Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - NLOK

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

Item 1A. Risk Factors, of this Annual Report on Form 10-K. We encourage you to read those sections carefully. There may also be other factors that have not been anticipated or that are not described in our periodic filings with the Securities and Exchange Commission (SEC), generally because we did not believe them to be significant at the time, which could cause actual results to differ materially from our projections and expectations. All forward-looking statements should be evaluated with the understanding of their inherent uncertainty.
4

PART I
Item 1. Business
Purpose and Mission
Purpose: Powering Digital Freedom.
Mission: We create technology solutions for people to take full advantage of the digital world, safely, privately, and confidently so together, we can build a better tomorrow.
Our Values
Protecting people is what inspires us, and our people are at the core of what we do. We seek to attract talent that embraces the following values:
Customer Driven. Community Minded. We are advocates for our customers and are dedicated to making their lives simpler and safer. We are driven by the positive impact we can have on all the communities in which we live and work.
Think Big. Be Bold. We empower and inspire one another to think in new ways and to embrace change. We take calculated risks and learn fast to drive innovation across the business.
Keep it real. Make it Happen. We are authentic, open, and treat one another with respect. We do what we say and say what we do with integrity.
Play to win. Together. We act with passion, purpose, and energy to win with customers and in the marketplace. We leverage the strength of our global team, knowing we’re more powerful together.
Company Overview
Gen is a global company powering Digital Freedom with a family of trusted brands including Norton, Avast, LifeLock, Avira, AVG, ReputationDefender and CCleaner. We bring award-winning products and services in cyber safety, covering security, privacy and identity protection to approximately 500 million users in more than 150 countries so they can live their digital lives safely, privately, and confidently today and for generations to come. We bring award-winning products and services in Cyber Safety, covering security, privacy and identity protection to approximately 500 million users in more than 150 countries so they can live their digital lives safely, privately, and confidently today and for generations to come.
Today’s world is increasingly digital, and this has changed the way we live our lives every day. The last decade has brought increasingly impressive technological advances that have unlocked new ways to play and transact online, control smart homes, and more. The possibilities in the digital world will continue to transform our lives. However, with each new digital interaction comes increased risk and exposure for consumers as cybercriminals use a mix of old and new tactics and technologies, including phishing, vishing, smishing, based on machine learning and generative artificial intelligence (AI) technologies, to execute highly advanced threats and attacks. However, with each new digital interaction comes increased risk and exposure for consumers as cybercriminals use a mix of old and new tactics and technology, including phishing, vishing, smishing, based on machine learning and deep fake, to execute highly advanced threats. We are our customers’ trusted ally they can depend on to help secure and control their digital lives so they can be free to enjoy the promise of the digital world. We are committed more than ever to protecting and empowering people’s digital lives with personalized, human-centered safety.
We are well positioned for driving the awareness of cyber safety for individuals, families, and small businesses, fueled by an increasingly connected world.We are well positioned for driving the awareness of Cyber Safety for individuals, families, and small businesses, fueled by an increasingly connected world. We maintain a global, omni-channel sales approach, including direct, indirect and freemium acquisition and a family of brands marketing program. We maintain a global, omni-channel sales approach, including direct acquisition and a family of brands marketing program. This program is designed to grow our customer base by increasing brand awareness and understanding of our products and services and maximizing our global reach to prospective customers.
We help prevent, detect and restore potential damages caused by many cybercriminals. We also make it easy for consumers to find, buy and use our products and services. To this end, we offer both free and paid subscription-based cyber safety solutions primarily direct-to-consumer through our family of brands and indirectly through partner relationships. To this end, we offer both free and paid subscription-based Cyber Safety solutions primarily direct-to-consumer through our family of brands and indirectly through partner relationships. Most of our subscriptions are offered on annual terms, but we also provide monthly subscriptions.
As of March 29, 2024, we have approximately 500 million total users, which come from direct, indirect and freemium channels. Of these total users, we have approximately 65 million paid cyber safety customers including over 39 million direct customers with whom we have a direct billing relationship. Of these total users, we have approximately 65 million paid Cyber Safety customers including over 38 million direct customers with whom we have a direct billing relationship.
Direct-to-consumer channel: We use advertising to elevate our family of brands, attract new customers and generate significant demand for our services. Our direct subscriptions are primarily sold through our e-commerce platform and mobile apps, and we have a direct billing relationship with the majority of these customers.
Indirect partner distribution channels: We use strategic and affiliate partner distribution channels to refer prospective customers to us and expand our reach to our partners’ and affiliates’ customer bases. We developed and implemented a global partner sales organization that targets new, as well as existing, partners to enhance our partner distribution channels. These channels include retailers, telecom service providers, hardware OEMs, employee benefit providers, strategic partners, and small offices, home offices and very small businesses. Physical retail and OEM partners represent a small portion of our distribution, which minimizes the impact of supply chain disruptions.
Freemium channels: With the acquisitions of Avast and Avira, we have expanded our go-to-market with multiple freemium channels. We use free versions of our products to reach the broadest set of consumers globally and bring cyber safety to a larger audience, especially in international markets. We use free versions of our products to reach the broadest set of consumers globally and bring Cyber Safety to a larger audience, especially in international markets. The free solution offers a baseline of protection and presents premium functionalities based on the risk profile and specific needs of the user. The user can choose to add specific premium solutions or upgrade to suites that provide security, identity, and privacy across multiple platforms and devices, thereby becoming a paid customer.
5

Seasonality
As is typical for many consumer technology companies, portions of our business are impacted by seasonality. However, we believe the net impact on our business is limited. Seasonal behavior in orders primarily reflects consumer spending patterns where our fiscal third and fourth quarters are generally higher due to the holidays in our third quarter, as well as follow-on holiday purchases and the U.S. tax filing season which typically is in our fourth quarter. Revenue generally reflects similar seasonal patterns but to a lesser extent than orders because of our subscription business model, as the majority of our in-period revenues are recognized ratably from our deferred revenue balance.
Our Strategy
Our strategy is focused on long-term profitable growth. To fuel our growth, our consumer-centric strategy is to provide comprehensive and easy-to-use integrated platforms, which we have built in-house or acquired. By combining and leveraging our family of trusted consumer brands, including offerings from Norton, Avast, LifeLock, Avira, AVG, ReputationDefender and CCleaner, we deliver an industry-leading set of cyber safety solutions.
We are positioned for long-term growth and expansion. Our three primary growth levers are:
1.Extending Reach: Leveraging an omni-channel strategy and building partnerships to broaden privacy and identity protection internationally.
2.Increasing Value: Cross-selling and up-selling, and expanding security, identity and privacy solutions to address consumers’ evolving needs.
3.Growing Loyalty: Increase customer loyalty and retention, as consumers move from point products protecting their devices towards all-in-one comprehensive cyber safety memberships.
The key elements of our strategy include the following:
Extend our leadership position through new products and continued enhancement of our solutions and services: Cyber safety is a large and expanding market, which we believe provides a significant growth opportunity. Our strategy is to grow our business through innovation and acquisitions to expand the solutions and services we offer into new cohorts, territories and sectors. We believe there are many additional areas where we can both offer new solutions, as well as use our core capabilities and our integrated platform to reach new customers and markets globally.
Grow our customer base through multiple channels: We have multiple go-to-market channels to reach new customers globally, including direct-to-customer, indirect partnerships and freemium. We intend to leverage our expertise in digital marketing, as well as existing and new strategic partnerships, to grow our customer base. We believe that continued investments in these areas, as well as our product offerings and infrastructure, will allow us to further enhance our leading brands and superior products, increase awareness of our consumer services and enhance our ability to efficiently acquire new customers.
Continue our focus on customer retention: We continue to optimize and expand the value we provide to customers which we believe can positively impact retention. We aim to continue to increase customer engagements through actionable alerts, education on timely topics and introducing new product capabilities. We also plan to continue investing in enhancing both desktop and mobile customer experiences throughout a customer’s journey with Gen, from purchase, to onboarding and beyond.
Increase value to existing customers: We believe strong customer satisfaction will provide us with the opportunity to engage customers in new services offerings. We maintain the Norton 360 and Avast One platforms that have multiple tiers of membership, and we continue to engage customers with standalone products to offer membership options and show the value proposition of our premium solutions. Over time, we plan to drive further growth as we add additional offerings and services for our customers.
Draw strength from our world-class customer service support: Our global support team seeks to ensure the voice of the consumer is heard and that we put our customers first. We leverage frequent communication and feedback from our customers to continually improve our solutions and services. We embrace end-to-end customer experience and aim to continue to improve our Net Promoter Scores and overall customer satisfaction.
Leverage our global brands to drive growth: We will work to keep building our family of trusted brands in markets globally as we strive to bring protection and empowerment to all consumers when it comes to their digital lives. According to our most recent research, Norton has 85% global brand awareness, and we are best positioned and top of mind in consumer cyber safety, according to the 2023 Gen Brand Tracker. According to our most recent research, Norton has 84% global brand awareness, and we are best positioned and number one top of mind in consumer Cyber Safety, according to the 2022 Gen Brand Impact study.
Our Cyber Safety Solutions and Services
Our broad portfolio of products and services is developed from consumer insights to help us bring to market real solutions to real problems and to engage and educate consumers about cyber safety. We continuously aim to release new products and features to outpace evolving threats and find synergies to integrate current and future technology acquisitions. We continuously target to release new products and features at an accelerated pace and find synergies to integrate current and future technology acquisitions.
Our cyber safety portfolio provides protection across three key categories in multiple channels and geographies, including security and performance, identity protection, and online privacy. Leveraging our technology platforms, we integrate software and service capabilities within these three categories into comprehensive and easy-to-use products and solutions across our brands. Our technology platforms bring together software and service capabilities within these three categories into comprehensive and easy-to-use products and solutions across our brands.
6

We have also evolved beyond traditional cyber safety to offer adjacent trust-based solutions, including digital identity and access management, digital reputation, and restoration support services.
We protect and empower consumers by providing solutions and services in two main ways:
Comprehensive membership plans: Providing a comprehensive and all-in-one cyber safety portfolio of solutions for a membership fee. Plans are offered through Norton 360 and Avast One subscriptions, with both brands providing multiple levels of membership tiers that range from basic, mid-level, or premium tiers where identity theft and online privacy features are included. Plans are offered through Norton 360 and Avast One subscriptions, both brands provide multiple levels of membership tiers that range from basic, mid-level, or premium tiers where identity theft and online privacy features are included.
Point solutions: Providing individual, stand-alone products and services in security, identity and privacy, offering flexibility for consumers to choose between free or paid solutions. These products solve for a specific need, when you need it, and can add on to the value you already have. Please see below for our full set of products by category.
We are well positioned across three key cyber safety categories:
Security and Performance (Norton, Avast, Avira, AVG, and CCleaner offerings): Our offerings provide real-time threat protection for PCs, Macs and mobile devices against malware, viruses, adware, ransomware and other online emerging threats. These offerings monitor and block unauthorized traffic from the internet to the device to help protect private and sensitive information when customers are online. Additionally, our all-in-one cybersecurity solutions help small business owners safeguard their team’s online activities, devices and customer data. Scams have also continued to become more prevalent and sophisticated and we offer real-time scam detection tools such as Norton Genie to help determine if a text, email, social media post or website could be a scam. We also provide performance and optimization software solutions that frees up space on devices, clears online tracking and helps machines run faster.
Identity Protection (US: LifeLock Identity Theft Protection, Avast and AVG Secure Identity; International: Norton Identity Theft Protection, Dark Web Monitoring): In the US, we offer Identity Theft protection as part of our LifeLock, Avast and AVG brands. All three products include monitoring of credit reports, the dark web and social media accounts to help safeguard our customers’ personal information. The LifeLock product also offers monitoring of financial accounts. In the event of identity theft, we assign an Identity Restoration Specialist to work directly with customers to help restore their identities, and all plans include reimbursements for losses and expenses incurred ranging up to $3 million. Outside the US, we offer Norton branded plans that include dark web monitoring in over 50 countries and monitoring of credit, social media and financial accounts, restoration support and identity theft insurance in select countries.
Online Privacy (VPN, multiple personal data protection products, ReputationDefender): Our VPN solutions offered through the Norton, Avast and AVG brands enhance security and online privacy by providing an encrypted data tunnel. This allows customers to securely transmit and access private information, such as passwords, bank details and credit card numbers, when using public Wi-Fi on PCs, Macs, and mobile iOS and Android devices. We offer a variety of solutions under the Norton and Avast brands to protect customers’ data either by keeping it anonymous while browsing online through our AntiTrack and Secure Browser products or helping customers remove it from public data broker sites through our Privacy Monitor Assistant and BreachGuard products. ReputationDefender is a white glove service that helps customers manage all aspects of their personal branding online, including search results, social media sites and overall web presence.
Innovation, Research and Development
Gen has a long history of innovation, and we plan to continue to invest in research and development to drive our long-term success.
As cyber threats evolve, we are focused on delivering a portfolio that protects each element of our customers’ digital lives. To do this, we engage and listen to our customers, and we embrace innovation by deploying a global research and development strategy across our cyber safety platform. Our engineering and product management teams are focused on delivering new versions of existing offerings, as well as developing entirely new offerings to drive the company’s global leadership in cyber safety.
We are committed to our innovation and research and development efforts. The Technology team at Gen is driving the company’s future technologies and innovation and helping guide the consumer cybersecurity industry. Our global technology research organization is focused on applied research projects, with the goal of rapidly creating new products to address consumer trends and grow the business, including defending consumer digital privacy and identity. We also have a global threat response and security technology organization that is comprised of our dedicated team of threat and security researchers, supported by advanced systems to innovate security technology and threat intelligence. We also have a global threat 7Table of Contentsresponse and security technology organization that is comprised of our dedicated team of threat and security researchers, supported by advanced systems to innovate security technology and threat intelligence.
We have one of the world’s largest consumer cyber safety networks. Leveraging our capabilities, our global threat response team handles a wide variety of attacks, including social engineering attacks, file-based attacks, web and network-based attacks, privacy and data exfiltration attacks, identity theft attacks, algorithmic manipulation attacks, and more.
Our differentiated approach is powered by our global scale and visibility, geographically distributed cloud data platform, and advanced AI-based automation.
7

Industry Overview
Cyber safety is a growing market, fueled by the increase in activities online over the years as well as the years ahead. The core markets that we participate in are security, identity and privacy. We believe the cyber safety market will continue to expand beyond these core markets and grow significantly, driven by the increasing number of people globally connected to the internet and their expanding digital lives. We believe the Cyber Safety market will continue to expand beyond these core markets and grow significantly, driven by the growing number of people globally connected to the internet and their expanding digital lives.
The cyber threat landscape is larger and more complicated than ever before, exposing consumers to an increased risk to their digital lives. The digitization of the world and the overlap between the physical and digital world are growing at a fast pace. New technologies, smart devices, digital identities and an increasingly more connected world mean consumers will encounter a range of new cyber safety challenges. Consumer demands and behaviors are rapidly changing and driving more activities online, from shopping, socializing, working, banking, to other activities in healthcare, entertainment and so much more. Almost every aspect of a person’s life has a digital component. Unfortunately, many of those activities are left unprotected, and attackers are exploiting this larger opportunity and the inherent security and privacy vulnerabilities. Cybercriminals have not only expanded their reach, but the sophistication of digital threats and attacks are becoming increasingly more realistic and believable. The advancement of AI and large language model (LLM) technology is a key driver of this.
Cybercrime, and the ways in which cybercriminals target consumers, continue to evolve along with behaviors and technology. Cybercrime encompasses any crime committed with devices over the internet and includes crimes where (i) malicious software or unauthorized access is detected on a device, network or online account (such as email, social media, online banking, crypto currency, online retail, gaming, online entertainment, etc.), and unauthorized access or connection to cloud service accounts; (ii) an individual is digitally victimized through a data breach, cyber theft, cyber extortion, or fraud (stolen personally identifiable information, identity theft, etc.); (iii) online stalking, bullying, or harassment is inflicted; or (iv) attacks related to privacy or disinformation (such as online tracking protection, identity impersonation, disinformation on social media, deepfakes, unsecured WiFi, EvilTwin attacks, etc.).
Competitive Landscape
We operate in a highly competitive and dynamic environment. We face global competition from a broad range of companies, including software vendors focusing on cyber safety solutions, operating system providers such as Apple, Google and Microsoft, and ‘pure play’ companies that currently specialize in one or a few particular segments of the market and many of which are expanding their product portfolios into different segments. We face global competition from a broad range of companies, including software vendors focusing on Cyber Safety solutions, operating system providers such as Apple, Google and Microsoft, and ‘pure play’ companies that currently specialize in one or a few particular segments of the market and many of which are expanding their product portfolios into different segments. We believe the competitive factors in our market include innovation, access to a breadth of identity and consumer transaction data, broad and effective service offerings, brand recognition, technology, effective and cost-efficient customer acquisition, having a strong retention rate, customer satisfaction, price, convenience of purchase, ease of use, frequency of upgrades and updates and quality and reliable customer service. Our competitors may vary by offering, geography, business model and channel.
Our principal competitors are set forth below:
Security: Our principal competitors in this segment include Apple, Bitdefender, ESET, F-Secure, Google, Kaspersky, Malwarebytes, McAfee, Microsoft, Trend Micro, and Webroot.
Identity Protection: Our principal competitors in this segment include credit bureaus such as Equifax, Experian and TransUnion, as well as certain credit monitoring and identity theft protection solutions from others such as Allstate, Aura, Generali (Iris), Intuit (Credit Karma) and Microsoft.
Online Privacy: Our principal competitors in this segment include Apple, Aura, Brave, DuckDuckGo, IPVanish, Kape, Mozilla and Nord Security.
Other Competitors: In addition to competition from independent software vendors such as Bitdefender, Kaspersky, McAfee and Trend Micro, and from OS providers such as Apple, Google and Microsoft, we also face competition from other companies that currently focus on one or a few cyber safety or adjacent segments but are developing additional competing products and expanding their portfolios into new segments, such as ‘pure play’ companies including but not limited to, 1Password, Bark, Dashlane, LastPass, Life360, Proton, and Truecaller, internet service providers, big tech platform providers, insurance companies and financial service organizations.
We believe we compete favorably with our competitors on the strength of our technology, people, product offerings and presence in all of the current key cyber safety categories. However, some of our competitors have greater financial, technical, marketing, distribution or other resources than we do, including in new cyber safety and digital life segments we may enter, which consequently affords them competitive advantages. However, some of our competitors have greater financial, technical, marketing, distribution or other resources than we do, including in new Cyber Safety and digital life segments we may enter, which consequently affords them competitive advantages. As a result, they may be able to devote greater resources to develop, promote and sell their offerings; deliver competitive offerings at lower prices or for free; and introduce new solutions and respond to market developments and customer requirements and preferences more quickly or cost effectively than we can. In addition, for individual solutions or features, smaller, well-funded competitors may be able to innovate and adapt more nimbly to the dynamic nature of the market and shifting consumer needs.
For more information on the risks associated with our competitors, please see “Risk Factors” – Risks Related to Our Business Strategy and Industry – “We operate in a highly competitive and dynamic environment, and if we are unable to compete effectively, we could experience a loss in market share and a reduction in revenue” and “We may need to change our pricing models to compete successfully,” in Item 1A included in this Annual Report on Form 10-K.
8

Environmental, Social and Governance (ESG)
Our commitment to ESG supports our company Purpose and Mission. The Nominating and Governance Committee of our Board of Directors has oversight over the Company’s ESG strategy, and our full Board of Directors receives a quarterly ESG update. This quarterly update includes program information across ethics, community investment, the environment and information on emerging ESG priorities. Additionally, as part of our ESG reporting process, we hold regular meetings with functional leaders to review our ESG disclosures. Our Leadership Team is highly engaged in our ESG efforts. Our Head of Corporate Responsibility and Public Policy provides quarterly updates to our Leadership Team and cross-functional ESG Working Group to review our strategy, progress, and program updates. Our Head of Corporate Responsibility and Government Affairs reports to our Chief Marketing Officer and meets quarterly with our CEO and Leadership Team and cross-functional ESG Working Group to review our strategy, progress, and program updates.
Building a brand centered on trust is critically important to our business success, and our focus on ESG helps us earn trust from our customers, employees, investors and shareholders.Building a brand centered on trust is critically important, and our focus on ESG helps us earn trust from our customers, employees, investors and shareholders. As such, ESG topics are core to our business strategy. Examples of our efforts include:
Environment: Helping protect our planet is part of promoting a safe and sustainable future. We work to reduce greenhouse gas emissions from our operations through operational efficiencies, reduce the environmental footprint of our products across their lifecycle through innovative approaches to product development and packaging, promote high standards in our supply chain and engage with employees and environmental partners to amplify our work.
Social: We are proud to support the communities where our team members live and work. Our community impact programs include employee volunteering and giving, product donations, signature programs that leverage our unique expertise in increasing digital safety literacy, and corporate philanthropic giving. Our community impact programs include employee volunteering and giving, product donations, signature programs that leverage our unique expertise in increasing digital safety literacy, and corporate philanthropic giving focused on digital safety education; environmental action; and disaster response. Our giving focuses on digital safety education; environmental action; and disaster response. We also support diversity, equity, and inclusion and employee engagement, discussed in more detail in the Human Capital Management subsection.
Governance: Governance covers many core operating principles overseen by the Nominating and Governance Committee of our Board of Directors. This committee has oversight of ESG program and receives quarterly updates on topics such as diversity, ethics, community investment and the environment. This committee has oversight of ESG issues and receives quarterly updates on topics such as diversity, ethics, environmental stewardship and community investment. Our global culture of responsibility, and the positive contributions we make to the customers, employees, communities, and other stakeholders that we serve drives value for our business.
Setting strategic, achievable, and business-aligned corporate responsibility objectives helps to guide our work and improves our company performance. We align our ESG programs with the company’s financial goals and focus on the unique positive social and environmental impacts that our business model can have on the world. We align our objectives with the company’s financial goals and focus on the unique positive social and environmental impacts that our business model can have on the world. These include:
Data Privacy and Protection: We safeguard our customer, partner and employee data and offer products that help consumers protect their personal data wherever it is found.
Education and Training for cyber safety: We leverage our leading expertise and technology to help educate, train and protect children, families and vulnerable communities online.
Diversity, Equity and Inclusion in Technology: We invest in high-impact non-profits to bring more women and under-represented groups into cybersecurity and technology.
Environment: We focus our environmental strategy on climate and energy, sustainable products, our supply chain, and engagement with employees and nonprofit partners with an emphasis on transparency about our progress and commitments.
Employee Engagement: We provide employees globally with meaningful ways to put their time, skills and monetary donations to work for their favorite causes. Gen provides robust benefits for volunteering and giving for all employees including matching donations dollar for dollar to approved nonprofits. During special campaigns, Gen provides an opportunity to double their donations to their favorite causes.
We cannot guarantee that we will achieve these objectives, and our ability to achieve them is subject to risks and uncertainties both known and unknown, including various risks noted in Item 1A. Risk Factors and elsewhere in this Annual Report on Form 10-K. Our annual ESG and Corporate Responsibility Report can be found at Investor.GenDigital.com/ESG.
Human Capital Management
At Gen, our mission is to build a comprehensive and easy-to-use integrated portfolio that prevents, detects and responds to cyber threats and cybercrimes in today’s digital world. Our success in helping achieve this mission depends, in large part, on the success of our employees.
General Employee Demographics: As of March 29, 2024, we employed just under 3,400 team members in nearly 30 countries worldwide. With dual headquarters in Tempe, Arizona, and in Prague, Czech Republic, we have over 1,000 active employees located in the U.S. and nearly 900 active employees in the Czech Republic. None of our U.S. employees are represented by a labor union or covered by a collective bargaining agreement.
As of March 29, 2024, inclusive of our integration of bringing together NortonLifeLock and Avast teams as a combined company, women represented 34% of Gen’s total workforce and held positions in 34% of our leadership. In addition, as of March 29, 2024, women represented 40% of our Board of Directors and half of our independent board membership.
Diversity, Equity and Inclusion (DEI): We strive to be a diverse, vibrant community with strong values and a shared commitment to our customers, to each other, the work we do and the world we all share. Our mission is to increase our global representation of underrepresented groups at all levels (diversity), where everyone has an opportunity for
9

development and advancement (equity) and can bring their whole selves to work and feel valued every day (inclusion). As part of our culture and leadership fabric, we are committed to increasing diversity through our four pillar DEI strategy. This mission is built upon four foundational pillars: (1) measurement and accountability; (2) fostering an inclusive environment; (3) diversifying our workforce; and (4) employee development and retention, which are designed to support, attract, retain and nurture our talent.
Clear and actionable multi-year representation goals are set at the leadership level to support accountability and progress, against our goals. Diversity and inclusion are woven into our people processes and our culture. We ask new hires and employees to self-identify their demographics and other important characteristics to help us better measure the diversity of our applicant pool and of our team to derive insights and actionable people strategies. We ask new hires and employees to self-identify their demographics, and important characteristics to help us better measure the diversity of our applicant pool and of our team to derive insights and actionable people strategies. We post positions on several diverse recruiting sites and have dedicated budget to support increasing diverse candidate pipelines.
Inclusion is something we strive for and we measure belonging as a key metric in our Engage employee surveys and are proud to support our nine employee resource groups, our Gen communities for people to come together as allies, to learn, support, mentor, and celebrate with one another and to provide an environment where everyone feels seen, heard, respected and valued. We measure belonging as a key metric in our quarterly Engage employee surveys and are proud to support our eight employee resource groups our Gen communities for people to come together as allies, to learn, support, mentor, and celebrate with one another and to provide an environment where everyone feels seen, heard, respected and valued.
Employee Development and Training: Our people programs are designed to provide our team members with support, resources, and opportunities they need to grow, learn and thrive in their careers. We continued to focus on learning and development in fiscal 2024, investing further in digital learning via our Rise Learning programs for all employees. We continued to focus on learning and development in fiscal 2023, investing further in digital learning via our Rise Learning (formally Nvest Learning) programs for all employees. Leveraging an extensive breadth of content and learning opportunities, this umbrella of offerings includes Rise Mentorship, Rise eLearning and University of Rise (U Rise). Leveraging an extensive breadth of content and learning opportunities.
Rise eLearning, a collection of over 5,000 digital, on-demand modules categorized around leadership, health and wellness, business skills, and technical skills, experienced a steady increase in participation during the year with over 2,000 individual learners. Rise eLearning, a collection of digital, on-demand modules categorized around leadership, health and wellness, business skills, and technical skills, experienced a steady increase in participation during the year with over 1,200 individual learners who have experienced 5000 modules total. We also provide group learning designed around TED Talks on topics including leadership, change management and to support our diversity, equity and inclusion efforts.
Our Rise Mentorship program continues to grow and boasts an active community of mentors and mentees across the world. Our U Rise leadership program that offers best-in-class content from Harvard ManageMentor to inspire and engage existing and aspiring people leaders provides over 40 course options and group learning opportunities. University of Rise (U Rise) leadership program that offers best-in-class content from Harvard ManageMentor to inspire and engage existing and aspiring people leaders provides over 40 course options and group learning opportunities. Over 200 participants have enrolled in this program to date.
As part of our ongoing focus on diverse employee development, we continue to extend our participation in McKinsey & Company’s Connected Leaders Academy for our Asian, Black and Hispanic-Latino leaders. Additionally, we had women globally attend the Women in Tech conference and several employees attended the Out & Equal Global Workplace Summit.
Employee Engagement: We value our people and are committed to creating a positive and fulfilling experience for everyone. Feedback from our employees is critical, and we have developed an ongoing dialogue with our teams via our Engage pulse survey on a targeted topic that drives actions and improvements. Feedback from our employees is critical, and we have developed an ongoing dialogue with our teams via our quarterly Engage pulse survey on a targeted topic that drives actions and improvements.
Benefits; Health and Wellness: At Gen, we value our people and are committed to creating a positive and fulfilling experience for everyone through the programs and benefits we offer. Our employee value proposition, Life@Gen is centered on choice, flexibility and growth and encompasses the many elements of our employee experience. Our commitment to overall health and wellness are centered around having an integrated and equitable wellness program that supports body, mind and financial health.
Human Capital Governance: We partner closely with our Board of Directors and the Compensation and Leadership Development Committee on executive compensation, our broader reward strategies and objectives related to talent management, talent acquisition, leadership development, retention and succession, DEI and employee engagement.
Intellectual Property
Our intellectual property is an important and vital asset that enables us to develop, market, and sell our software products and services and enhance our competitive position. We are a leader among consumer cyber safety solutions in pursuing patents and currently have a portfolio of over 1,000 U.S. and international patents issued with many pending. We protect our intellectual property rights and investments in a variety of ways to safeguard our technologies and our long-term success. Our IP portfolio is spread across different entities and in multiple countries. As we continue to expand our international operations, we have developed a strategy to ensure global distribution of our IP aligns with our long-term strategic objectives, business model, and goals. We work actively in the U.S. and internationally to ensure the enforcement of copyright, trademark, trade secret and other protections that apply to our software products and services. The term of the patents we hold is, on average, in excess of ten years. The term of the patents we hold is, on average, seventeen years.
From time to time, we enter into cross-license agreements with other technology companies covering broad groups of patents; we have an additional portfolio of over 2,000 U.S. and international patents cross-licensed to us as part of our arrangement with Broadcom as a result of the asset sale of our former Enterprise Security business. We also use software from third parties in our business and generally must rely on those third parties to protect the licensed rights. This can include open source software, which is subject to limited proprietary rights. While it may be necessary in the future to seek or renew licenses relating to various aspects of our products, services, and business methods, we believe, based upon past experience and industry practice, such licenses generally can be obtained on commercially reasonable terms. The ability to maintain and protect
10

our intellectual property rights is important to our success, but we believe our business is not materially dependent on any individual patent, copyright, trademark, trade secret, license, or other intellectual property right.
However, circumstances outside our control could pose a threat to our intellectual property rights. Effective intellectual property protection may not be available, and the efforts we have taken to protect our proprietary rights may not be sufficient or effective. Any significant impairment of our intellectual property rights could harm our business or our ability to compete. In addition, protecting our intellectual property rights is costly and time consuming. Any unauthorized disclosure or use of our intellectual property could make it more expensive to do business and harm our operating results.
In addition, a large number of patents, copyrights and trademarks are owned by other companies in the technology industry. Those companies may request license agreements, threaten litigation, or file suit against us based on allegations of infringement or other violations of intellectual property rights.
For more information on the risks associated with our intellectual property, please see “Risk Factors” in Item 1A included in this Annual Report on Form 10-K.
Governmental Regulation
We collect, use, store or disclose an increasingly high volume, and variety of personal information, including from employees and customers, in connection with the operation of our business, particularly, in relation to our identity and information protection offerings, which rely on large data repositories of personal information and consumer transactions. The personal information we process is subject to an increasing number of federal, state, local and foreign laws regarding privacy and data security.
For information on the risks associated with complying with privacy and data security laws, please see “Risk Factors” in Item 1A included in this Annual Report on Form 10-K.
Available Information
Our internet home page is located at GenDigital.com. We make available our annual reports on Form 10-K, quarterly reports on Form 10-Q, current reports on Form 8-K, and amendments to those reports as soon as reasonably practicable after we electronically file such material with the SEC on our investor relations website located at Investor.GenDigital.com. We also use our website as a tool to disclose important information about the company and comply with our disclosure obligations under Regulation Fair Disclosure. The information contained, or referred to, on our website, including in any reports that are posted on our website, is not part of this annual report unless expressly noted. The SEC maintains a website that contains reports, proxy and information statements, and other information regarding our filings at http://www.sec.gov.
Item 1A. Risk Factors
RISKS RELATED TO OUR BUSINESS STRATEGY AND INDUSTRY
If we are unable to develop new and enhanced solutions, or if we are unable to continually improve the performance, features, and reliability of our existing solutions, our business and operating results could be adversely affected.
Our future success depends on our ability to effectively respond to evolving threats to consumers, as well as competitive technological developments and industry changes, by developing or introducing new and enhanced solutions on a timely basis. In the past, we have incurred, and will continue to incur, significant research and development expenses as we focus on organic growth through internal innovation. We believe that we must continue to dedicate significant resources to our research and development efforts to deliver innovative market competitive products and avoid being reliant on third-party technology and products. We believe that we must dedicate significant resources to our research and development efforts to deliver innovative market competitive products and avoid being reliant on third party technology and products. If we do not achieve the benefits anticipated from these investments, or if the achievement of these benefits is delayed, our operating results may be adversely affected. We must continually address the challenges of dynamic and accelerating market trends and competitive developments. Customers may require features and capabilities that our current solutions do not have. Our failure to develop new solutions and improve our existing solutions to satisfy customer preferences and effectively compete with other market offerings in a timely and cost-effective manner may harm our ability to retain our customers and attract new customers.
The development and introduction of new solutions involve significant commitments of time and resources and are subject to risks and challenges including but not limited to:
Lengthy development cycles;
Evolving industry and regulatory standards and technological developments, including AI and machine learning, by our competitors and customers;
Rapidly changing customer preferences and accurately anticipating technological trends or needs;
Evolving platforms, operating systems, and hardware products, such as mobile devices;
Product and service interoperability challenges with customer’s technology and third-party vendors;
The integration of products and solutions from acquired companies;
Availability of engineering and technical talent;
Entering new or unproven market segments; and
Executing new product and service strategies.
11

In addition, third parties, including operating systems and internet browser companies, have in the past and may in the future limit the interoperability of our solutions with their own products and services, in some cases to promote their own offerings or those of our competitors. Any such actions by third parties could delay the development of our solutions or our solutions may be unable to operate effectively. This could also result in decreased demand for our solutions, decreased revenue, harm to our reputation, and adversely affect our business, financial condition, results of operations, and cash flows.
If we are not successful in managing these risks and challenges, or if our new or improved solutions are not technologically competitive or do not achieve market acceptance, our business and operating results could be adversely affected.
We operate in a highly competitive and dynamic environment, and if we are unable to compete effectively, we could experience a loss in market share and a reduction in revenue.
We operate in intensely competitive and dynamic markets that experience frequent and rapid technological developments, changes in industry and regulatory standards, evolving market trends, changes in customer requirements and preferences, and frequent new product introductions and improvements. If we are unable to anticipate or react to these continually evolving conditions, we could experience a loss of market share and a reduction in our revenues, which could materially and adversely affect our business and financial results. To compete successfully, we must maintain an innovative research and development effort to develop new solutions and enhance our existing solutions, and effectively adapt to changes in the technology, privacy and data protection standards or trends.
We face competition from a broad range of companies, including software vendors focusing on cyber safety solutions such as Bitdefender, Kaspersky, McAfee and Trend Micro, operating system providers such as Apple, Google and Microsoft, and companies such as Nord, Life360, LastPass and others that currently specialize in one or a few particular segments of the market and many of which are expanding their product portfolios into different segments.We face competition from a broad range of companies, including software vendors focusing on Cyber Safety solutions such as Bitdefender, Kapersky, McAfee and Trend Micro, operating system providers such as Apple, Google and Microsoft, and companies such as Nord, Life360, Last Pass and others that currently specialize in one or a few particular segments of the market and many of which are expanding their product portfolios into different segments. Many of these competitors offer solutions or are currently developing solutions that directly compete with some or all of our offerings. We also face growing competition from other technology companies, as well as from companies in the identity threat protection space such as credit bureaus. Further, many of our competitors are increasingly developing and incorporating into their products data protection software and other competing cyber safety products such as antivirus protection or VPN, often free of charge, that compete with our offerings. Further, many of our competitors are increasingly developing and incorporating into their products data protection software and other competing Cyber Safety products such as antivirus protection or VPN, often free of charge, that compete with our offerings. Our competitive position could be adversely affected by the functionality incorporated into these products rendering our existing solutions obsolete and therefore causing us to fail to meet customer expectations. In addition, the introduction of new products or services by competitors, and/or market acceptance of products or services based on emerging or alternative technologies, could make it easier for other products or services to compete with our solutions.
We have seen and anticipate additional competition as new participants enter the cyber safety market and as our current competitors seek to increase their market share and expand their existing offerings.We anticipate additional competition as new participants enter the Cyber Safety market and as our current competitors seek to increase their market share and expand their existing offerings. Some of our competitors have greater financial, technical, marketing, or other resources than we do, including in new cyber safety and digital life segments. Consequently, those competitors may influence customers to purchase their products instead of ours through investing more in internal innovation than we can and through their unique access to customer engagement points. Further consolidation among our competitors and within our industry or, in addition to other changes in the competitive environment, such as greater vertical integration from key computing and operating system suppliers could result in larger competitors that compete more frequently with us.
In addition to competing with these vendors directly for sales to end-users of our solutions, we compete with them for the opportunity to have our solutions bundled with the offerings of our strategic partners, such as computer hardware OEMs, internet service providers, operating systems and telecom service providers.In addition to competing with these vendors directly for sales to end-users of our solutions, we compete with them for the opportunity to have our solutions bundled with the offerings of our strategic partners, such as computer hardware original equipment manufacturers (OEMs), internet service providers (ISPs), operating systems and telecom service providers. Our competitors could gain market share from us if any of these strategic partners replace our solutions with those of our competitors or with their own solutions. Similarly, they could gain market share from us if these partners promote our competitors’ solutions or their own solutions more frequently or more favorably than our solutions. Similarly, they could gain market share from us if these partners promote our competitors’ solutions or their own solutions more than our solutions. In addition, software vendors who have bundled our solutions with theirs may choose to bundle their solutions with their own or other vendors’ solutions or may limit our access to standard interfaces and inhibit our ability to develop solutions for their platform. Further product development by these vendors could cause our solutions to become redundant, which could significantly impact our sales and operating results.
We cannot be sure that we will accurately predict how the markets in which we compete or intend to compete will evolve. Failure on our part to anticipate changes in our markets and to develop solutions and enhancements that meet the demands of those markets or to effectively compete against our competitors will significantly impair our business, financial condition, results of operations, and cash flows.
Issues in the development and deployment of AI may result in reputational harm and legal liability and could adversely affect our results of operations.
We have incorporated, and are continuing to develop and deploy, AI into many of our products, solutions and services. AI presents challenges and risks that could affect our products, solutions and services, and therefore our business. For example, AI algorithms may have flaws, and datasets used to train models may be insufficient or contain biased information. These potential issues could subject us to regulatory risk, legal liability, including under new proposed legislation regulating AI in jurisdictions such as the EU and regulations being considered in other jurisdictions, and brand or reputational harm.
The rapid evolution of AI, including potential government regulation of AI, requires us to invest significant resources to develop, test, and maintain AI in our products and services in a manner that meets evolving requirements and expectations. The rules and regulations adopted by policymakers over time may require us to make changes to our business practices. Developing, testing, and deploying AI systems may also increase the cost profile of our offerings due to the nature of the computing costs involved in such systems.
12

The intellectual property ownership and license rights surrounding AI technologies, as well as data protection laws related to the use and development of AI, are currently not fully addressed by courts or regulators. The use or adoption of AI technologies in our products may result in exposure to claims by third parties of copyright infringement or other intellectual property misappropriation, which may require us to pay compensation or license fees to third parties. The evolving legal, regulatory, and compliance framework for AI technologies may also impact our ability to protect our own data and intellectual property against infringing use.
Our acquisitions and divestitures create special risks and challenges that could adversely affect our financial results.
As part of our business strategy, we may acquire or divest businesses or assets. For example, in 2019, we completed the sale of certain of our enterprise security assets to Broadcom Inc. (the Broadcom sale), in January 2021, we completed the acquisition of Avira, and in September 2022, we completed the acquisition of Avast. Our acquisition and divestiture activities have and may continue to involve a number of risks and challenges, including:
Complexity, time and costs associated with managing these transactions, including the integration of acquired and the winding down of divested business operations, workforce, products, IT systems and technologies;
Challenges in retaining the customers of acquired businesses, providing the same level of service to existing customers with reduced resources, or retaining the third-party relationships, including with suppliers, service providers, and vendors, among others;
Diversion of management time and attention;
Loss or termination of employees, including costs and potential institutional knowledge loss associated with the termination or replacement of those employees;
Assumption of liabilities of the acquired and divested business or assets, including pending or future litigation, investigations or claims related to the acquired business or assets;
Addition of acquisition-related debt;
Difficulty entering into or expanding in new markets or geographies;
Increased or unexpected costs and working capital requirements;
Dilution of stock ownership of existing stockholders;
Ongoing contractual obligations and unanticipated delays or failure to meet contractual obligations;
Substantial accounting charges for acquisition-related costs, asset impairments, amortization of intangible assets and higher levels of stock-based compensation expense; and
Difficulty in realizing potential benefits, including cost savings and operational efficiencies, synergies and growth prospects from integrating acquired businesses.
Macroeconomic factors, such as high inflation, high interest rates, and volatility in foreign currency exchange rates and capital markets could negatively influence our future acquisition opportunities.Macroeconomic factors, such as rising inflation and interest rates, and capital market volatility could negatively influence our future acquisition opportunities. Moreover, to be successful, large complex acquisitions depend on large-scale product, technology, and sales force integrations that are difficult to complete on a timely basis or at all and may be more susceptible to the special risks and challenges described above. Any of the foregoing, and other factors, could harm our ability to achieve anticipated levels of profitability or other financial benefits from our acquired or divested businesses, product lines or assets or to realize other anticipated benefits of divestitures or acquisitions.
Our revenue and operating results depend significantly on our ability to retain our existing customers and expand sales to them, convert existing non-paying customers to paying customers and add new customers.
We generally sell our solutions to our customers on a monthly or annual subscription basis. It is important to our business that we retain existing customers and that our customers expand their use of our solutions over time. Customers may choose not to renew their membership with us at any time. Renewing customers may require additional incentives to renew, may not renew for the same contract period, or may change their subscriptions. We therefore may be unable to retain our existing customers on the same or more profitable terms, if at all. In addition, we may not be able to accurately predict or anticipate future trends in customer retention or effectively respond to such trends.
Our customer retention rates may decline or fluctuate due to a variety of factors, including the following:
Our customers’ levels of satisfaction or dissatisfaction with our solutions and the value they place on our solutions;
The quality, breadth, and prices of our solutions, including solutions offered in emerging markets;
Our general reputation and events impacting that reputation;
The services and related pricing offered by our competitors; including increasing the availability and efficacy of free solutions;
Disruption by new services or changes in law or regulations that impact the need for or efficacy of our products and services;
Changes in auto-renewal and other consumer protection regulations;
13

Our customers’ dissatisfaction with our efforts to market additional products and services;
Our customer service and responsiveness to the needs of our customers;
Changes in our target customers’ spending levels as a result of general economic conditions, inflationary pressures or other factors; and
The quality and efficacy of our third-party partners who assist us in renewing customers’ subscriptions.
Declining customer retention rates could cause our revenue to grow more slowly than expected or decline, and our operating results, gross margins and business will be harmed. In addition, our ability to generate revenue and maintain or improve our results of operations partly depends on our ability to cross-sell our solutions to our existing customers and to convert existing non-paying customers to paying customers and add new customers. We may not be successful in cross-selling our solutions because our customers may find our additional solutions unnecessary or unattractive. Our failure to sell additional solutions to our existing customers, failure to convert existing non-paying customers to paying customers or add new customers could adversely affect our ability to grow our business. Our failure to sell additional solutions to our existing customers could adversely affect our ability to grow our business.
An important part of our growth strategy involves continued investment in direct marketing efforts, indirect partner distribution channels, freemium channels, our sales force, and infrastructure to add new customers. The number and rate at which new customers purchase our products and services depends on a number of factors, including those outside of our control, such as customers’ perceived need for our solutions, competition, general economic conditions, market transitions, product obsolescence, technological change, public awareness of security threats to IT systems, macroeconomic conditions, and other factors. New customers, if any, may subscribe or renew their subscriptions at lower rates than we have experienced in the past, introducing uncertainty about their economic attractiveness and potentially impacting our financial results.
Additionally, there are inherent challenges in measuring the usage of our products and solutions across our brands, platforms, regions, and internal systems, and therefore, calculation methodologies for direct customer counts may differ, which may impact our ability to measure the addition of new customers. The methodologies used to measure these metrics require judgment and are also susceptible to algorithms or other technical errors. The methodologies used to measure these metrics require 14Table of Contentsjudgment and are also susceptible to algorithms or other technical errors. We continually seek to improve our estimates of our user base, and these estimates are subject to change due to improvements or revisions to our methodology. From time to time, we review our metrics and may discover inaccuracies or make adjustments to improve their accuracy, which can result in adjustments to our historical metrics. Our ability to recalculate our historical metrics may be impacted by data limitations or other factors that require us to apply different methodologies for such adjustments.
We may need to change our pricing models to compete successfully.
The intense competition we face, in addition to general and economic business conditions (including economic volatility, bank failures, and high inflation and interest rates, among other things), may put pressure on us to change our pricing practices.The intense competition we face, in addition to general and economic business conditions (including economic volatility, recent bank failures, and increased inflation and interest rates, among other things), may put pressure on us to change our pricing practices. If our competitors offer deep discounts on certain solutions, provide offerings, or offer free introductory products that compete with ours, we may need to lower our prices or offer similar free introductory products to compete successfully. If our competitors offer deep discounts on certain solutions or provide offerings, or offer free introductory products that compete with ours, we may need to lower prices or offer similar free introductory products to compete successfully. Similarly, if external factors, such as economic conditions, market trends, or business combinations require us to raise our prices, our ability to acquire new customers and retain existing customers may be diminished. Any such changes may reduce revenue and margins and could adversely affect our financial results.
Additionally, changes in the macroeconomic environment have previously and may continue to affect our business. Our solutions are discretionary purchases, and customers may reduce or eliminate their discretionary spending on our solutions during a difficult macroeconomic environment. We may experience a material increase in cancellations by customers or a material reduction in our retention rate in the future, especially in the event of a prolonged recession or a worsening of current conditions as a result of inflation, changes in interest rates, or other macroeconomic events. We may have to lower our prices or make other changes to our pricing model to address these dynamics, any of which could adversely affect our business and financial results.
Many of Avira’s and Avast’s users are freemium subscribers, meaning they do not pay for its basic services. Many of Avira’s and Avast’s users are freemium subscribers, meaning they do not pay for its basic services. Much of our anticipated growth in connection with the Avira and Avast acquisitions are attributable to attracting and converting Avira’s and Avast’s freemium users to a paid subscription option. Much of our anticipated growth in connection with the Avira acquisition and the Merger with Avast is attributable to attracting and converting Avira’s and Avast’s freemium users to a paid subscription option. Numerous factors, however, have previously and may continue to impede our ability to attract and retain free users, convert these users into paying customers and retain them as paying customers. We focus our environmental strategy on climate and energy, sustainable products, our supply chain, engagement with employees and nonprofit partners with an emphasis on transparency about our progress and commitments.
If we fail to manage our sales and distribution channels effectively, or if our partners choose not to market and sell our solutions to their customers, our operating results could be adversely affected.
A portion of our revenues is derived from sales through indirect channels, including, but not limited to, distributors that sell our products to end-users and other resellers, and partners that incorporate our products into, or bundle our products with, their products. These channels involve risks, including:
Our resellers, distributors and telecom service providers are generally not subject to minimum sales requirements or any obligation to market our solutions to their customers;
Our reseller and distributor agreements are generally nonexclusive and may be terminated at any time without cause and our partners may terminate or renegotiate their arrangements with us and new terms may be less favorable due to competitive conditions in our markets and other factors;
Our resellers, distributors and OEMs may encounter issues or have violations of applicable law or regulatory requirements or otherwise cause damage to our reputation through their actions;
14

Our resellers and distributors frequently market and distribute competing solutions and may, from time to time, place greater emphasis on the sale of competing solutions due to pricing, promotions and other terms offered by our competitors;
Any consolidation of electronics retailers can increase their negotiating power with respect to software providers such as us and any decline in the number of physical retailers could decrease the channels of distribution for us;
The consolidation of online sales through a small number of larger channels has been increasing, which could reduce the channels available for online distribution of our solutions; and
Sales through our partners are subject to changes in general economic conditions, strategic direction, competitive risks, and other issues that could result in fewer sales, or cause our partners to suffer financial difficulty which could delay payments to us, affecting our operating results.
If we fail to manage our sales and distribution channels successfully, these channels may conflict with one another or otherwise fail to perform as we anticipate, which could reduce our sales and increase our expenses as well as weaken our competitive position.
Changes in industry structure and market conditions have and may continue to lead to charges related to discontinuance of certain of our products or businesses and asset impairments.
In response to changes in industry structure and market conditions, we have been and may continue to be required to strategically reallocate our resources and consider restructuring, disposing of, or otherwise exiting certain businesses.In response to changes in industry structure and market conditions, we may be required to strategically reallocate our resources and consider restructuring, disposing of, or otherwise exiting certain businesses. Any decision to limit investment in or dispose of or otherwise exit businesses has and may continue to result in the recording of special charges, such as technology-related write-offs, workforce reduction costs, charges relating to consolidation of excess facilities, or claims from third parties who were resellers or users of discontinued products. Any decision to limit investment in or dispose of or otherwise exit businesses may result in the recording of special charges, such as technology-related write-offs, workforce reduction costs, charges relating to consolidation of excess facilities, or claims from third parties who were resellers or users of discontinued products. Our estimates with respect to the useful life or ultimate recoverability of our carrying basis of assets, including purchased intangible assets, could change as a result of such assessments and decisions. Our loss contingencies have and may continue to include liabilities for contracts that we cannot cancel, reschedule or adjust with suppliers. Our loss contingencies may include liabilities for contracts that we cannot cancel, reschedule or adjust with suppliers.
Further, our estimates relating to the liabilities for excess facilities are affected by changes in real estate market conditions. Additionally, we are required to evaluate goodwill impairment on an annual basis and between annual evaluations in certain circumstances. Additionally, we are required to evaluate goodwill impairment on an annual basis and between annual evaluations in certain circumstances, and future goodwill impairment evaluations may result in a charge to earnings. Goodwill impairment evaluations have previously and may result in a charge to earnings.
RISKS RELATED TO OUR OPERATIONS
Our international operations involve risks that could increase our expenses, adversely affect our operating results and require increased time and attention of our management.
Following the acquisition of Avast, we derive a significant portion of our revenues from customers located outside of the United States, and we have substantial operations outside of the United States, including engineering, finance, sales and customer support.Following the Merger with Avast, we derive a significant portion of our revenues from customers located outside of the US, and we have substantial operations outside of the US, including engineering, finance, sales and customer support. Our international operations are subject to risks in addition to those faced by our domestic operations, including:
Difficulties staffing, managing, and coordinating the activities of our geographically dispersed and culturally diverse operations;
Potential loss of proprietary information due to misappropriation or laws that may be less protective of our intellectual property rights than U.S. laws or that may not be adequately enforced;
Requirements of foreign laws and other governmental controls, including tariffs, trade barriers and labor restrictions, and related laws that reduce the flexibility of our business operations;
Fluctuations in currency exchange rates, economic instability and inflationary conditions could make our solutions more expensive or could increase our costs of doing business in certain countries;
Potential changes in trade relations arising from policy initiatives or other political factors;
Regulations or restrictions on the use, import or export of encryption technologies that could delay or prevent the acceptance and use of encryption products and public networks for secure communications;
Local business and cultural factors that differ from our normal standards and practices, including business practices that we are prohibited from engaging in by the Foreign Corrupt Practices Act and other anti-corruption laws and regulations;
Central bank and other restrictions on our ability to repatriate cash from our international subsidiaries or to exchange cash in international subsidiaries into cash available for use in the United States;
Limitations on future growth or inability to maintain current levels of revenues from international sales if we do not invest sufficiently in our international operations;
Difficulties in staffing, managing and operating our international operations;
Costs and delays associated with developing software and providing support in multiple languages;
Political, social or economic unrest, war, terrorism, regional natural disasters, or export controls and trade restrictions, particularly in areas in which we have facilities; and
15

Multiple and possibly overlapping tax regimes.
The expansion of our existing international operations and entry into additional international markets has required and will continue to require significant management attention and financial resources. These increased costs may increase our cost of acquiring international customers, which may delay our ability to achieve profitability or reduce our profitability in the future. We also have and may continue to face pressure to lower our prices in order to compete in emerging markets, which has previously and could in the future adversely affect revenue derived from our international operations. An unexpected decrease in sales over those traditionally high-volume selling periods may impact our revenue and could have a disproportionate effect on our results of operations for the entire fiscal year.
It is not possible to predict the broader consequences of geopolitical conflicts, such as the Russia-Ukraine conflict, and the numerous conflicts in the Middle East, and other conflicts that may arise in the future, which could include geopolitical instability and uncertainty; adverse impacts on global and regional economic conditions and financial markets, including significant volatility in credit, capital, and currency markets; reduced economic activity; changes in laws and regulations affecting our business, including further sanctions or counter-sanctions which may be enacted; and increased cybersecurity threats and concerns.Our business has not been materially impacted to date by Russia’s invasion of Ukraine and retaliatory sanctions against the Russian Federation and Belarus; however, it is not possible to predict the broader consequences of this conflict or other conflicts that may arise in the future, which could include geopolitical instability and uncertainty; adverse impacts on global and regional economic conditions and financial markets, including significant volatility in credit, capital, and currency markets; reduced economic activity; changes in laws and regulations affecting our business, including further sanctions or counter-sanctions which may be enacted; and increased cybersecurity threats and concerns. The ultimate extent to which such conflicts may negatively impact our business, financial condition and results of operations will depend on future developments, which are highly uncertain, difficult to predict and subject to change. The ultimate extent to which Russia’s invasion of Ukraine or other future conflicts may negatively impact our business, financial condition and results of operations will depend on future developments, which are highly uncertain, difficult to predict and subject to change.
Our future success depends on our ability to attract and retain personnel in a competitive marketplace.16Table of ContentsOur future success depends on our ability to attract and retain personnel in a competitive marketplace.
Our future success depends upon our ability to recruit and retain key management, technical (including cyber security and AI experts), sales, marketing, e-commerce, finance and other personnel. Our officers and other key personnel are “at will” employees and we generally do not have employment or non-compete agreements with our employees. Competition is significant for people with the specific skills that we require, including in the areas of AI and machine learning, and especially in the locations where we have a substantial presence and need for such personnel.
In order to attract and retain personnel in a competitive marketplace, we must provide competitive pay packages, including cash and equity-based compensation. Additionally, changes in immigration laws could impair our ability to attract and retain highly qualified employees. If we fail to attract, retain and motivate new or existing personnel, our business, results of operations and future growth prospects could suffer. Volatility in our stock price may from time to time adversely affect our ability to recruit or retain employees. In addition, we may not have an adequate number of shares reserved under our equity compensation plans, forcing us to reduce awards of equity-based compensation, which could impair our efforts to attract, retain and motivate necessary personnel. If we are unable to hire and retain qualified employees, or conversely, if we fail to manage employee performance or reduce staffing levels when required by market conditions, our business and operating results could be adversely affected.
Effective succession planning is also important to our long-term success. Failure to ensure effective transfer of knowledge and smooth transitions involving key employees could hinder our strategic planning and execution. From time to time, key personnel leave our company and the frequency and number of such departures have widely varied and have, in the past, resulted in significant changes to our executive leadership team. The loss of any key employee could result in significant disruptions to our operations, including adversely affecting the timeliness of product releases, the successful implementation and completion of company initiatives, our internal control over financial reporting and our results of operations. In addition, hiring, training and successfully integrating replacement personnel can be time consuming and expensive, may cause additional disruptions to our operations and may be unsuccessful, which could negatively impact future financial results. In addition, hiring, training, and successfully integrating replacement personnel can be time consuming and expensive, may cause additional disruptions to our operations, and may be unsuccessful, which could negatively impact future financial results.
Our solutions, systems, websites and the data on these sources have been in the past and may continue to be subject to cybersecurity events that could materially harm our reputation and future sales.Our solutions, systems, websites and the data on these sources have been and may continue to be subject to cybersecurity events that could materially harm our reputation and future sales.
We expect to continue to be a target of attacks specifically designed to impede the performance and availability of our offerings and harm our reputation as a leading cyber security company. In addition, we face the risk of cyberattacks by nation-states and state-sponsored actors, which may increase or heighten due to geopolitical tensions. In addition, we face the risk of cyberattacks by nation-states and state-sponsored actors. These attacks may target us, our partners, suppliers, vendors or customers. Similarly, experienced computer programmers or other sophisticated individuals or entities, including malicious hackers, state-sponsored organizations, and insider threats including actions by employees and third-party service providers, have attempted to penetrate, and in some cases have penetrated, our network security or the security of our vendors or suppliers. Such attempts are increasing in number and in technical sophistication, including through the use of AI, and have in the past and could in the future expose us and the affected parties, to risk of loss or misuse of proprietary, personal or confidential information or disruptions of our business operations. Such attempts are increasing in number and in technical sophistication, and could expose us and the affected parties, to risk of loss or misuse of proprietary, personal or confidential information or disruptions of our business operations.
In addition, our internal IT environment continues to evolve. We embrace new ways of sharing data and communicating internally and with partners and customers using methods such as social networking and other consumer-oriented technologies. We also remain vigilant with the increasing use of generative AI models in our internal systems which may create new attack methods for adversaries. Our business policies and internal security controls may not keep pace with these changes as new threats emerge, or emerging cybersecurity regulations in jurisdictions worldwide.
When a data breach occurs, our information technology systems and infrastructure can be subject to damage, compromise, disruption, and shutdown due to attacks or breaches by hackers or other circumstances, such as error or malfeasance by employees or third-party service providers, phishing, social engineering, account takeovers, vulnerability exploitation, misconfigurations, ransomware, or technology malfunction.When a data breach occurs, our information technology systems and infrastructure can be subject to damage, compromise, disruption, and shutdown due to attacks or breaches by hackers or other circumstances, such as error or malfeasance by employees or third-party service providers or technology malfunction. A data breach may result in significant legal, financial, and reputational harm, including government inquiries, enforcement actions, litigation, and negative publicity. A series of breaches may be determined to be material at a later date in the aggregate, even if they may not be material individually at the time of their occurrence. The occurrence of any of these events, as well as a failure to promptly remedy them when they occur, could compromise our systems and the information stored in our systems. Any such circumstance could adversely affect our ability to attract and maintain customers as well as strategic partners, cause us to suffer negative publicity or damage to our brand, and
16

subject us to legal claims and liabilities or regulatory penalties. In addition, unauthorized parties might alter information in our databases, which would adversely affect both the reliability of that information and our ability to market and perform our services as well as undermine our ability to remain compliant with relevant laws and regulations. Techniques used to obtain unauthorized access or to sabotage systems change frequently, are constantly evolving and generally are difficult to recognize and react to effectively. We are not always able to anticipate these techniques or to implement adequate or timely preventive or reactive measures. Several recent, highly publicized data security breaches, such as the large-scale attacks by foreign nation state actors, the global incident involving the MOVEit file transfer software, and a significant uptick in ransomware/extortion attacks at other companies, have heightened consumer awareness of this issue and may embolden individuals or groups to target our systems or those of our strategic partners or enterprise customers. Several recent, highly publicized data security breaches, including large-scale attacks by foreign nation state actors and a significant uptick in ransomware/extortion attacks at other companies, have heightened consumer awareness of this issue and may embolden individuals or groups to target our systems or those of our strategic partners or enterprise customers. Threat actors have previously and could in the future exploit a new vulnerability before we complete our remediation work or identify a vulnerability that we did not effectively remediate. If that happens, there could be unauthorized access to, or acquisition of, data we maintain, and damage to our systems.
We could also face legal action from individuals, business partners, and regulators in connection with data breaches, which would result in increased costs and fees incurred in our defense against those proceedings, and/or payment of any regulatory penalties. We could also face legal action from individuals, business partners, and regulators in connection with data breaches, which would result in increased costs and fees incurred in our defense against those proceedings, and/or payment of any regulatory penalties.
We collect, use, disclose, store or otherwise process personal information, which subjects us to privacy and data security laws and contractual commitments.17Table of ContentsWe collect, use, disclose, store or otherwise process personal information, which subjects us to privacy and data security laws and contractual commitments.
We collect, use, process, store, transmit or disclose (collectively, process) an increasingly large amount of confidential information, including personal information (which includes credit card information and other critical data from employees and customers), in connection with the operation of our business, particularly in relation to our identity and information protection service offerings.
The confidential and personal information we process is subject to an increasing number of federal, state, local and foreign laws regarding privacy and data security, as well as contractual commitments. Any failure or perceived failure by us to comply with such obligations has previously and may in the future result in governmental enforcement actions, fines, litigation or public statements against us by consumer advocacy groups or others and could cause our customers to lose trust in us, which could have an adverse effect on our reputation and business. Any failure or perceived failure by us to comply with such obligations may result in governmental enforcement actions, fines, litigation, or public statements against us by consumer advocacy groups or others and could cause our customers to lose trust in us, which could have an adverse effect on our reputation and business.
Additionally, changes to applicable privacy or data security laws could impact how we process personal information and therefore limit the effectiveness of our solutions or our ability to develop new solutions. For example, the European Union General Data Protection Regulation imposes more stringent data protection requirements and provides for greater penalties for noncompliance of up to the greater of €20 million or four percent of our worldwide annual revenues.
Data protection legislation is also increasing in the U.S. at both the federal and state level. For example, the California Consumer Privacy Act of 2018 (the CCPA) requires, among other things, covered companies to provide disclosures to California consumers regarding the use of personal information, gives California residents expanded rights to access their personal information that has been collected and allows such consumers new abilities to opt-out of certain sales of personal information. For example, the California Consumer Privacy Act of 2018 (the CCPA) requires, among other things, covered companies to provide new disclosures to California consumers regarding the use of personal information, gives California residents expanded rights to access their personal information that has been collected and allows such consumers new abilities to opt-out of certain sales of personal information. Further, the California Privacy Rights Act (the CPRA) significantly modifies the CCPA and there are new similar and overlapping state privacy laws in at least 10 other U.S. states, which all go into effect by January 1, 2026. These new laws may result in additional uncertainty and require us to incur additional costs and expenses in our effort to comply. Additionally, the Federal Trade Commission (the FTC) and many state attorneys general are interpreting federal and state consumer protection laws to impose standards for the online collection, use, dissemination, and security of data. The burdens imposed by the new state privacy laws and other similar laws that may be enacted at the federal and state level may require us to modify our data processing practices and policies, adapt our goods and services and incur substantial expenditures in order to comply.
Global privacy and data protection legislation and enforcement are rapidly expanding and evolving, and may be inconsistent from jurisdiction to jurisdiction. We may be or become subject to data localization laws mandating that data collected in a foreign country be processed and stored only or primarily within that country. If any country in which we have customers were to adopt a data localization law, we could be required to expand our data storage facilities there or build new ones in order to comply. The expenditure this would require, as well as costs of compliance generally, could harm our financial condition.
Additionally, third parties with whom we work, such as vendors or developers, may violate applicable laws or our policies and such violations can place the personal information of our customers at risk. In addition, our customers may also accidentally disclose their passwords or store them on a device that is lost or stolen, creating the perception that our systems are not secure against third-party access. This could have an adverse effect on our reputation and business. In addition, such third parties could expose us to compromised data or technology, or be the target of cyberattack and other data breaches which could impact our systems or our customers’ records and personal information. Further, we could be the target of a cyberattack or other action that impacts our systems and results in a data breach of our customers’ records and personal information. This could have an adverse effect on our reputation and business and potentially result in litigation and/or regulatory penalties.
Our inability to successfully recover from a disaster or other business continuity event could impair our ability to deliver our products and services and harm our business.
We are heavily reliant on our technology and infrastructure to provide our products and services to our customers. For example, we host many of our products using third-party data center facilities and we do not control the operation of these facilities. These facilities are vulnerable to damage, interference, interruption or performance problems from earthquakes, hurricanes, floods, fires, power loss, telecommunications failures, pandemics and similar events. These facilities are vulnerable to damage, interference, interruption, or performance problems from earthquakes, hurricanes, floods, fires, power loss, telecommunications failures, pandemics and similar events. They are also subject to break-ins, computer viruses, sabotage, intentional acts of vandalism and other misconduct. The occurrence of a natural disaster, an act of terrorism state-sponsored attacks, a pandemic, geopolitical tensions or armed conflicts, and similar events could result in a
17

decision to close the facilities without adequate notice or other unanticipated problems, which in turn, could result in lengthy interruptions in the delivery of our products and services, which could negatively impact our sales and operating results.
Furthermore, our business administration, human resources, compliance efforts and finance services depend on the proper functioning of our computer, telecommunication and other related systems and operations. A disruption or failure of these systems or operations because of a disaster, cyberattack or other business continuity event, such as a pandemic, could cause data to be lost or otherwise delay our ability to complete sales and provide the highest level of service to our customers. In addition, we could have difficulty producing accurate financial statements on a timely basis, and deficiencies may arise in our internal control over financial reporting, which may impact our ability to certify our financial results, all of which could adversely affect the trading value of our stock. There are no assurances that data recovery in the event of a disaster would be effective or occur in an efficient manner. If these systems or their functionality do not operate as we expect them to, we may be required to expend significant resources to make corrections or find alternative sources for performing these functions.
We are dependent upon Broadcom for certain engineering and threat response services, which are critical to many of our products and business.18Table of ContentsWe are dependent upon Broadcom for certain engineering and threat response services, which are critical to many of our products and business.
Our Norton branded endpoint security solution has historically relied upon certain threat analytics software engines and other software (the Engine-Related Services) that have been developed and provided by engineering teams that have transferred to Broadcom as part of the Broadcom sale. The technology, including source code, at issue is shared, and pursuant to the terms of the Broadcom sale, we retain rights to use, modify, enhance and create derivative works from such technology. Broadcom has committed to provide these Engine-Related Services substantially to the same extent and in substantially the same manner, as has been historically provided under a license agreement with a limited term.
As a result, we are dependent on Broadcom for services and technology that are critical to our business, and if Broadcom fails to deliver these Engine-Related Services it would result in significant business disruption, and our business and operating results and financial condition could be materially and adversely affected. Furthermore, if our current sources become unavailable, and if we are unable to develop or obtain alternatives to integrate or deploy them in time, our ability to compete effectively could be impacted and have a material adverse effect on our business. Additionally, in connection with the Broadcom sale, we lost other capabilities, including certain threat intelligence data which were historically provided by our former Enterprise Security business, the lack of which could have a negative impact on our business and products.
If we fail to offer high-quality customer support, our customer satisfaction may suffer and have a negative impact on our business and reputation.
Many of our customers rely on our customer support services to resolve issues, including technical support, billing and subscription issues, that may arise. If demand increases, or our resources decrease, we may be unable to offer the level of support our customers expect. Any failure by us to maintain the expected level of support could reduce customer satisfaction and negatively impact our customer retention and our business.
Our solutions are complex and operate in a wide variety of environments, systems and configurations, which could result in failures of our solutions to function as designed.
Because we offer very complex solutions, errors, defects, disruptions, or other performance problems with our solutions may occur and have occurred. For example, we may experience disruptions, outages and other performance problems due to a variety of factors, including infrastructure changes, human or software errors, fraud, security attacks or capacity constraints due to an overwhelming number of users accessing our websites simultaneously. For example, we may experience disruptions, outages, and other performance problems due to a variety of factors, including infrastructure changes, human or software errors, fraud, security attacks, or capacity constraints due to an overwhelming number of users accessing our websites simultaneously. In some instances, we may not be able to identify the cause or causes of these performance problems within an acceptable period of time. Interruptions in our solutions could impact our revenues or cause customers to cease doing business with us. Our operations are dependent upon our ability to protect our technology infrastructure against damage from business continuity events that could have a significant disruptive effect on our operations. We could potentially lose customer data or personal information, or experience material adverse interruptions to our operations or delivery of solutions to our clients in a disaster recovery scenario.
Negative publicity regarding our brand, solutions and business could harm our competitive position.
Our brand recognition and reputation as a trusted service provider are critical aspects of our business and key to retaining existing customers and attracting new customers. Our business could be harmed due to errors, defects, disruptions or other performance problems with our solutions causing our customers and potential customers to believe our solutions are unreliable. Furthermore, negative publicity, whether or not justified, including intentional brand misappropriation, relating to events or activities attributed to us, our employees, our strategic partners, our affiliates, or others associated with any of these parties, may tarnish our reputation and reduce the value of our brands. In addition, the rapid rise and use of social media has the potential to harm our brand and reputation. We may be unable to timely respond to and resolve negative and inaccurate social media posts regarding our company, solutions and business in an appropriate manner. Damage to our reputation and loss of brand equity may reduce demand for our solutions and have an adverse effect on our business, operating results and financial condition. Moreover, any attempts to rebuild our reputation and restore the value of our brands may be costly and time consuming, and such efforts may not ultimately be successful.
Our reputation and/or business could be negatively impacted by ESG matters and/or our reporting of such matters.
The focus from regulators, customers, certain investors, employees, and other stakeholders concerning environmental, social and governance (ESG) matters and related disclosures, both in the United States and internationally, has resulted in, and is likely to continue to result in, increased general and administrative expenses and increased management time and attention spent complying with or meeting ESG-related requirements and expectations.The focus from regulators, customers, certain investors, employees, and other stakeholders concerning environmental, social and governance (ESG) matters and related disclosures, both in the United States and internationally, have resulted in, and are likely to continue to result in, increased general and administrative expenses and increased management time and attention spent complying with or meeting ESG-related requirements and expectations. For example, developing and acting on ESG-related
18

initiatives and collecting, measuring and reporting ESG-related information and metrics can be costly, difficult and time consuming and is subject to evolving reporting standards, including the SEC’s climate-related reporting requirements and the recent California legislation, which includes disclosure requirements relating to voluntary carbon offsets and a wide range of environmental marketing claims. Similarly, the Corporate Sustainability Reporting Directive will require large EU companies to make detailed disclosures in relation to certain sustainability-related issues. We communicate certain ESG-related initiatives, goals, and/or commitments regarding environmental matters, diversity, responsible sourcing and social investments and other matters on our website, in our filings with the SEC and elsewhere. These initiatives, goals or commitments could be difficult to achieve and costly to implement, the technologies needed to implement them may not be cost effective and may not advance at a sufficient pace, and we could be criticized for the accuracy, adequacy or completeness of the disclosure. These initiatives, goals, or commitments could be difficult to achieve and costly to implement, the technologies needed to implement them may not be cost effective and may not advance at a sufficient pace, and we could be criticized for the accuracy, adequacy or completeness of the disclosure. Further, statements about our ESG-related initiatives, goals or commitments and progress with respect to such initiatives, goals or commitments may be based on standards for measuring progress that are still developing, internal controls and processes that continue to evolve, and assumptions that are subject to change in the future. In addition, we could be criticized for the timing, scope or nature of these initiatives, goals or commitments, or for any revisions to them. If we fail to achieve progress with respect to our ESG-related initiatives, goals or commitments on a timely basis, or at all, or if our ESG-related data, processes and reporting are incomplete or inaccurate, our reputation, business, financial performance and growth could be adversely affected. If we fail to achieve progress with respect to our ESG-related initiatives, goals or commitments on a timely basis, or at all, 19Table of Contentsor if our ESG-related data, processes and reporting are incomplete or inaccurate, our reputation, business, financial performance and growth could be adversely affected.
We are affected by seasonality, which may impact our revenue and results of operations.
Portions of our business are impacted by seasonality. Seasonal behavior in orders has historically occurred in the third and fourth quarters of our fiscal year, which include the important selling periods during the holidays in our third quarter, as well as follow-on holiday purchases and the U.S. tax filing season, which is typically in our fourth quarter. Revenue generally reflects similar seasonal patterns, but to a lesser extent than orders. This is due to our subscription business model, as a large portion of our in-period revenue is recognized ratably from our deferred revenue balance. An unexpected decrease in sales over those traditionally high-volume selling periods may impact our revenue and could have a disproportionate effect on our results of operations for the entire fiscal year.
LEGAL AND COMPLIANCE RISKS
Our solutions are highly regulated, which could impede our ability to market and provide our solutions or adversely affect our business, financial position and results of operations.
Our solutions are subject to a high degree of regulation, including a wide variety of international and U.S. federal, state, and local laws and regulations, such as the Fair Credit Reporting Act, the Gramm-Leach-Bliley Act, the Federal Trade Commission Act (the FTC Act), and comparable state laws that are patterned after the FTC Act. We have previously entered into consent decrees and similar arrangements with the FTC and the attorney generals of 35 states as well as a settlement with the FTC relating to allegations that certain of LifeLock’s advertising, marketing and security practices constituted deceptive acts or practices in violation of the FTC Act, which impose additional restrictions on our business, including prohibitions against making any misrepresentation of “the means, methods, procedures, effects, effectiveness, coverage, or scope of” our solutions. We signed an Undertaking, effective June 14, 2021, with the United Kingdom’s Competition and Markets Authority (CMA) requiring our NortonLifeLock Ireland Limited and NortonLifeLock UK entities to make certain changes to their policies and practices related to automatically renewing subscriptions in the United Kingdom as part of the CMA’s investigation into auto-renewal practices in the antivirus sector launched in December 2018. Any of the laws and regulations that apply to our business are subject to revision or new or changed interpretations, and we cannot predict the impact of such changes on our business.
Additionally, the nature of our identity and information protection products subjects us to the broad regulatory, supervisory and enforcement powers of the Consumer Financial Protection Bureau which may exercise authority with respect to our services, or the marketing and servicing of those services, through the oversight of our financial institution or credit reporting agency customers and suppliers, or by otherwise exercising its supervisory, regulatory or enforcement authority over consumer financial products and services.Additionally, the nature of our identity and information protection products subjects us to the broad regulatory, supervisory, and enforcement powers of the Consumer Financial Protection Bureau which may exercise authority with respect to our services, or the marketing and servicing of those services, through the oversight of our financial institution or credit reporting agency customers and suppliers, or by otherwise exercising its supervisory, regulatory, or enforcement authority over consumer financial products and services.
If we do not protect our proprietary information and prevent third parties from making unauthorized use of our products and technology, our financial results could be harmed.
Much of our software and underlying technology is proprietary. We seek to protect our proprietary rights through a combination of confidentiality agreements and procedures and through copyright, patent, trademark and trade secret laws. However, these measures afford only limited protection and may be challenged, invalidated or circumvented by third parties. Third parties may copy all or portions of our products or otherwise obtain, use, distribute and sell our proprietary information without authorization.
Patents may also not be issued from our pending patent applications and claims allowed on any future issued patents may not be sufficiently broad to protect our technology. Also, these protections may not preclude competitors from independently developing products with functionality or features similar to our products.
Third parties have previously and may in the future also develop similar or superior technology independently by designing around our patents. Our consumer agreements do not require a signature and therefore may be unenforceable under the laws of some jurisdictions. Furthermore, the laws of some foreign countries do not offer the same level of protection of our proprietary rights as the laws of the United States, and we may be subject to the unauthorized use of our products in those countries. Furthermore, the laws of some foreign countries do not offer the same level of protection of our proprietary rights as the laws of the US, and we may be subject to the unauthorized use of our products in those countries. The unauthorized copying or use of our products or proprietary information could result in reduced sales of our products. Any legal action to protect proprietary information that we may bring or be engaged in with a strategic partner or vendor could adversely affect our ability to access software, operating system and hardware platforms of such partner or vendor, or cause such partner or vendor to choose not to offer our products to their customers. In addition, any legal action to protect proprietary information
19

that we may bring or be engaged in, could be costly, may distract management from day-to-day operations and may lead to additional claims against us, which could adversely affect our operating results.
From time to time we are party to lawsuits and investigations, and third parties have claimed and additional third parties in the future may claim that we infringe their proprietary rights, which has previously and could in the future require significant management time and attention, cause us to incur significant legal expenses and prevent us from selling our products.
We are frequently involved in litigation and other proceedings, including, but not limited to, class actions and governmental claims or investigations, some of which may be material initially or become material over time.We are frequently involved in litigation and other proceedings, including, but not limited to, patent litigation, class actions, and governmental claims or investigations, some of which may be material initially or become material over time. The expense of initiating and defending, and in some cases settling, such matters may be costly and divert management’s attention from the day-to-day operations of our business, which could have a materially adverse effect on our business, results of operations and cash flows. In addition, such matters may through the course of litigation or other proceedings change unfavorably which could alter the profile of the matter and create potential material risk to the company. Any unfavorable outcome in a matter could result in significant fines, settlements, monetary damages, or injunctive relief that could negatively and materially impact our ability to conduct our business, results of operations and cash flows. Additionally, in the event we did not previously accrue for such litigation or proceeding in our financial statements, we may be required to record retrospective accruals that adversely affect our results of operations and financial condition. Additionally, in the event we did not previously accrue for such 20Table of Contentslitigation or proceeding in our financial statements, we may be required to record retrospective accruals that adversely affect our results of operations and financial condition.
Additionally, third parties have claimed and, from time to time, additional third parties may claim that we have infringed their intellectual property rights, including claims regarding patents, copyrights and trademarks.Third parties have claimed and, from time to time, additional third parties may claim that we have infringed their intellectual property rights, including claims regarding patents, copyrights, and trademarks. For additional information on such claims, please refer to Note 18 of the Notes to the Consolidated Financial Statements included in this Annual Report on Form 10-K.
Because of constant technological change in the segments in which we compete, the extensive patent coverage of existing technologies, and the rapid rate of issuance of new patents, it is possible that the number of these claims may grow. In addition, former employers of our former, current or future employees may assert claims that such employees have improperly disclosed to us confidential or proprietary information of these former employers. Any such claim, with or without merit, could result in costly litigation and distract management from day-to-day operations. If we are not successful in defending such claims, we could be required to stop selling, delay shipments of, or redesign our solutions, pay monetary amounts as damages, enter into royalty or licensing arrangements, or satisfy indemnification obligations that we have with some of our partners. We cannot assure you that any royalty or licensing arrangements that we may seek in such circumstances will be available to us on commercially reasonable terms or at all. We have made and expect to continue making significant expenditures to investigate, defend and settle claims related to the use of technology and intellectual property rights as part of our strategy to manage this risk.
In addition, we license and use software from third parties in our business and generally must rely on those third parties to protect the licensed rights. These third-party software licenses may not continue to be available to us on acceptable terms or at all and may expose us to additional liability. This liability, or our inability to use any of this third-party software, could result in delivery delays or other disruptions in our business that could materially and adversely affect our operating results.
Some of our products contain “open source” software, and any failure to comply with the terms of one or more of these open source licenses could negatively affect our business.
Certain of our products are distributed with software licensed by its authors or other third parties under so-called “open source” licenses. Some of these licenses contain requirements that we make available source code for modifications or derivative works we create based upon the open source software and that we license such modifications or derivative works under the terms of a particular open source license or other license granting third parties certain rights of further use. By the terms of certain open source licenses, we could be required to release the source code of our proprietary software if we combine our proprietary software with open source software in a certain manner. Some open source software may include generative artificial intelligence (AI) software or other software that incorporates or relies on generative AI. The use of such software may expose us to risks as the intellectual property ownership and license rights, including copyright, of generative AI software and tools, has not been fully interpreted by U.S. courts or been fully addressed by federal, state, or international regulations. In addition to risks related to license requirements, using open source software, including open source software that incorporates or relies on generative AI, can lead to greater risks than use of third-party commercial software, as open source licensors generally do not provide warranties or controls on origin of the software. We have established processes to help alleviate these risks, including a review process for screening requests from our development organizations for the use of open source. However, we cannot be sure that all open source, including open source that incorporates or relies on generative AI, is submitted for approval prior to use in our products. In addition, many of the risks associated with usage of open source, including open source that incorporates or relies on generative AI, may not or cannot be eliminated and could, if not properly addressed, negatively affect our business.
RISKS RELATED TO OUR LIQUIDITY AND INDEBTEDNESS
There are risks associated with our outstanding and future indebtedness that could adversely affect our financial condition.
As of March 29, 2024, we had an aggregate of $8,716 million of outstanding indebtedness that will mature in calendar years 2025 through 2030, and $1,500 million available for borrowing under our revolving credit facility. See Note 10 of the Notes to the Consolidated Financial Statements included in this Annual Report on Form 10-K for further information on our outstanding debt. Our ability to meet expenses, comply with the covenants under our debt instruments, pay interest and repay principal for our substantial level of indebtedness depends on, among other things, our operating performance, competitive developments, and
20

financial market conditions, all of which are significantly affected by financial, business, economic and other factors. We are not able to control many of these factors. Accordingly, our cash flow may not be sufficient to allow us to pay principal and interest on our debt, including our 5.0% Senior Notes due 2025, 6.75% Senior Notes due 2027 and 7.125% Senior Notes due 2030 (collectively, the Senior Notes), and meet our other obligations. Our level of indebtedness could have other important consequences, including the following:
We must use a substantial portion of our cash flow from operations to pay interest and principal on the Amended and Restated Credit Agreement, our existing Senior Notes, and other indebtedness, which reduces funds available to us for other purposes such as working capital, capital expenditures, other general corporate purposes and potential acquisitions;
We may be unable to refinance our indebtedness or to obtain additional financing for working capital, capital expenditures, acquisitions or general corporate purposes;
We have significant exposure to fluctuations in interest rates because borrowings under our senior secured credit facilities bear interest at variable rates;
Our leverage may be greater than that of some of our competitors, which may put us at a competitive disadvantage and reduce our flexibility in responding to current and changing industry and financial market conditions;
We may be more vulnerable to an economic downturn or recession and adverse developments in our business;
We may be unable to comply with financial and other covenants in our debt agreements, which could result in an event of default that, if not cured or waived, may result in acceleration of certain of our debt and would have an adverse effect on our business and prospects and could force us into bankruptcy or liquidation; and
Changes by any rating agency to our outlook or credit rating could negatively affect the value of our debt and/or our common stock, adversely affect our access to debt markets and increase the interest we pay on outstanding or future debt.
There can be no assurance that we will be able to manage any of these risks successfully. In addition, we conduct a significant portion of our operations through our subsidiaries. Accordingly, repayment of our indebtedness will be dependent in part on the generation of cash flow by our subsidiaries and their respective abilities to make such cash available to us by dividend, debt repayment or otherwise, which may not always be possible. If we do not receive distributions from our subsidiaries, we may be unable to make the required principal and interest payments on our indebtedness.
Our Amended and Restated Credit Agreement imposes operating and financial restrictions on us.
Our Amended and Restated Credit Agreement contains covenants that limit our ability and the ability of our restricted subsidiaries to:
Incur additional debt;
Create liens on certain assets to secure debt;
Enter into certain sale and leaseback transactions;
Pay dividends on or make other distributions in respect of our capital stock or make other restricted payments; and
Consolidate, merge, sell or otherwise dispose of all or substantially all of our assets.
These covenants may adversely affect our ability to finance our operations, meet or otherwise address our capital needs, pursue business opportunities, react to market conditions or may otherwise restrict activities or business plans. A breach of any of these covenants could result in a default. If a default occurs, the relevant lenders could declare the indebtedness, together with accrued interest and other fees, to be immediately due and payable and, to the extent such indebtedness is secured, proceed against any collateral securing that indebtedness.
The failure of financial institutions or transactional counterparties could adversely affect our current and projected business operations and our financial condition and result of operations.
We regularly maintain cash balances with other financial institutions in excess of the FDIC insurance limit. A failure of a depository institution to return deposits could result in a loss or impact access to our invested cash or cash equivalents and could adversely impact our operating liquidity and financial performance.
Additionally, future adverse developments with respect to specific financial institutions or the broader financial services industry may lead to market-wide liquidity shortages, impair the ability of companies to access near-term working capital needs, and create additional market and economic uncertainty. Our general business strategy, including our ability to access existing debt under the terms of our Amended and Restated Credit Agreement may be adversely affected by any such economic downturn, liquidity shortages, volatile business environment or continued unpredictable and unstable market conditions. If the current equity and credit markets deteriorate, or if adverse developments are experienced by financial institutions, it may cause short-term liquidity risk and also make any necessary debt or equity financing more difficult, more costly, more onerous with respect to financial and operating covenants and more dilutive. Failure to secure any necessary financing in a timely manner and on favorable terms could have a material adverse effect on our operations, growth strategy, financial performance and stock price and could require us to alter our operating plans.
Hedging or other mitigation actions to mitigate against interest rate exposure may adversely affect our earnings, limit our gains or result in losses, which could adversely affect cash available for distributions.
21

We have previously and may in the future enter into interest rate swap agreements or pursue other interest rate hedging strategies. In March 2023, we entered into interest rate swap agreements to mitigate risks associated with the variable interest rate of our Term A Facility. These pay-fixed, receive-floating rate interest rate swaps have the economic effect of hedging the variability of forecasted interest payments until their maturity on March 31, 2026. Pursuant to the agreements, we have effectively converted $1 billion of our variable rate borrowings under Term A Facility to fixed rates, with $500 million at a fixed rate of 3.762% and $500 million at a fixed rate of 3.550%. These pay-fixed, receive-floating rate interest rate swaps have the economic effect of hedging the variability of forecasted interest payments until their maturity on March 31, 2026. Pursuant to the agreements, we will effectively convert $1 billion of our variable rate borrowings under Term A Facility to fixed rates, with $500 million at a fixed rate of 3.762% and $500 million at a fixed rate of 3.550%. The objective of our interest rate swaps, all of which are designated as cash flow hedges, is to manage the variability of future cash interest expense.
Our future hedging activity will vary in scope based on the level of interest rates, the type and expected duration of portfolio investments held, and other changing market conditions. Our current and future interest rate hedging may fail to protect or could adversely affect us because, among other things:
Interest rate hedging can be expensive, particularly during periods of rising and volatile interest rates;
Available interest rate hedging may not correspond directly with the interest rate risk for which protection is sought;
The duration of the hedge may not match the duration of the related liability or asset;
The credit quality of the party owing money on the hedge may be downgraded to such an extent that it impairs our ability to sell or assign our side of the hedging transaction;
The party owing money in the hedging transaction may default on its obligation to pay; and
We may purchase a hedge that turns out not to be necessary (i.e., a hedge that is out of the money).
Any hedging activity we engage in may adversely affect our earnings, which could adversely affect cash available for distributions. Unanticipated changes in interest rates may result in poorer overall investment performance than if we had not engaged in any such hedging transactions. In addition, the degree of correlation between price movements of the instruments used in a hedging strategy and price movements in the portfolio positions being hedged or liabilities being hedged may vary materially. Moreover, for a variety of reasons, we may not seek to establish a perfect correlation between such hedging instruments and the portfolio holdings being hedged. Any such imperfect correlation may prevent us from achieving the intended hedge and expose us to risk of loss.
GENERAL RISKS
Government efforts to combat inflation, along with other interest rate pressures arising from an inflationary economic environment, have led to and may continue to lead to higher financing costs.
We operate globally and as a result our business and revenues are impacted by global macroeconomic conditions. Inflation has risen on a global basis, including in the United States, and government entities have taken various actions to combat inflation, such as raising interest rate benchmarks. While the Federal Reserve has recently held inflation rates steady, global inflation remains high and government entities may continue their efforts, or implement additional efforts, to combat inflation, which may include continuing to raise interest rate benchmarks or maintaining interest rate benchmarks at elevated levels. Such government efforts, along with other interest rate pressures arising from an inflationary economic environment, have led to higher financing costs. Such government efforts, along with other interest rate pressures arising from an inflationary economic environment, have led to higher financing costs and have had and may continue to have a material adverse effect on our business, financial condition and results of operations. For example, recent elevated interest rates have resulted in an increase in our cost of debt. These government actions and global macroeconomic conditions have had and may continue to have a material adverse effect on our business, financial condition and results of operations.
Fluctuations in our quarterly financial results have affected the trading price of our stock in the past and could affect the trading price of our stock in the future.
Our quarterly financial results have fluctuated in the past and are likely to vary in the future due to a number of factors, many of which are outside of our control. If our quarterly financial results or our predictions of future financial results fail to meet our expectations or the expectations of securities analysts and investors, the trading price of our outstanding securities could be negatively affected. Volatility in our quarterly financial results may make it more difficult for us to raise capital in the future or pursue acquisitions.
Factors associated with our industry, the operation of our business, and the markets for our solutions may cause our quarterly financial results to fluctuate, including but not limited to:
Fluctuations in demand for our solutions;
Disruptions in our business operations or target markets caused by, among other things, terrorism or other intentional acts, outbreaks of disease, or earthquakes, floods or other natural disasters;
Entry of new competition into our markets;
Technological changes in our markets;
Our ability to achieve targeted operating income and margins and revenues;
Competitive pricing pressure or free offerings that compete with one or more of our solutions;
Our ability to timely complete the release of new or enhanced versions of our solutions;
The amount and timing of commencement and termination of major marketing campaigns;
22

The number, severity and timing of threat outbreaks and cyber security incidents;
Loss of customers or strategic partners or the inability to acquire new customers or cross-sell our solutions;
Changes in the mix or type of solutions and subscriptions sold and changes in consumer retention rates;
The rate of adoption of new technologies and new releases of operating systems, and new business processes;
Consumer confidence and spending changes;
The outcome or impact of litigation, claims, disputes, regulatory inquiries or investigations;
The impact of acquisitions (and our ability to achieve expected synergies or attendant cost savings), divestitures, restructurings, share repurchase, financings, debt repayments, equity investments and other investment activities;
Changes in U.S. and worldwide economic conditions, such as economic recessions, the impact of inflation, fluctuations in foreign currency exchange rates including the weakening of foreign currencies relative to USD, which has and may in the future negatively affect our revenue expressed in USD, changes in interest rates, geopolitical conflicts, and other global macroeconomic factors on our operations and financial performance;
The publication of unfavorable or inaccurate research reports about our business by cybersecurity industry analysts;
The success of our ESG initiatives;
Changes in tax laws, rules and regulations;
Changes in tax rates, benefits and expenses; and
Changes in consumer protection laws and regulations.
Any of the foregoing factors could cause the trading price of our outstanding securities to fluctuate significantly.
RISK RELATED TO TAXES
Changes to our effective tax rate, including through the adoption of new tax legislation or exposure to additional income tax liabilities, could increase our income tax expense and reduce (increase) our net income (loss), cash flows and working capital. In addition, audits by tax authorities could result in additional tax payments for prior periods.
We are a multinational company dual headquartered in the U.S. and the Czech Republic, with our principal executive offices in Tempe, Arizona. As such, we are subject to tax in multiple U.S. and international tax jurisdictions. Our effective tax rate could be adversely affected by several factors, many of which are outside of our control, including:
Changes to the U.S. federal income tax laws, including the potential for federal tax law changes put forward by Congress and the current administration including potentially increased corporate tax rates, new minimum taxes and other changes to the way that our US tax liability has been calculated following the 2017 Tax Cuts and Jobs Act. Certain of these proposals could have significant retroactive adjustments adding cash tax payments/liabilities if adopted;
Changes to other tax laws, regulations, and interpretations in multiple jurisdictions in which we operate, including actions resulting from the Organisation for Economic Co-operation and Development's (OECD) base erosion and profit shifting project including recent proposals for a global minimum tax rate, proposed actions by international bodies such as digital services taxation, as well as the requirements of certain tax rulings. In October 2021, the OECD/G20 inclusive framework on Base Erosion and Profit Shifting (the Inclusive Framework) published a statement updating and finalizing the key components of a two-pillar plan on global tax reform which has now been agreed upon by the majority of OECD members. OECD and many countries have proposed to reallocate a portion of profits of large multinational enterprises (MNE) with an annual global turnover exceeding €20 billion to markets where sales arise (Pillar One), as well as enact a global minimum tax rate of 15% for MNE with an annual global turnover exceeding €750 million (Pillar Two). On December 12, 2022, the European Union reached an agreement to implement the Pillar Two Directive of the OECD’s reform of international taxation at the European Union level. The agreement affirms that all Member States must transpose the Directive by December 31, 2023. The rules will therefore first be applicable for fiscal years starting on or after December 31, 2023. Ireland, Czech Republic and certain jurisdictions in which we operate have enacted legislation to implement Pillar Two and other countries are actively considering changes to their tax laws to adopt certain parts of the OECD’s proposals. The agreement affirms that all Member States must transpose the Directive by December 31, 2023. The rules will therefore first be applicable for fiscal years starting on or after December 31, 2023. We will continue to monitor the implementation of the Inclusive Framework agreement by the countries in which we operate. The enactment of Pillar Two legislation is not expected to have a material adverse effect on our effective tax rate and Consolidated Financial Statements in the near term. We will continue to monitor and reflect the impact of such legislative changes in future financial statements as appropriate;
Changes in the relative proportions of revenues and income before taxes in the various jurisdictions in which we operate that have differing statutory tax rates;
Changes in the valuation of deferred tax assets and liabilities and the discovery of new information in the course of our tax return preparation process;
The ultimate determination of our taxes owed in any of these jurisdictions is for an amount in excess of the tax provision we have recorded or reserved for;
The tax effects of, and tax planning and changes in tax rates related to significant infrequently occurring events (including acquisitions, divestitures and restructurings) that may cause fluctuations between reporting periods;
Tax assessments, or any related tax interest or penalties, that could significantly affect our income tax expense for the period in which the settlements take place; and
23

Taxes arising in connection to changes in our workforce, corporate and legal entity structure or operations as they relate to tax incentives and tax rates.
From time to time, we receive notices that a tax authority in a particular jurisdiction believes that we owe a greater amount of tax than we have reported to such authority and we are consequently subject to tax audits. These audits can involve complex issues, which may require an extended period of time to resolve and can be highly judgmental. Additionally, our ability to recognize the financial statement benefit of tax refund claims is subject to change based on a number of factors, including but not limited to, changes in facts and circumstances, changes in tax laws, correspondence with tax authorities, and the results of tax audits and related proceedings, which may take several years or more to resolve. If tax authorities disagree with certain tax reporting positions taken by us, as a result, they assess additional taxes against us. We are regularly engaged in discussions and sometimes disputes with these tax authorities. We ultimately sometimes have to engage in litigation to achieve the results reflected in our tax estimates, and such litigation can be time consuming and expensive. We regularly assess the likely outcomes of any audits in order to determine the appropriateness of our tax provision. If the ultimate determination of our taxes owed in any of these jurisdictions is for an amount in excess of the tax provision we have recorded or reserved for, our operating results, cash flows, and financial condition could be materially and adversely affected. If the ultimate determination of our taxes owed in any of these jurisdictions is for an amount in excess of the tax provision we have recorded or reserved for, our operating results, cash flows, and financial condition could be materially and adversely affected.
Our corporate and legal entity structure and intercompany arrangements are subject to the tax laws of various jurisdictions, and we could be obligated to pay additional taxes, which would harm our results of operations.
We generally conduct our international operations through wholly-owned subsidiaries and are or may be required to report our taxable income in various jurisdictions worldwide based upon our business operations in those jurisdictions. Our intercompany relationships are subject to complex transfer pricing regulations administered by taxing authorities in various jurisdictions. The amount of taxes we pay in different jurisdictions may depend on a variety of factors including the application of the tax laws of those various jurisdictions (including the U.S.) to our international business activities, changes in tax rates, new or revised tax laws or interpretations of existing tax laws and policies, and our ability to operate our business in a manner consistent with our corporate structure and intercompany arrangements. The relevant taxing authorities have in the past and may in the future disagree with our determinations as to the income and expenses attributable to specific jurisdictions. If such a disagreement were to occur, and our position was not sustained, we could be required to pay additional taxes, interest and penalties, which could result in one-time tax charges, higher effective tax rates, reduced cash flows and lower overall profitability of our operations. If the ultimate determination of our taxes owed in any of these jurisdictions is for an amount in excess of the tax provision we have recorded or reserved for, our operating results, cash flows, and financial condition could be materially and adversely affected.
Any changes or interpretations to existing accounting pronouncements or taxation rules or practices may cause fluctuations in our reported results of operations or affect how we conduct our business. Any changes or interpretations to existing accounting pronouncements or taxation rules or practices may cause fluctuations in our reported results of operations or affect how we conduct our business.
A change in accounting pronouncements or taxation rules or practices could have a significant effect on our reported results and may affect our reporting of transactions completed before the change is effective. New accounting pronouncements, taxation rules and varying interpretations of accounting pronouncements or taxation rules have occurred in the past and may occur in the future. We could be required to modify a current tax or accounting position as a result of any such change, and this could adversely affect our reported financial results and could change the way we conduct our business.
Item 1B. Unresolved Staff Comments
None.
Item 1C. Cybersecurity
Cybersecurity risk management and strategy
We maintain a cybersecurity program designed to protect our systems and data from information security risks, including regular oversight of our programs for security monitoring. Gen has a process for identifying and assessing material risks from cybersecurity threats on a regular basis that operates alongside our broader overall risk assessment process, covering all identified enterprise wide risks. Cybersecurity risk is reviewed quarterly with management and with the board of directors. In addition, we regularly perform evaluations (including independent third-party evaluations) of our security program and our information technology infrastructure and information security management systems. Our processes also address risk and identification of cybersecurity threat risks from our use of third-party service providers. This involves, among other things, conducting pre-engagement risk-based diligence, reviewing security and controls reports, implementing contractual security and notification provisions, and ongoing monitoring as needed.
Our information security management system is based upon industry frameworks. Our Chief Information Security Officer (CISO) leads our cybersecurity program, which includes the implementation of controls designed to align with these industry frameworks and applicable statutes and regulations. Our Chief Information Security Officer (CISO) leads our cybersecurity program, which includes the implementation of controls aligned with industry guidelines and applicable statutes and regulations to identify threats, detect attacks and protect these information assets. Our CISO has over 30 years of prior work experience in various roles involving managing information security programs, developing cybersecurity strategy, implementing effective information and cybersecurity initiatives and has been the Head of IT Audit, CISO and CIO at three other companies prior to Gen Digital. He has a Bachelor of Science in Computer Information Systems. We have implemented security monitoring capabilities designed to alert us to suspicious activity and developed an incident response program that includes periodic testing and is designed to restore business operations quickly. In addition, employees participate in mandatory annual training and receive communications regarding the cybersecurity environment to increase awareness throughout the company. In addition, employees participate in an ongoing program of mandatory annual training and receive communications regarding the cybersecurity environment to increase awareness throughout the company. We also implemented an enhanced annual training program for specific specialized employee populations, including secure coding training.
Governance
The Technology and Cybersecurity Committee of the Board has direct oversight to the Company’s (1) technology strategy, initiatives, and investments and (2) key cybersecurity information technology risks against both internal and external threats. The Technology and Cybersecurity Committee is comprised entirely of independent directors, all of whom have experience related to
24

information security issues or oversight and meets and reports to the Board on a quarterly basis. The Audit Committee, which is also comprised entirely of independent directors, considers cybersecurity information technology risks in connection with overseeing our enterprise risk management system, and reports to the Board on enterprise risk management matters on a quarterly basis. We have processes in place for management to report security instances to the Technology and Cybersecurity Committee and Audit Committee as they occur, if material, and to provide a summary multiple times per year of other incidents to the Technology and Cybersecurity Committee. Additionally, our CISO attends each Technology and Cybersecurity Committee meeting and meets regularly with the Board of Directors or the Audit Committee of the Board of Directors to brief them on technology and information security matters. We carry insurance that provides protection against some of the potential losses arising from a cybersecurity incident. We carry insurance that provides protection against the potential losses arising from a cybersecurity incident. In the last fiscal three years, we have not experienced any material information security breach incidences and the expenses we have incurred from information security breach incidences were immaterial. This includes penalties and settlements, of which there were none.
We describe whether and how risks from identified cybersecurity threats, including as a result of any previous cybersecurity incidents, have materially affected or are reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition, under the heading “Our solutions, systems, websites and the data on these sources have been in the past and may continue to be subject to cybersecurity events that could materially harm our reputation and future sales.Our solutions, systems, websites and the data on these sources have been and may continue to be subject to cybersecurity events that could materially harm our reputation and future sales. ” included as part of ”Risk Factors” in Item 1A of this Annual Report on Form 10-K, which disclosures are incorporated by reference herein.
Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
NKE 1 day, 5 hours ago
OPTT 1 day, 5 hours ago
ANGO 1 day, 5 hours ago
CTAS 1 day, 7 hours ago
RPM 1 day, 7 hours ago
CNXA 2 days, 2 hours ago
LW 2 days, 8 hours ago
HUDA 3 days, 4 hours ago
AXR 3 days, 5 hours ago
CALM 3 days, 5 hours ago
BUKS 3 days, 5 hours ago
NRAC 4 days, 1 hour ago
RGP 4 days, 5 hours ago
SING 1 week ago
CSBR 1 week ago
DRI 1 week ago
SCHL 1 week ago
GNLN 1 week, 1 day ago
AIR 1 week, 1 day ago
ABTI 1 week, 2 days ago
SHMP 1 week, 2 days ago
BXXY 1 week, 2 days ago
ACRG 1 week, 3 days ago
CARV 1 week, 3 days ago
FOMC 1 week, 3 days ago
KRFG 1 week, 3 days ago
GHMP 1 week, 3 days ago
GWTI 1 week, 3 days ago
VEII 1 week, 3 days ago
ZEST 1 week, 4 days ago
KITL 1 week, 4 days ago
ADMT 1 week, 4 days ago
ATAK 1 week, 4 days ago
BOTY 1 week, 4 days ago
DPLS 1 week, 4 days ago
FDX 1 week, 4 days ago
ECIA 1 week, 4 days ago
ATXG 1 week, 4 days ago
CRMT 1 week, 4 days ago
ELRE 1 week, 4 days ago
CAG 2 weeks, 1 day ago
KALV 2 weeks, 1 day ago
PAYX 2 weeks, 1 day ago
MEI 2 weeks, 1 day ago
BCRD 2 weeks, 1 day ago
FMHS 2 weeks, 2 days ago
ASPA 2 weeks, 2 days ago
STEK 2 weeks, 2 days ago
LEAI 2 weeks, 4 days ago
AIDG 3 weeks ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard