📄 Extracted Text (1,079 words)
dating products through app stores increases, we may need to offset these increased app store fees by decreasing traditional marketing expenditures as a
percentage of revenue, increasing user volume or monetization per user, or by engaging in other efforts to increase revenue or decrease costs generally, or
our business, financial condition and results of operations could be adversely affected.
19
IaLle_Qtconlents
Our success depends, in part, on the integrity of our systems and infrastructures and on our ability to enhance, expand and adapt these systems
and infrastructures in a timely and cost-effective manner.
In order for us to succeed, our systems and infrastructures must perform well on a consistent basis. From time to time, we may experience system
interruptions that make some or all of our systems or data unavailable and prevent our products from functioning property for our users: any such interruption
could arise for any number of reasons. Further, our systems and infrastructures are vulnerable to damage from fire, power loss, telecommunications failures
and similar events. %Mille we have backup systems in place for certain aspects of our operations, our systems and infrastructures are not hilly redundant,
disaster recovery planning is not sufficient for all eventualities and our property and business interruption insurance coverage may not be adequate to
compensate us fully for any losses that we may suffer. Any interruptions or outages, regardless of the cause, could negatively impact our users' experiences
with our products, tarnish our brands reputation and decrease demand for our products. any or all of which could adversely affect our business. financial
condition and results of operations.
We also continually work to expand and enhance the efficiency and scalability of our technology and network systems to improve the experience of our users,
accommodate substantial increases in the volume of traffic to our various dating products and to keep up with changes in technology and user preference.
Any failure to do so in a timely and cost-effective manner could adversely affect our users experience with our various products and thereby negatively impact
the demand for our products, and could increase our costs, either of which could adversely affect our business, financial condition and results of operations.
We are currently undertaking a significant and complex update to the technology relating to some of our businesses, and failure to complete this
project in a timely and effective manner could adversely affect our business.
We are currently in the process of an ongoing consolidation and streamlining of the technology and network systems and infrastructures of a number of our
businesses, including Match, Ourtme and Meetic. The goal or this project is to modernize, optimize and improve the scalability and cost-effectiveness of
these systems and infrastructures and to increase our ability to deploy product changes more rapidly across devices and product lines. We have budgeted
significant human and financial resources for these efforts and if we experience delays, inefficiencies or operational failures, we will Incur additional costs,
which would adversely affect our profitability. Moreover, these efforts may not be successful generally, may not be completed in a timely or cost-effective
manner, may not result in the cost savings or other benefits we anticipate and may disrupt operations, any or all of which could adversely affect our business,
financial condition and results of operations.
We may not be able to protect our systems and infrastructures from cyber attacks and may be adversely affected by cyber attacks experienced by
third parties.
We are regularly under attack by perpetrators of random or targeted malicious technology-related events, such as cyber attacks, computer viruses, worms or
other destructive or disruptive software, distributed denial of service attacks and attempts to misappropriate customer information, including credit card
information. Mile we have invested heavily in the protection of our systems and infrastructures and in related training, there can be no assurance that our
efforts will prevent significant breaches in our systems or other such events from occumng. Any cyber or similar attack we are unable to protect ourselves
against could damage our systems and infrastructure, prevent us from providing our products, erode our reputation and brands, result in the disclosure of
confidential information of our users and/or be costly to remedy.
20
Table of Contents
The impact of cyber security events experienced by third parties with whom we do business (or upon whom we otherwise rely In connection with our day-to
day operations) could have a similar effect on us. Moreover, even cyber or similar attacks that do not directly affect us or third parties with whom we do
business may result in a loss of consumer confidence generally, which could make users less likely to use or continue to use our products. The occurrence of
any of these events could have an adverse effect on our business. financial condition and results of operations.
Our success depends, in part, on the Integrity of third party systems and infrastructures.
We rely on third parties, primarily data center service providers, as well as third party computer systems, broadband and other communications systems and
service providers, in connection with the provision of our products generally, as well as to facilitate and process certain transactions with our users. We have
no control over any of these third parties or their operations.
Problems experienced by third party data center service providers upon whom we rely, the telecommunications network providers with whom they contract or
with the systems through which telecommunications providers allocate capacity among their customers could also adversely affect us. Any changes in service
levels at our data centers or any interruptions, outages or delays in our systems or those of our third party providers, or deterioration in the performance of
these systems, could impair our ability to provide our products or process transactions with our users, which would adversely impact our business, financial
condition and results of operations.
If the security of personal and confidential user information that we maintain and store Is breached or otherwise accessed by unauthorized
persons, it may be costly to mitigate the impact of such an event and our reputation could be harmed.
We receive, process, store and transmit a significant amount of personal user and other confidential information, including credit card information, and enable
our users to share their personal 'information with each other. In some cases, we retain third party vendors to store this information. We continuously develop
Mir: tec.gov An:laves daW15751890/0104746915006431 3222645Rn-I /Wm(I 1,9721)1 911:17 Ahfl
CONFIDENTIAL - PURSUANT TO FED. R. CRIM. P. 6(e) DB-SDNY-0075140
CONFIDENTIAL SONY GM_00221324
EFTA01377980
ℹ️ Document Details
SHA-256
4f53ba3c427e4998dd0a5fad0f58746a101679dc16c7425df0377441916da409
Bates Number
EFTA01377980
Dataset
DataSet-10
Document Type
document
Pages
1
Comments 0