Our user growth, engagement, and monetization on mobile devices depend upon effective operation with mobile operating systems, networks, and standards that we do not control. The substantial majority of our revenue will be generated from advertising on mobile devices. There is no guarantee that popular mobile devices will feature our products, or that mobile device users will continue to use our products rather than competing products. We are dependent on the interoperability of our products with popular mobile operating systems, networks, and standards that we do not control, such as the Android and iOS operating systems. Any changes, bugs, or technical issues in such systems, or changes in our relationships with mobile operating system partners, or in their terms of service or policies that degrade our products' functionality, reduce or eliminate our ability to distribute our products, give preferential treatment to competitive products, limit our ability to deliver, target, or measure the effectiveness of ads, or charge fees related to the distribution of our products or our delivery of ads could adversely affect the usage of our products and monetization on mobile devices. Additionally, to deliver high-quality mobile products, it is important that our products work well with a range of mobile technologies, systems, networks, and standards that we do not control. We may not be successful in maintaining or developing relationships with key participants in the mobile ecosystem or in developing products that operate effectively with these technologies, systems, networks, or standards. If it is more difficult for our users to access and use our products on their mobile devices, or if our users choose not to access or use our products on their mobile devices or use mobile products that do not offer access to our products, our user growth, and user engagement could be harmed. From time to time, we may also take actions regarding the distribution of our products or the operation of our business based on what we believe to be in our long-term best interests. Such actions may adversely affect our users and our relationships with the operators of mobile operating systems, or other business partners, and there is no assurance that these actions will result in the anticipated long-term benefits. If our users are adversely affected by these actions or if our relationships with such third parties deteriorate, our user growth, engagement, and monetization could be adversely affected, and our business could be harmed. Security breaches and improper access to or disclosure of our data or user data, or other hacking and phishing attacks on our systems, could harm our reputation and adversely affect our business. Our industry is prone to cyber-attacks by third parties seeking unauthorized access to our data or users’ data. Any failure to prevent or mitigate security breaches and improper access to or disclosure of our data or user data could result in the loss or misuse of such data, which could harm our business and reputation and diminish our competitive position. In addition, computer malware, viruses, social engineering (predominantly spear phishing attacks), and general hacking have become more prevalent in our industry and may occur on our systems in the future. As a result of the industry, we believe that we are a particularly attractive target for such breaches and attacks. Such attacks may cause interruptions to the services we provide, degrade the user experience, cause users to lose confidence and trust in our products, or result in financial harm to us. Our efforts to protect our company data or the information we receive may also be unsuccessful due to software bugs or other technical malfunctions; employee, contractor, or vendor error or malfeasance; government surveillance; or other threats that evolve. In addition, third parties may attempt to fraudulently induce employees or users to disclose information in order to gain access to our data or our users' data. Although we have developed systems and processes that are designed to protect our data and user data, to prevent data loss, and to prevent or detect security breaches, we cannot assure you that such measures will provide absolute security. In addition, some of our developers or other partners, such as those that help us measure the effectiveness of ads, may receive or store information provided by us or by our users through mobile or web applications. We provide limited information to such third parties based on the scope of services provided to us. However, if these third parties or developers fail to adopt or adhere to adequate data security practices, or in the event of a breach of their networks, our data or our users' data may be improperly accessed, used, or disclosed. Affected users or government authorities could initiate legal or regulatory actions against us in connection with any security breaches or improper disclosure of data, which could cause us to incur significant expense and liability or result in orders or consent decrees forcing us to modify our business practices. Any of these events could have a material and adverse effect on our business, reputation, or financial results. We may incur liability as a result of information retrieved from or transmitted over the Internet or published using our products or as a result of claims related to our products. We may face claims relating to information that is published or made available on our products. In particular, the nature of our business exposes us to claims related to defamation, dissemination of misinformation or news hoaxes, intellectual property rights, rights of publicity and privacy, personal injury torts, or local laws regulating hate speech or other types of content. This risk is enhanced in certain jurisdictions outside the United States where our protection from liability for third-party actions may be unclear and where we may be less protected under local laws than we are in the United States. We could incur significant costs investigating and defending such claims and, if we are found liable, significant damages. We could also face orders restricting or blocking our services in particular geographies as a result of content hosted on our services. If any of these events occur, our business and financial results could be adversely affected. Our products and internal systems rely on software that is highly technical, and if it contains undetected errors or vulnerabilities, our business could be adversely affected. Our products and internal systems rely on software, including software developed or maintained internally and/or by third parties, that is highly technical and complex. In addition, our products and internal systems depend on the ability of such software to store, retrieve, process, and manage immense amounts of data. The software on which we rely has contained, and will in the future contain, undetected errors, bugs, or vulnerabilities. Some errors may only be discovered after the code has been released for external or internal use. Errors, vulnerabilities, or other design defects within the software on which we rely may result in a negative experience for users and marketers who use our products, delay product introductions or enhancements, result in targeting, measurement, or billing errors, compromise our ability to protect the data of our users and/or our intellectual property or lead to reductions in our ability to provide some or all of our services. In addition, any errors, bugs, vulnerabilities, or defects discovered in the software on which we rely, and any associated degradations or interruptions of service, could result in damage to our reputation, loss of users, loss of revenue, or liability for damages, any of which could adversely affect our business and financial results. 28 |