LOGM 2017 Annual Report

Any breach of the cybersecurity measures we have taken to safeguard this information may subject us to fines and penalties, time consuming and expensive litigation, trigger indemnification obligations and other contractual liabilities, damage our reputation and harm our customers and our business. Cyber-attacks from computer hackers and cyber criminals and other malicious Internet-based activity continue to increase generally, and our services and systems, including the systems of our outsourced service providers, have been and may in the future continue to be the target of various forms of cyber-attacks such as DNS attacks, wire- less network attacks, viruses and worms, malicious software, application centric attacks, peer-to-peer attacks, phishing attempts, backdoor trojans and distributed denial of service attacks. The techniques used by computer hackers and cyber criminals to obtain unauthorized access to data or to sabotage computer systems change fre- quently and generally are not detected until after an incident has occurred. While we make significant efforts to maintain the security and integrity of our services and computer systems, our cybersecurity measures and the cybersecurity measures taken by our third-party data center facilities may be unable to anticipate, detect or pre- vent all attempts to compromise our systems. If our cybersecurity measures are compromised as a result of third- party action, employee or customer error, malfeasance, stolen or fraudulently obtained log-in credentials or otherwise, our reputation could be damaged, our business may be harmed and we could incur significant liabilities. Many states have enacted laws requiring companies to notify individuals of security breaches involving their personal data. These mandatory disclosures regarding a security breach may be costly to comply with and may lead to widespread negative publicity, which may cause our customers to lose confidence in the effectiveness of our cybersecurity measures. Additionally, some of our customer contracts require us to notify customers in the event of a security breach and/or indemnify customers from damages they may incur as a result of a breach of our services and computer systems. There can be no assurance that the limitations of liability provisions in our contracts for a security breach would be enforceable or would otherwise protect us from any such liabilities or damages with respect to any particular claim. We also cannot be sure that our existing insurance coverage will continue to be available on acceptable terms or will be available in sufficient amounts to cover one or more large claims related to a breach of our services or computer systems. The successful assertion of one or more large claims against us that exceed our available insurance coverage could have a material adverse effect on our busi- ness, financial condition and operating results. Our business strategy includes acquiring or investing in other companies, which may ultimately fail to meet our expectations, divert our management’s attention, result in additional dilution to our stockholders and disrupt our business and operating results. Our business strategy continues to contemplate us making strategic acquisitions of, or strategic investments in, complementary businesses, services, technologies and intellectual property rights. Acquisitions of high- technology companies are inherently risky, and negotiating these transactions can be time-consuming, difficult and expensive and our ability to close these transactions may often be subject to conditions or approvals that are beyond our control. Consequently, these transactions, even if undertaken and announced, may not close. In con- nection with an acquisition, investment or strategic transaction we may do one or more of the following, which may harm our business and adversely affect our operating results: • issue additional equity securities that would dilute our stockholders and decrease our earnings per share; • use cash and other resources that we may need in the future to operate our business; • incur debt on unfavorable terms or that we are unable to repay; • incur large charges or substantial liabilities; and • become subject to adverse tax consequences, substantial depreciation or deferred compensation charges. Following an acquisition, the integration of an acquired company may cost more than we anticipate, and we may be subject to unforeseen liabilities arising from an acquired company’s past or present operations. These liabilities may be greater than the warranty and indemnity limitations we negotiate. Any unforeseen liability that 12

RkJQdWJsaXNoZXIy NTIzOTM0