GOOG » Topics » Our business may be adversely affected by malicious applications that interfere with, or exploit security flaws in, our products and services.

This excerpt taken from the GOOG 10-Q filed May 6, 2009.

Our business may be adversely affected by malicious applications that interfere with, or exploit security flaws in, our products and services.

Our business may be adversely affected by malicious applications that make changes to our users’ computers and interfere with the Google experience. These applications have in the past attempted, and may in the future attempt, to change our users’ internet experience, including hijacking queries to Google.com, altering or replacing Google search results, or otherwise interfering with our ability to connect with our users. The interference often occurs without disclosure to or consent from users, resulting in a negative experience that users may associate with Google. These applications may be difficult or impossible to uninstall or disable, may reinstall themselves and may circumvent other applications’ efforts to block or remove them. In addition, we offer a number of products and services that our users download to their computers or that they rely on to store information and transmit information to others over the internet. These products and services are subject to attack by viruses, worms and other malicious software programs, which could jeopardize the security of information stored in a user’s computer or in our computer systems and networks. The ability to reach users and provide them with a superior experience is critical to our success. If our efforts to combat these malicious applications are unsuccessful, or if our products and services have actual or perceived vulnerabilities, our reputation may be harmed and our user traffic could decline, which would damage our business.

This excerpt taken from the GOOG 10-K filed Feb 13, 2009.

Our business may be adversely affected by malicious applications that interfere with, or exploit security flaws in, our products and services.

Our business may be adversely affected by malicious applications that make changes to our users’ computers and interfere with the Google experience. These applications have in the past attempted, and may in the future attempt, to change our users’ internet experience, including hijacking queries to Google.com, altering or replacing Google search results, or otherwise interfering with our ability to connect with our users. The interference often occurs without disclosure to or consent from users, resulting in a negative experience that users may associate with Google. These applications may be difficult or impossible to uninstall or disable, may reinstall themselves and may circumvent other applications’ efforts to block or remove them. In addition, we offer a number of products and services that our users download to their computers or that they rely on to store information and transmit information to others over the internet. These products and services are subject to attack by viruses, worms and other malicious software programs, which could jeopardize the security of information stored in a user’s computer or in our computer systems and networks. The ability to reach users and provide them with a superior experience is critical to our success. If our efforts to combat these malicious applications are unsuccessful, or if our products and services have actual or perceived vulnerabilities, our reputation may be harmed and our user traffic could decline, which would damage our business.

This excerpt taken from the GOOG 10-Q filed Nov 7, 2008.

Our business may be adversely affected by malicious applications that interfere with, or exploit security flaws in, our products and services.

Our business may be adversely affected by malicious applications that make changes to our users’ computers and interfere with the Google experience. These applications have in the past attempted, and may in the future attempt, to change our users’ internet experience, including hijacking queries to Google.com, altering or replacing Google search results, or otherwise interfering with our ability to connect with our users. The interference often occurs without disclosure to or consent from users, resulting in a negative experience that users may associate with Google. These applications may be difficult or impossible to uninstall or disable, may reinstall themselves and may circumvent other applications’ efforts to block or remove them. In addition, we offer a number of products and services that our users download to their computers or that they rely on to store information and transmit information to others over the internet. These products and services are subject to attack by viruses, worms and other malicious software programs, which could jeopardize the security of information stored in a user’s computer or in our computer systems and networks. The ability to reach users and provide them with a superior experience is critical to our success. If our efforts to combat these malicious applications are unsuccessful, or if our products and services have actual or perceived vulnerabilities, our reputation may be harmed and our user traffic could decline, which would damage our business.

 

45


Table of Contents
This excerpt taken from the GOOG 10-Q filed Aug 7, 2008.

Our business may be adversely affected by malicious applications that interfere with, or exploit security flaws in, our products and services.

Our business may be adversely affected by malicious applications that make changes to our users’ computers and interfere with the Google experience. These applications have in the past attempted, and may in the future attempt, to change our users’ internet experience, including hijacking queries to Google.com, altering or replacing Google search results, or otherwise interfering with our ability to connect with our users. The interference often occurs without disclosure to or consent from users, resulting in a negative experience that users may associate with Google. These applications may be difficult or impossible to uninstall or disable, may reinstall themselves and may circumvent other applications’ efforts to block or remove them. In addition, we offer a number of products and services that our users download to their computers or that they rely on to store information and transmit information to others over the internet. These products and services are subject to attack by viruses, worms and other malicious software programs, which could jeopardize the security of information stored in a user’s computer or in our computer systems and networks. The ability to reach users and provide them with a superior experience is critical to our success. If our efforts to combat these malicious applications are unsuccessful, or if our products and services have actual or perceived vulnerabilities, our reputation may be harmed and our user traffic could decline, which would damage our business.

This excerpt taken from the GOOG 10-Q filed May 12, 2008.

Our business may be adversely affected by malicious applications that interfere with, or exploit security flaws in, our products and services.

Our business may be adversely affected by malicious applications that make changes to our users’ computers and interfere with the Google experience. These applications have in the past attempted, and may in the future attempt, to change our users’ internet experience, including hijacking queries to Google.com, altering or replacing Google search results, or otherwise interfering with our ability to connect with our users. The interference often occurs without disclosure to or consent from users, resulting in a negative experience that users may associate with Google. These applications may be difficult or impossible to uninstall or disable, may reinstall themselves and may circumvent other applications’ efforts to block or remove them. In addition, we offer a number of products and services that our users download to their computers or that they rely on to store information and transmit information to others over the internet. These products and services are subject to attack by viruses, worms and other malicious software programs, which could jeopardize the security of information stored in a user’s computer or in our computer systems and networks. The ability to reach users and provide them with a superior experience is critical to our success. If our efforts to combat these malicious applications are unsuccessful, or if our products and services have actual or perceived vulnerabilities, our reputation may be harmed and our user traffic could decline, which would damage our business.

These excerpts taken from the GOOG 10-K filed Feb 15, 2008.

Our business may be adversely affected by malicious applications that interfere with, or exploit security flaws in, our products and services.

Our business may be adversely affected by malicious applications that make changes to our users’ computers and interfere with the Google experience. These applications have in the past attempted, and may in the future attempt, to change our users’ internet experience, including hijacking queries to Google.com, altering or replacing Google search results, or otherwise interfering with our ability to connect with our users. The interference often occurs without disclosure to or consent from users, resulting in a negative experience that users may associate with Google. These applications may be difficult or impossible to uninstall or disable, may reinstall themselves and may circumvent other applications’ efforts to block or remove them. In addition, we offer a number of products and services that our users download to their computers or that they rely on to store information and transmit information to others over the internet. These products and services are subject to attack by viruses, worms and other malicious software programs, which could jeopardize the security of information stored in a user’s computer or in our computer systems and networks. The ability to reach users and provide them with a superior experience is critical to our success. If our efforts to combat these malicious applications are unsuccessful, or if our products and services have actual or perceived vulnerabilities, our reputation may be harmed and our user traffic could decline, which would damage our business.

Our business may be adversely affected by malicious applications that interfere
with, or exploit security flaws in, our products and services.

Our business may be adversely affected by malicious applications
that make changes to our users’ computers and interfere with the Google experience. These applications have in the past attempted, and may in the future attempt, to change our users’ internet experience, including hijacking queries to
Google.com, altering or replacing Google search results, or otherwise interfering with our ability to connect with our users. The interference often occurs without disclosure to or consent from users, resulting in a negative experience that users
may associate with Google. These applications may be difficult or impossible to uninstall or disable, may reinstall themselves and may circumvent other applications’ efforts to block or remove them. In addition, we offer a number of products
and services that our users download to their computers or that they rely on to store information and transmit information to others over the internet. These products and services are subject to attack by viruses, worms and other malicious software
programs, which could jeopardize the security of information stored in a user’s computer or in our computer systems and networks. The ability to reach users and provide them with a superior experience is critical to our success. If our efforts
to combat these malicious applications are unsuccessful, or if our products and services have actual or perceived vulnerabilities, our reputation may be harmed and our user traffic could decline, which would damage our business.

STYLE="margin-top:18px;margin-bottom:0px; text-indent:2%">Proprietary document formats may limit the effectiveness of our search technology by preventing our technology from accessing the content of
documents in such formats, which could limit the effectiveness of our products and services.

A large amount of information on the
internet is provided in proprietary document formats such as Microsoft Word. The providers of the software application used to create these documents could engineer the document format to prevent or interfere with our ability to access the document
contents with our search technology. This would mean that the document contents would not be included in our search results even if the contents were directly relevant to a search. The software providers may also seek to require us to pay them
royalties in exchange for giving us the ability to search documents in their format. If the software provider also competes with us in the search business, they may give their search technology a preferential ability to search documents in their
proprietary format. Any of these results could harm our brand and our operating results.

 


26







Table of Contents


This excerpt taken from the GOOG 10-Q filed Nov 7, 2007.

Our business may be adversely affected by malicious applications that interfere with, or exploit security flaws in, our products and services.

Our business may be adversely affected by malicious applications that make changes to our users’ computers and interfere with the Google experience. These applications have in the past attempted, and may in the future attempt, to change our users’ internet experience, including hijacking queries to Google.com, altering or replacing Google search results, or otherwise interfering with our ability to connect with our users. The interference often occurs without disclosure to or consent from users, resulting in a negative experience that users may associate with Google. These applications may be difficult or impossible to uninstall or disable, may reinstall themselves and may circumvent other applications’ efforts to block or remove them. In addition, we offer a number of products and services that our users download to their computers or that they rely on to store information and transmit information to others over the internet. These products and services are subject to attack by viruses, worms and other malicious software programs, which could jeopardize the security of information stored in a user’s computer or in our computer systems and networks. The ability to reach users and provide them with a superior experience is critical to our success. If our efforts to combat these malicious applications are unsuccessful, or if our products and services have actual or perceived vulnerabilities, our reputation may be harmed and our user traffic could decline, which would damage our business.

This excerpt taken from the GOOG 10-Q filed Aug 9, 2007.

Our business may be adversely affected by malicious applications that interfere with, or exploit security flaws in, our products and services.

Our business may be adversely affected by malicious applications that make changes to our users’ computers and interfere with the Google experience. These applications have in the past attempted, and may in the future attempt, to change our users’ internet experience, including hijacking queries to Google.com, altering or replacing Google search results, or otherwise interfering with our ability to connect with our users. The interference often occurs without disclosure to or consent from users, resulting in a negative experience that users may associate with Google. These applications may be difficult or impossible to uninstall or disable, may reinstall themselves and may circumvent other applications’ efforts to block or remove them. In addition, we offer a number of products and services that our users download to their computers or that they rely on to store information and transmit information to others over the internet. These products and services are subject to attack by viruses, worms and other malicious software programs, which could jeopardize the security of information stored in a user’s computer or in our computer systems and networks. The ability to reach users and provide them with a superior experience is critical to our success. If our efforts to combat these malicious applications are unsuccessful, or if our products and services have actual or perceived vulnerabilities, our reputation may be harmed and our user traffic could decline, which would damage our business.

 

37


Table of Contents
Wikinvest © 2006, 2007, 2008, 2009, 2010, 2011, 2012. Use of this site is subject to express Terms of Service, Privacy Policy, and Disclaimer. By continuing past this page, you agree to abide by these terms. Any information provided by Wikinvest, including but not limited to company data, competitors, business analysis, market share, sales revenues and other operating metrics, earnings call analysis, conference call transcripts, industry information, or price targets should not be construed as research, trading tips or recommendations, or investment advice and is provided with no warrants as to its accuracy. Stock market data, including US and International equity symbols, stock quotes, share prices, earnings ratios, and other fundamental data is provided by data partners. Stock market quotes delayed at least 15 minutes for NASDAQ, 20 mins for NYSE and AMEX. Market data by Xignite. See data providers for more details. Company names, products, services and branding cited herein may be trademarks or registered trademarks of their respective owners. The use of trademarks or service marks of another is not a representation that the other is affiliated with, sponsors, is sponsored by, endorses, or is endorsed by Wikinvest.
Powered by MediaWiki