Overview
Carbonite, Inc. (together with its subsidiaries, "Carbonite", the "Company", "our", "we", or "us") provides data protection solutions including cloud, hybrid and on-premise backup and restore, disaster recovery as a service ("DRaaS") and email archiving. Our solutions provide powerful features packaged in a cost-effective, simple and secure manner and are designed to address the specific needs of small and medium-sized businesses ("SMBs") and consumers.
We were incorporated on February 10, 2005 as a Delaware corporation and our principal executive offices are located at Two Avenue de Lafayette, Boston, Massachusetts, 02111. We founded Carbonite on one simple idea: all computers need to be backed up, and in our always connected and highly mobile world, cloud backup is the ideal approach.
We derive the majority of our revenue from subscription fees and our consistently strong retention rates and scalable infrastructure help to support our growth. The remainder of our revenue is derived from software arrangements, which often contain multiple revenue elements, such as software licenses, hardware, professional services and post-contract customer support. For the year ended December 31, 2016, 2015 and 2014, we generated revenue of $207.0 million, $136.6 million and $122.6 million, respectively. We continue to invest in customer acquisition because the market for our solutions is highly competitive and, as a result, our bookings have grown from $98.5 million in 2012 to $209.3 million in 2016. For a reconciliation of bookings to revenue for the last five years, see “Selected Consolidated Financial and Other Data.”
Industry Trends
Trends on several fronts are fueling growth opportunities for Carbonite.
The first trend is the continued growth of the data protection market fueled by the proliferation of data, which the industry analyst firm International Data Corporation ("IDC") says is expanding at a 40-50% compound annual growth rate ("CAGR").
1
IDC predicts the worldwide disk-based data protection and recovery ("DBDP") market will grow to $16.6 billion by 2020.
2
Included in the 2020 DBDP forecast are the $8.4 billion worldwide data protection and recovery software ("DP&R") market, in which IDC projects cloud-based solutions to grow at almost three times the rate of on-premise solutions, at 12.1% and 4.3% CAGR respectively,
1
and the $4.1 billion purpose-built backup appliances ("PBBA") market. Together, DP&R and PBBA, Carbonite’s primary lines of business, represent 72% or $12 billion of the worldwide DBDP market.
The second trend is threats to data. The number of cyberattacks known as “Ransomware” grew rapidly over the past 12 months. The FBI defines ransomware as a type of malware installed on a computer or server that encrypts the files, making them inaccessible until a specified ransom is paid.
5
The FBI reported that ransomware “skyrocketed” in Q1 of 2016, costing businesses $209 million during the first three months of the year, compared to $24 million in all of 2015.
3
The total cost for 2016 is expected to exceed $1 billion and this reflects only those incidents that are reported.
4
In order to avoid bad press and reputational damage, many ransomware incidents are not reported.
In September 2016, the FBI issued a public service announcement stressing the importance of regular data backups and verification of the integrity of those backups as a defense to ransomware, stating that “backups are critical in ransomware incidents,” and “backups may be the best way to recover your critical data.”
5
We expect this trend to drive adoption of backup solutions as businesses and individuals look for solutions to protect their data to avoid falling prey to criminals.
Finally, the industry analyst firm Gartner estimates the DRaaS market will nearly triple to $3.4 billion in 2019.
6
According to Gartner, mid-market drivers for DRaaS include improved affordability and functionality.
We believe data growth and data threats will continue to drive the need for data protection and that our solutions position us well to capitalize on this growth opportunity.
___________________________
1
IDC Market Forecast: Worldwide Data Protection and Recovery Software Forecast, 2016-2020. Nov 2016 - US41893415
2
IDC Market Forecast: Worldwide Disk-Based Data Protection and Recovery Forecast, 2016-2020. Feb 2017 - US42237416
3
How Ransomware Became a Billion-Dollar Nightmare for Businesses (
https://www.theatlantic.com/business/archive/2016/09/ransomware-us/498602/
)
4
Cyber-extortion losses skyrocket, says FBI (
http://money.cnn.com/2016/04/15/technology/ransomware-cyber-security/
)
5
Federal Bureau of Investigation Public Service Announcement I-091516-PSA, Ransomware Victims Urged to Report Infections to Federal Law Enforcement (
https://www.ic3.gov/media/2016/160915.aspx
)
6
Gartner: Magic Quadrant for Disaster Recovery as a Service, 2016
Our Solutions
We believe that customers purchase our data protection solutions because they provide powerful features packaged in a cost-effective, simple and secure manner. We make it easy for customers to recover their files, applications or complete systems, and we provide secure anytime, anywhere data access as well as high quality customer support.
We believe that our solutions provide the following benefits to our customers:
Power
: Enterprise-grade data protection and recovery capabilities.
Simplicity
: Intuitive user interfaces that make our solutions easy to use and maintain.
Security
: Proven, modern technology that provides peace of mind that our customers' data is safe. We encrypt all customer files before they are transmitted to our data centers, guarding against unauthorized access to stored files and ensuring a high level of data security. In addition, we employ state-of-the-art data center security measures intended to prevent intrusions.
Value
: We provide comprehensive solutions at an affordable, predictable price, enabling customers to meet their data protection needs from a single vendor.
Our Key Competitive Strengths
We believe that our key competitive strengths include the following:
Proprietary backup architecture
. Our entire infrastructure is designed and optimized for data protection, which is a low transaction speed, high volume, write mostly application. We believe that our average storage costs per subscriber are lower than those realized by typical general purpose data center storage systems, providing us with lower cost of service and greater return on investment.
Heterogeneous environment support.
Our EVault solutions have been architected to use proprietary “agents” that run on a variety of operating platforms, including Windows, Linux, VMware, Oracle, IBM AIX and HP-UX, to ensure that medium-sized businesses can securely backup and restore all their important data.
Brand awareness.
We believe that we have among the highest brand awareness in the cloud backup market. We promote our brand through our multi-channel marketing program, which includes a broad presence in radio, online display advertising, print advertising, paid and natural search, and an affiliate and reseller network.
Distribution.
Our sales network is designed to sell large volumes of our solutions to SMB customers. To penetrate the extensive and diverse population of SMBs, we have invested in recruiting and onboarding a network of sales channel partners including distributors, value-added resellers and managed service providers (“MSPs”). We believe the breadth and diversity of our channel partner relationships, coupled with our internal direct sales capabilities provide a competitive advantage when reaching SMBs.
Significant intellectual property portfolio.
We have a significant intellectual property portfolio relating to our solutions, including
33
patents and
24
patents pending. CARBONITE is a registered trademark in the U.S. and in over 40 other countries, including countries in the European Union.
Encryption and data security.
We use sophisticated encryption technology to ensure the privacy of our customers’ stored files. We encrypt files using a secure key before the files leave the customers' computer and transmit the encrypted files over the internet to one of our secure data centers. Customers’ files remain encrypted on our servers to guard against unauthorized access. We employ outside security analysis firms, including anti-hacking specialists, to review and test our defenses and internal procedures.
Comprehensive customer support.
We believe that our customer support is more comprehensive than that offered by our primary competitors in the cloud backup market and aids in our customer retention. Telephone, live chat, and email customer support are included in our subscription fee.
Our Offerings
Our data protection offerings include cloud, hybrid and on-premise backup and restore, DRaaS and email archiving. Our suite of solutions includes:
Backup and restore:
For SMBs and consumers, we offer annual and multi-year cloud backup plans. All plans offer discounts for multi-year subscriptions. For SMBs, we also offer backup and restore solutions for on-premise use under software license arrangements, which often contain multiple revenue elements, such as software licenses, hardware, professional services and post-contract customer support.
Our SMB plans include:
Carbonite Computer Backup:
Automatically back up files directly to the cloud and include an unlimited number of devices for an annual flat fee based on the amount of storage needed. Our Carbonite Office Core plan starts with 250GB of cloud storage with additional 100GB storage packs available.
Carbonite Server Backup:
Cloud and hybrid backup for physical and virtual servers with advanced management capabilities including scheduling, retention, bandwidth and compression settings, and detailed monitoring and reporting via a personalized server dashboard. Plans include:
|
|
•
|
Carbonite Office Power - Includes all the features of Carbonite Office Core and protects one physical or virtual server. Server protection includes image backup with bare metal restore which simplifies system recovery. This plan includes 250GB of cloud storage with additional 100GB storage packs available.
|
|
|
•
|
Carbonite Office Ultimate - Includes all the features of Carbonite Office Power and protects an unlimited number of physical or virtual servers. This plan includes 500GB of cloud storage with additional 100GB storage packs available.
|
EVault Cloud Backup:
Our EVault solutions provide scalable backup and restore capabilities to SMBs with complex and heterogeneous IT infrastructures. EVault backup includes plans that backup directly to cloud and hybrid backup services which include cloud-connected appliances delivered as a service.
DRaaS:
Our EVault Cloud Disaster Recovery Service is a cloud-based managed service that helps organizations quickly recover systems after a disaster by accessing those systems remotely via a secure, virtual environment in our cloud.
Email archiving:
Our MailStore offerings are designed to meet the specific email archiving needs of SMBs in terms of performance, stability, functionality and simplicity. Our three solutions include MailStore Server, MailStore Service Provider Edition and MailStore Home.
Our Proprietary Technology
At the core of our offerings is proprietary technology that allows us to offer highly scalable data protection solutions to our end customers, and as a platform for MSP partners to offer to their customers as a white-labeled offering. This technology is installed on protected systems, running in the customers' environment, and includes server software, web-based monitoring, control, and account management tools. We believe that simple, centralized, web-based control of our solutions improves the user experience both for end-users and for our partners.
We invest heavily in the development of our technologies. In 2016, 2015 and 2014, we spent $33.3 million, $28.1 million and $24.1 million, respectively, on research and development. Our proprietary technologies are fundamental to our value proposition as they enable us to deliver solutions that are scalable, reliable and cost effective.
Marketing and Sales
Our marketing and sales efforts are focused on three primary goals: acquiring customers at a low cost, retaining existing customers, and building brand awareness. Our advertising reinforces our brand by emphasizing ease of use, affordability, security and reliability. We use radio advertising, online display advertising, print advertising, paid search, direct marketing, and affiliate and reseller marketing. Our public relations efforts include engaging the traditional press, new media, industry influencers and social networks. Our sales model is designed to sell large volumes of our solutions to SMBs globally, both directly and through our indirect network of partners which includes distributors, value-added resellers, and managed service providers.
Marketing.
Our customers come from the following primary sources: SMBs who buy our solutions directly from our website, our inside sales team, or from our network of partners, and consumers who sign up for Carbonite backup solutions on our website in response to our direct marketing campaigns. We support our sales network with a marketing approach that leverages our established brand to drive market awareness and demand generation among the broad population of SMBs and consumers. Our marketing efforts are designed to attract prospective customers and enroll them as paying customers, either through immediate sale, free trials or communication of the benefits of our solutions and development of ongoing relationships.
Channel distribution.
To further penetrate the extensive and diverse population of SMBs, we have and will continue to invest in our network of sales channel partners. Our network of sales channel partners includes distributors, value-added resellers and retailers and is designed to sell large volumes of our relatively low-priced solutions to SMB customers.
Retention.
Our retention efforts are focused on establishing and maintaining long-term relationships with our customers by delivering a compelling customer experience and superior value, communicating regularly with customers through email, on-site messaging, and other media, and creating positive interactions with our customer support team. We monitor developing trends in subscription durations, renewals, and customer satisfaction to maximize our customer retention. We offer incentives to customers to purchase multi-year subscriptions, which we believe helps to increase our retention. As of December 31, 2016, 2015 and 2014, 24%, 27% and 25%, respectively, of our total subscription bookings were for multi-year contracts.
Intellectual Property
We believe the strength of our brand and the functionality of our software help differentiate us from our competitors. Our success therefore depends on our ability to protect our technologies and intellectual property, which allows us to move and store vast amounts of customer data. To protect our intellectual property, we rely on a combination of trademark, patent, copyright, and trade secret laws, as well as confidentiality procedures and contractual restrictions. Carbonite, the Carbonite Logo, ZAMANDA, MAILSTORE and EVAULT, as well as other marks, are registered trademarks of Carbonite, Inc. in numerous countries throughout the world. The Carbonite trademark is subject to registrations covering over 40 countries. Carbonite also has additional registrations and/or pending applications for additional marks in the U.S. and/or other countries, including but not limited to “Carbonite The Better Backup Plan”, “Back it up. Get it back”, “Because Your Life is On Your Computer” Logo, "Carbonite" and the Green Dot Logo, Carbonite Lock Logo, the Z logo and Chinese character representations for Carbonite. In addition, we have
33
issued patents, expiring at various times between 2021 and 2031, and
24
pending patent applications in the U.S. and internationally that cover both our technical infrastructure and our key usability and design concepts.
Competition
Our market is rapidly evolving due to technological advances that are driving changes in the way SMBs operate. Over the past few years, competition has intensified, and we expect this to continue with market consolidation, the introduction of new technologies, and introduction of new market entrants. We compete against many companies across the data protection, disaster recovery and storage industries, ranging from those who provide a wide array of IT services, to those who provide only a specific business continuity product, to distributors and resellers. We expect many of our actual and potential competitors and solutions to change as we expand further into the SMB market and as the markets we compete in continue to evolve.
We believe key factors to successfully compete in any of our markets include ease of installation and use, value, cloud storage, data security, reliability, and brand reputation. We believe that Carbonite competes favorably with respect to each of the key factors by providing powerful, yet simple solutions. Our offerings are easy-to-use, affordable, secure, include a variety of storage capacity options, and enable anytime, anywhere access to files.
Employees
As of December 31, 2016, we had 820 full-time and 20 part-time employees. Of our full-time employees, 330 were in operations and support, 193 were in sales and marketing, 153 were in research and development, and 144 were in general and administrative functions. None of our employees are covered by collective bargaining agreements.
Subsequent Events
Credit Facility Amendment
On January 30, 2017, we entered into a fourth amendment to the Credit Facility (as defined within
Note 15 - Revolving Credit Facility
) with Silicon Valley Bank (the "2017 Amendment"), which increased the Credit Facility in the amount of $15.0 million to a total credit limit of $40.0 million. The 2017 Amendment also included certain changes to the definitions and calculations of financial covenants. On January 31, 2017, $39.2 million was drawn from the Credit Facility, and was used to partially fund the acquisition of Double-Take Software, Inc. (“Double-Take”).
Acquisition
On January 31, 2017, we entered into a Stock Purchase Agreement (the “Agreement”) with Vero Parent, Inc. (“Vero Parent”), the sole stockholder of Double-Take, and Vision Solutions, Inc., a wholly-owned subsidiary of Vero Parent, pursuant to which, simultaneously with the execution of the Agreement, we acquired all of the outstanding capital stock of Double-Take for a purchase price of $65,250,000, which was paid $59,750,000 in cash and $5,500,000 by the delivery of 332,326 shares of the Company’s common stock. Of the $59.8 million of cash consideration, $39.2 million was drawn from our credit facility with Silicon Valley Bank.
We are in the process of gathering information to complete our preliminary valuation of certain assets and liabilities acquired as part of the transaction to complete acquisition accounting.
Available Information
We file reports with the Securities and Exchange Commission (SEC), including annual reports on Form 10-K, quarterly reports on Form 10-Q, current reports on Form 8-K, and other filings required by the SEC. We make available on our website (www.carbonite.com) our annual reports on Form 10-K, quarterly reports on Form 10-Q, current reports on Form 8-K, and all amendments to those reports as soon as reasonably practicable after such material is electronically filed with or furnished to the SEC. These materials are available free of charge on or through our website via the Investor Relations page at www.carbonite.com. References to our website address in this report are intended to be inactive textual references only, and none of the information contained on our website is part of this Annual Report or incorporated in this Annual Report by reference.
The public may read and copy any materials that we file with the SEC at the SEC’s Public Reference Room at 100 F Street, NE, Washington, DC 20549. The public may obtain information on the operation of the Public Reference Room by calling the SEC at 1-800-SEC-0330. The SEC maintains an internet site (www.sec.gov) that contains reports, proxy and information statements, and other information regarding issuers that file electronically with the SEC.
An investment in our common stock involves a high degree of risk. You should carefully consider the risks described below and the other information in this Annual Report before making an investment decision. Our business, prospects, financial condition, or operating results could be harmed by any of these risks, as well as other risks not currently known to us or that we currently consider immaterial. The trading price of our common stock could decline due to any of these risks, and, as a result, you may lose all or part of your investment.
Risks Related to Our Business
We have experienced periods of losses and negative cash flow since our inception, and we may not be able to sustain profitability or positive cash flow in the future.
We experienced net losses of $9.4 million for 2014, $21.6 million for 2015, and $4.1 million for 2016 and we have an accumulated deficit of approximately $165.0 million as of December 31, 2016. While we have experienced revenue growth over these same periods, we may not be able to achieve profitability in the future or on a consistent basis. In an effort to increase and service our customer base, we expect to continue making significant expenditures to develop and expand our business, including for customer acquisition, advertising, technology infrastructure, storage capacity, product development, and international expansion. We also expect that our results may fluctuate due to a variety of factors described elsewhere in this Annual Report, including the timing and amount of our advertising expenditures, the timing and amount of expenditures related to the development of technologies and solutions, and to defend intellectual property infringement and other claims. We may also incur increased losses and negative cash flow in the future for a variety of reasons, and we may encounter unforeseen expenses, difficulties, complications, delays, and other unknown events.
The market for cloud solutions is competitive, and if we do not compete effectively, our operating results could be harmed.
We compete with cloud backup providers and providers of traditional hardware-based backup systems. Many of our actual and potential competitors benefit from competitive advantages over us, such as greater name recognition, longer operating histories, more varied services, and larger marketing budgets, as well as greater financial, technical, and other resources. In addition, many of our competitors have established marketing relationships and major distribution agreements with computer manufacturers, internet service providers, and resellers, giving them access to larger customer bases. Some of our competitors may make acquisitions or enter into strategic relationships to offer a more comprehensive service than we do. These combinations may make it more difficult for us to compete effectively. We expect these trends to continue as competitors attempt to strengthen or maintain their market positions.
Demand for our cloud and hybrid backup solutions is sensitive to price. Many factors, including our customer acquisition, advertising and technology costs, and our current and future competitors’ pricing and marketing strategies, can significantly affect our pricing strategies. Certain of our competitors offer, or may in the future offer, lower-priced or free solutions or services that compete with our solutions. Similarly, certain competitors may use internet-based marketing strategies that enable them to acquire customers at a lower cost than us. There can be no assurance that we will not be forced to engage in price-
cutting initiatives, or to increase our advertising and other expenses to attract and retain customers in response to competitive pressures, either of which could have a material adverse effect on our revenue and operating results.
Over the long term, we intend to invest in research and development activities, and these investments may achieve delayed, or lower than expected benefits, which could harm our operating results.
While we intend to focus on managing our costs and expenses, over the long term, we also intend to invest in research and development activities as we focus on organic growth through internal innovation. We are likely to recognize the costs associated with these investments earlier than some of the anticipated benefits, and the return on these investments may be lower, or may develop more slowly, than we expect. If we do not achieve the benefits anticipated from these investments, or if the achievement of these benefits is delayed, our operating results may be adversely affected.
We have in the past incurred, and will continue to incur, significant research and development expenses as we strive to remain competitive. New product development and market introduction involves a significant commitment of time and resources and is subject to a number of risks and challenges including:
|
|
•
|
the difficulty in forecasting customer preferences or demand accurately;
|
|
|
•
|
the inability to expand solution capacity to meet demand for new solutions;
|
|
|
•
|
the inability to successfully manage the transition from older solutions;
|
|
|
•
|
the impact of customers’ demand for new solutions, thereby causing a decline in sales of existing solutions and an excessive, obsolete supply of inventory;
|
|
|
•
|
delays in initial shipments of new solutions;
|
|
|
•
|
adapting to emerging and evolving industry standards and to technological developments by our competitors and customers;
|
|
|
•
|
entering into new or unproven markets with which we have limited experience
|
|
|
•
|
the response of competitors to the introductions of new solutions; and
|
|
|
•
|
the desire by customers to evaluate new solutions for extended periods of time.
|
Our failure to introduce new or enhanced solutions on a timely basis, keep pace with rapid industry, technological or market changes or effectively manage the transitions to new solutions or new technologies could have a material adverse effect on our business, results of operations and financial condition.
We may not be able to respond to rapid technological changes with new solutions, which could have a material adverse effect on our operating results.
The market in which we compete is characterized by rapid technological change and frequent new solution and service introductions. Our ability to attract new customers and increase revenue from existing customers will depend in large part on our ability to enhance and improve our existing solutions, introduce new features and solutions, and sell into new markets. We are in the process of addressing the challenges of dynamic and accelerating market trends, such as the changing PC market, the adoption of mobile devices, the increase in the use of virtualized environments and architectural shifts in the provision of security and storage solutions, all of which has made it more difficult for us to compete effectively and requires us to improve our solutions and service offerings. Customers may require features and capabilities that our current solutions do not have. Our failure to develop solutions that satisfy customer preferences in a timely and cost-effective manner may harm our ability to renew our subscriptions with existing customers and to create or increase demand for our solutions, and may adversely impact our operating results.
Additionally, the process of developing new technology is complex and uncertain, and if we fail to accurately predict customers’ changing needs and emerging technological trends or if we fail to achieve the benefits expected from our investments, our business could be harmed. We believe that we must continue to dedicate a significant amount of resources to our research and development efforts to maintain our competitive position and we must commit significant resources to
developing new solutions before knowing whether our investments will result in solutions the market will accept. Our new solutions or solution enhancements could fail to attain sufficient market acceptance for many reasons, including:
|
|
•
|
delays in releasing our new solutions or enhancements to the market;
|
|
|
•
|
failure to accurately predict market demand or customer demands;
|
|
|
•
|
inability to protect against new types of attacks or techniques used by hackers;
|
|
|
•
|
defects, errors or failures in their design or performance;
|
|
|
•
|
negative publicity about their performance or effectiveness;
|
|
|
•
|
introduction or anticipated introduction of competing solutions by our competitors;
|
|
|
•
|
poor business conditions for our customers, causing them to delay IT purchases;
|
|
|
•
|
the perceived value of our solutions or enhancements relative to their cost;
|
|
|
•
|
easing of regulatory requirements around security or storage; and
|
|
|
•
|
reluctance of customers to purchase solutions incorporating open source software.
|
The introduction of new services by competitors or the development of entirely new technologies to replace existing offerings could make our solutions obsolete or adversely affect our business and operating results. In addition, any new markets or countries into which we attempt to sell our solutions may not be receptive. We may experience difficulties with software development, design, or marketing that could delay or prevent our development, introduction, or implementation of new solutions and enhancements. We have in the past experienced delays in the planned release dates of new features and upgrades, and have discovered defects in new solutions after their introduction. There can be no assurance that new solutions or upgrades will be released according to schedule, or that when released they will not contain defects. Either of these situations could result in adverse publicity, loss of revenue, delay in market acceptance, or claims by customers brought against us, all of which could have a material adverse effect on our reputation, business, operating results, and financial condition. Moreover, upgrades and enhancements to our solutions may require substantial investment and we have no assurance that such investments will be successful.
A decline in demand for our solutions or for cloud solutions in general could cause our revenue to decline.
We derive, and expect to continue to derive, substantially all of our revenue from the sale of data protection solutions including our backup and restore, DRaaS and email archiving offerings. Our introduction of "hybrid" solutions (cloud and on-premise) provides a broader offering for customers who may not want cloud only solutions, but the market for cloud solutions remains dynamic and subject to rapidly changing customer demands and trends in preferences. Some of the potential factors that could affect interest in and demand for cloud solutions include:
|
|
•
|
awareness of our brand and the cloud and hybrid backup solutions category generally;
|
|
|
•
|
the appeal and reliability of our solutions;
|
|
|
•
|
the price, performance, features, and availability of competing solutions and services;
|
|
|
•
|
public concern regarding privacy and data security;
|
|
|
•
|
our ability to maintain high levels of customer satisfaction; and
|
|
|
•
|
the rate of growth in cloud solutions generally.
|
In addition, substantially all of our revenue is currently derived from customers in the U.S. Consequently, a decrease of interest in and demand for cloud backup solutions in the U.S. could have a disproportionately greater impact on us than if our geographic mix of revenue was less concentrated.
If we are unable to attract new customers to our solutions on a cost-effective basis, our revenue and operating results would be adversely affected.
We generate the majority of our revenue from the sale of subscriptions to our solutions. In order to grow, we must continue to attract a large number of customers, many of whom may have not previously used cloud backup solutions. We use and periodically adjust a diverse mix of advertising and marketing programs to promote our solutions. Significant increases in the pricing of one or more of our advertising channels would increase our advertising costs or cause us to choose less expensive and perhaps less effective channels. As we add to or change the mix of our advertising and marketing strategies, we may expand into channels with significantly higher costs than our current programs, which could adversely affect our operating results. We may incur advertising and marketing expenses significantly in advance of the time we anticipate recognizing any revenue generated by such expenses, and we may only at a later date, or never, experience an increase in revenue or brand awareness as a result of such expenditures. Additionally, because we recognize revenue from customers over the terms of their subscriptions, a large portion of our revenue for each quarter reflects deferred revenue from subscriptions entered into during previous quarters, and downturns or upturns in subscription sales or renewals may not be reflected in our operating results until later periods. We have made in the past, and may make in the future, significant investments to test new advertising, and there can be no assurance that any such investments will lead to the cost-effective acquisition of additional customers. If we are unable to maintain effective advertising programs, our ability to attract new customers could be adversely affected, our advertising and marketing expenses could increase substantially, and our operating results may suffer.
A portion of our potential customers locate our website through search engines, such as Google, Bing, and Yahoo!. Our ability to maintain the number of visitors directed to our website is not entirely within our control. If search engine companies modify their search algorithms in a manner that reduces the prominence of our listing, or if our competitors’ search engine optimization efforts are more successful than ours, fewer potential customers may click through to our website. In addition, the cost of purchased listings has increased in the past and may increase in the future. A decrease in website traffic or an increase in search costs could adversely affect our customer acquisition efforts and our operating results.
A significant portion of our customers first try our solutions through free trials. We seek to convert these free trial users to paying customers of our solutions. If our rate of conversion suffers for any reason, our revenue may decline and our business may suffer.
If we are unable to retain our existing customers, our business, financial condition and operating results would be adversely affected.
If our efforts to satisfy our existing customers are not successful, we may not be able to retain them, and as a result, our revenue and ability to grow would be adversely affected. We may not be able to accurately predict future trends in customer renewals. Customers choose not to renew their subscriptions for many reasons, including if customer service issues are not satisfactorily resolved, a desire to reduce discretionary spending, or a perception that they do not use the service sufficiently, that the solution is a poor value, or that competitive services provide a better value or experience. If our retention rate decreases, we may need to increase the rate at which we add new customers in order to maintain and grow our revenue, which may require us to incur significantly higher advertising and marketing expenses than we currently anticipate, or our revenue may decline. A significant decrease in our retention rate would therefore have an adverse effect on our business, financial condition, and operating results.
Our relationships with our partners and distributors may be terminated or may not continue to be beneficial in generating new customers, which could adversely affect our ability to increase our customer base.
We maintain a network of active partners and distributors, which refer customers to us through links on their websites or outbound promotion to their customers. The number of customers that we are able to add through these relationships is dependent on the marketing efforts of our partners and distributors, over which we have little control. If we are unable to maintain our relationships, or renew contracts on favorable terms, with existing partners and distributors or establish new contractual relationships with potential partners and distributors, we may experience delays and increased costs in adding customers, which could have a material adverse effect on us.
If we are unable to expand our base of small and medium business customers, our future growth and operating results could be adversely affected.
We have committed and continue to commit substantial resources to the expansion and increased marketing of our small and medium business solutions. If we are unable to market and sell our solutions to small and medium businesses with competitive pricing and in a cost-effective manner, our ability to grow our revenue and achieve profitability may be harmed.
We believe that it is more difficult and expensive to attract and retain small and medium business customers than individual consumers, because small and medium businesses:
|
|
•
|
may require more expensive, targeted sales campaigns;
|
|
|
•
|
may have different or much more complex needs than those of individual consumers, such as archiving, version control, enhanced security requirements, and other forms of encryption and authentication, which our solutions may not adequately address; and
|
|
|
•
|
may cease operations due to the sale or failure of their business.
|
In addition, small and medium businesses frequently have limited budgets and are more likely to be significantly affected by economic downturns than larger, more established companies. As a result, they may choose to spend funds on items other than our solutions, particularly during difficult economic times. If we are unsuccessful in meeting the needs of potential small and medium business customers, it could adversely affect our future growth and operating results.
If we are unable to sustain market recognition of and loyalty to our brand, or if our reputation were to be harmed, we could lose customers or fail to increase the number of our customers, which could harm our business, financial condition and operating results.
Given our small and medium business and individual consumer market focus, maintaining and enhancing the Carbonite brand is critical to our success. We believe that the importance of brand recognition and loyalty will increase in light of increasing competition in our markets. We plan to continue investing substantial resources to promote our brand, both domestically and internationally, but there is no guarantee that our brand development strategies will enhance the recognition of our brand. Some of our existing and potential competitors have well-established brands with greater recognition than we have. If our efforts to promote and maintain our brand are not successful, our operating results and our ability to attract and retain customers may be adversely affected. In addition, even if our brand recognition and loyalty increases, this may not result in increased use of our solutions or higher revenue.
Our solutions, as well as those of our competitors, are regularly reviewed in computer and business publications. Negative reviews, or reviews in which our competitors’ solutions and services are rated more highly than our solutions, could negatively affect our brand and reputation. From time-to-time, our customers express dissatisfaction with our solutions, including, among other things, dissatisfaction with our customer support, our billing policies, and the way our solutions operate. If we do not handle customer complaints effectively, our brand and reputation may suffer, we may lose our customers’ confidence, and they may choose not to renew their subscriptions. In addition, many of our customers participate in online blogs about computers and internet services, including our solutions, and our success depends in part on our ability to generate positive customer feedback through such online channels where consumers seek and share information. If actions that we take or changes that we make to our solutions upset these customers, their blogging could negatively affect our brand and reputation. Complaints or negative publicity about our solutions or billing practices could adversely impact our ability to attract and retain customers and our business, financial condition, and operating results.
The termination of our relationship with any major credit card company would have a severe, negative impact on our ability to collect revenue from customers. Increases in credit card processing fees would increase our operating expenses and adversely affect our operating results.
The majority of our customers purchase our solutions online with credit cards, and our business depends upon our ability to offer credit card payment options. The termination of our ability to process payments on any major credit card would significantly impair our ability to operate our business and significantly increase our administrative costs related to customer payment processing. If we fail to maintain our compliance with the applicable data protection and documentation standards adopted by the major credit card issuers, these issuers could terminate their agreements with us, and we could lose our ability to offer our customers a credit card payment option. If these issuers increase their credit card processing fees because we experience excessive chargebacks or refunds or for other reasons, it could adversely affect our business and operating results.
Any significant disruption in service on our websites, in our computer systems, or caused by our third party storage and system providers could damage our reputation and result in a loss of customers, which would harm our business, financial condition, and operating results.
Our brand, reputation, and ability to attract, retain and serve our customers are dependent upon the reliable performance of our websites, network infrastructure and payment systems, and our customers’ ability to readily access their stored files. We
have experienced interruptions in these systems in the past, including server failures that temporarily slowed down our websites’ performance and our customers’ ability to access their stored files, or made our websites and infrastructure inaccessible, and we may experience interruptions in the future.
In addition, while we operate and maintain elements of our websites and network infrastructure, some elements of this complex system are operated by third parties that we do not control and that would require significant time to replace. We expect this dependence on third parties to increase. In particular, we utilize Amazon Web Services and Google Cloud Storage to provide computing and storage capacity pursuant to agreements that continue until terminated upon written notice by either party. All of these third-party systems are located in data center facilities operated by third parties. Our data center leases expire at various times in 2017 and 2021 with rights of extension. If we are unable to renew these agreements on commercially reasonable terms, we may be required to transfer that portion of our computing and storage capacity to new data center facilities, and we may incur significant costs and possible service interruption in connection with doing so.
We also rely upon third party colocation providers to host our main servers. If these providers are unable to handle current or higher volumes of use, experience any interruption in operations or cease operations for any reason or if we are unable to agree on satisfactory terms for continued hosting relationships, we would be forced to enter into a relationship with other service providers or assume hosting responsibilities ourselves. If we are forced to switch data center facilities, we may not be successful in finding an alternative service provider on acceptable terms or in hosting the computer servers ourselves. We may also be limited in our remedies against these providers in the event of a failure of service.
Interruptions in our own systems, the third-party systems and facilities on which we rely, or the use of our data center facilities, whether due to system failures, computer viruses, physical or electronic break-ins, damage or interruption from human error, power losses, natural disasters or terrorist attacks, hardware failures, systems failures, telecommunications failures or other factors, could affect the security or availability of our websites and infrastructure, prevent us from being able to continuously back up our customers’ data or our customers from accessing their stored data, and may damage our customers’ stored files. Any financial difficulties, such as bankruptcy, faced by our third-party data center operators, our third-party colocation providers or any of the service providers with whom we or they contract may have negative effects on our business, the nature and extent of which are difficult to predict. Moreover, if our third-party data center providers or our third-party colocation providers are unable to keep up with our growing needs for capacity, this could have an adverse effect on our business. Interruptions in our services might reduce our revenue, cause us to issue credits or refunds to customers, subject us to potential liability, or harm our renewal rates.
In addition, prolonged delays or unforeseen difficulties in connection with adding storage capacity or upgrading our network architecture when required may cause our service quality to suffer. Problems with the reliability or security of our systems could harm our reputation. Damage to our reputation and the cost of remedying these problems could negatively affect our business, financial condition, and operating results.
Our proprietary systems provide redundancy at the disk level, and geospatially for vault based storage, to protect copies of stored customer files. We rely on the fact that our customers maintain the primary instance of their files. We only offer higher redundancy backup sites for our vault based solutions. As such, a total failure of our systems, or the failure of any of our systems, could result in the loss of or a temporary inability to back up our customers’ data and result in our customers being unable to access their stored files. If one of our data centers fails at the same time that our customers’ computers fail, we would be unable to provide stored copies of their data. If this were to occur, our reputation could be compromised and we could be subject to liability to the customers that were affected.
Our ability to provide services to our customers depends on our customers’ continued high-speed access to the internet and the continued reliability of the internet infrastructure.
Our business depends on our customers’ continued high-speed access to the internet, as well as the continued maintenance and development of the internet infrastructure. The future delivery of our solutions will depend on third-party internet service providers to expand high-speed internet access, to maintain a reliable network with the necessary speed, data capacity and security, and to develop complementary solutions and services, including high-speed modems, for providing reliable and timely internet access and services. All of these factors are out of our control. To the extent that the internet continues to experience an increased number of users, frequency of use, or bandwidth requirements, the internet may become congested and be unable to support the demands placed on it, and its performance or reliability may decline. Any internet outages or delays could adversely affect our ability to provide services to our customers.
If the security of our customers’ confidential information stored in our systems is breached or their stored files are otherwise subjected to unauthorized access, our reputation and business may be harmed, and we may be exposed to liability.
Our customers rely on our solutions to store digital copies of their files, including financial records, business information, photos, and other personally meaningful content. We also store credit card information and other personal information about our customers. An actual or perceived breach of our network security and systems or other events that cause the loss or public disclosure of, or access by third parties to, our customers’ stored files could have serious negative consequences for our business, including possible fines, penalties and damages, reduced demand for our solutions, an unwillingness of customers to provide us with their credit card or payment information, an unwillingness of our customers to use our solutions, harm to our reputation and brand, loss of our ability to accept and process customer credit card orders, and time-consuming and expensive litigation. If this occurs, our business and operating results could be adversely affected. Third parties may be able to circumvent our security by deploying viruses, worms, and other malicious software programs that are designed to attack or attempt to infiltrate our systems and networks and we may not immediately discover these attacks or attempted infiltrations. Further, outside parties may attempt to fraudulently induce our employees, consultants, or affiliates to disclose sensitive information in order to gain access to our information or our customers’ information. The techniques used to obtain unauthorized access, disable or degrade service, or sabotage systems change frequently, often are not recognized until launched against a target, and may originate from less regulated or remote areas around the world. As a result, we may be unable to proactively address these techniques or to implement adequate preventative or reactionary measures. In addition, employee or consultant error, malfeasance, or other errors in the storage, use, or transmission of personal information could result in a breach of customer or employee privacy. We maintain insurance coverage to mitigate the potential financial impact of these risks; however, our insurance may not cover all such events or may be insufficient to compensate us for the potentially significant losses, including the potential damage to the future growth of our business, that may result from the breach of customer or employee privacy.
Many states have enacted laws requiring companies to notify consumers of data security breaches involving their personal data. These mandatory disclosures regarding a security breach often lead to widespread negative publicity, which may cause our customers to lose confidence in the effectiveness of our data security measures. Any security breach, whether successful or not, would harm our reputation and could cause the loss of customers. Similarly, if a well-publicized breach of data security at any other cloud backup service provider or other major consumer website were to occur, there could be a general public loss of confidence in the use of the internet for cloud backup services or commercial transactions generally. Any of these events could have material adverse effects on our business, financial condition, and operating results.
We are subject to governmental regulation and other legal obligations related to privacy, and our actual or perceived failure to comply with such obligations could harm our business.
We receive, store, and process personal information and other customer data. Personal privacy has become a significant issue in the United States and in many other countries where we offer our solutions. The regulatory framework for privacy issues worldwide is currently complex and evolving, and it is likely to remain uncertain for the foreseeable future. There are numerous federal, state, local, and foreign laws regarding privacy and the storing, sharing, use, processing, disclosure and protection of personal information and other customer data, the scope of which are changing, subject to differing interpretations, and may be inconsistent among countries or conflict with other rules. We generally seek to comply with industry standards and are subject to the terms of our privacy policies and privacy-related obligations to third parties. We strive to comply with all applicable laws, policies, legal obligations, and industry codes of conduct relating to privacy and data protection to the extent possible. However, it is possible that these obligations may be interpreted and applied in a manner that is inconsistent from one jurisdiction to another and may conflict with other rules or our practices. Any failure or perceived failure by us to comply with our privacy policies, our privacy-related obligations to customers or other third parties, our privacy-related legal obligations, or any compromise of security that results in the unauthorized release or transfer of personally identifiable information or other customer data, may result in governmental enforcement actions, litigation, or public statements against us by consumer advocacy groups or others and could cause our customers to lose trust in us, which could have an adverse effect on our reputation and business. Our customers may also accidentally disclose their passwords or store them on a mobile device that is lost or stolen, creating the perception that our systems are not secure against third-party access. Additionally, if third parties that we work with, such as vendors or developers, violate applicable laws or our policies, such violations may also put our customers’ information at risk and could in turn have an adverse effect on our business. Any significant change to applicable laws, regulations, or industry practices regarding the use or disclosure of our customers’ data, or regarding the manner in which the express or implied consent of customers for the use and disclosure of such data is obtained, could require us to modify our solutions and features, possibly in a material manner, and may limit our ability to develop new services and features that make use of the data that our customers voluntarily share with us.
Our solutions are used by customers in the health care industry and we must comply with numerous federal and state laws related to patient privacy in connection with providing our solutions to these customers.
Our solutions are used by customers in the health care industry and we must comply with numerous federal and state laws related to patient privacy in connection with providing our solutions to these customers. In particular, the Health Insurance
Portability and Accountability Act of 1996, or HIPAA, and the Health Information Technology for Economic and Clinical Health Act, or HITECH, include privacy standards that protect individual privacy by limiting the uses and disclosures of individually identifiable health information and implementing data security standards. Because our solutions may backup individually identifiable health information for our customers, our customers are mandated by HIPAA to enter into written agreements with us known as business associate agreements that require us to safeguard individually identifiable health information. Business associate agreements typically include:
|
|
•
|
a description of our permitted uses of individually identifiable health information;
|
|
|
•
|
a covenant not to disclose that information except as permitted under the agreement and to make our subcontractors, if any, subject to the same restrictions;
|
|
|
•
|
assurances that appropriate administrative, physical, and technical safeguards are in place to prevent misuse of that information;
|
|
|
•
|
an obligation to report to our customers any use or disclosure of that information other than as provided for in the agreement;
|
|
|
•
|
a prohibition against our use or disclosure of that information if a similar use or disclosure by our customers would violate the HIPAA standards;
|
|
|
•
|
the ability of our customers to terminate their subscription to our solution if we breach a material term of the business associate agreement and are unable to cure the breach;
|
|
|
•
|
the requirement to return or destroy all individually identifiable health information at the end of the customer’s subscription; and
|
|
|
•
|
access by the Department of Health and Human Services to our internal practices, books, and records to validate that we are safeguarding individually identifiable health information.
|
We may not be able to adequately address the business risks created by HIPAA or HITECH implementation or comply with our obligations under our business associate agreements. Furthermore, we are unable to predict what changes to HIPAA, HITECH or other laws or regulations might be made in the future or how those changes could affect our business or the costs of compliance. Failure by us to comply with any of the federal and state standards regarding patient privacy may subject us to penalties, including civil monetary penalties and, in some circumstances, criminal penalties, which could have an adverse effect on our business, financial condition, and operating results.
Our solutions operate in a wide variety of environments, systems, applications and configurations, which could result in errors or solution failures.
Because we offer solutions that solve a complex business need, undetected errors, failures, or bugs may occur, especially when solutions are first introduced or when new versions are released. Our solutions are often installed and used in large-scale computing environments with different operating systems, system management software, and equipment and networking configurations, which may cause errors or failures in our solutions or may expose undetected errors, failures, or bugs in our solutions. Our customers’ computing environments are often characterized by a wide variety of standard and non-standard configurations that make pre-release testing for programming or compatibility errors very difficult and time-consuming. In addition, despite testing by us and others, errors, failures, or bugs may not be found in new solutions or releases until after distribution. In the past, we have discovered software errors, failures, and bugs in certain of our solution offerings after their introduction and, in some cases, have experienced delayed or lost revenues as a result of these errors.
Errors, failures, or bugs in solutions released by us could result in negative publicity, damage to our brand, returns, loss of or delay in market acceptance of our solutions, loss of competitive position, or claims by customers or others. Many of our end-user customers use our solutions in applications that are critical to their businesses and may have a greater sensitivity to defects in our solutions than to defects in other, less critical, software solutions. In addition, if an actual or perceived breach of information integrity or availability occurs in one of our end-user customer’s systems, regardless of whether the breach is attributable to our solutions, the market perception of the effectiveness of our solutions could be harmed. Alleviating any of these problems could require significant expenditures of our capital and other resources and could cause interruptions, delays, or cessation of our solution licensing, which could cause us to lose existing or potential customers and could adversely affect our operating results.
Our operating results have fluctuated in the past and may continue to do so in the future. As a result, we may fail to meet or exceed the expectations of securities analysts or investors, which could cause our stock price to decline.
Our quarterly and annual operating results may fluctuate as a result of a variety of factors, many of which are outside of our control. If our quarterly or annual operating results or guidance fall below the expectations of securities analysts or investors, the price of our common stock could decline substantially. The following factors, among others, could cause fluctuations in our quarterly or annual operating results or guidance:
|
|
•
|
our ability to attract new customers and retain existing customers;
|
|
|
•
|
our ability to accurately forecast revenue and appropriately plan our expenses;
|
|
|
•
|
our ability to introduce new solutions;
|
|
|
•
|
the actions of our competitors, including pricing changes or the introduction of new solutions;
|
|
|
•
|
our ability to effectively manage our growth;
|
|
|
•
|
the mix of annual and multi-year subscriptions at any given time;
|
|
|
•
|
seasonal variations or other cyclicality in the demand for our solutions, including the purchasing and budgeting cycles of our small and medium business customers;
|
|
|
•
|
the timing and cost of advertising and marketing efforts;
|
|
|
•
|
the timing and cost of developing or acquiring technologies, services, or businesses;
|
|
|
•
|
the timing, operating cost, and capital expenditures related to the operation, maintenance, and expansion of our business;
|
|
|
•
|
service outages or security breaches and any related impact on our reputation;
|
|
|
•
|
our ability to successfully manage any future acquisitions of businesses, solutions, or technologies;
|
|
|
•
|
the impact of worldwide economic, industry, and market conditions and those conditions specific to internet usage and online businesses;
|
|
|
•
|
costs associated with defending intellectual property infringement and other claims; and
|
|
|
•
|
changes in government regulation affecting our business.
|
We believe that our quarterly and annual operating results may vary significantly in the future and that period-to-period comparisons of our operating results may not be meaningful. You should not rely on the results of one period as an indication of future performance.
If we fail to maintain proper and effective internal controls, our ability to produce accurate and timely financial statements could be impaired, which could harm our operating results, our ability to operate our business, and our investors views of us.
Ensuring that we have adequate internal financial and accounting controls and procedures in place so that we can produce accurate financial statements on a timely basis is a costly and time-consuming effort that needs to be evaluated frequently. As part of our process of documenting and testing our internal control over financial reporting, we may identify areas for further attention and improvement. Implementing any appropriate changes to our internal controls may distract our officers and employees, entail substantial costs to modify our existing processes, and take significant time to complete. These changes may not, however, be effective in maintaining the adequacy of our internal controls, and any failure to maintain that adequacy, or consequent inability to produce accurate financial statements on a timely basis, could increase our operating costs and harm our business. In addition, investors' perceptions that our internal controls are inadequate or that we are unable to produce accurate financial statements on a timely basis may harm our stock price and make it more difficult for us to effectively market and sell our solutions to new and existing customers.
We do not expect that disclosure controls or internal controls over financial reporting will prevent all errors and all fraud. A control system, no matter how well designed and operated, can provide only reasonable, not absolute, assurance that the control system’s objectives will be met. Further, the design of a control system must reflect the fact that there are resource constraints and the benefits of controls must be considered relative to their costs. Because of the inherent limitations in all control systems, no evaluation of controls can provide absolute assurance that all control issues and instances of fraud, if any, have been detected. Failure of our control systems to prevent error or fraud could materially and adversely impact our operating results, our ability to operate our business, and our investors’ views of us.
If our estimates or judgments relating to our critical accounting policies are based on assumptions that change or prove to be incorrect, our operating results could fall below expectations of securities analysts and investors, resulting in a decline in our stock price.
The preparation of financial statements in conformity with generally accepted accounting principles in the U.S. ("GAAP") requires management to make estimates and assumptions that affect the amounts reported in the consolidated financial statements and accompanying notes. We base our estimates on historical experience and on various other assumptions that we believe to be reasonable under the circumstances, the results of which form the basis for making judgments about the carrying values of assets and liabilities that are not readily apparent from other sources. Significant assumptions and estimates used in preparing our consolidated financial statements include those related to revenue recognition, stock-based compensation, valuation of inventory and accounting for income taxes. Our operating results may be adversely affected if our assumptions change or if actual circumstances differ from those in our assumptions, which could cause our operating results to fall below the expectations of securities analysts and investors, resulting in a decline in our stock price.
Changes in financial accounting standards or practices may cause adverse, unexpected financial reporting fluctuations and affect our reported results of operations.
Changes in financial accounting standards or practices can have a significant effect on our reported results and may even affect our reporting of transactions completed before the change is effective. New accounting pronouncements and varying interpretations of accounting pronouncements have occurred and may occur in the future. Changes to existing rules or the questioning of current practices may adversely affect our reported results of operations.
Growth may place significant demands on our management and our infrastructure.
We have experienced substantial growth in our business. This growth has placed and may continue to place significant demands on our management and our operational and financial infrastructure. As our operations grow in size, scope, and complexity, we will need to improve and upgrade our systems and infrastructure to attract, service and retain an increasing number of customers. The expansion of our systems and infrastructure will require us to commit substantial financial, operational, and technical resources in advance of an increase in the volume of business, with no assurance that the volume of business will increase. Any such additional capital investments will increase our cost base. Continued growth could also strain our ability to maintain reliable service levels for our customers, develop and improve our operational, financial, and management controls, enhance our reporting systems and procedures, and recruit, train, and retain highly skilled personnel. If we fail to achieve the necessary level of efficiency in our organization as we grow, our business, financial condition, and operating results could be harmed.
We may expand by continuing to acquire or invest in other companies, which may divert our management’s attention, result in additional dilution to our stockholders, and consume resources that are necessary to sustain our business.
We may in the future continue to acquire complementary solutions, services, technologies, or businesses. We may also enter into relationships with other businesses to expand our portfolio of solutions or our ability to provide our solutions in foreign jurisdictions, which could involve preferred or exclusive licenses, additional channels of distribution, discount pricing, or investments in other companies. We do not have substantial experience with integrating and managing acquired businesses or assets. Negotiating these transactions can be time-consuming, difficult and expensive, and our ability to complete these transactions may often be subject to conditions or approvals that are beyond our control. Consequently, these transactions, even if undertaken and announced, may not close.
Acquisitions may also disrupt our business, divert our resources, and require significant management attention that would otherwise be available for the development of our business. Moreover, the anticipated benefits of any acquisition, investment, or business relationship may not be realized or we may be exposed to unknown liabilities, including litigation against the companies that we may acquire. In connection with any such transaction, we may:
|
|
•
|
issue additional equity securities that would dilute our stockholders;
|
|
|
•
|
use cash that we may need in the future to operate our business;
|
|
|
•
|
incur debt on terms unfavorable to us, that we are unable to repay, or that may place burdensome restrictions on our operations;
|
|
|
•
|
incur large charges or substantial liabilities; or
|
|
|
•
|
become subject to adverse tax consequences or substantial depreciation, deferred compensation, or other acquisition-related accounting charges.
|
Any of these risks could harm our business and operating results.
Integration of an acquired company’s operations may present challenges.
The integration of an acquired company requires, among other things, coordination of administrative, sales and marketing, accounting and finance functions, and expansion of information and management systems. Integration may prove to be difficult due to the necessity of coordinating geographically separate organizations and integrating personnel with disparate business backgrounds and accustomed to different corporate cultures. We may not be able to retain key employees of an acquired company. Additionally, the process of integrating a new solution or service may require a disproportionate amount of time and attention of our management and financial and other resources. Any difficulties or problems encountered in the integration of a new solution or service could have a material adverse effect on our business.
We intend to continue to acquire businesses which we believe will help achieve our business objectives. As a result, our operating costs will likely continue to grow. The integration of an acquired company may cost more than we anticipate, and it is possible that we will incur significant additional unforeseen costs in connection with such integration, which may negatively impact our earnings.
In addition, we may only be able to conduct limited due diligence on an acquired company’s operations. Following an acquisition, we may be subject to liabilities arising from an acquired company’s past or present operations, including liabilities related to data security, encryption and privacy of customer data, and these liabilities may be greater than the warranty and indemnity limitations that we negotiate. Any liability that is greater than these warranty and indemnity limitations could have a negative impact on our financial condition.
Even if successfully integrated, there can be no assurance that our operating performance after an acquisition will be successful or will fulfill management’s objectives.
We may be unsuccessful in managing or expanding our operations, which could adversely affect our business and operating results.
We have office locations throughout the United States and in various international locations, including Germany, the Netherlands, Canada and Switzerland. If we are unable to effectively manage a large and geographically dispersed group of employees or to anticipate our future growth and personnel needs, our business may be adversely affected. As we expand our business, we add complexity to our organization and must expand and adapt our operational infrastructure and effectively coordinate throughout our organization. As a result, we have incurred and expect to continue to incur additional expense related to our continued growth. Failure to manage any future growth effectively could result in increased costs, negatively impact our customers’ satisfaction with our solutions, and harm our operating results.
The loss of one or more of our key personnel, or our failure to attract, integrate, and retain other highly qualified personnel, could harm our business and growth prospects.
We depend on the continued service and performance of our key personnel. We do not have long-term employment agreements with any of our officers or key employees. In addition, many of our key technologies and systems are custom-made for our business by our personnel. The loss of key personnel, including key members of our management team, as well as certain of our key marketing, sales, products development, or technology personnel, could disrupt our operations and have an adverse effect on our ability to grow our business. In addition, several of our key personnel have only recently been employed by us, and we are still in the process of integrating these personnel into our operations. Our failure to successfully integrate these key employees into our business could adversely affect our business.
To execute our growth plan, we must attract and retain highly qualified personnel. Competition for these employees is intense, and we may not be successful in attracting and retaining qualified personnel. We have from time to time in the past experienced, and we expect to continue to experience, difficulty in hiring and retaining highly skilled employees with appropriate qualifications. New hires require significant training and, in most cases, take significant time before they achieve full productivity. Our recent hires and planned hires may not become as productive as we expect, and we may be unable to hire or retain sufficient numbers of qualified individuals. Many of the companies with which we compete for experienced personnel have greater resources than we have. In addition, in making employment decisions, particularly in the internet and high-technology industries, job candidates often consider the value of the equity that they are to receive in connection with their employment. In addition, employees may be more likely to voluntarily exit the Company if the shares underlying their vested and unvested options, as well as unvested restricted stock units, have significantly depreciated in value resulting in the options they are holding being significantly above the market price of our common stock and the value of the restricted stock units decreasing. If we fail to attract new personnel, or fail to retain and motivate our current personnel, our business and growth prospects could be severely harmed.
Our corporate culture has contributed to our success, and if we cannot maintain this culture as we grow, we could lose the innovation, creativity and teamwork fostered by our culture, and our business may be harmed.
We believe that our corporate culture has been a key contributor to our success. If we do not continue to develop our corporate culture as we grow and evolve, including maintaining our culture of transparency with our employees, it could harm our ability to foster the innovation, creativity, and teamwork that we believe that we need to support our growth. As our organization grows and we are required to implement more complex organizational structures, we may find it increasingly difficult to maintain the beneficial aspects of our corporate culture, which could negatively impact our future success. In addition, the availability of a public market for our securities could create disparities of wealth among our employees, which could adversely impact relations among employees and our corporate culture in general.
Unanticipated changes in effective tax rates or adverse outcomes resulting from examination of our income or other tax returns could adversely affect our operating results and financial condition.
We are subject to income taxes in the United States and various foreign jurisdictions, and our domestic and international tax liabilities will be subject to the allocation of expenses in differing jurisdictions. Our future effective tax rates could be subject to volatility or adversely affected by a number of factors, including:
|
|
•
|
changes in the valuation of our deferred tax assets and liabilities;
|
|
|
•
|
expected timing and amount of the release of tax valuation allowances;
|
|
|
•
|
expiration of, or detrimental changes in, research and development tax credit laws;
|
|
|
•
|
tax effects of stock-based compensation;
|
|
|
•
|
costs related to intercompany restructurings;
|
|
|
•
|
changes in tax laws, regulations, accounting principles or interpretations thereof; or
|
|
|
•
|
future earnings being lower than anticipated in countries where we have lower statutory tax rates and higher than anticipated earnings in countries where we have higher statutory tax rates.
|
In addition, we may be subject to audits of our income and sales taxes by the Internal Revenue Service and other foreign and state tax authorities. Outcomes from these audits could have an adverse effect on our operating results and financial condition.
Our ability to use net operating losses to offset future taxable income may be subject to certain limitations.
As of December 31, 2016, we had federal, state, and foreign net operating loss carryforwards, or NOLs, of $105.9 million, $69.7 million, and $4.1 million, respectively, available to offset future taxable income, which expire in various years through 2033 if not utilized. A lack of future taxable income would adversely affect our ability to utilize these NOLs before they expire. Under the provisions of the Internal Revenue Code of 1986, as amended, or the Internal Revenue Code, substantial changes in our ownership may limit the amount of pre-change NOLs that can be utilized annually in the future to offset taxable income. Section 382 of the Internal Revenue Code, or Section 382, imposes limitations on a company’s ability to use NOLs if a
company experiences a more-than-50-percent ownership change over a three-year testing period. Based upon our analysis as of December 31, 2016, there was no ownership change experienced during 2016. If changes in our ownership occur in the future, our ability to use NOLs may be further limited. For these reasons, we may not be able to utilize a material portion of the NOLs, even if we achieve profitability. If we are limited in our ability to use our NOLs in future years in which we have taxable income, we will pay more taxes than if we were able to fully utilize our NOLs. This could adversely affect our operating results and the market price of our common stock.
We face many risks associated with our plans to expand internationally, which could harm our business, financial condition, and operating results.
We anticipate that our efforts to expand internationally will entail the marketing and advertising of our services and brand and the development of localized websites. We do not have substantial experience in selling our solutions in international markets or in conforming to the local cultures, standards, or policies necessary to successfully compete in those markets, and we must invest significant resources in order to do so. We may not succeed in these efforts or achieve our customer acquisition or other goals. For some international markets, customer preferences and buying behaviors may be different, and we may use business or pricing models that are different from our traditional subscription model to provide cloud backup and related services to customers. Our revenue from new foreign markets may not exceed the costs of establishing, marketing, and maintaining our international solutions, and therefore may not be profitable on a sustained basis, if at all.
In addition, conducting international operations subjects us to new risks that we have not generally faced in the U.S. These risks include:
|
|
•
|
localization of our solutions, including translation into foreign languages and adaptation for local practices and regulatory requirements;
|
|
|
•
|
lack of experience in other geographic markets;
|
|
|
•
|
strong local competitors;
|
|
|
•
|
cost and burden of complying with, lack of familiarity with, and unexpected changes in foreign legal and regulatory requirements, including consumer and data privacy laws;
|
|
|
•
|
difficulties in managing and staffing international operations;
|
|
|
•
|
fluctuations in currency exchange rates or restrictions on foreign currency;
|
|
|
•
|
potentially adverse tax consequences, including the complexities of transfer pricing, foreign value added or other tax systems, double taxation and restrictions, and/or taxes on the repatriation of earnings;
|
|
|
•
|
dependence on third parties, including channel partners with whom we do not have extensive experience;
|
|
|
•
|
compliance with the Foreign Corrupt Practices Act, economic sanction laws and regulations, export controls, and other U.S. laws and regulations regarding international business operations;
|
|
|
•
|
increased financial accounting and reporting burdens and complexities;
|
|
|
•
|
political, social, and economic instability abroad, terrorist attacks, and security concerns in general; and
|
|
|
•
|
reduced or varied protection for intellectual property rights in some countries.
|
Operating in international markets also requires significant management attention and financial resources. The investment and additional resources required to establish operations and manage growth in other countries may not produce desired levels of revenue or profitability.
Our software contains encryption technologies, certain types of which are subject to U.S. and foreign export control regulations and, in some foreign countries, restrictions on importation and/or use. Any failure on our part to comply with encryption or other applicable export control requirements could result in financial penalties or other sanctions under the U.S. export regulations, including restrictions on future export activities, which could harm our business and operating results.
Regulatory restrictions could impair our access to technologies that we seek for improving our solutions and may also limit or reduce the demand for our solutions outside of the U.S.
Risks Related to Intellectual Property
Assertions by a third party that our solutions infringe its intellectual property, whether or not correct, could subject us to costly and time-consuming litigation or expensive licenses.
There is frequent litigation in the software and technology industries based on allegations of infringement or other violations of intellectual property rights. Any such claims or litigation may be time-consuming and costly, divert management resources, require us to change our services, require us to credit or refund subscription fees, or have other adverse effects on our business. Many companies are devoting significant resources to obtaining patents that could affect many aspects of our business. Third parties may claim that our technologies or solutions infringe or otherwise violate their patents or other intellectual property rights. As we face increasing competition and become increasingly visible as a publicly-traded company, or if we become more successful, the possibility of new third-party claims may increase.
If we are forced to defend ourselves against intellectual property infringement claims, whether they have merit or are determined in our favor, we may face costly litigation, diversion of technical and management personnel, limitations on our ability to use our current websites and technologies, and an inability to market or provide our solutions. As a result of any such claim, we may have to develop or acquire non-infringing technologies, pay damages, enter into royalty or licensing agreements, cease providing certain services, adjust our marketing and advertising activities, or take other actions to resolve the claims. These actions, if required, may be costly or unavailable on terms acceptable to us, or at all.
Furthermore, we have licensed proprietary technologies from third parties that we use in our technologies and business, and we cannot be certain that the owners’ rights in their technologies will not be challenged, invalidated, or circumvented. In addition to the general risks described above associated with intellectual property and other proprietary rights, we are subject to the additional risk that the seller of such technologies may not have appropriately created, maintained, or enforced their rights in such technology.
Our success depends in large part on our ability to protect and enforce our intellectual property rights. If we are not able to adequately protect our intellectual property and proprietary technologies to prevent use or appropriation by our competitors, the value of our brand and other intangible assets may be diminished, and our business may be adversely affected.
Our future success and competitive position depend in large part on our ability to protect our intellectual property and proprietary technologies. We rely on a combination of trademark, patent, copyright, and trade secret laws, as well as confidentiality procedures and contractual restrictions, to establish and protect our proprietary rights, all of which provide only limited protection and may not now or in the future provide us with a competitive advantage. Carbonite, the Carbonite Logo, ZAMANDA, MAILSTORE, and EVAULT as well as other marks, are registered trademarks of Carbonite, Inc. in numerous countries throughout the world. The Carbonite trademark is subject to registrations covering over 40 countries. Carbonite also has additional registrations and pending applications for additional marks in the U.S. and other countries. We cannot assure you that any future trademark registrations will be issued for pending or future applications or that any registered trademarks will be enforceable or provide adequate protection of our proprietary rights. We currently have
33
issued patents and
24
pending patent applications in the U.S. and internationally. We cannot assure you that any patents will issue from any such patent applications, that patents that issue from such applications will give us the protection that we seek, or that any such patents will not be challenged, invalidated, or circumvented. Any patents that may issue in the future from our pending or future patent applications may not provide sufficiently broad protection and may not be enforceable in actions against alleged infringers. To counter infringement or unauthorized use, we may be required to file patent infringement claims, which can be expensive and time-consuming to litigate. In addition, in an infringement proceeding, a court may decide that a patent of ours is not valid or is unenforceable, or may refuse to stop others from using the technology at issue on the grounds that our patent(s) do not cover such technology. An adverse determination of any litigation or defense proceedings could put one or more of our patents at risk of being invalidated or interpreted narrowly and could put our patent applications at risk of not being issued.
There can be no assurance that the steps that we take will be adequate to protect our technologies and intellectual property, that our trademark and patent applications will lead to registered trademarks or issued patents, that others will not develop or patent similar or superior technologies, solutions, or services, or that our trademarks, patents, and other intellectual property will not be challenged, invalidated, or circumvented by others. Furthermore, effective trademark, patent, copyright, and trade secret protection may not be available in every country in which our services are available or where we have employees or independent contractors. In addition, the legal standards relating to the validity, enforceability, and scope of protection of
intellectual property rights in internet-related industries are uncertain and still evolving. If our efforts to protect our technologies and intellectual property are inadequate, the value of our brand and other intangible assets may be diminished and competitors may be able to mimic our solutions and methods of operations. Any of these events could have a material adverse effect on our business, financial condition, and operating results.
Confidentiality agreements with employees and others may not adequately prevent disclosure of our trade secrets and proprietary information. Failure to protect our proprietary information could make it easier for third parties to compete with our solutions and harm our business.
We have devoted substantial resources to the development of our proprietary technologies and related processes. In order to protect our proprietary technologies and processes, we rely in part on trade secret laws and confidentiality agreements with our employees, licensees, independent contractors, and other advisors. These agreements may not effectively prevent disclosure of confidential information and may not provide an adequate remedy in the event of unauthorized disclosure of confidential information. In addition, others may independently discover our trade secrets, in which case we would not be able to assert trade secret rights, or develop similar technologies and processes. Further, laws in certain jurisdictions may afford little or no trade secret protection, and any changes in, or unexpected interpretations of, the intellectual property laws in any country in which we operate may compromise our ability to enforce our intellectual property rights. Costly and time-consuming litigation could be necessary to enforce and determine the scope of our proprietary rights, and failure or inability to obtain or maintain trade secret protection or otherwise protect our proprietary rights could adversely affect our business.
Our use of “open source” software could negatively affect our ability to sell our solutions and subject us to possible litigation.
A portion of the technologies licensed by us to our customers incorporates so-called “open source” software, and we may incorporate open source software in the future. Such open source software is generally licensed by its authors or other third parties under open source licenses. These licenses may subject us to certain unfavorable conditions, including requirements that we offer our solutions that incorporate the open source software for no cost, that we make publicly available source code for modifications or derivative works we create based upon, incorporating, or using the open source software, and/or that we license such modifications or derivative works under the terms of the particular open source license. Additionally, if a third-party software provider has incorporated open source software into software that we license from such provider, we could be required to disclose any of our source code that incorporates or is a modification of such licensed software. If an author or other third party that distributes open source software that we use or license were to allege that we had not complied with the conditions of the applicable license, we could be required to incur significant legal expenses defending against such allegations and could be subject to significant damages, enjoined from the sale of our solutions that contained the open source software, and required to comply with the foregoing conditions. Any of the foregoing could disrupt the distribution and sale of our solutions and harm our business.
We rely on third-party software to develop and provide our solutions, including server software and licenses from third parties to use patented intellectual property.
We rely on software licensed from third parties to develop and offer our solutions. In addition, we may need to obtain future licenses from third parties to use intellectual property associated with the development of our solutions, which might not be available to us on acceptable terms, or at all. Any loss of the right to use any software required for the development and maintenance of our solutions could result in delays in the provision of our solutions until equivalent technology is either developed by us, or, if available from others, is identified, obtained, and integrated, which delay could harm our business. Any errors or defects in third-party software could result in errors or a failure of our solutions, which could harm our business.
If we are unable to protect our domain names, our reputation, brand, customer base, and revenue, as well as our business and operating results, could be adversely affected.
We have registered domain names for websites, or URLs, that we use in our business, such as www.carbonite.com. If we are unable to maintain our rights in these domain names, our competitors or other third parties could capitalize on our brand recognition by using these domain names for their own benefit. In addition, although we own the Carbonite domain name under various global top level domains such as .com and .net, as well as under various country-specific domains, we might not be able to, or may choose not to, acquire or maintain other country-specific versions of the Carbonite domain name or other potentially similar URLs. Domain names similar to ours have already been registered in the U.S. and elsewhere, and our competitors or other third parties could capitalize on our brand recognition by using domain names similar to ours. The regulation of domain names in the U.S. and elsewhere is generally conducted by internet regulatory bodies and is subject to change. If we lose the ability to use a domain name in a particular country, we may be forced to either incur significant additional expenses to market
our solutions within that country, including the development of a new brand and the creation of new promotional materials, or elect not to sell our solutions in that country. Either result could substantially harm our business and operating results. Regulatory bodies could establish additional top-level domains, appoint additional domain name registrars, or modify the requirements for holding domain names. As a result, we may not be able to acquire or maintain the domain names that utilize the name Carbonite in all of the countries in which we currently conduct or intend to conduct business. Further, the relationship between regulations governing domain names and laws protecting trademarks and similar proprietary rights varies among jurisdictions and is unclear in some jurisdictions. We may be unable to prevent third parties from acquiring and using domain names that infringe, are similar to, or otherwise decrease the value of, our brand or our trademarks. Protecting and enforcing our rights in our domain names and determining the rights of others may require litigation, which could result in substantial costs, divert management attention, and not be decided favorably to us.
Material defects or errors in our software could harm our reputation, result in significant costs to us, and impair our ability to sell our solutions.
The software applications underlying our solutions are inherently complex and may contain material defects or errors, particularly when first introduced or when new versions or enhancements are released. We have from time to time found defects or errors in our solutions, and new defects or errors in our existing solutions may be detected in the future by us or our customers. The costs incurred in correcting such defects or errors may be substantial and could harm our operating results. In addition, we rely on hardware purchased or leased and software licensed from third parties to offer our solutions. Any defects in, or unavailability of, our or third-party software or hardware that cause interruptions to the availability of our solutions could, among other things:
|
|
•
|
cause a reduction in revenue or delay in market acceptance of our solutions;
|
|
|
•
|
require us to issue credits or refunds to our customers or expose us to claims for damages;
|
|
|
•
|
cause us to lose existing customers and make it more difficult to attract new customers;
|
|
|
•
|
divert our development resources or require us to make extensive changes to our solutions or software, which would increase our expenses;
|
|
|
•
|
increase our technical support costs; and
|
|
|
•
|
harm our reputation and brand.
|
Risks Related to Ownership of our Common Stock
Our stock price may be volatile due to fluctuations in our operating results and other factors, each of which could cause our stock price to decline and you may be unable to sell your shares at or above the price at which you purchased your stock.
Shares of our common stock were sold in our initial public offering in August 2011 at a price of $10.00 per share, and our common stock has subsequently traded as high as $21.10 and as low as $5.75. An active, liquid, and orderly market for our common stock may not be developed or sustained, which could depress the trading price of our common stock. The market price for shares of our common stock could be subject to significant fluctuations in response to various factors, some of which are beyond our control. Some of the factors that may cause the market price for shares of our common stock to fluctuate include:
|
|
•
|
price and volume fluctuations in the overall stock market from time to time;
|
|
|
•
|
fluctuations in our quarterly financial results or the quarterly financial results of companies perceived to be similar to us;
|
|
|
•
|
actual or anticipated fluctuations in our key operating metrics, financial condition, and operating results;
|
|
|
•
|
loss of existing customers or inability to attract new customers;
|
|
|
•
|
actual or anticipated changes in our growth rate;
|
|
|
•
|
announcements of technological innovations or new offerings by us or our competitors;
|
|
|
•
|
our announcement of actual results for a fiscal period that are lower than projected or expected or our announcement of revenue or earnings guidance that is lower than expected;
|
|
|
•
|
changes in estimates of our financial results or recommendations by securities analysts;
|
|
|
•
|
failure of any of our solutions to achieve or maintain market acceptance;
|
|
|
•
|
changes in market valuations of similar companies;
|
|
|
•
|
success of competitive solutions or services;
|
|
|
•
|
changes in our capital structure, such as future issuances of securities or the incurrence of debt;
|
|
|
•
|
announcements by us or our competitors of significant solutions or services, contracts, acquisitions, or strategic alliances;
|
|
|
•
|
regulatory developments in the U.S. or foreign countries;
|
|
|
•
|
actual or threatened litigation involving us or our industry;
|
|
|
•
|
additions or departures of key personnel;
|
|
|
•
|
general perception of the future of the cloud backup market or our solutions;
|
|
|
•
|
share price and volume fluctuations attributable to inconsistent trading volume levels of our shares;
|
|
|
•
|
sales of our shares of common stock by our existing stockholders;
|
|
|
•
|
changes in general economic, industry, and market conditions; and
|
|
|
•
|
major changes in our Board of Directors or management or departures of key personnel.
|
In addition, the stock market in general, and the market for internet-related companies in particular, has experienced extreme price and volume fluctuations that have often been unrelated or disproportionate to the operating performance of those companies. The trading price of our common stock might also decline in reaction to events that affect other companies in our industry even if these events do not directly affect us. Securities class action litigation has often been instituted against companies following periods of volatility in the overall market and in the market price of a company’s securities. Such litigation, if instituted against us, could result in very substantial costs, divert our management’s attention and resources, and harm our business, financial condition, and operating results. In addition, recent fluctuations in the financial and capital markets have resulted in volatility in securities prices.
Our failure to raise additional capital or generate the cash flows necessary to expand our operations and invest in our business could reduce our ability to compete successfully and depress the market price of our common stock.
Although we currently anticipate that our available funds will be sufficient to meet our cash needs for the next 12 months, we may require additional financing in the future. Our ability to obtain financing will depend, among other things, on our development efforts, business plans, operating performance and condition of the capital markets at the time we seek financing. If we need to raise additional funds, we may not be able to obtain debt or equity financing on favorable terms, if at all. If we raise additional equity financing, our stockholders may experience significant dilution of their ownership interests, and the per share value of our common stock could decline. If we engage in debt financing, we may be required to accept terms that restrict our ability to incur additional indebtedness and force us to maintain specified liquidity or other ratios. If we need additional capital and cannot raise it on acceptable terms, we may not be able to, among other things:
|
|
•
|
develop or enhance our solutions;
|
|
|
•
|
continue to expand our development, sales, and marketing organizations;
|
|
|
•
|
acquire complementary technologies, solutions, or businesses;
|
|
|
•
|
expand our operations in the U.S. or internationally;
|
|
|
•
|
hire, train, and retain employees;
|
|
|
•
|
respond to competitive pressures or unanticipated working capital requirements; or
|
|
|
•
|
continue our operations.
|
Future sales of shares of our common stock by existing stockholders could depress the market price of our common stock.
If our existing stockholders sell, or indicate an intent to sell, a substantial number of shares of our common stock in the public market, the trading price of our common stock could decline significantly.
We do not currently intend to pay dividends on our common stock and, consequently, your ability to achieve a return on your investment will depend on appreciation in the price of our common stock.
We have never declared or paid any cash dividends on our common stock and do not intend to do so for the foreseeable future. Additionally, the Credit Facility contains contractual restrictions on our ability to pay dividends. We currently intend to invest our future earnings, if any, to fund our growth and continuing operations. Therefore, you are not likely to receive any dividends on your shares of common stock for the foreseeable future and the success of an investment in shares of our common stock will depend upon any future appreciation in their value. Our common stock may not appreciate in value or even maintain the price at which our stockholders have purchased their shares.
We cannot guarantee that we will repurchase our common stock pursuant to our stock repurchase program or that our stock repurchase program will enhance long-term stockholder value. Stock repurchases could also increase the volatility of the price of our common stock and could diminish our cash reserves.
In May 2015, our board of directors authorized a stock repurchase
program. Under the program, we are authorized to repurchase shares of our common stock for an aggregate purchase price not to exceed $20 million which expires in May 2018. Although our board of directors has authorized the stock repurchase
program, the stock repurchase
program does not obligate us to repurchase any specific dollar amount or to acquire any specific number of shares and may be suspended or terminated at any time. Stock may be purchased from time to time, in the open market or through private transactions, subject to market condition, in compliance with applicable state and federal securities laws. The timing and amount of repurchases, if any, will depend upon several factors, including market and business conditions, the trading price of our common stock and the nature of other investment opportunities. In addition, repurchases
of our common stock pursuant to our stock repurchase
program could affect the market price of our common stock or increase its volatility. For example, the existence of a stock repurchase
program could cause our stock price to be higher than it would be in the absence of such a program and could potentially reduce the market liquidity for our stock. Additionally, our stock repurchase
program could diminish our cash reserves, which may impact our ability to finance future growth and to pursue possible future strategic opportunities and acquisitions. There can be no assurance that any stock repurchases
will enhance stockholder value because the market price of our common stock may decline below the levels at which we determine to repurchase
our stock. Although our stock repurchase
program is intended to enhance long-term stockholder value, there is no assurance that it will do so and short-term stock price fluctuations could reduce the program’s effectiveness.
Anti-takeover provisions contained in our certificate of incorporation, bylaws as well as provisions of Delaware law, could impair a takeover attempt.
Our certificate of incorporation and bylaws contain provisions that could have the effect of delaying or preventing changes in control or changes in our management without the consent of our board of directors. These provisions include:
|
|
•
|
a classified board of directors with three-year staggered terms, which may delay the ability of stockholders to change the membership of a majority of our board of directors;
|
|
|
•
|
no cumulative voting in the election of directors, which limits the ability of minority stockholders to elect director candidates;
|
|
|
•
|
the exclusive right of our board of directors to elect a director to fill a vacancy created by the expansion of the board of directors or the resignation, death, or removal of a director, which prevents stockholders from being able to fill vacancies on our board of directors;
|
|
|
•
|
the ability of our board of directors to determine to issue shares of preferred stock and to determine the price and other terms of those shares, including preferences and voting rights, without stockholder approval, which could be used to significantly dilute the ownership of a hostile acquirer;
|
|
|
•
|
a prohibition on stockholder action by written consent, which forces stockholder action to be taken at an annual or special meeting of our stockholders;
|
|
|
•
|
the requirement that a special meeting of stockholders may be called only by the chairman of the board of directors, the chief executive officer, or the board of directors, which may delay the ability of our stockholders to force consideration of a proposal or to take action;
|
|
|
•
|
limiting the liability of, and providing indemnification to, our directors and officers;
|
|
|
•
|
controlling the procedures for the conduct and scheduling of stockholder meetings;
|
|
|
•
|
providing the board of directors with the express power to postpone previously scheduled annual meetings of stockholders and to cancel previously scheduled special meetings of stockholders;
|
|
|
•
|
providing that directors may be removed prior to the expiration of their terms by stockholders only for cause; and
|
|
|
•
|
advance notice procedures that stockholders must comply with in order to nominate candidates to our board of directors or to propose matters to be acted upon at a stockholders’ meeting, which may discourage or deter a potential acquiror from conducting a solicitation of proxies to elect the acquiror’s own slate of directors or otherwise attempting to obtain control of us.
|
As a Delaware corporation, we are also subject to provisions of Delaware law, including Section 203 of the Delaware General Corporation Law, which prevents some stockholders holding more than 15% of our outstanding common stock from engaging in certain business combinations without approval of the holders of substantially all of our outstanding common stock. Any provision of our certificate of incorporation or bylaws or Delaware law that has the effect of delaying or deterring a change in control could limit the opportunity for our stockholders to receive a premium for their shares of our common stock, and could also affect the price that some investors are willing to pay for our common stock.