Symantec 2009 Annual Report Download - page 79

Download and view the complete annual report

Please find page 79 of the 2009 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 167

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167

Third parties claiming that we infringe their proprietary rights could cause us to incur significant legal
expenses and prevent us from selling our products.
From time to time, we receive claims that we have infringed the intellectual property rights of others, including
claims regarding patents, copyrights, and trademarks. In addition, former employers of our former, current, or
future employees may assert claims that such employees have improperly disclosed to us the confidential or
proprietary information of these former employers. Any such claim, with or without merit, could result in costly
litigation and distract management from day-to-day operations. If we are not successful in defending such claims,
we could be required to stop selling, delay shipments of, or redesign our products, pay monetary amounts as
damages, enter into royalty or licensing arrangements, or satisfy indemnification obligations that we have with
some of our customers. We cannot assure you that any royalty or licensing arrangements that we may seek in such
circumstances will be available to us on commercially reasonable terms or at all.
In addition, we license and use software from third parties in our business. These third party software licenses
may not continue to be available to us on acceptable terms or at all, and may expose us to additional liability. This
liability, or our inability to use any of this third party software, could result in shipment delays or other disruptions in
our business that could materially and adversely affect our operating results.
If we do not protect our proprietary information and prevent third parties from making unauthorized use
of our products and technology, our financial results could be harmed.
Most of our software and underlying technology is proprietary. We seek to protect our proprietary rights
through a combination of confidentiality agreements and procedures and through copyright, patent, trademark, and
trade secret laws. However, all of these measures afford only limited protection and may be challenged, invalidated,
or circumvented by third parties. Third parties may copy all or portions of our products or otherwise obtain, use,
distribute, and sell our proprietary information without authorization. Third parties may also develop similar or
superior technology independently by designing around our patents. Our shrink-wrap license agreements are not
signed by licensees and therefore may be unenforceable under the laws of some jurisdictions. Furthermore, the laws
of some foreign countries do not offer the same level of protection of our proprietary rights as the laws of the U.S.,
and we may be subject to unauthorized use of our products in those countries. The unauthorized copying or use of
our products or proprietary information could result in reduced sales of our products. Any legal action to protect
proprietary information that we may bring or be engaged in with a strategic partner or vendor could adversely affect
our ability to access software, operating system, and hardware platforms of such partner or vendor, or cause such
partner or vendor to choose not to offer our products to their customers. In addition, any legal action to protect
proprietary information that we may bring or be engaged in, alone or through our alliances with the Business
Software Alliance (“BSA”), or the Software & Information Industry Association (“SIIA”), could be costly, may
distract management from day-to-day operations, and may lead to additional claims against us, which could
adversely affect our operating results.
Some of our products contain “open source” software, and any failure to comply with the terms of one or
more of these open source licenses could negatively affect our business.
Certain of our products are distributed with software licensed by its authors or other third parties under so-
called “open source” licenses, which may include, by way of example, the GNU General Public License (“GPL”),
GNU Lesser General Public License (“LGPL”), the Mozilla Public License, the BSD License, and the Apache
License. Some of these licenses contain requirements that we make available source code for modifications or
derivative works we create based upon the open source software, and that we license such modifications or
derivative works under the terms of a particular open source license or other license granting third parties certain
rights of further use. If we combine our proprietary software with open source software in a certain manner, we
could, under certain of the open source licenses, be required to release the source code of our proprietary software.
In addition to risks related to license requirements, usage of open source software can lead to greater risks than use
of third party commercial software, as open source licensors generally do not provide warranties or controls on
origin of the software. We have established processes to help alleviate these risks, including a review process for
screening requests from our development organizations for the use of open source, but we cannot be sure that all
19