AMSWA » Topics » Serious harm to our business could result if our encryption technology fails to ensure the security of our customers online transactions.

This excerpt taken from the AMSWA 10-K filed Jul 14, 2009.

Serious harm to our business could result if our encryption technology fails to ensure the security of our customers’ online transactions.

The secure exchange of confidential information over public networks is a significant concern of consumers engaging in online transactions and interaction. Some of our software applications use encryption technology to provide the security necessary to affect the secure exchange of valuable and confidential information. Advances in computer capabilities, new discoveries in the field of cryptography or other events or developments could result in a compromise or breach of the algorithms that these applications use to protect customer transaction data. If any compromise or breach occurs, it could have a material adverse affect on our business, results of operations and financial condition.

These excerpts taken from the AMSWA 10-K filed Jul 14, 2008.

Serious harm to our business could result if our encryption technology fails to ensure the security of our customers’ online transactions.

The secure exchange of confidential information over public networks is a significant concern of consumers engaging in on-line transactions and interaction. Some of our software applications use encryption technology to provide the security necessary to affect the secure exchange of valuable and confidential information. Advances in computer capabilities, new discoveries in the field of cryptography or other events or developments could result in a compromise or breach of the algorithms that these applications use to protect customer transaction data. If any compromise or breach were to occur, it could have a material adverse affect on our business, results of operations and financial condition.

Serious harm to our business could result if our encryption technology fails to
ensure the security of our customers’ online transactions.

The secure exchange of confidential information over public networks is
a significant concern of consumers engaging in on-line transactions and interaction. Some of our software applications use encryption technology to provide the security necessary to affect the secure exchange of valuable and confidential
information. Advances in computer capabilities, new discoveries in the field of cryptography or other events or developments could result in a compromise or breach of the algorithms that these applications use to protect customer transaction data.
If any compromise or breach were to occur, it could have a material adverse affect on our business, results of operations and financial condition.

SIZE="2">If our customers lose confidence in the security of data on the Internet, our revenues could be adversely affected.

SIZE="2">Maintaining the security of computers and computer networks is an issue of critical importance for our customers. Attempts by experienced computer programmers, or hackers, to penetrate client network security or the security of web sites to
misappropriate confidential information are currently an industry-wide phenomenon that affects computers and networks across all platforms. Despite efforts to address these risks, actual or perceived security vulnerabilities in our products (or the
Internet in general) could lead some customers to seek to reduce or delay future purchases or to purchase competitors’ products which are not Internet-based applications. Customers may also increase their spending to protect their computer
networks from attack, which could delay adoption of new technologies. Any of these actions by customers could adversely affect our revenues.

This excerpt taken from the AMSWA 10-K filed Jul 16, 2007.

Serious harm to our business could result if our encryption technology fails to ensure the security of our customers’ online transactions.

The secure exchange of confidential information over public networks is a significant concern of consumers engaging in on-line transactions and interaction. Some of our software applications use encryption technology to provide the security necessary to affect the secure exchange of valuable and confidential information. Advances in computer capabilities, new discoveries in the field of cryptography or other events or developments could result in a compromise or breach of the algorithms that these applications use to protect customer transaction data. If any compromise or breach were to occur, it could have a material adverse affect on our business, results of operations and financial condition.

This excerpt taken from the AMSWA 10-K filed Jul 14, 2006.

Serious harm to our business could result if our encryption technology fails to ensure the security of our customers’ online transactions.

The secure exchange of confidential information over public networks is a significant concern of consumers engaging in on-line transactions and interaction. Some of our software applications use encryption technology to provide the security necessary to affect the secure exchange of valuable and confidential information. Advances in computer capabilities, new discoveries in the field of cryptography or other events or developments could result in a compromise or breach of the algorithms that these applications use to protect customer transaction data. If any compromise or breach were to occur, it could have a material adverse affect on our business, results of operations and financial condition.

This excerpt taken from the AMSWA 10-K filed Oct 14, 2005.

Serious harm to our business could result if our encryption technology fails to ensure the security of our customers’ online transactions.

 

The secure exchange of confidential information over public networks is a significant concern of consumers engaging in on-line transactions and interaction. Some of our software applications use encryption technology to provide the security necessary to affect the secure exchange of valuable and confidential information. Advances in computer capabilities, new discoveries in the field of cryptography or other events or developments could result in a compromise or breach of the algorithms that these applications use to protect customer transaction data. If any compromise or breach were to occur, it could have a material adverse affect on our business, results of operation and financial condition.

 

Wikinvest © 2006, 2007, 2008, 2009, 2010, 2011, 2012. Use of this site is subject to express Terms of Service, Privacy Policy, and Disclaimer. By continuing past this page, you agree to abide by these terms. Any information provided by Wikinvest, including but not limited to company data, competitors, business analysis, market share, sales revenues and other operating metrics, earnings call analysis, conference call transcripts, industry information, or price targets should not be construed as research, trading tips or recommendations, or investment advice and is provided with no warrants as to its accuracy. Stock market data, including US and International equity symbols, stock quotes, share prices, earnings ratios, and other fundamental data is provided by data partners. Stock market quotes delayed at least 15 minutes for NASDAQ, 20 mins for NYSE and AMEX. Market data by Xignite. See data providers for more details. Company names, products, services and branding cited herein may be trademarks or registered trademarks of their respective owners. The use of trademarks or service marks of another is not a representation that the other is affiliated with, sponsors, is sponsored by, endorses, or is endorsed by Wikinvest.
Powered by MediaWiki