LOGI » Topics » We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

These excerpts taken from the LOGI 10-K filed Jun 1, 2009.
We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

     Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

     We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be granted. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. Unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

     Product quality issues could adversely affect our reputation and could impact our operating results.

     The market for our products is characterized by rapidly changing technology and evolving industry standards. To remain competitive, we must continually introduce new products and technologies. The products that we sell could contain defects in design or manufacture. Defects could also occur in the products or components that are supplied to us. There can be no assurance we will be able to detect and remedy all defects in the hardware and software we sell. Failure to do so could result in product recalls, product redesign efforts, lost revenue, loss of reputation, and significant warranty and other expenses to remedy.

26


     Our effective tax rates may increase in the future, which could adversely affect our net income.

     We operate in multiple jurisdictions and our profits are taxed pursuant to the tax laws of these jurisdictions. Our effective tax rate may be affected by changes in or interpretations of tax laws in any given jurisdiction, utilization of net operating loss and tax credit carryforwards, changes in geographical allocation of income and expense, and changes in management’s assessment of matters such as the realizability of deferred tax assets. In the past, we have experienced fluctuations in our effective income tax rate. Our effective income tax rate in a given fiscal year reflects a variety of factors that may not be present in the succeeding fiscal year or years. There is no assurance that our effective income tax rate will not change in future periods. We are currently subject to ongoing audits in various jurisdictions and a material assessment by a governing tax authority could adversely affect our profitability. If our effective tax rate increases in future periods, our net income could be adversely affected.

     

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

     Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

     We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be granted. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. Unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

     Product quality issues could adversely affect our reputation and could impact our operating results.

     The market for our products is characterized by rapidly changing technology and evolving industry standards. To remain competitive, we must continually introduce new products and technologies. The products that we sell could contain defects in design or manufacture. Defects could also occur in the products or components that are supplied to us. There can be no assurance we will be able to detect and remedy all defects in the hardware and software we sell. Failure to do so could result in product recalls, product redesign efforts, lost revenue, loss of reputation, and significant warranty and other expenses to remedy.

26


     Our effective tax rates may increase in the future, which could adversely affect our net income.

     We operate in multiple jurisdictions and our profits are taxed pursuant to the tax laws of these jurisdictions. Our effective tax rate may be affected by changes in or interpretations of tax laws in any given jurisdiction, utilization of net operating loss and tax credit carryforwards, changes in geographical allocation of income and expense, and changes in management’s assessment of matters such as the realizability of deferred tax assets. In the past, we have experienced fluctuations in our effective income tax rate. Our effective income tax rate in a given fiscal year reflects a variety of factors that may not be present in the succeeding fiscal year or years. There is no assurance that our effective income tax rate will not change in future periods. We are currently subject to ongoing audits in various jurisdictions and a material assessment by a governing tax authority could adversely affect our profitability. If our effective tax rate increases in future periods, our net income could be adversely affected.

     

We
may be unable to protect our proprietary rights. Unauthorized use of our
technology may result in the development of products that compete with our
products.


     Our
future success depends in part on our proprietary technology, technical know-how
and other intellectual property. We rely on a combination of patent, trade
secret, copyright, trademark and other intellectual property laws, and
confidentiality procedures and contractual provisions such as nondisclosure
terms and licenses, to protect our intellectual property.


     We hold
various United States patents and pending applications, together with
corresponding patents and pending applications from other countries. It is
possible that any patent owned by us will be invalidated, deemed unenforceable,
circumvented or challenged, that the patent rights granted will not provide
competitive advantages to us, or that any of our pending or future patent
applications will not be granted. In addition, other intellectual property laws
or our confidentiality procedures and contractual provisions may not adequately
protect our intellectual property. Also, others may independently develop
similar technology, duplicate our products, or design around our patents or
other intellectual property rights. Unauthorized parties have copied and may in
the future attempt to copy aspects of our products or to obtain and use
information that we regard as proprietary. Any of these events could
significantly harm our business, financial condition and operating
results.


     Product quality issues
could adversely affect our reputation and could impact our operating results.


     The
market for our products is characterized by rapidly changing technology and
evolving industry standards. To remain competitive, we must continually
introduce new products and technologies. The products that we sell could contain
defects in design or manufacture. Defects could also occur in the products or
components that are supplied to us. There can be no assurance we will be able to
detect and remedy all defects in the hardware and software we sell. Failure to
do so could result in product recalls, product redesign efforts, lost revenue,
loss of reputation, and significant warranty and other expenses to
remedy.


26





     Our effective tax rates
may increase in the future, which could adversely affect our net income.


     We
operate in multiple jurisdictions and our profits are taxed pursuant to the tax
laws of these jurisdictions. Our effective tax rate may be affected by changes
in or interpretations of tax laws in any given jurisdiction, utilization of net
operating loss and tax credit carryforwards, changes in geographical allocation
of income and expense, and changes in management’s assessment of matters such as
the realizability of deferred tax assets. In the past, we have experienced
fluctuations in our effective income tax rate. Our effective income tax rate in
a given fiscal year reflects a variety of factors that may not be present in the
succeeding fiscal year or years. There is no assurance that our effective income
tax rate will not change in future periods. We are currently subject to ongoing
audits in various jurisdictions and a material assessment by a governing tax
authority could adversely affect our profitability. If our effective tax rate
increases in future periods, our net income could be adversely affected.


     

We
may be unable to protect our proprietary rights. Unauthorized use of our
technology may result in the development of products that compete with our
products.


     Our
future success depends in part on our proprietary technology, technical know-how
and other intellectual property. We rely on a combination of patent, trade
secret, copyright, trademark and other intellectual property laws, and
confidentiality procedures and contractual provisions such as nondisclosure
terms and licenses, to protect our intellectual property.


     We hold
various United States patents and pending applications, together with
corresponding patents and pending applications from other countries. It is
possible that any patent owned by us will be invalidated, deemed unenforceable,
circumvented or challenged, that the patent rights granted will not provide
competitive advantages to us, or that any of our pending or future patent
applications will not be granted. In addition, other intellectual property laws
or our confidentiality procedures and contractual provisions may not adequately
protect our intellectual property. Also, others may independently develop
similar technology, duplicate our products, or design around our patents or
other intellectual property rights. Unauthorized parties have copied and may in
the future attempt to copy aspects of our products or to obtain and use
information that we regard as proprietary. Any of these events could
significantly harm our business, financial condition and operating
results.


     Product quality issues
could adversely affect our reputation and could impact our operating results.


     The
market for our products is characterized by rapidly changing technology and
evolving industry standards. To remain competitive, we must continually
introduce new products and technologies. The products that we sell could contain
defects in design or manufacture. Defects could also occur in the products or
components that are supplied to us. There can be no assurance we will be able to
detect and remedy all defects in the hardware and software we sell. Failure to
do so could result in product recalls, product redesign efforts, lost revenue,
loss of reputation, and significant warranty and other expenses to
remedy.


26





     Our effective tax rates
may increase in the future, which could adversely affect our net income.


     We
operate in multiple jurisdictions and our profits are taxed pursuant to the tax
laws of these jurisdictions. Our effective tax rate may be affected by changes
in or interpretations of tax laws in any given jurisdiction, utilization of net
operating loss and tax credit carryforwards, changes in geographical allocation
of income and expense, and changes in management’s assessment of matters such as
the realizability of deferred tax assets. In the past, we have experienced
fluctuations in our effective income tax rate. Our effective income tax rate in
a given fiscal year reflects a variety of factors that may not be present in the
succeeding fiscal year or years. There is no assurance that our effective income
tax rate will not change in future periods. We are currently subject to ongoing
audits in various jurisdictions and a material assessment by a governing tax
authority could adversely affect our profitability. If our effective tax rate
increases in future periods, our net income could be adversely affected.


     

This excerpt taken from the LOGI 10-Q filed Feb 3, 2009.

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be granted. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. Unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

This excerpt taken from the LOGI 10-Q filed Nov 4, 2008.

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

 

50


Table of Contents

We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be granted. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. Unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

This excerpt taken from the LOGI 10-Q filed Aug 5, 2008.

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be issued. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. Unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

This excerpt taken from the LOGI 10-K filed May 30, 2008.

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be issued. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. Unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

This excerpt taken from the LOGI 6-K filed Feb 1, 2008.

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be issued. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. In addition, unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

This excerpt taken from the LOGI 6-K filed Nov 6, 2007.

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

 

38


Table of Contents

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be issued. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. In addition, unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

This excerpt taken from the LOGI 6-K filed Aug 3, 2007.

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

 

32


Table of Contents

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be issued. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. In addition, unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

This excerpt taken from the LOGI 20-F filed May 25, 2007.

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

 

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

 

We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be issued. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. In addition, unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

 

This excerpt taken from the LOGI 6-K filed Feb 2, 2007.

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses to protect our intellectual property.

We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be issued. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. In addition, unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

 

42


Table of Contents
This excerpt taken from the LOGI 6-K filed Nov 3, 2006.

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be issued. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. In addition, unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

 

40


Table of Contents
This excerpt taken from the LOGI 6-K filed Aug 4, 2006.

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed

 

33


Table of Contents

unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be issued. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. In addition, unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

This excerpt taken from the LOGI 20-F filed May 19, 2006.

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

 

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

 

12


Table of Contents
Index to Financial Statements

We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be issued. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. In addition, unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

 

This excerpt taken from the LOGI 6-K filed Feb 3, 2006.

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

 

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

 

We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be issued. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. In addition, unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

 

33


Table of Contents
This excerpt taken from the LOGI 6-K filed Nov 7, 2005.

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

 

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

 

We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be issued. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. In addition, unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

 

These excerpts taken from the LOGI 6-K filed Aug 5, 2005.

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

 

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

 

29


We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be issued. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions, may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. In addition, unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

 

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

 

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

 

29


We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be issued. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions, may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. In addition, unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

 

This excerpt taken from the LOGI 20-F filed May 18, 2005.

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

 

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

 

We hold various United States patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be issued. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions, may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. In addition, unauthorized parties have copied and may in the future attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

 

We are also increasing our reliance on technologies that we license or acquire from others. We may find it necessary or desirable in the future to obtain licenses or other rights relating to one or more of our products or to current or future technologies. These licenses or other rights may not be available on commercially reasonable terms, or at all. The inability to obtain certain licenses or other rights or to obtain such licenses or rights on favorable terms, or the need to engage in litigation regarding these matters, could have a material adverse effect on our business, financial condition and operating results. Moreover, the use of intellectual property licensed from third parties may limit our ability to protect the proprietary rights in our products.

 

This excerpt taken from the LOGI 6-K filed Feb 7, 2005.

We may be unable to protect our proprietary rights. Unauthorized use of our technology may result in the development of products that compete with our products.

 

Our future success depends in part on our proprietary technology, technical know-how and other intellectual property. We rely on a combination of patent, trade secret, copyright, trademark and other intellectual property laws, and confidentiality procedures and contractual provisions such as nondisclosure terms and licenses, to protect our intellectual property.

 

33


Table of Contents

We hold various United States and European patents and pending applications, together with corresponding patents and pending applications from other countries. It is possible that any patent owned by us will be invalidated, deemed unenforceable, circumvented or challenged, that the patent rights granted will not provide competitive advantages to us, or that any of our pending or future patent applications will not be issued. In addition, other intellectual property laws or our confidentiality procedures and contractual provisions, may not adequately protect our intellectual property. Also, others may independently develop similar technology, duplicate our products, or design around our patents or other intellectual property rights. In addition, unauthorized parties may attempt to copy aspects of our products or to obtain and use information that we regard as proprietary. Any of these events could significantly harm our business, financial condition and operating results.

 

We are also increasing our reliance on technologies that we license or acquire from others. We may find it necessary or desirable in the future to obtain licenses or other rights relating to one or more of our products or to current or future technologies. These licenses or other rights may not be available on commercially reasonable terms, or at all. The inability to obtain certain licenses or other rights or to obtain such licenses or rights on favorable terms, or the need to engage in litigation regarding these matters, could have a material adverse effect on our business, financial condition and operating results. Moreover, the use of intellectual property licensed from third parties may limit our ability to protect the proprietary rights in our products.

 

Wikinvest © 2006, 2007, 2008, 2009, 2010, 2011, 2012. Use of this site is subject to express Terms of Service, Privacy Policy, and Disclaimer. By continuing past this page, you agree to abide by these terms. Any information provided by Wikinvest, including but not limited to company data, competitors, business analysis, market share, sales revenues and other operating metrics, earnings call analysis, conference call transcripts, industry information, or price targets should not be construed as research, trading tips or recommendations, or investment advice and is provided with no warrants as to its accuracy. Stock market data, including US and International equity symbols, stock quotes, share prices, earnings ratios, and other fundamental data is provided by data partners. Stock market quotes delayed at least 15 minutes for NASDAQ, 20 mins for NYSE and AMEX. Market data by Xignite. See data providers for more details. Company names, products, services and branding cited herein may be trademarks or registered trademarks of their respective owners. The use of trademarks or service marks of another is not a representation that the other is affiliated with, sponsors, is sponsored by, endorses, or is endorsed by Wikinvest.
Powered by MediaWiki