and sporting regulations, as well as the history of the technical regulations since 1950.
Regulation of therapeutic goods The regulation of therapeutic goods, defined as drugs and therapeutic devices, varies by jurisdiction. In some countries, such as the United States, they are regulated at the national level by a single agency.
New York Codes, Rules and Regulations The New York Codes, Rules and Regulations (NYCRR) contains New York state rules and regulations. The NYCRR is officially compiled by the New York State Department of State's Division of Administrative Rules.
Risk Factors
EFUNDS CORP ITEM 1A RISK FACTORS When used in this Annual Report on Form 10-K and in future filings by the Company with the Securities and Exchange Commission, in our press releases, letters and reports to stockholders and in oral statements made by our representatives, the words or phrases ‘should,’ ‘are expected to,’ ‘targeted,’ ‘will continue,’ ‘will approximate,’ ‘is anticipated,’ ‘estimate,’ ‘project’ or similar expressions are intended to identify ‘forward-looking statements’ within the meaning of the Private Securities Litigation Reform Act of 1995
These statements are necessarily subject to certain risks and uncertainties, including those discussed below, which could cause our actual results to differ materially from our historical experience and our present expectations or projections
Caution should be taken not to place undue reliance on any such forward-looking statements, which speak only as of the date made
The factors listed below could affect our financial performance and could cause our actual results for future periods to differ from any opinions or statements expressed with respect thereto
Such differences could be material and adverse
We will not undertake and specifically decline any obligation to publicly release the result of any revisions that may be made to any forward-looking statements to reflect events or circumstances occurring after the date of such statements or to reflect the occurrence of anticipated or unanticipated events
IF THE SECURITY OF OUR DATABASES IS COMPROMISED, OUR REPUTATION COULD SUFFER AND CUSTOMERS MAY NOT BE WILLING TO USE OUR PRODUCTS AND SERVICES In our electronic payments and risk management businesses, we collect personal consumer data, such as names and addresses, social security numbers, drivers’ license numbers, checking, savings, credit card and prepaid account numbers and payment history records
If the security of our databases is compromised, our business could be materially adversely affected
Unauthorized access to our databases could result in the theft or publication of personal confidential information and the deletion or modification of personal records or otherwise cause interruptions in our operations
These concerns about security are increased when we transmit information overseas, over the Internet or via couriers
A security or privacy breach may: - deter customers from using our products and services; - harm our reputation; - expose us to liability; - increase our operating expenses to remediate problems caused by the breach; and - decrease market acceptance of electronic commerce transactions in general
In addition, concerns about data security have led to a growing number of regulatory bodies adopting or considering the adoption of a variety of consumer notification requirements in the event their information is accessed by unauthorized persons
Compliance with a large number of conflicting and complex consumer notifications laws could prove to be impossible or, at a minimum, expensive and difficult
A failure to so comply could nevertheless subject us to regulatory scrutiny or liability
ESTIMATES OF FUTURE FINANCIAL RESULTS ARE INHERENTLY UNRELIABLE From time to time, the Company and its representatives may make public predictions or forecasts regarding the Company’s future results, including estimates regarding future revenues, expense levels, tax rates, acquisition expenses, capital expenditures, earnings or earnings from operations
Any forecast regarding our future performance reflects various assumptions and judgments by management regarding the likelihood that certain possible future events will in fact occur
These assumptions and judgments are subject to significant uncertainties and shifting market dynamics, and, as a matter of course, many of them will prove to be incorrect
Further, events that may seem unlikely or relatively certain at the time a given prediction is made may in fact occur or fail to occur
Many of the factors that can influence the outcome of any prediction or projections are beyond our control
As a result, there can be no assurance that our performance will be consistent with any management forecasts or that the variation from such forecasts will not be material and adverse
Investors are cautioned that any predictions, projection or other forward looking statement made by us should be considered current only as of the date made
Investors are encouraged to utilize the entire available mix of historical and forward-looking information made available by us, and other information relating to our Company and our products and services, when evaluating our prospective results of operations
OUR ABILITY TO EXPAND THROUGH ACQUISITIONS INVOLVES RISKS AND MAY NOT BE SUCCESSFUL We have been acquiring companies to complement and grow our existing businesses
Our ability to expand through acquisitions involves many risks, including: - the operations, technology and personnel of any acquired companies may be difficult to integrate; 9 _________________________________________________________________ [43]Table of Contents - the acquired businesses may not achieve anticipated revenues, earnings or cash flow
Such a shortfall could require us to write-down the goodwill associated with any acquired company, which would adversely affect our reported earnings; - the allocation of management resources to consummate these transactions may disrupt our day to day business; and - acquisitions may require us to revise our published earnings guidance and record special charges that reduce our earnings
CONSOLIDATION IN THE INDUSTRIES WE SERVE MAY ADVERSELY AFFECT OUR ABILITY TO SELL OUR PRODUCTS AND SERVICES Mergers, acquisitions and personnel changes at financial institutions and electronic funds transfer networks may adversely affect our business, financial condition and results of operations
The banking and EFT industries continue to consolidate, causing the number of financial institutions and processing networks to decline
This consolidation could cause us to lose: - current and potential customers; - market share if an entity resulting from a combination of our customers determines that it is more efficient to develop in-house products and services similar to ours or to use our competitors’ products and services; and - revenue if such a combined institution is able to negotiate a greater volume discount for, or discontinue the use of, our products and services
For example, the STAR network, formerly one of the larger customers of our electronic payments processing business, was purchased by one of our competitors, Concord EFS, during 2001
First Data Corporation, which owned a substantial equity interest in the NYCE Network, subsequently purchased Concord EFS Following this acquisition, First Data sold its interest in the NYCE network to our competitor, Metavante, a subsidiary of M&I Bank
Both the STAR and NYCE networks utilize our electronic funds transfer software
WE ARE UNABLE TO PREDICT THE RESULTS OF THE PURPORTED CLASS ACTION LAWSUIT FILED IN FLORIDA The Company, along with numerous other defendants, is a defendant in an action pending in the US District Court for the Southern District of Florida
The complaint in this action alleges that the Company purchased motor vehicle records from the State of Florida and used that data for marketing and other purposes that are not permitted under the Federal Driver’s Privacy Protection Act
The plaintiffs are seeking liquidated damages of not less than dlra2cmam500 for each affected member of a purported class, plus costs and attorney’s fees
The plaintiffs are also asking for injunctive relief to prevent further alleged violations of the Federal Act
In March 2004, the Company joined in a motion to dismiss this case filed by a co-defendant and the Company filed its own further motion to dismiss a portion of this case and a motion for summary judgment in June 2004
The Court stayed all further proceedings in this case pending the decision by the Eleventh Circuit of Appeals in Kehoe v
This ruling was issued in August 2005 and the plaintiffs in this case have moved the Court to re-open these proceedings
The Court has not yet ruled on this motion and has instead ordered the parties to participate in a mandatory mediation session in early March
The Company cannot predict whether the plaintiffs in this case will be successful in certifying their complaint as a class action
The Company believes that it has meritorious defenses with regard to the allegations made in this lawsuit and intends to vigorously defend this action
Litigation is, however, by its nature uncertain and an unfavorable resolution of this lawsuit could materially adversely affect our business, results of operation and financial condition
WE MAY BE UNABLE TO PROTECT OUR INTELLECTUAL PROPERTY RIGHTS OR OTHERS MAY CLAIM THAT WE ARE INFRINGING ON THEIR INTELLECTUAL PROPERTY Third parties have asserted infringement claims against our prepaid and stored value business in the past and others may assert these types of claims against this business, or any of our other enterprises, in the future
Claims for infringement of all types of patents are a common source of litigation
Infringement claims can require us to modify our products, services and technologies or obtain a license to permit our continued use of those rights
We may not be able to do either of these things in a timely manner or upon reasonable terms and conditions
In addition, future litigation relating to infringement claims could result in substantial costs to us and a diversion of management resources
Adverse determinations in any litigation or proceeding could also subject us to significant liabilities and could prevent us from selling some of our products, services or technologies
10 _________________________________________________________________ [44]Table of Contents Despite our efforts to protect them, third parties may infringe or misappropriate our intellectual property rights, or otherwise independently develop substantially equivalent products and services
The loss of intellectual property protection or the inability to secure or enforce intellectual property protection could harm our business and ability to compete
We may be required to expend significant resources to protect our trade secrets and monitor and police our intellectual property rights and these efforts may not be uniformly successful
These concerns are heightened when we license our software for use in countries or regions that do not have a history of consistently enforcing the rights of intellectual property owners against persons who misappropriate the same
WE FACE INTENSE COMPETITION IN ALL AREAS OF OUR BUSINESS, AND IF WE DO NOT COMPETE EFFECTIVELY, OUR BUSINESS WILL BE HARMED We face intense competition from a number of companies and we expect that competition will intensify as the movement towards increasing consolidation within the financial services industry continues
The high levels of competition we experience have led to pricing pressures in most aspects of our business
Many of our competitors have significantly greater financial, technical and marketing resources, greater name recognition and a larger installed customer base than we do
In the electronic payments market, our principal competitors include: - third-party debit network processors, including First Data Corporation, VISA Debit Processing Services, Fifth Third Processing Solutions, Metavante Corporation, Certegy and Fiserv; - financial institutions that have developed in house processing capabilities or services similar to ours, including Bank of America, M&I Bank and Fifth Third National Bank; - prepaid and stored value providers, including First Data, VISA Debit Processing Services, TYSYS and Metavante; - government service (EBT) providers including JP Morgan Chase and ACS; and - electronic funds transfer software providers, including Transaction System Architects and S1
In the risk management market, our principal competitors include: - providers of fraud management data and software including Equifax, Experian, TransUnion, RiskWise (a division of Lexis-Nexis of Reed Elsevier) and Primary Payment Systems (a subsidiary of First Data Corporation); and - retail check verification and electronic check processing providers, including Certegy and Telecheck, a subsidiary of First Data Corporation
In the global outsourcing market, our competitors include Spectramind/Wipro Ltd, Intelenet Global Services Ltd, Progeon Ltd
(an Infosys Technologies company), WNS Global Services, Daksh services (a subsidiary of IBM) and numerous other business process and IT outsourcing service providers
In the market for electronic transaction processing, the principal factors on which we compete are price and service levels and the features and functionality associated with our EFT software and processing services
The future growth of our revenues in this market is dependent upon securing an increasing volume of transactions
If we cannot control our transaction processing expenses, we may not remain price competitive and our revenues will be adversely affected
Our revenues can also be adversely affected if we are required to make pricing concessions to retain significant processing customers
In the current environment, price reductions typically accompany contract renewals
This dynamic will dampen the rate of growth in our processing business if we are not successful in retaining new customers or expanding the suite of services we offer to our existing clients
We have also seen an effort by processors such as First Data Corporation and VISA that are affiliated with branded networks to seek exclusive processing relationships with the debit card-issuing financial institutions that subscribe to their networks
Ownership or control of a branded network may also enable these competitors to influence the interchange fees financial institutions receive from retailers who accept transactions from the debit cards issued by these network participants
We are unable to predict what effect the vertical integration between transaction processors and branded debit networks will have on our processing business over the long-term
Our software business competes primarily upon the basis of the quality and reliability of our software and its conformance to the current and future requirements of our customers
If we do not maintain the technological relevance of our software offerings or fail to anticipate shifts in customer requirements, our ability to sell our software products will be impaired
Competition for our risk management products is based primarily on the quantity and quality of the data and data analytic capabilities available to us for this purpose and, to a somewhat lesser degree, price
Our competitive position in these markets 11 _________________________________________________________________ [45]Table of Contents could be harmed if our competitors were able to compile different data sources and analytical capabilities that proved to be more effective than our products
In addition, we continue to experience competitive pressure on the pricing for our check verification service
Our business process management and information technology solutions offerings compete primarily on the basis of the quality of our service levels, price and the expertise we have with the process being outsourced to us
The future growth of this aspect of our business is dependent on demonstrating to our current and prospective customers that we are a dependable and efficient service provider who understands their particular business needs
In addition to our current competitors, it is reasonable to expect that we will encounter substantial competition from new companies
No assurance can be given that we will be able to compete effectively against current and future competitors
Increased competition could result in price reductions, reduced gross margins or loss of market share
IF WE EXPERIENCE SYSTEM FAILURES, THE PRODUCTS AND SERVICES WE PROVIDE TO OUR CUSTOMERS COULD BE DELAYED OR INTERRUPTED, WHICH COULD HARM OUR BUSINESS AND REPUTATION AND RESULT IN THE LOSS OF CUSTOMERS Our ability to provide reliable service largely depends on the efficient and uninterrupted operations of our computer and telecommunications network systems and our data centers
Any significant interruptions could severely harm our business and reputation and result in a loss of revenue and customers
We could also be required to apply substantial amounts of our available cash to fund our settlement obligations and it is possible that we would not have sufficient resources in the event of a severe and persistent outage
Our systems and operations could be exposed to damage or interruption from fire, natural disaster, unlawful acts, power loss, telecommunications failure, unauthorized entry and computer viruses
Although we have taken steps to prevent system failures, we cannot be certain that our measures will be successful and that we will not experience service interruptions
Further, our property and business interruption insurance may not be adequate to compensate us for all losses or failures that may occur
Although our prepaid and stored value solutions business has two data centers for business continuity purposes, both of these centers are located in Florida, which is a hurricane-prone area
The severe storms encountered by this region have resulted in some disruption to the day to day operations of this business in the past and similar occurrences are virtually certain to occur in the future
A prolonged interruption could harm our business and our prospects
LEGISLATION OR REGULATION COULD IMPAIR OUR ABILITY TO COLLECT AND USE DATA, INCREASE OUR OPERATING COSTS OR OTHERWISE HARM OUR BUSINESS Existing and new laws and regulations relating to consumer privacy protection could harm our ability to collect and use consumer data, increase our operating costs or otherwise harm our business
We collect personal data about consumers for use in our risk management products and as part of our prepaid solutions business
Due to increasing public concern over consumer privacy rights, Congress and state legislatures have adopted and are considering adopting laws and regulations restricting the purchase, sale and sharing of personal information about consumers
For example, in the past legislation has been proposed which would require consumers to opt in to any plan which would allow their nonpublic personal information to be disclosed
We are unable to predict whether more restrictive legislation or regulations will be adopted in the future
A material increase in the scope of these types of restrictions could impair the efficacy of our risk management products or impair our ability to use our India-based resources to support our risk management business, which would increase our costs
WE MAY EXPERIENCE SOFTWARE DEFECTS, DEVELOPMENT DELAYS AND INSTALLATION DIFFICULTIES, WHICH COULD HARM OUR BUSINESS AND REPUTATION AND EXPOSE US TO POTENTIAL LIABILITY Our services and products are based on sophisticated software and computing systems and we often encounter delays when developing new products and services
Further, the software underlying our products and services has occasionally contained and may in the future contain undetected errors or defects when first introduced or when new versions are released
In addition, we have experienced difficulties and delays in installing and integrating our products and technologies on platforms used by our customers or in new environments in the past and it is reasonable to expect that we will encounter similar issues in the future
The probability of such occurrence is increased when we seek to install complex, multi-function systems for our larger customers
Projects such as these can also divert our available IT and project resources, causing delays in other initiatives
Defects in our software products, errors or delays in the processing of electronic transactions or other difficulties could result in: - delays in market acceptance; 12 _________________________________________________________________ [46]Table of Contents - additional development or installation costs; - loss of customers; - negative publicity; and - exposure to liability claims
Although we attempt to limit our potential liability for warranty claims through disclaimers and limitation-of-liability provisions in our license and client agreements, we cannot be certain that these measures will be successful
THERE ARE A NUMBER OF RISKS ASSOCIATED WITH OUR INTERNATIONAL SALES AND OPERATIONS THAT COULD HARM OUR BUSINESS Because we currently sell some of our products and services on a global basis and provide outsourcing services from India, our business is subject to risks associated with doing business internationally
During 2005, we generated approximately 11prca of our net sales outside of the United States and we presently anticipate that our international efforts will constitute a higher percentage of our net sales in future periods
Our future results could be harmed by a variety of factors, including: - changes in foreign currency exchange rates; - changes in a specific country’s or region’s political and economic conditions, particularly in emerging markets; - potentially unfavorable tax rules; - tariffs, duties and other trade barriers; - reduced protection for intellectual property rights; - challenges in managing widespread operations; - changes in foreign laws and regulatory requirements or in foreign policy; and - varying business practices in foreign countries
We have prepared sensitivity analyses to assess the impact of hypothetical changes in foreign currency rates on our income before tax for the year ended December 31, 2005
Based upon these analyses, we estimate that a 10prca adverse change in the exchange rate between the US dollar and the British pound, Indian rupee and Canadian dollar would have reduced our reported income before taxes during the past year by approximately dlra5 million
In addition, the process of selling our outsourcing services typically involves visits to our sites in India by prospective customers
Increased levels of international tension can result in prospective clients postponing or canceling plans to visit our facilities, lengthening the sales cycle and otherwise inhibiting our ability to grow this business
Political opposition to the use of offshore resources such as our India-based operations and domestic security concerns that can make it more difficult for foreign nationals to obtain US visas can potentially have a similar effect
CHANGES IN INDIAN TAX LAWS COULD ADVERSELY AFFECT OUR RESULTS OF OPERATIONS Our Indian software development and business process management operations qualify for tax incentives associated with businesses that operate within designated geographic locations
These incentives generally provide us with exemptions from Indian tax on certain business income generated from these operations and phase out through March 2009
We cannot assure you that these tax benefits will be continued in the future at their current levels or at all
If our Indian tax benefits are reduced or eliminated, our taxes in future periods would increase
WE FACE TERMINATION AND COMPLIANCE RISKS WITH RESPECT TO OUR GOVERNMENT CONTRACTS All of our government EBT contracts can be terminated at any time, without cause, by the contracting governmental entity
If a government contract is so terminated, we are generally entitled only to receive compensation for the services provided or costs incurred at the time of termination and a reasonable profit on the contract work performed prior to the date of termination
In addition, all of our government contracts require us to comply with various contract provisions and procurement regulations, and in some cases, accounting requirements
Violations of some of these provisions could, if not cured, result in termination of the contract and fines
We are also seeing increased levels of pricing competition in this business
PROVISIONS IN OUR CHARTER DOCUMENTS AND DELAWARE LAW MAY DELAY OR PREVENT A CHANGE IN CONTROL OF OUR COMPANY THAT YOU MAY CONSIDER FAVORABLE Provisions of our certificate of incorporation and bylaws and Delaware law may delay or prevent a change in control of our Company that you may consider favorable
These provisions include the following: - no cumulative voting by stockholders for directors; 13 _________________________________________________________________ [47]Table of Contents - a classified board of directors with three-year staggered terms; - the ability of our board to set the size of the board of directors, to create new directorships and to fill vacancies; - the ability of our board to issue preferred stock, without stockholder approval, with rights and preferences that may be superior to our common stock; - the ability of our board to amend our bylaws; - a prohibition of stockholder action by written consent; - advance notice requirements for stockholder proposals and for nominating candidates to our board; - restrictions under Delaware law on mergers and other business combinations between us and any holder of 15prca or more of our outstanding common stock; - a requirement that 66-2/3prca of our stockholders and 66-2/3prca of our directors approve certain corporate transactions, including mergers and consolidations, sales of assets or amendments to our certificate of incorporation; and - we have adopted a stockholder rights plan, which discourages the unauthorized acquisition of 15prca or more of our common stock or an unauthorized exchange or tender offer