Biggest changeAlthough we have implemented policies and procedures that are designed to ensure compliance with applicable privacy and data security laws, rules and regulations, the efficacy and longevity of these policies and procedures remains uncertain, and if our privacy or data security measures fail to comply with applicable current or future laws and regulations, including, without limitation, the EU ePrivacy Regulation, GDPR, UK GDPR and CCPA as well as those of other countries such as India’s Digital Personal Data Protection Act 2023 and China’s Cybersecurity, Data Security and Personal Information Protection laws, we will likely be required to modify our data collection or processing practices and policies in an effort to comply with such laws and regulations, and we could be subject to increased costs, fines, litigation, regulatory investigations, and enforcement notices requiring us to change the way we use personal data or our marketing practices or other liabilities such as compensation claims by individuals affected by a personal data breach, as well as negative publicity and a potential loss of business.
Biggest changeIf our data privacy and cybersecurity measures fail to comply with any of the foregoing requirements, we will likely be required to modify our data collection or processing practices and policies in an effort to comply with such requirements, and we could be subject to increased costs, fines, litigation, regulatory investigations, and enforcement notices, which may have an adverse impact on our business, financial condition, and results of operations.
Moreover, providers that are not currently our competitors may become competitors or be acquired by or merge with a competitor in the future, any of which could reduce our access to the information and technology solutions provided by those companies.
Moreover, providers that are not currently our competitors may become competitors or may be acquired by or merge with a competitor in the future, any of which could reduce our access to the information and technology solutions provided by those companies.
We seek to achieve our growth objectives by optimizing our offerings to meet the needs of our customers through organic development, including by delivering integrated workflow platforms, acquiring new customers, implementing operational efficiency initiatives, and through acquisitions, joint ventures, investments, and dispositions.
We seek to achieve our growth objectives by optimizing our offerings to meet the needs of our customers through organic development, including by delivering integrated workflow platforms, acquiring new customers, and implementing operational efficiency initiatives, and through acquisitions, joint ventures, investments, and dispositions.
We rely and expect to continue to rely on a combination of physical, operational, and managerial protections of our confidential information and intellectual property and proprietary rights, including trademark, copyright, patent, and trade secret protection laws, as well as confidentiality, assignment, and license agreements with our employees, contractors, consultants, vendors, service providers, customers, and other third parties with whom we have relationships.
We rely and expect to continue to rely on a combination of physical, operational, and managerial protections of our confidential information and intellectual property and other proprietary rights, including trademark, copyright, patent, and trade secret protection laws, as well as confidentiality, assignment, and license agreements with our employees, contractors, consultants, vendors, service providers, customers, and other third parties with whom we have relationships.
This, coupled with the fact that we cannot easily switch our computing operations and other computer systems to other service providers, means that any disruption of or interference with our use of our current third-party cloud computing service, or the services provided by our other vendors, service providers, contractors, and consultants could disrupt our operations, and our business could be adversely impacted.
This fact, coupled with the fact that we cannot easily switch our computing operations and other computer systems to other service providers, means that any disruption of or interference with our use of our current third- party cloud computing service, or the services provided by our other vendors, service providers, contractors, and consultants, could disrupt our operations, and our business could be adversely impacted.
The steps we take to protect our intellectual property and proprietary rights require significant resources and may be inadequate. Effective trade secret, copyright, trademark, patent, and domain name protection is expensive to develop and maintain, both in terms of initial and ongoing registration requirements and expenses and the costs of defending and enforcing our rights.
The steps we take to protect our intellectual property and other proprietary rights require significant resources and may be inadequate. Effective trade secret, copyright, trademark, patent, and domain name protection is expensive to develop and maintain, both in terms of initial and ongoing registration requirements and expenses and the costs of defending and enforcing our rights.
In addition, some of our competitors combine competing products with complementary products as packaged solutions, which could pre-empt use of our products or solutions and some of our customers may decide to independently develop certain products and services. If we fail to compete effectively, our financial condition and results of operations could be adversely affected.
In addition, some of our competitors combine competing products with complementary products as packaged solutions, which could pre-empt use of our products or solutions. Alternatively, some of our customers may decide to independently develop certain products and services. If we fail to compete effectively, our financial condition and results of operations could be adversely affected.
Strategy and Market Demand Risks We are dependent on third parties, including public sources, for data, information, and other services, and our relationships with such third parties may not be successful or may change, which could adversely affect our results of operations.
Strategy and Market Risks We are dependent on third parties, including public sources, for data, information, and other services, and our relationships with such third parties may not be successful or may change, which could adversely affect our results of operations.
Our indebtedness could have significant consequences on our future operations, including: • making it more difficult for us to satisfy our debt obligations and our other ongoing business obligations, which may result in defaults; • events of default if we fail to comply with the financial and other covenants contained in the agreements governing our debt instruments, which could result in all of our debt becoming immediately due and payable or require us to negotiate an amendment to financial or other covenants that could cause us to incur additional fees and expenses; 14 Table of Contents • sensitivity to interest rate increases on our variable rate outstanding indebtedness, which could result in increased interest under our credit facilities and could cause our debt service obligations to increase significantly; • reducing the availability of our cash flow to fund working capital, capital expenditures, acquisitions, and other general corporate purposes, and limiting our ability to obtain additional financing for these purposes; • limiting our flexibility in planning for, or reacting to, and increasing our vulnerability to, changes in our business, the industries in which we operate, and the overall economy; • placing us at a competitive disadvantage compared to any of our competitors that have less debt or are less leveraged; • increasing our vulnerability to adverse economic and industry conditions; and • if we receive a downgrade of our credit ratings, our cost of borrowing could increase, negatively affecting our ability to access the capital markets on advantageous terms, or at all.
Our indebtedness could have significant consequences on our future operations, including: • making it more difficult for us to satisfy our debt obligations and our other ongoing business obligations, which may result in defaults; • events of default if we fail to comply with the financial and other covenants contained in the agreements governing our debt instruments, which could result in all of our debt becoming immediately due and payable or require us to negotiate an amendment to financial or other covenants that could cause us to incur additional fees and expenses; • sensitivity to interest rate increases on our variable rate outstanding indebtedness, which could result in increased interest under our credit facilities and could cause our debt service obligations to increase significantly; • reducing the availability of our cash flow to fund working capital, capital expenditures, acquisitions, and other general corporate purposes, and limiting our ability to obtain additional financing for these purposes; • limiting our flexibility in planning for or adequately reacting to changes in our business, the industries in which we operate, and the overall economy; • placing us at a competitive disadvantage compared to any of our competitors that have less debt or are less leveraged; • increasing our vulnerability to adverse economic and industry conditions; and • if we receive a downgrade of our credit ratings, our cost of borrowing could increase, negatively affecting our ability to access the capital markets on advantageous terms, or at all.
We have international operations and, accordingly, our business is subject to risks resulting from differing legal and regulatory requirements, political, social, and economic conditions and unforeseeable developments in a variety of jurisdictions.
We have significant international operations and, accordingly, our business is subject to risks resulting from differing legal and regulatory requirements, political, social, and economic conditions and unforeseeable developments in a variety of jurisdictions.
In addition, third parties that provide AI products and services, including some which are publicly available, may have trained their LLMs or other AI tools or technology on our content without our consent and it may be difficult to enforce our copyrights and other intellectual property rights in connection with such unauthorized use, which could reduce demand for our products and services.
In addition, third parties that provide AI products and services, including some which are publicly available, may have trained their LLMs or other AI tools or technology on our content without our consent and it may be difficult to enforce our copyrights, other intellectual property rights, and technical controls in connection with such unauthorized use, which could reduce demand for our products and services.
In addition, the international scope of our business operations subjects us to multiple overlapping tax regimes that can make it difficult to determine what our obligations are in particular situations, and relevant tax authorities may interpret rules differently over time or differently from each other.
In addition, the international scope of our business operations subjects us to multiple overlapping tax regimes that can make it difficult to determine what our obligations are, and relevant tax authorities may interpret rules differently over time or differently from each other.
Our overall success as a global business depends, in part, on our ability to anticipate and effectively manage these risks, and there can be no assurance that we will be able to do so without incurring unexpected costs.
Our overall success as a global business depends, in part, on our ability to anticipate and effectively manage these risks, and there can be no assurance that we will be able to do so without incurring unexpected or significant costs.
In addition, despite our efforts to ensure that our employees, contractors, consultants, vendors, and service providers do not use the intellectual property and other proprietary information or know-how of third-parties in their work for us, we may be subject to claims that we or our employees, contractors, consultants, vendors, or service providers have inadvertently or otherwise used or disclosed intellectual property, including copyrighted materials, trade secrets, know-how, software, or other proprietary information of a former employer or other third parties.
In addition, despite our efforts to ensure that our employees, contractors, consultants, vendors, and service providers do not use the intellectual property and other proprietary information or know-how of third-parties in their work for us, we may be subject to claims that we or our employees, contractors, consultants, vendors, or service providers have inadvertently or otherwise used or disclosed intellectual property, including copyrighted materials, trade secrets, know-how, software, or other proprietary information of former employers or other third parties.
Our collection, storage, and use of confidential, sensitive, or personal information or data are subject to applicable data protection and privacy laws, and any failure to comply with such laws may harm our reputation and business or expose us to fines and other enforcement action.
Our collection, storage, and use of confidential, sensitive, or personal information or data are subject to applicable data privacy and cybersecurity laws, and any failure to comply with such laws may harm our reputation and business or expose us to fines and other enforcement action.
If such third parties are successful, we could be subject to liability, be required to make our proprietary software source code available under an open source license, purchase a license (which, if available, could be costly), or cease offering the implicated products or services unless and until we can re-engineer them to avoid infringement.
If such third parties are successful, we could be subject to liability, be required to make our proprietary software source code available under an open source license, purchase a license (which, if available, could be costly), or cease offering the implicated products or services unless and until we can re-engineer them to avoid infringement, misappropriation, or other violation.
While our terms and policies require users to respect the intellectual property rights of others, we have limited ability to influence the behavior of third parties, and there can be no assurance that these terms and policies will be sufficient to dissuade or prevent infringing activity by third parties using our products or services.
While our terms and policies require users to respect the intellectual property rights of others, we have limited ability to influence the behavior of third parties, and there can be no assurance that these terms and policies will be sufficient to dissuade or prevent infringing, misappropriating, or other violating activity by third parties using our products or services.
Our results of operations could be adversely affected if our customers choose to use these public sources as a substitute for our products or services. We operate in a highly competitive industry, and we may be adversely affected by competition and other changes in our markets.
Our results of operations could be adversely affected if our customers choose to use these public sources as a substitute for our products or services. 12 Table of Contents We operate in a highly competitive industry, and we may be adversely affected by competition and other changes in our markets.
These policies and procedures are designed to increase the likelihood that we are prepared to continue operations during times of unexpected disruption, and we have taken steps to minimize risks that could lead to disruptions in our operations and to avoid our customers being harmed in the event of a significant disruption in our operations.
These policies and procedures are designed to increase the likelihood that we are prepared to continue operations during times of unexpected disruption, and we have taken steps to minimize risks that could lead to disruptions in our operations and to avoid harm to our customers in the event of a significant disruption to our operations.
The loss of the services of key personnel, leadership transition, or an inability to recruit effective replacements or to otherwise attract, motivate, or retain highly qualified personnel could have a material adverse effect on our business, financial condition, and operating results. 12 Table of Contents Our business continuity plans may not be effective against events that may adversely impact our business.
The loss of the services of key personnel, leadership transition, or an inability to recruit effective replacements or to otherwise attract, motivate, or retain highly qualified personnel could have a material adverse effect on our business, financial condition, and operating results. Our business continuity and recovery plans may not be effective against events that may adversely impact our business.
Foreign Corrupt Practices Act and the UK Bribery Act 2010); • possible difficulties in enforcing a U.S. judgment against us or our directors and officers residing outside the United States, or asserting securities law claims outside of the United States; and • protecting your interests as a shareholder due to the differing rights of shareholders under Jersey law, where we are incorporated.
Foreign Corrupt Practices Act and the UK Bribery Act 2010); • possible difficulties in enforcing a U.S. judgment against us or our directors and officers residing outside the United States, or asserting securities law claims outside the United States; and • protecting shareholder interests due to differing shareholder rights under Jersey law, where we are incorporated.
In addition, we may not qualify for the safe harbors established by laws in the United States and other countries protecting online service providers from claims related to content posted by users, or those laws could change in a manner making it difficult or impossible to qualify for such protection, increasing our exposure.
In addition, we may not 20 Table of Contents qualify for the safe harbors established by laws in the United States and other countries protecting online service providers from claims related to content posted by users, or those laws could change in a manner making it difficult or impossible to qualify for such protection, increasing our exposure.
Although we may have contractual protections with our third-party vendors, service providers, contractors, and consultants, any actual or perceived security breach, incident, or disruption could harm our reputation and brand, expose us to potential liability, or require us to expend significant resources on cybersecurity in responding to any such actual or perceived compromise, breach, incident, or disruption and negatively impact our business.
Although we may have contractual protections with our third-party providers, any actual or perceived security breach, incident, or disruption could harm our reputation and brand, expose us to potential liability, or require us to expend significant resources on cybersecurity in responding to any such actual or perceived compromise, breach, incident, or disruption and negatively impact our business.
Our international operations are subject to the following risks, among others: • changes in regulatory requirements or other U.S. executive branch actions, such as Executive Orders; • changes in the global trade environment, including potential deterioration in geopolitical or trade relations between countries; • political instability; 13 Table of Contents • international hostilities (including the ongoing war between Russia and Ukraine and related sanctions, the ongoing conflicts in the Middle East, tensions between Serbia and Kosovo, and related negative economic impacts), military actions, terrorist or cyber-terrorist activities, weather conditions (including climate change), natural disasters, pandemics, and infrastructure disruptions; • China’s domestic policy and increased preference for nationalized content; • differing economic cycles and adverse economic conditions; • unexpected changes in regulatory environments and government interference in the economy and the possibility that the U.S. could default on its debt obligations; • continued inflationary and interest rate pressures; • differing labor regulations in locations where we have a significant number of employees; • foreign exchange controls and restrictions on repatriation of funds; • fluctuations in currency exchange rates; • insufficient protection against product piracy and differing protections for IP rights; • varying regulatory and legislative frameworks regarding the use and implementation of AI; • varying attitudes towards censorship and the treatment of information service providers by foreign governments, particularly in emerging markets; • various trade restrictions (including tariffs, trade and economic sanctions, and export controls prohibiting or restricting transactions involving certain persons and certain designated countries or territories) and anti-corruption laws (including the U.S.
Our international operations are subject to the following risks, among others: • changes in regulatory requirements or other U.S. executive branch actions, such as executive orders; • changes in the global trade environment, including potential deterioration in geopolitical or trade relations between countries; • political instability; • international hostilities (including the ongoing war between Russia and Ukraine and related sanctions, the ongoing conflicts in the Middle East, tensions between Serbia and Kosovo, geopolitical tensions in Latin America, and related negative economic impacts), military actions, terrorist or cyberterrorist activities, weather conditions (including climate change), natural disasters, pandemics, and infrastructure disruptions; • China’s domestic policy, increasing cybersecurity requirements, and increased preference for nationalized content; • differing economic cycles and adverse economic conditions; • unexpected changes in regulatory environments and government interference in the economy and the possibility that the U.S. could default on its debt obligations; • inflationary and interest rate pressures; • differing labor regulations in locations where we have a significant number of employees; • foreign exchange controls and restrictions on repatriation of funds; • fluctuations in currency exchange rates; • insufficient protection against product piracy and differing protections for intellectual property and other proprietary rights; • varying regulatory and legislative frameworks regarding the use and implementation of AI; • varying attitudes towards censorship, privacy, and the treatment of information service providers by foreign governments, particularly in emerging markets; • various trade restrictions (including tariffs, trade and economic sanctions, and export controls prohibiting or restricting transactions involving certain persons and certain designated countries or territories) and anti-corruption laws (including the U.S.
A number of other states have enacted, or are in the process of enacting or considering, similar comprehensive state-level privacy, data protection, and cybersecurity laws, rules, and regulations, creating the potential for a patchwork of overlapping but different state laws.
A number of other states have enacted, or are in the process of enacting or considering, similar comprehensive state-level data privacy and cybersecurity laws, rules, and regulations, creating a patchwork of overlapping but different state laws.
For example, in the U.S., there are numerous federal, state, and local privacy, data protection, and cybersecurity laws, rules, and regulations governing the collection, storage, transmission, use, and other processing of personal data and Congress has considered, and continues to consider, many proposals for additional comprehensive national data privacy and cybersecurity legislation.
For example, in the U.S., there are numerous federal, state, and local data privacy, and cybersecurity laws, rules, and regulations governing the collection, storage, use, transmission, and other processing of personal information and Congress has considered, and continues to consider, various proposals for additional comprehensive national data privacy and cybersecurity legislation.
Any of the foregoing risks may be exacerbated by our use of AI, or that of our competitors or third-party service providers.
Any of the foregoing risks may be exacerbated by the use of AI by us or by our competitors or third-party service providers.
We expend significant resources to develop and secure our computer systems, IP, and proprietary, confidential, or sensitive data, but they may be subject to damage or interruption from weather conditions (including climate change), natural disasters, infrastructure or network failures (including failures at third-party data centers, by third-party cloud-computing providers, or of aging technology assets), terrorist attacks, power loss, internet and telecommunications failures, the loss or failure of systems over which we have no control, and cybersecurity risks such as cyberattacks, ransomware attacks, social engineering (including phishing attacks), computer viruses, denial of service attacks, physical or electronic break-ins, and similar disruptions from foreign governments, state-sponsored entities, hackers, organized cybercriminals, cyber terrorists, and individual threat actors (including malicious insiders), any of which may see their effectiveness further enhanced in the future by the use of AI.
We expend significant resources designed to develop and secure our computer systems, intellectual property, and information, including confidential, sensitive, and personal information, but they may be subject to damage or interruption from weather conditions (including climate change), natural disasters, infrastructure or network failures (including failures at third-party data centers, by third-party cloud-computing providers, or of aging technology assets), terrorist attacks, armed conflicts, power loss, internet and telecommunications failures, the loss or failure of systems over which we have no control, and cybersecurity risks such as cyberattacks, ransomware attacks, social engineering (including phishing attacks), computer viruses, denial of service attacks, physical or electronic break-ins, and similar disruptions from foreign governments, state-sponsored entities, hackers, organized cybercriminals, cyber terrorists, and individual threat actors (including malicious insiders), any of which may see their effectiveness further enhanced by the use of AI.
If we cannot license or develop technology for any allegedly infringing aspect of our business, we may be forced to limit our service and may be unable to compete effectively.
If we cannot license or develop technology for any allegedly infringing, misappropriating, or other violating aspect of our business, we may be forced to limit our service and may be unable to compete effectively.
Any fraudulent, malicious, or accidental breach of our computer systems or data security protections (including due to malicious insiders or inadvertent employee errors) could result in unintentional disclosure of, or unauthorized access to, customer, vendor, employee, or our own proprietary, confidential, or sensitive data or other protected information, which could result in additional costs to enhance security or to respond to such incidents, lost sales, violations of privacy or other laws, notifications to individuals, penalties, or litigation.
Any fraudulent, malicious, or accidental breach of our computer systems or cybersecurity protections (including due to malicious insiders or inadvertent employee errors) could result in unintentional disclosure of, or unauthorized access to, customer, vendor, employee, or our own information, including confidential, sensitive, and personal information, which could result in additional costs to enhance security or to respond to such incidents, lost sales, violations of data privacy, cybersecurity, or other laws or regulations, notifications to individuals, penalties, or litigation.
We have implemented certain systems and processes designed to thwart such threat actors and otherwise protect our computer systems and proprietary, confidential, or sensitive data; however, the systems and processes we have adopted may not be effective, and, similar to many other global multinational companies, we have experienced and may continue to experience cyber-threats, cyberattacks and other attempts to breach the security of our systems or gain unauthorized access to our proprietary, confidential, or sensitive data.
We have implemented systems and processes designed to thwart such threat actors and otherwise protect our computer systems and information, including confidential, sensitive, and personal information; however, the systems and processes we have adopted may not be effective, and, similar to many other global multinational companies, we have experienced and may continue to experience cyber- threats, cyberattacks and other attempts to breach the security of our systems or gain unauthorized access to our information, including confidential, sensitive, and personal information.
The GDPR and UK GDPR also provide individuals with various rights in respect of their personal data, including rights of access, erasure, portability, rectification, restriction, and objection. Failure to comply with the GDPR and the UK GDPR can result in significant fines and other liability.
The GDPR and UK GDPR also provide individual rights with respect to personal data, including rights of access, erasure, portability, rectification, restriction, and objection. Failure to comply with the GDPR and the UK GDPR can result in significant fines and other liability.
If we are not able to manage the risks related to our international operations, our business, financial condition, and results of operations may be materially affected.
If we are unable to manage the risks related to our international operations, our business, financial condition, and results of operations may be materially affected.
We have incurred goodwill impairment charges and may incur further impairment charges for our goodwill and other intangible assets, which would negatively impact our operating results. In 2024, 2023, and 2022, we recorded goodwill impairment charges that arose primarily due to worsening macroeconomic and market conditions, as well as sustained declines in our share price.
We have incurred goodwill impairment charges and may incur future impairment charges for our goodwill and other intangible assets, which would negatively impact our operating results. We have previously recorded goodwill impairment charges that arose primarily due to worsening macroeconomic and market conditions, as well as sustained declines in our share price.
Additionally, while we generally perform cybersecurity due diligence on our key vendors, service providers, contractors, and consultants, if any of these third parties fail to adopt or adhere to adequate cybersecurity practices, or in the event of a breach, incident, disruption, or other compromise of their networks, computer systems, or applications, our or our customers’ proprietary, confidential, or sensitive data, may be improperly lost, destroyed, modified, accessed, used, disclosed, or otherwise processed, which could subject us to claims, demands, proceedings, and liabilities.
Additionally, while we generally perform cybersecurity due diligence on our key vendors, service providers, contractors, and consultants, if any of these third parties fail to adopt or adhere to adequate cybersecurity practices, or in the event of a breach, incident, disruption, or other compromise of their technology infrastructure, our or our customers’ information, including confidential, sensitive, and personal information, may be improperly lost, destroyed, modified, accessed, used, disclosed, or otherwise processed, which could subject us to claims, demands, proceedings, and liabilities.
For example: • AI algorithms that we use may be flawed or may be based on datasets that are biased or insufficient; • Emerging AI applications may require additional investment in the development of proprietary datasets and machine learning models and new approaches and processes; • We may not have sufficient rights to use data or other material or content produced by generative AI in our business; • We may inadvertently expose third-party data or other material or content to AI without appropriate permission or attribution; • Our employees, contractors, vendors, or service providers may use any third-party software incorporating AI in connection with our business or the services they provide to us and inadvertently disclose or incorporate our information into publicly available training sets, which may impact our ability to realize the benefit of, or adequately protect, our intellectual property; 16 Table of Contents • Any output we create using generative AI may not be subject to copyright protection, which may adversely affect the intellectual property rights in or ability to commercialize such content; • Third parties may be able to use AI to create technology that could reduce demand for our products; • The use of AI may result in cybersecurity incidents that implicate the personal data of users of our AI tools or technologies; • The failure to properly remediate AI usage or ethics issues may cause public confidence in AI to be undermined, which could slow adoption of AI in our products and services; and • Our customers may not accept or be able to pay a premium for advanced AI capabilities in certain markets where we operate.
For example: • AI tools that we use may be flawed or may be based on algorithms, datasets, or prompts that are biased or insufficient; • We or our customers may rely on the output of AI tools, whether the tools are ours or those of a third-party service provider, which may contain errors or material that is unclear, unattributed, misattributed, insufficient, biased, or false; • Emerging AI applications may require additional investment in the development of proprietary datasets, algorithms, and machine learning models and new approaches and processes; • We may not have sufficient rights to use data or other material or content produced by AI, or the models, algorithms, data, or other material or content on which our AI tools rely, in our business; • We may inadvertently expose third-party data or other material or content to AI without appropriate permission or attribution; • Our employees, contractors, vendors, or service providers may use third-party software incorporating AI in connection with our business or the services they provide to us and inadvertently disclose or incorporate our information into publicly available or other third-party training sets, which may impact our ability to realize the benefit of, or adequately protect, our intellectual property and other proprietary rights; • Any output we create using AI may not be subject to copyright protection, which may adversely affect our intellectual property rights in or our ability to commercialize such content; • Third parties may be able to use AI to create technology that could reduce demand for our products; • The use of AI may result in cybersecurity incidents that implicate the personal or other confidential data of users of our AI tools or technologies; • Third-party vendors may fail to comply with shifting regulations or contractual obligations; • The failure to properly remediate AI usage or ethics issues may cause public confidence in AI to be undermined, which could slow adoption of AI in our products and services; and • Our customers may not accept or be able to pay a premium for advanced AI capabilities in certain markets where we operate.
Our reputation and ability to attract, retain, and serve our customers is dependent upon the reliable performance and security of our computer systems and those of third parties that we utilize in our operations to collect, store, use, and otherwise process public records, IP, and proprietary, confidential, and sensitive data, including personal data.
Our reputation and ability to attract, retain, and serve our customers is dependent upon the reliable performance and security of our computer systems and those of third parties that we utilize in our operations to collect, store, use, transmit, and otherwise process public records, intellectual property, and other information, including confidential, sensitive, and personal information.
We also compete with smaller and sometimes newer companies, some of which are specialized with a narrower focus than our company, and with other internet services companies and search providers.
We also compete with smaller and sometimes newer companies, some of which have a narrower focus than our company, and with other information services companies and search providers.
From time to time, we may also receive notices from third parties claiming infringement by our products and services of third-party patent and other IP rights and as the number of products and services in our markets increases and the functionality of these products and services further overlaps with third-party products and services, we may become increasingly subject to claims by a third party that our products and services infringe on such party’s IP rights.
We may also receive notices from third parties claiming infringement, misappropriation, or other violations by our products and services of third-party patent and other intellectual property rights and, as the number of products and services in our markets increases and the functionality of these products and services further overlaps with third-party products and services, we may become increasingly subject to claims by a third party that our products and services infringe on, misappropriate, or otherwise violate such party’s intellectual property rights.
Because most of the revenues we report in each quarter are the result of subscription and re-occurring agreements entered into or renewed in previous quarters, with subscription renewals historically concentrated in the first quarter, a decline in subscriptions in any one quarter may not affect our results in that quarter, but could reduce revenues in future quarters.
Because most of the revenues we report each quarter are the result of subscription and re-occurring agreements entered into or renewed in previous quarters, a decline in subscription activity in any one quarter may not affect our results that quarter, but could result in lower revenues in future quarters.
If any tax authority were to dispute a position we have taken or may take in the future and successfully proceed against us, it could adversely affect our cash flows and financial position, and the amounts we could be required to pay may be significant.
If any tax authority were to dispute a position we have taken or may take in the future and successfully proceed against us, it could adversely affect our cash flows and financial position, and the amounts we could be required to pay may be significant. We face risks associated with having operations and employees located in Israel.
Further, our use of any AI tools that use or incorporate any open source software may heighten any of the foregoing risks. Any of these risks could be difficult to eliminate or manage, and, if not addressed, could adversely affect our business, financial condition, and results of operations.
Further, our use of any AI tools that use or incorporate any open source software may heighten any of the foregoing risks. Any of these risks could be difficult to eliminate or manage, and, if not addressed, could adversely affect our business, financial condition, and results of operations. 21 Table of Contents Item 1B. Unresolved Staff Comments. None.
Additionally, we may be bound by contractual requirements applicable to our collection, storage, transmission, use, and other processing of proprietary, confidential, and sensitive data, including personal data, and may be bound or asserted to be bound by, or voluntarily comply with, self-regulatory or other industry standards relating to these matters. Item 1B. Unresolved Staff Comments. None.
Additionally, we may be bound by contractual requirements applicable to our collection, storage, use, transmission, and other processing of information, including confidential, sensitive, and personal information, and may be bound or asserted to be bound by, or voluntarily comply with, self-regulatory or other industry standards relating to these matters.
We generate a significant percentage of our revenues from recurring subscription-based arrangements and highly predictable re-occurring arrangements, with the remaining revenue coming from transactional revenues. If we are unable to maintain a high annual renewal rate for our subscription-based and re-occurring arrangements, or we are unable to achieve expected transactional revenues, our results of operations could be adversely affected.
We generate a significant percentage of our revenues from recurring subscription-based arrangements and highly predictable re-occurring arrangements. If we are unable to maintain a high annual renewal rate for our subscription- based and re-occurring arrangements, our results of operations could be adversely affected.
Our business can also be affected by macroeconomic factors beyond our control, and our ability to keep pace with technology, business, and regulatory changes is subject to a number of risks, including that we may find it difficult or costly to: • update or enhance our products and services and develop new products and services quickly enough to meet our customers’ needs; • leverage AI, including generative AI, in our existing or newly developed products and services; • make some features of our products work effectively and securely or with new or changed operating systems; and • update our products and services to keep pace with business, evolving industry standards, regulatory requirements, and other developments in the markets in which our customers operate.
Our ability to keep pace with technology, industry, and regulatory changes is subject to a number of risks, including those that we may find it difficult or costly to: • leverage AI in our existing or newly developed products and services; • make some features of our products work effectively and securely or with new or changed operating systems; and • update our products and services to keep pace with business, evolving industry standards, regulatory requirements, our customers’ needs, and other developments in the markets in which our customers operate.
The development, adoption, and use of generative AI technologies are still in their early stages and, as with many innovations, present risks, challenges, and unintended consequences that could affect its adoption.
The development, adoption, and use of AI technologies are still in 17 Table of Contents their formative stages and, as with many innovations, present risks, challenges, and unintended consequences that could affect their adoption.
If we do not maintain or obtain the expected benefits from our relationships with third-party providers or if a substantial number of our third-party providers or any key service providers were to withdraw their services, we may be less competitive, our ability to offer products and services to our customers may be negatively affected, and our results of operations could be adversely impacted. 10 Table of Contents Increased accessibility to free or relatively inexpensive information sources may reduce demand for our products and services.
If we do not maintain or obtain the expected benefits from our relationships with third-party providers, or if a substantial number of our third-party providers or any key service providers were to withdraw their services, we may be less competitive, our ability to offer products and services to our customers may be negatively affected, and our results of operations could be adversely impacted.
Any failure of our computer systems, disruption to our operations, or unauthorized access to any of our computer systems or those of third parties upon whom we rely or with whom we partner, including our cloud computing and other service providers, vendors, contractors, and consultants, could result in, among other things, significant expense to repair, replace, or remediate such systems, equipment, or facilities, a loss of customers, legal or regulatory claims, and proceedings or fines and adversely affect our business and results of operations.
Any failure of our computer systems, disruption to our operations, or unauthorized access to any of our computer systems or information, including confidential, sensitive, and personal information, or those of third parties upon whom we rely or with whom we partner could result in, among other things, significant expense to repair, replace, or remediate such systems, equipment, or facilities, a loss of customers, legal or regulatory claims, and proceedings or fines, all of which could adversely affect our business, financial condition, and results of operations.
These technologies are themselves highly complex and rapidly developing, and it is not possible to predict all of the legal or regulatory risks that may arise relating to our use of such technologies.
These technologies are themselves highly complex and rapidly developing, and it is not possible to predict all of the legal or regulatory risks that may arise relating to our use of such technologies. Laws and regulations vary between jurisdictions and are subject to change and evolving interpretations.
The effects of these hostilities on the Israeli economy and our operations in Israel are unclear, and we cannot predict the effect on our business of further increases in these hostilities or future armed conflict, political instability, or violence in the region.
The effects of recent regional hostilities and political unrest on the Israeli economy and our operations in Israel continue to be unclear, and we cannot predict the effect on our business of increases in these or other hostilities or future armed conflict, political instability, or violence in the region.
For the year ended December 31, 2024, approximately 80% of our revenues were subscription-based and re-occurring arrangements and 20% were transactional revenues.
For the year ended December 31, 2025 , approximately 83% of our revenues were subscription-based and re-occurring arrangements.
Our Value Creation Plan is subject to market conditions, customer adoption, and other uncertainties. We may not be able to successfully implement this plan on our anticipated timeline or at all, or it may not significantly improve or enhance our business, financial condition, or results of operations.
Our Value Creation Plan is subject to market conditions, customer adoption, successful operational implementation, and other uncertainties. Our efforts to continue implementing this plan may not be successful on our anticipated timeline or at all, or they may not significantly improve or enhance our business, financial condition, or results of operations.
We rely on our key personnel to execute our existing business operations and identify and pursue new growth opportunities. We have made recent changes in senior management, including our CEO, and could have further changes in the future, which could be disruptive to our management and operations and impede our ability to fully implement our business plan and growth strategy.
We rely on our key personnel to execute our existing business operations and identify and pursue new growth opportunities. Changes in senior management or other key personnel could be disruptive to our management and operations and impede our ability to fully implement our business plan and growth strategy.
Such third-party partners may also discontinue their relationships with us as a result of injunctions or otherwise, which could result in loss of revenue and adversely impact our business operations.
Such third-party partners may also discontinue their relationships with us as a result of injunctions or otherwise, which could result in loss of revenue and adversely impact our business operations. Our use of AI may heighten the foregoing risks, any of which could adversely affect our business, financial condition, and results of operations.
However, we may not be able to achieve the expected benefits of our acquisitions, including anticipated revenue, cost synergies, or growth opportunities. Moreover, we may not be able to integrate the assets acquired in any such acquisition or achieve our expected cost synergies without increases in costs or other difficulties.
We may not be able to achieve the expected benefits of our acquisitions, including anticipated revenue, cost synergies, or growth opportunities, and we may not be able to integrate the assets acquired or achieve our expected cost synergies without increases in costs or other difficulties. Furthermore, we may ultimately divest unsuccessful acquisitions, investments, or businesses.
Poor representation of our products and services by agents, or entities acting without our permission, could have an adverse effect on our brands, reputation, and business. Our indebtedness could adversely affect our business, financial condition, and results of operations.
In addition, in some jurisdictions, we engage sales agents in connection with the sale of certain of our products and services. Poor representation of our products and services by agents, or entities acting without our permission, could have an adverse effect on our brands, reputation, and business. Our indebtedness could adversely affect our business, financial condition, and results of operations.
In recent years, more public sources of free or relatively inexpensive information have become available, and we expect this trend to continue. Public sources of free or relatively inexpensive information may reduce demand for our products and services.
Increased access to free or relatively inexpensive information sources may reduce demand for our products and services. In recent years, more public sources of free or relatively inexpensive information have become available, and we expect this trend to continue, especially with the deployment of free, general purpose AI models and other AI tools.
Agreements with such third-party providers periodically come up for renewal or renegotiation, and there is a risk that such negotiations may result in different rights and restrictions which could impact our customers’ use of the content.
Agreements with such third-party providers periodically come up for renewal or renegotiation, and there is a risk that such negotiations may result in different rights and restrictions which could adversely impact our customers’ use of the content , particularly in certain cases where we are reliant on a sole source for data feeds that are not diversified .
Any acquisitions, investments, and dispositions will be accompanied by the risks commonly encountered in such transactions, including assuming potential liabilities of an acquired company, managing the potential disruption to our ongoing business, incurring expenses associated with the amortization of intangible assets, particularly for intellectual property and other intangible assets, incurring expenses associated with an impairment of all or a portion of goodwill and other intangible assets, and failing to implement or remediate controls, procedures, and policies appropriate for a larger public company at acquired companies that prior to the acquisition lacked such controls.
Any acquisitions, investments, and dispositions may be affected by the risks commonly encountered in such transactions, including assuming potential liabilities of an acquired company, managing the potential disruption to our ongoing business, incurring expenses associated with an impairment of all or a portion of goodwill and other intangible assets, and failure to implement or maintain proper controls, procedures, and policies associated with acquisition, investment, or disposition.
However, there is no guarantee that these measures will be effective in minimizing disruption from unexpected events that could result from a variety of causes, including human error, weather conditions (including climate change), natural disasters (such as hurricanes and floods), infrastructure or network failures (including failures at third-party data centers, by third-party cloud-computing providers, or of aging technology assets), and a disruption to our business that we are not capable of managing could adversely affect us.
Our goal is to ensure organizational resilience across product sets; however, there is no guarantee that our plans and procedures will be effective in minimizing disruption from unexpected events that could result from a variety of causes, including human error, military actions, terrorist or cyberterrorist activities, weather conditions (including climate change), natural disasters (such as hurricanes and floods), and infrastructure or network failures (including failures at third-party data centers or by third-party cloud-computing providers).
Our products and services include “open source” software, and we may incorporate additional open source software in the future. Open source software is generally freely accessible, usable, and modifiable.
Our use of “open source” software could negatively affect our ability to offer our solutions and subject us to possible litigation. Our products and services include “open source” software, and we may incorporate additional open source software in the future. Open source software is generally freely accessible, usable, and modifiable.
Further, implementing the plan could be time consuming, require us to incur costs, divert our management’s attention, result in the loss of potential business opportunities, and negatively impact our ability to attract, retain, and motivate key employees.
Further, completing the plan could be time consuming and costly, divert management’s attention, result in the loss of potential business opportunities, and negatively impact our ability to attract, retain, and motivate key employees. The loss of, or the inability to attract and retain, key personnel could impair our ability to execute our business strategy and achieve future success.
Our registered or unregistered trademarks, tradenames, or other intellectual property rights may be challenged, infringed, circumvented, misappropriated, or otherwise violated or declared invalid or unenforceable or determined to be infringing on other marks. Furthermore, even if we do obtain intellectual property rights, any challenge to those rights could result in them being narrowed in scope or declared invalid or unenforceable.
Our registered or unregistered trademarks, tradenames, or other intellectual property rights may be challenged, infringed, circumvented, misappropriated, or otherwise violated; declared invalid or unenforceable; determined to be infringing on other third-party rights, or narrowed in scope.
Our business is characterized by rapidly changing technology, evolving industry standards and changing regulatory requirements. Our growth and success depend upon our ability to keep pace with such changes and developments and to meet changing customer needs and preferences.
Our growth and success depend upon our ability to keep pace with such changes and developments and to meet changing customer needs and preferences.
At the state level, we are subject to laws, rules, and regulations, such as the California Consumer Privacy Act (as amended by the California Privacy Rights Act (collectively, “CCPA”)), which imposes requirements, including disclosure requirements, access rights, opt out rights, and the right to request deletion of personal information, on covered companies that process California consumers’ personal information and provides for civil penalties for violations as well as a private right of action for certain data breaches.
At the state level, we are subject to laws, rules, and regulations, such as the California Consumer Privacy Act (as amended by the California Privacy Rights Act (collectively, “CCPA”)), which imposes disclosure requirements, access rights, opt out rights, and the right to request deletion of personal information, among other rights.
In the ordinary course of business, we collect, store, use, and transmit certain types of information that are subject to different laws and regulations. In particular, data security and data protection laws and regulations often vary significantly by jurisdiction.
In the ordinary course of business, we collect, aggregate, store, use, analyze, transmit, license, and otherwise process certain types of information, including confidential, sensitive, and personal information, including data sourced from third parties, that are subject to different laws and regulations. In particular, data privacy and cybersecurity laws and regulations often vary significantly by jurisdiction.
Given the costs and expenses of obtaining, maintaining, protecting, defending, and enforcing our intellectual property rights, we may choose not to obtain, maintain, protect, defend, or enforce certain rights that later turn out to be important to our business.
We may choose not to obtain, maintain, protect, defend, or enforce certain rights that later turn out to be important to our business.
We use, and may expand our use of, AI in our products, services, business, and operations. Developing, testing, deploying, and maintaining AI systems will require additional investment and may increase our costs. If we fail to keep pace with rapidly evolving AI technological developments, our competitive position and business results may be negatively impacted.
We use and expect to expand our use of AI in our products, services, business, and operations. Developing, testing, deploying, and maintaining AI systems will require additional investment and may increase our costs.
We may be unable to prevent the misappropriation or disclosure of our proprietary information or deter independent development of similar products and services by others, which may diminish the value of our brand and other intangible assets and allow competitors to more effectively mimic our products and services. 15 Table of Contents While it is our policy to require our employees, contractors, and other parties with whom we conduct business who may be involved in the conception or development of intellectual property for us to execute agreements assigning such intellectual property to us, we may be unsuccessful in executing such an agreement with each party that conceives or develops intellectual property that we regard as ours.
While it is our policy to require our employees, contractors, and other parties with whom we conduct business who may be involved in the development of our intellectual property to execute agreements assigning such intellectual property to us, we may be unsuccessful in executing such an agreement with each party that conceives or develops intellectual property that we regard as ours.
We may not be able to adequately anticipate or respond to these evolving technologies, laws, and regulations, and we may need to expend additional resources to adjust our products, services, and operations, which could adversely affect our business, financial condition, and results of operations.
We may not be able to adequately anticipate or respond to these evolving technologies, laws, and regulations, and we may need to expend additional resources to adjust our products, services, and operations, which could adversely affect our business, financial condition, and results of operations. 18 Table of Contents Any disruption in or unauthorized access to or breaches of our computer systems or those of third parties that we utilize in our operations, including those relating to cybersecurity or arising from cyberattacks, could adversely impact our business.
In addition, many of our employees in Israel are obligated to perform annual reserve duty in the Israeli military and are subject to being called for active duty under emergency circumstances. We cannot predict the full impact of these conditions on our operations in the future, particularly if emergency circumstances or an escalation in the political situation occurs.
In addition, many of our employees in Israel are obligated to perform annual reserve duty in the Israeli military and are subject to being called for active duty under emergency circumstances.
Failure to meet one or more of our revenue objectives could have a material adverse effect on our business, financial condition, and operating results. 11 Table of Contents If our products and services do not achieve and maintain broad market acceptance, or if we are unable to keep pace with or adapt to rapidly changing technology, evolving industry standards, macroeconomic market conditions, and changing regulatory requirements, our revenues could be adversely affected.
If our products and services do not achieve and maintain broad market acceptance, or if we are unable to keep pace with or adapt to rapidly changing technology, evolving industry standards, and changing regulatory requirements, our revenues could be adversely affected. Our business is characterized by rapidly changing technology, evolving industry standards, and changing regulatory requirements.
We may also face additional strain on our systems and networks due to aging or end-of-life technology that we have not yet updated or replaced. Further, many of our employees work remotely, which magnifies the importance of the integrity of our remote access security measures and may expose us to additional cybersecurity risks.
We may also face additional strain on our systems and networks due to aging or end-of-life technology that we have not yet updated or replaced.
As previously announced, we have developed and adopted a new Value Creation Plan that is intended to increase subscription and re-occurring revenue mix, increase organic growth, optimize return on investment, and improve financial performance.
Business and Operational Risks Our Value Creation Plan may not be successful and may not lead to increased shareholder value. In 2025, we adopted a Value Creation Plan that is intended to increase subscription and re-occurring revenue mix, increase organic growth, optimize return on investment, and improve financial performance.
We must also maintain our ability to attract, motivate, and retain highly qualified employees in our respective segments in order to support our customers and achieve business results. Our ability to attract and retain employees may be negatively impacted by employees’ reactions to our policies related to working remotely and returning to office, particularly in the United States.
We must also maintain our ability to attract, motivate, and retain highly qualified employees in our respective segments in order to support our customers and achieve business results.
In addition, the principal customers for certain of our products and services are universities and government agencies, which fund purchases of these products and services from limited budgets that are sensitive to changes in private and governmental sources of funding. Recession, economic uncertainty, or austerity have contributed, and may in the future contribute, to reductions in spending by such sources.
Reductions in customers’ research budgets or government funding may adversely affect our business. The principal customers for certain of our products and services are academic institutions, government agencies, and life sciences and pharmaceutical companies, which fund purchases of these products and services from limited budgets that are sensitive to changes in private and governmental sources of funding.
As a result, political and military conditions in Israel and the surrounding region directly affect our operations. The future of peace efforts between Israel and its neighbors in the Middle East remains uncertain. There has been a significant increase in hostilities and political unrest in Israel and the surrounding region.
We have an office with approximately 500 employees located in Israel, including members of our executive team. As a result, political and military conditions in Israel and the surrounding region could directly affect our operations. The future of peace efforts between Israel and its neighbors in the Middle East remains uncertain.
New and emerging technologies, including AI, can also have the impact of allowing start-up companies to enter the market more quickly than they would have been able to in the past.
New and emerging technologies, including AI, may present opportunities for our existing competitors to adopt additional or complementary services more effectively than us, and may also allow start-up companies to enter the market more quickly than they would have been able to in the past.
In the event we further impair our goodwill, other intangible assets, or long-lived assets, such a charge could have a material adverse effect on our financial condition and results of operations.
In the event we impair our goodwill, other intangible assets, or long-lived assets, such a charge could have a material adverse effect on our operating results. 16 Table of Contents Intellectual Property, Data Privacy, and Cybersecurity Risks Failure to obtain, maintain, protect, defend, or enforce our intellectual property and other proprietary rights could adversely affect our business, financial condition, and results of operations.
Furthermore, future acquisitions may not be completed on acceptable terms, and we may ultimately divest unsuccessful acquisitions, investments, or businesses. Additionally, if we fail to successfully complete an intended disposition, our operations and financial results may be negatively affected.
If we fail to successfully complete an intended disposition, our operations and financial results may be negatively affected.