Home
Jump to Risk Factors
Jump to Industries
Jump to Exposures
Jump to Event Codes
Jump to Wiki Summary

Industries
Automobiles and Components
Electrical Components and Equipment
Technology Hardware Storage and Peripherals
Information Technology
Technology Hardware and Equipment
Commercial and Professional Services
Asset Management and Custody Banks
Investment Banking and Brokerage
Automobile Manufacturers
Motorcycle Manufacturers
Exposures
Military
Economic
Cooperate
Regime
Express intent
Rights
Leadership
Provide
Crime
Judicial
Event Codes
Solicit support
Agree
Vote
Yield
Warn
Release or return
Endorse
Sports contest
Host meeting
Human death
Demand
Force
Rally support
Reduce routine activity
Yield to order
Riot
Consult
Acknowledge responsibility
Military blockade
Threaten
Accident
Reward
Covert monitoring
Wiki Wiki Summary
Bitwise operation In computer programming, a bitwise operation operates on a bit string, a bit array or a binary numeral (considered as a bit string) at the level of its individual bits. It is a fast and simple action, basic to the higher-level arithmetic operations and directly supported by the processor.
Special Activities Center The Special Activities Center (SAC) is a division of the Central Intelligence Agency responsible for covert operations and paramilitary operations. The unit was named Special Activities Division (SAD) prior to 2015.
Operations management Operations management is an area of management concerned with designing and controlling the process of production and redesigning business operations in the production of goods or services. It involves the responsibility of ensuring that business operations are efficient in terms of using as few resources as needed and effective in meeting customer requirements.
Emergency operations center An emergency operations center (EOC) is a central command and control facility responsible for carrying out the principles of emergency preparedness and emergency management, or disaster management functions at a strategic level during an emergency, and ensuring the continuity of operation of a company, political subdivision or other organization.\nAn EOC is responsible for strategic direction and operational decisions and does not normally directly control field assets, instead leaving tactical decisions to lower commands.
Competition Competition is a rivalry where two or more parties strive for a common goal which cannot be shared: where one's gain is the other's loss (an example of which is a zero-sum game). Competition can arise between entities such as organisms, individuals, economic and social groups, etc.
Inflation An infection is the invasion of an organism's body tissues by pathogens, their multiplication, and the reaction of host tissues to the infectious agents and the toxins they produce. An infectious disease, also known as a transmissible disease or communicable disease, is an illness resulting from an infection.
Gross domestic product Gross domestic product (GDP) is a monetary measure of the market value of all the final goods and services produced in a specific time period by countries. GDP (nominal) per capita does not, however, reflect differences in the cost of living and the inflation rates of the countries; therefore, using a basis of GDP per capita at purchasing power parity (PPP) may be more useful when comparing living standards between nations, while nominal GDP is more useful comparing national economies on the international market.
Contract manufacturer A contract manufacturer (CM) is a manufacturer that contracts with a firm for components or products (in which case it is a turnkey supplier). It is a form of outsourcing.
Electronics manufacturing services Electronics Manufacturing Services (EMS) is a term used for companies that design, manufacture, test, distribute, and provide return/repair services for electronic components and assemblies for original equipment manufacturers (OEMs). The concept is also referred to as Electronics Contract Manufacturing (ECM).Many consumer electronics are built in China, due to maintenance cost, availability of materials, and speed as opposed to other countries such as the United States.
Original equipment manufacturer An original equipment manufacturer (OEM) is generally perceived as a company that produces parts and equipment that may be marketed by another manufacturer.\nHowever, the term is also used in several other ways, which causes ambiguity.
Contract A contract is a legally enforceable agreement that creates, defines, and governs mutual rights and obligations among its parties. A contract typically involves the transfer of goods, services, money, or a promise to transfer any of those at a future date.
Original design manufacturer An original design manufacturer is a company that designs and manufactures a product, as specified, that is eventually rebranded by another firm for sale. Such companies allow the firm that owns or licenses the brand to produce products (either as a supplement or solely) without having to engage in the organization or running of a factory.
Timeline of Apple Inc. products This timeline of Apple Inc. products is a list of all stand-alone Apple II, Macintosh, and other computers, as well as computer peripherals, expansion cards, ancillary products, and consumer electronics sold by Apple Inc.
Significant form Significant form refers to an aesthetic theory developed by English art critic Clive Bell which specified a set of criteria for what qualified as a work of art.
Bit numbering In computing, bit numbering is the convention used to identify the bit positions in a binary number.\n\n\n== Bit significance and indexing ==\n\nIn computing, the least significant bit (LSB) is the bit position in a binary integer representing the binary 1s place of the integer.
Statistical significance In statistical hypothesis testing, a result has statistical significance when it is very unlikely to have occurred given the null hypothesis. More precisely, a study's defined significance level, denoted by \n \n \n \n α\n \n \n {\displaystyle \alpha }\n , is the probability of the study rejecting the null hypothesis, given that the null hypothesis is true; and the p-value of a result, \n \n \n \n p\n \n \n {\displaystyle p}\n , is the probability of obtaining a result at least as extreme, given that the null hypothesis is true.
Second-language acquisition Second-language acquisition (SLA), sometimes called second-language learning — otherwise referred to as L2 (language 2) acquisition, is the process by which people learn a second language. Second-language acquisition is also the scientific discipline devoted to studying that process.
Adverse Adverse or adverse interest, in law, is anything that functions contrary to a party's interest. This word should not be confused with averse.
Adverse possession Adverse possession, sometimes colloquially described as "squatter's rights", is a legal principle in the Anglo-American common law under which a person who does not have legal title to a piece of property—usually land (real property)—may acquire legal ownership based on continuous possession or occupation of the property without the permission (licence) of its legal owner. The possession by a person is not adverse if they are in possession as a tenant or licensee of the legal owner.
Adverse food reaction An adverse food reaction is an adverse response by the body to food or a specific type of food.The most common adverse reaction is a food allergy, which is an adverse immune response to either a specific type or a range of food proteins.\nHowever, other adverse responses to food are not allergies.
Material adverse change In the fields of mergers and acquisitions and corporate finance, a material adverse change (abbreviated MAC), material adverse event (MAE), or material adverse effect (also MAE) is a change in circumstances that significantly reduces the value of a company. A contract to acquire, invest in, or lend money to a company often contains a term that allows the acquirer, investor, or lender to cancel the transaction if a material adverse change occurs.
Anthony Adverse Anthony Adverse is a 1936 American epic historical drama film directed by Mervyn LeRoy and starring Fredric March and Olivia de Havilland. The screenplay by Sheridan Gibney draws elements of its plot from eight of the nine books in Hervey Allen's historical novel, Anthony Adverse.
Hostile witness A hostile witness, also known as an adverse witness or an unfavorable witness, is a witness at trial whose testimony on direct examination is either openly antagonistic or appears to be contrary to the legal position of the party who called the witness. This concept is used in the legal proceedings in the United States, and analogues of it exist in other legal systems in Western countries.
Requirements analysis In systems engineering and software engineering, requirements analysis focuses on the tasks that determine the needs or conditions to meet the new or altered product or project, taking account of the possibly conflicting requirements of the various stakeholders, analyzing, documenting, validating and managing software or system requirements.Requirements analysis is critical to the success or failure of a systems or software project. The requirements should be documented, actionable, measurable, testable, traceable, related to identified business needs or opportunities, and defined to a level of detail sufficient for system design.
Requirements elicitation In requirements engineering, requirements elicitation is the practice of researching and discovering the requirements of a system from users, customers, and other stakeholders. The practice is also sometimes referred to as "requirement gathering".
Competitor analysis Competitive analysis in marketing and strategic management is an assessment of the strengths and weaknesses of current and potential competitors. This analysis provides both an offensive and defensive strategic context to identify opportunities and threats.
New product development In business and engineering, new product development (NPD) covers the complete process of bringing a new product to market, renewing an existing product or introducing a product in a new market. A central aspect of NPD is product design, along with various business considerations.
List of mergers and acquisitions by Alphabet Google is a computer software and a web search engine company that acquired, on average, more than one company per week in 2010 and 2011. The table below is an incomplete list of acquisitions, with each acquisition listed being for the respective company in its entirety, unless otherwise specified.
Knowledge acquisition Knowledge acquisition is the process used to define the rules and ontologies required for a knowledge-based system. The phrase was first used in conjunction with expert systems to describe the initial tasks associated with developing an expert system, namely finding and interviewing domain experts and capturing their knowledge via rules, objects, and frame-based ontologies.
Ben Ashkenazy Ben Ashkenazy (born 1968/69) is an American billionaire real estate developer. He is the founder, CEO, and majority owner of Ashkenazy Acquisition Corporation, which has a $12 billion property portfolio.
Library acquisitions Library acquisitions is the department of a library responsible for the selection and purchase of materials or resources. The department may select vendors, negotiate consortium pricing, arrange for standing orders, and select individual titles or resources.Libraries, both physical and digital, usually have four common broad goals that help dictate these responsibilities.
Technology company A technology company (or tech company) is an electronics-based technological company, including, for example, business relating to digital electronics, software, and internet-related services, such as e-commerce services.\n\n\n== Details ==\nAccording to Fortune, as of 2020, the ten largest technology companies by revenue are: Apple Inc., Samsung, Foxconn, Alphabet Inc., Microsoft, Huawei, Dell Technologies, Hitachi, IBM, and Sony.
Educational technology Educational technology (commonly abbreviated as edutech, or edtech) is the combined use of computer hardware, software, and educational theory and practice to facilitate learning. When referred to with its abbreviation, edtech, it is often referring to the industry of companies that create educational technology.In addition to practical educational experience, educational technology is based on theoretical knowledge from various disciplines such as communication, education, psychology, sociology, artificial intelligence, and computer science.
Space technology Space technology is technology for use in outer space, in travel (astronautics) or other activities beyond Earth's atmosphere, for purposes such as spaceflight, space exploration, and Earth observation. Space technology includes space vehicles such as spacecraft, satellites, space stations and orbital launch vehicles; deep-space communication; in-space propulsion; and a wide variety of other technologies including support infrastructure equipment, and procedures.
Information technology consulting In management, information technology consulting (also called IT consulting, computer consultancy, business and technology services, computing consultancy, technology consulting, and IT advisory) is a field of activity which focuses on advising organizations on how best to use information technology (IT) in achieving their business objectives.\nOnce a business owner defines the needs to take a business to the next level, a decision maker will define a scope, cost and a time frame of the project.
Healing Is Difficult Healing Is Difficult is the second studio album by Australian singer and songwriter Sia. It was released in the United Kingdom on 9 July 2001 and in the United States on 28 May 2002.
The Difficult Couple The Difficult Couple (Chinese: 难夫难妻; pinyin: Nànfū Nànqī), also translated as Die for Marriage, is a 1913 Chinese film. It is known for being the earliest Chinese feature film.
Risk Factors
INTERNET SECURITY SYSTEMS INC/GA Item 1A Risk Factors There are many factors that affect ISS’ business and the results of its operations, some of which are beyond ISS’ control
The following is a description of some of the important factors that may cause the actual results of ISS’ operations in future periods to differ materially from those currently expected or desired
We encourage you to read this section carefully
We Operate in a Rapidly Evolving Market We operate in a rapidly evolving market and must, among other things: · respond to competitive developments; · continue to upgrade and expand our product and services offerings; and · continue to attract, retain and motivate our employees
8 ______________________________________________________________________ We cannot be certain that we will successfully address these issues
We introduced our Proventia appliance line in April 2003 that includes intrusion prevention and integrated security protection
While market response to these products has had a positive impact on our operating results, failure to continue to gain further market acceptance of new appliance products could result in revenues below our expectations and our operating results could be adversely affected
Our Future Operating Results Will Likely Fluctuate Significantly We cannot predict our future revenues and operating results with certainty
However, we do expect our future revenues and operating results to fluctuate due to a combination of factors, including: · the extent to which the public perceives that unauthorized access to and use of online information are threats to network security; · customer budgets; · the mix of product sales among the various products offered by ISS and whether revenue is recognized upon sale or deferred to subsequent periods; · the volume and timing of orders, including seasonal trends in customer purchasing; · our ability to develop and timely introduce new and enhanced product and managed service offerings; · the introduction and acceptance rate of new ISS branded appliances, including related increased cost of goods sold; · our ability to accurately forecast and produce demanded quantities of our appliance products and models; · availability of component parts of appliance products and reliance on contract manufacturers to produce such products; · our ability to provide scalable managed services offerings in a cost effective manner; · foreign currency exchange rates that affect our international operations; · whether enterprises consolidate their security platforms with fewer vendors and whether ISS benefits from this; · product and price competition in our markets; and · general economic conditions, both domestically and in our foreign markets
We focus our direct sales efforts on enterprise-wide security solutions, which consist of our entire product suite, professional services, and managed security services, rather than on the sale of component products
In addition, the revenues associated with particular sales vary significantly depending on the number of products acquired by a customer and the number of devices used by the customer
Large individual sales, or even small delays in customer orders, can cause significant variation in our license revenues and results of operations for a particular period
The timing of large orders is usually difficult to predict and, like many software-based technology companies, many of our customers typically complete transactions in the last month of a quarter
9 ______________________________________________________________________ We cannot predict our operating expenses based on our past results
Instead, we establish our spending levels based in large part on our expected future revenues
As a result, if our actual revenues in any future period fall below our expectations, our operating results likely will be adversely affected because very few of our expenses vary with our revenues
Because of the factors listed above, we believe that our quarterly and annual revenues, expenses and operating results likely will vary significantly in the future
Our ability to provide timely guidance and meet the expectations of investors with respect to our operating and financial results is affected by the tendency of a majority of our product and license sales to be completed in the last month of a quarter
We may not be able to determine whether we will experience material deviations from guidance or expectations until the end of a quarter
Dependence on Third Party Suppliers and Manufacturers We carry little inventory of our appliance products and we rely on suppliers to deliver necessary components to our contract manufacturers in a timely manner based on the forecasts we provide
We currently purchase some Proventia appliance components and contract manufacturing services from single or limited sources
If shortages occur, supplies are interrupted, or we underestimate demand for models, we may not be able to deliver products to our customers and our revenue and operating results would be adversely affected
We provide forecasts of our demand to our contract manufacturers
Because our supply of hardware is based on short-term forecasts and purchase orders, our contract manufacturers are not obligated to purchase components for greater quantities over longer periods
If we underestimate our requirements, our contract manufacturers may have an inadequate component inventory and, based on lead times, this could interrupt manufacturing and result in delays in shipments and revenues
We Face Intense Competition in Our Market The market for network security monitoring, detection, prevention and response solutions is intensely competitive, and we expect competition to increase in the future
We cannot guarantee that we will compete successfully against our current or potential competitors, especially those with significantly greater financial resources or brand name recognition
Our chief competitors generally fall within the following categories: · large companies, including Symantec Corporation, Cisco Systems, Inc, Juniper Networks, Inc, 3Com Corporation, Check Point Software Technologies, LTD, and McAfee, Inc, that sell competitive products and offerings, as well as other large software companies that have the technical capability and resources to develop competitive products; · software or hardware network infrastructure companies like Cisco Systems, Inc, 3Com Corporation, and Juniper Networks, Inc
that could integrate features that are similar to our products into their own products; · smaller software companies offering relatively limited applications for network and Internet security; and · small and large companies with competitive offerings to components of our managed services offerings
Mergers or consolidations among these competitors, or acquisitions of small competitors by larger companies, represent risks
For example, Symantec Corporation, Cisco Systems, Inc, McAfee, Inc, 3Com Corporation, and Juniper Networks, Inc
have acquired during the past several years smaller companies, which have intrusion detection or prevention technologies
These acquisitions will make these entities potentially more formidable competitors to us if such products and offerings are effectively integrated
Large companies may have advantages over us because of their longer operating histories, greater name recognition, larger customer bases or greater financial, technical and marketing resources
As a result, they 10 ______________________________________________________________________ may be able to adapt more quickly to new or emerging technologies and changes in customer requirements
They can also devote greater resources to the promotion and sale of their products than we can
In addition, these companies have reduced and could continue to reduce, the price of their security monitoring, detection, prevention and response products and managed security services, which increases pricing pressures within our market
Several companies currently sell software products (such as encryption, firewall, operating system security and virus detection software) that our customers and potential customers have broadly adopted
In addition, the vendors of operating system software or networking hardware may enhance their products to include the same kinds of functions that our products currently provide
The widespread inclusion of comparable features to our software in operating system software or networking hardware could render our products less competitive or obsolete, particularly if such features are of a high quality
Even if security functions integrated into operating system software or networking hardware are more limited than those of our products, a significant number of customers may accept more limited functionality to avoid purchasing additional products
In addition, with the introduction of our Proventia integrated security appliance, we have offerings that compete with vendors of firewalls, VPNs, anti-virus systems, and content and spam filtering products
These offerings are competitive with a broader spectrum of network security companies, as well as those that also offer integrated security appliances or broad product suites
For the above reasons, we may not be able to compete successfully against our current and future competitors
Increased competition may result in price reductions, reduced gross margins and loss of market share
We Face Risks Associated with Governmental Contracting Our customers include the US and other national government agencies and a significant number of other state and local governments or agencies
· Procurement—Contracting with public sector customers is highly competitive and can be expensive and time-consuming, often requiring that we incur significant upfront time and expense without any assurance that we will win a contract; · Budgetary Constraints and Cycles—Demand and payment for our products and services are impacted by public sector budgetary cycles and funding availability, with funding reductions or delays adversely impacting public sector demand for our products and services; · Modification or Cancellation of Contracts—Public sector customers often have contractual or other legal rights to terminate current contracts for convenience or due to a default
If a contract is cancelled for convenience, which can occur if the customer’s product needs change, we may only be able to collect for products and services delivered prior to termination
If a contract is cancelled because of default, we may only be able to collect for products and alternative products and services; · Governmental Audits—National governments and other state and local agencies routinely investigate and audit government contractorsadministrative processes
They may audit our performance and pricing and review our compliance with applicable rules and regulations
If they find that we improperly allocated costs, they may require us to refund those costs or may refuse to pay us for outstanding balances related to the improper allocation
An unfavorable audit could result in a reduction of revenue, and may result in civil or criminal liability if the audit uncovers improper or illegal activities
11 ______________________________________________________________________ We Face Rapid Technological Change in Our Industry and Frequent Introductions of New Products Rapid changes in technology pose significant risks to us
We do not control nor can we influence the forces behind these changes, which include: · the extent to which businesses and others seek to establish more secure networks; · the extent to which hackers and others seek to compromise secure systems; · evolving computer hardware and software standards; · changing customer requirements; and · frequent introductions of new products and product enhancements
To remain successful, we must continue to change, adapt and improve our products in response to these and other changes in technology
Our future success hinges on our ability to both continue to enhance our current line of products and professional services and to introduce new products and services that address and respond to innovations in computer hacking, computer technology and customer requirements
We cannot be sure that we will successfully develop and market new products that do this
Any failure by us to timely develop and introduce new products, to enhance our current products or to expand our professional services capabilities in response to these changes could adversely affect our business, operating results and financial condition
Our products involve very complex technology and, as a consequence, major new products and product enhancements require a long time to develop and test before going to market
Because this amount of time is difficult to estimate, we have had to delay the scheduled introduction of new and enhanced products in the past and may have to delay the introduction of new and enhanced products in the future
The techniques computer hackers use to gain unauthorized access to, or to sabotage, networks and intranets are constantly evolving and increasingly sophisticated
Furthermore, because new hacking techniques are usually not recognized until used against one or more targets, we are unable to anticipate most new hacking techniques
To the extent that new hacking techniques harm our customers’ computer systems or businesses, affected or prospective customers may believe that our products are ineffective, which may cause them or prospective customers to reduce or avoid purchases of our products
Undetected Product Errors or Defects Could Result in Loss of Revenues, Delayed Market Acceptance and Claims Against Us We offer warranties on our products, allowing the end customer to have any defective product repaired, or to receive a replacement product for it during the warranty period, or in certain circumstances return the product for a refund
Our products may contain undetected errors or defects
If there is a broad product failure across our customer base, we may decide to replace all affected products or we may decide to refund the purchase price for defective units
Such defects and actions may adversely affect our ability to record revenue
Some errors are discovered only after a product has been installed and used by end customers
Any errors discovered after commercial release could result in loss of revenues and claims against us
We offer warranties on our service levels for managed security services
If we do not meet warranties, the customer generally may obtain credits for service
12 ______________________________________________________________________ If we are unable to fix errors or other product problems that later are identified after full deployment, or if we fail to meet our service levels for managed security services, in addition to the consequences described above, we could experience: · failure to achieve market acceptance; · loss of customers; · loss of or delay in revenues and loss of market share; · diversion of development resources; · increased service and warranty costs; · legal actions by our customers; and · increased insurance costs
Our Products are Complex and Are Operated in a Wide Variety of Computer Configurations, Which Could Result in Errors or Product Failures Because we offer very complex products, undetected errors, failures or bugs may occur when they are first introduced or when new versions are released
Our products often are installed and used in large-scale computing environments with different operating systems, system management software and equipment and networking configurations, which may cause errors or failures in our products or may expose undetected errors, failures or bugs in our products
We discover errors, failures and bugs in certain of our product offerings after their introduction and have experienced delays and could experience lost revenues during the period required to correct these errors
Our customers’ computer environments are often characterized by a wide variety of standard and non-standard configurations that make pre-release testing for programming or compatibility errors very difficult and time-consuming
Despite testing, errors, failures or bugs may not be found in new products or releases until after commencement of commercial shipments
Errors, failures or bugs in products released by us could result in negative publicity, product returns, loss of or delay in market acceptance of our products or claims by customers or others
In addition, if an actual or perceived breach of network security occurs in one of our end customer’s security systems, regardless of whether the breach is attributable to our products, the market perception of the effectiveness of our products could be harmed
Because the techniques used by computer hackers to access or sabotage networks change frequently and generally are not recognized until launched against a target, we may be unable to anticipate these techniques
Alleviating any of these problems could require significant expenditures of our capital and resources and could cause interruptions, delays or cessation of our product licensing, which could cause us to lose existing or potential customers and would adversely affect results of operations
We Might Have to Defend Lawsuits or Pay Damages in Connection With Any Alleged or Actual Failure of Our Products and Services Because our products and services provide and monitor network security and may protect valuable information, we could face claims for product liability, tort or breach of warranty
Anyone who circumvents our security measures could misappropriate the confidential information or other property of end customers using our products, or interrupt their operations
If that happens, affected end customers or others may sue us
In addition, we may face liability for breaches caused by faulty installation of our products by our service and support organizations
Provisions in our contracts relating to warranty disclaimers and liability limitations may be unenforceable
Some courts, for example, have found contractual limitations of liability in standard computer and software contracts to be unenforceable in some circumstances
Defending a lawsuit, regardless of its merit, could be costly and could divert 13 ______________________________________________________________________ management attention
Our business liability insurance coverage may be inadequate or future coverage may be unavailable on acceptable terms or at all
Risks Associated with Our Global Operations The expansion of our international operations includes our presence in dispersed locations throughout the world, including throughout EMEA and the Asia/Pacific and Latin America regions
Our international presence and expansion exposes us to risks not present in our US operations, such as: · the difficulty in managing an organization spread over various countries located across the world; · compliance with, and unexpected changes in, a wide range of complex regulatory requirements in countries where we do business; · duties and tariffs imposed on importation of our products in other jurisdictions where other manufacturers may not bear those same costs; · increased financial accounting and reporting burdens; · potentially adverse tax consequences; · fluctuations in foreign currency exchange rates resulting in losses or gains from transactions and expenses denominated in foreign currencies; · reduced protection for intellectual property rights in some countries; · reduced protection for enforcement of creditor and contractual rights in some countries; and · import and export license requirements and restrictions on the import and export of certain technology, especially encryption technology and trade restrictions
Despite these risks, we believe that we must continue to expand our operations in international markets to support our growth
To this end, we intend to establish additional foreign sales operations, expand our existing offices, hire additional personnel, expand our international sales channels and customize our products for local markets
If we fail to execute this strategy, our international sales growth will be limited
Our Networks, Products and Services May be Targeted by Hackers Like other companies, our websites, networks, information systems, products and services may be targets for sabotage, disruption or misappropriation by hackers
Although we believe we have sufficient controls in place to prevent disruption and misappropriation, and to respond to such situations, we expect these efforts by hackers to continue
If these efforts are successful, our operations, reputation and sales could be adversely affected
We Must Successfully Integrate Acquisitions As part of our growth strategy, we have and may continue to acquire or make investments in companies with products, technologies or professional services capabilities complementary to our solutions
When engaging in acquisitions, we could encounter difficulties in assimilating or completing the development of the technologies, new personnel and operations into our company
These difficulties may disrupt our ongoing business, distract our management and employees, increase our expenses and adversely affect our results of operations
These difficulties could also include accounting requirements, such as impairment charges related to goodwill or other intangible assets or expensing in-process research and development costs
We cannot be certain that we will successfully overcome these risks with respect to any future acquisitions or that we will not encounter other problems in connection with our recent or any 14 ______________________________________________________________________ future acquisitions
In addition, any future acquisitions may require us to incur debt or issue equity securities
The issuance of equity securities could dilute the investment of our existing stockholders
In July 2005, ISS announced a share repurchase program authorizing the use of up to dlra100 million in cash to repurchase outstanding shares of our common stock
We expect to repurchase shares for cash as business conditions warrant through July 19, 2006
The full implementation of this repurchase program would use a significant portion of our cash reserves
This use of cash could limit our future flexibility to complete acquisitions of businesses or technology or other transactions
Our Proprietary Rights May be Difficult to Enforce We rely primarily on copyright, trademark, patent and trade secrets laws, confidentiality procedures and contractual provisions to protect our proprietary rights
We hold several United States patents, one Taiwanese patent, and have a number of patent applications pending
We also hold numerous United States and foreign trademarks and have a number of trademark applications pending
There can be no assurance that patents will be issued from pending applications, or that claims allowed on any patents will be sufficiently broad to protect our technology
There can be no assurance that any issued patents will not be challenged, invalidated or circumvented, or that any rights granted under these patents will actually provide competitive advantages to us
Despite our efforts to protect our proprietary rights, unauthorized parties may attempt to copy aspects of our products or to obtain and use information that we regard as proprietary
Policing unauthorized use of our products is difficult
While we cannot determine the extent to which piracy of our software products occurs, we expect software piracy to be a persistent problem
In addition, the laws of some foreign countries do not protect our proprietary rights to as great an extent as do the laws of the United States, and many foreign countries do not enforce these laws as diligently as US government agencies and private parties
If we are unable to protect our proprietary rights to the totality of the features in our software and products (including aspects of our software and products protected other than by patent rights), we may find ourselves at a competitive disadvantage to others who need not incur the additional expense, time and effort required to create the innovative products that have enabled us to be successful
We May Be Found to Infringe the Proprietary Rights of Others Third parties may assert claims or initiate litigation related to exclusive patent, copyright, trademark and other intellectual property rights to technologies that are relevant to our business
Because of the large number of patents in the Internet, networking, security and software fields, the secrecy of some pending patents and the rapid rate of issuance of new patents, it is not economically practical (or even possible) to determine in advance whether a product (or any of its components) infringe or will infringe the patent rights of others
Third party asserted claims and/or initiated litigation can include claims against us or our manufacturers, suppliers, or customers, alleging infringement of proprietary rights with respect to our existing or future products (or components of those products)
Regardless of the merit of these claims, they can be time-consuming, result in costly litigation and diversion of technical and management personnel, or require us to develop a non-infringing technology or enter into license agreements
There can be no assurance that licenses will be available on acceptable terms and conditions, if at all, in these circumstances, or that any indemnification that might be available to us would be adequate to cover our costs of defense
Furthermore, because of the potential for large judgments, which are not necessarily predictable, it is not unusual to find even arguably unmeritorious claims settled for significant funds
If any infringement or other intellectual property claims made against us by a third party is successful, or if we fail to develop non-infringing technology or license the proprietary rights on commercially reasonable terms 15 ______________________________________________________________________ and conditions, our business, operating results, financial condition and liquidity could be materially and adversely affected
Some Provisions in the ISS Certificate of Incorporation and Bylaws Make a Takeover of ISS Difficult Our certificate of incorporation and bylaws contain provisions that could have the effect of making it more difficult for a third party to acquire, or of discouraging a third party from attempting to acquire, control of ISS These provisions: · establish a classified board of directors; · create preferred stock purchase rights that grant to holders of common stock the right to purchase shares of Series A Junior Preferred Stock in the event that a third party acquires 20prca or more of the voting power of our outstanding common stock; · prohibit the right of our stockholders to act by written consent; · limit calling special meetings of stockholders; and · impose a requirement that holders of 662¤3prca of the outstanding shares of common stock are required to amend the provisions relating to the classification of our board of directors and action by written consent of stockholders