Yahoo 2015 Annual Report Download - page 22

Download and view the complete annual report

Please find page 22 of the 2015 Yahoo annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 180

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180

governments to allow for certainty regarding transfers of data. However, given the preliminary nature
of the agreement, some uncertainty remains, and compliance obligations could cause us to incur
additional costs, require us to change business practices in a manner adverse to our business, or
affect the manner in which we provide our services.
The interpretation and application of privacy, data protection, data transfer and data retention laws
and regulations are often uncertain and in flux in the U.S. and internationally. These laws may be
interpreted and applied inconsistently from country to country and inconsistently with our current
policies and practices, complicating long-range business planning decisions. If privacy, data
protection, data transfer or data retention laws are interpreted and applied in a manner that is
inconsistent with our current policies and practices we may be fined or ordered to change our
business practices in a manner that adversely impacts our operating results. Complying with these
varying international requirements could cause us to incur substantial costs or require us to change
our business practices in a manner adverse to our business and operating results.
If our security measures are breached, our products and services may be perceived as not being
secure, users and customers may curtail or stop using our products and services, and we may incur
significant legal and financial exposure.
Our products and services involve the storage and transmission of Yahoo’s users’ and customers’
personal and proprietary information in our facilities and on our equipment, networks and corporate
systems. Security breaches expose us to a risk of loss of this information, litigation, remediation costs,
increased costs for security measures, loss of revenue, damage to our reputation, and potential
liability. Outside parties may attempt to fraudulently induce employees, users, or customers to
disclose sensitive information to gain access to our data or our users’ or customers’ data. In addition,
hardware, software or applications we procure from third parties may contain defects in design or
manufacture or other problems that could unexpectedly compromise network and data security.
Additionally, some third parties, such as our distribution partners, service providers and vendors, and
app developers, may receive or store information provided by us or by our users through
applications integrated with Yahoo. If these third parties fail to adopt or adhere to adequate data
security practices, or in the event of a breach of their networks, our data or our users’ data may be
improperly accessed, used or disclosed. Security breaches or unauthorized access have resulted in
and may in the future result in a combination of significant legal and financial exposure, increased
remediation and other costs, damage to our reputation and a loss of confidence in the security of our
products, services and networks that could have an adverse effect on our business. We take steps to
prevent unauthorized access to our corporate systems, however, because the techniques used to
obtain unauthorized access, disable or degrade service, or sabotage systems change frequently or
may be designed to remain dormant until a triggering event, we may be unable to anticipate these
techniques or implement adequate preventative measures. If an actual or perceived breach of our
security occurs, the market perception of the effectiveness of our security measures could be harmed
and we could lose users and customers.
If we are unable to attract, sustain, and renew distribution arrangements on favorable terms, our
revenue may decline.
We enter into distribution arrangements with third parties to promote or supply our services to their
users. For example:
We maintain search and display advertising relationships with Affiliate sites, which integrate our
advertising offerings into their websites.
We enter into distribution alliances with Internet service providers (including providers of cable
and broadband Internet access) and software distributors to promote our services to their users.
18