News Feed Item

DSS Earnings Call Scheduled For Thursday November 15 at 4:30 ET

ROCHESTER, N.Y., Nov. 13, 2012 /PRNewswire/ -- Document Security Systems, Inc. (NYSE MKT: DSS) which announced its  preliminary third quarter earnings on October 22, 2012, will have an earnings conference call to discuss the results with investors at 4:30 pm EST on November 15, 2012. The earnings call was originally scheduled for November 13. As highlighted in the press release on October 22, 2012, and detailed in the Form 10-Q filed today with the SEC, DSS had strong third quarter results, including a 15 percent increase in revenues and a 20 percent increase in gross profits. Moreover, core operating profit, as measured by adjusted EBITDA, less merger costs, was at a near break-even level, a significant financial milestone for the company.

During the call, DSS will also provide an update on its pending merger with Lexington Technology Group, Inc. ("Lexington"), announced on October 2, 2012.


DSS Management will host a teleconference and webcast on November 15, at 4:30 p.m. ET to discuss the results with the investment community:

Time: 4:30 p.m. ET
Date: Thursday, November 15, 2012
Investor Dial In (Toll Free):  877-407-9205
Investor Dial In (International):  201-689-8054

Live Webcast URL: http://www.investorcalendar.com/IC/CEPage.asp?ID=170041

A replay of the teleconference will be available until November 29, 2012, which can be accessed by dialing (877)660-6853 within the United States or (201)612-7415 if calling internationally. Please enter account #286 and conference ID #402581 to access the replay. 


Document Security Systems, Inc. (NYSE MKT: DSS) is a leader in anti-counterfeit, authentication, and mass-serialization technologies, providing security solutions to corporations, governments, and financial institutions. DSS security programs are designed to protect against product diversion, counterfeit, theft, and other costly and damaging occurrences. From risk analysis and vulnerability assessment, to systems integration and monitoring, DSS offers the advanced tools and knowledge base needed to protect the world's most valuable and at-risk brands. More information can be found at their website, www.dsssecure.com

Follow Document Security Systems, Inc. on LinkedIn, Facebook, Twitter and WordPress


Lexington Technology Group invests both expertise and capital in the development and monetization of pioneering technologies. Lexington's goal is to catalyze technology development within its investments and to reward those who take on the risks of innovation. The enterprise invests in companies that have developed important innovations but have not been fairly rewarded by the marketplace, where shareholder value depends on the company's ability to successfully monetize patented technologies. Its efforts contribute to an intellectual property market in which inventors are better able to profit from their inventions. More information is available at www.lex-tg.com.

Important Additional Information Will Be Filed with the SEC

This press release does not constitute an offer to sell or the solicitation of an offer to buy any securities of DSS, or Lexington Technology Group or the solicitation of any vote or approval. In connection with the proposed transaction, DSS will file with the SEC a Registration Statement on Form S-4 containing a proxy statement/prospectus. The proxy statement/prospectus will contain important information about DSS, Merger Sub, Lexington Technology Group, the transaction and related matters. DSS will mail or otherwise deliver the proxy statement/prospectus to its stockholders and the stockholders of Lexington Technology Group when it becomes available. Investors and security holders of DSS and Lexington Technology Group are urged to read carefully the proxy statement/prospectus relating to the Merger (including any amendments or supplements thereto) in its entirety when it is available, because it will contain important information about the proposed transaction.

Investors and security holders of DSS will be able to obtain free copies of the proxy statement/prospectus for the proposed Merger (when it is available) and other documents filed with the SEC by DSS through the website maintained by the SEC at www.sec.gov. In addition, investors and security holders of DSS and Lexington Technology Group will be able to obtain free copies of the proxy statement/prospectus for the proposed Merger (when it is available) by contacting Document Security Systems, Inc, Attn.: Philip Jones, Chief Financial Officer, at First Federal Plaza, 28 East Main Street, Suite 1525, Rochester, New York 14614, or by e-mail at [email protected]. Investors and security holders of Lexington Technology Group will also be able to obtain free copies of the proxy statement/prospectus for the Merger (when it is available) by contacting Lexington Technology Group Technology Group, Inc., Attn.: Jennifer Buckley, 375 Park Avenue 26th Floor, New York, NY 10152, or by e-mail at [email protected].

DSS and Lexington Technology Group, and their respective directors and certain of their executive officers, may be deemed to be participants in the solicitation of proxies in respect of the transactions contemplated by the agreement between DSS, Merger Sub and Lexington Technology Group. Information regarding DSS's directors and executive officers is contained in DSS's Definitive Proxy Statement on Schedule 14A prepared in connection with its 2012 Annual Meeting of Stockholders, which was filed with the SEC on April 18, 2012. Information regarding Lexington Technology Group's directors and officers and a more complete description of the interests of DSS's directors and officers in the proposed transaction will be available in the proxy statement/prospectus that will be filed by DSS with the SEC in connection with the proposed transaction.

Cautionary Note Regarding Forward-Looking Statements

Statements in this press release regarding the proposed transaction between DSS and Lexington Technology Group; the expected timetable for completing the transaction; the potential value created by the proposed Merger for DSS's and Lexington Technology Group's stockholders; the potential of the combined companies' technology platform; our respective or combined ability to raise capital to fund our combined operations and business plan; the continued listing of DSS's or the combined company's securities on the NYSE MKT; market acceptance of DSS products and services; our collective ability to maintain or protect our intellectual property rights through litigation or otherwise; Lexington Technology Group's limited operating history, competition from other industry competitors with greater market presence and financial resources than those of DSS's; our ability to license and monetize the patents owned by Lexington Technology Group; potential new legislation or regulation related to enforcing patents; the complexity and costly nature of acquiring patent or other intellectual property assets; the combined company's management and board of directors; and any other statements about DSS' or Lexington Technology Group's management teams' future expectations, beliefs, goals, plans or prospects constitute forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Any statements that are not statements of historical fact (including statements containing the words "believes," "plans," "could," "anticipates," "expects," "estimates," "plans," "should," "target," "will," "would" and similar expressions) should also be considered to be forward-looking statements. There are a number of important factors that could cause actual results or events to differ materially from those indicated by such forward-looking statements, including: the risk that DSS and Lexington Technology Group may not be able to complete the proposed transaction; the inability to realize the potential value created by the proposed Merger for DSS's and Lexington Technology Group's stockholders; our respective or combined inability to raise capital to fund our combined operations and business plan; DSS's or the combined company's inability to maintain the listing of our securities on the NYSE MKT; the potential lack of market acceptance of DSS's products and services; our collective inability to protect our intellectual property rights through litigation or otherwise; competition from other industry competitors with greater market presence and financial resources than those of DSS's; our inability to license and monetize the patents owned by Lexington Technology Group; and other risks and uncertainties more fully described in DSS's Annual Report on Form 10-K for the year ended December 31, 2011 and its Quarterly Reports on Form 10-Q for the quarters ended March 31, 2012, June 30, 2012, and September 30, 2012 each as filed with the SEC, as well as the other filings that DSS makes with the SEC. Investors and stockholders are also urged to read the risk factors set forth in the proxy statement/prospectus carefully when they are available.

In addition, the statements in this press release reflect our expectations and beliefs as of the date of this release. We anticipate that subsequent events and developments will cause our expectations and beliefs to change. However, while we may elect to update these forward-looking statements publicly at some point in the future, we specifically disclaim any obligation to do so, whether as a result of new information, future events or otherwise. These forward-looking statements should not be relied upon as representing our views as of any date after the date of this release.

Investor Relations for Document Security Systems:

CenturyIR.com 212-776-1030

For further information on Lexington Technology Group please contact:

Jamie Diaferia

Infinite PR


[email protected]


SOURCE DSS (Document Security Systems Inc.)

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that Enzu will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to focus on the core of their online busine...
In his session at 19th Cloud Expo, Nick Son, Vice President of Cyber Risk & Public Sector at Coalfire, will discuss the latest information on the FedRAMP Program. Topics will cover: FedRAMP Readiness Assessment Report (RAR). This new process is designed to streamline and accelerate the FedRAMP process from the traditional timeline by initially focusing on technical capability instead of documentation preparedness. FedRAMP for High-impact level systems. Early in 2016 FedRAMP officially publishe...
Join IBM November 2 at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA, and learn how to go beyond multi-speed it to bring agility to traditional enterprise applications. Technology innovation is the driving force behind modern business and enterprises must respond by increasing the speed and efficiency of software delivery. The challenge is that existing enterprise applications are expensive to develop and difficult to modernize. This often results in what Gartner calls...
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, will discuss the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They will also review two "free infrastruct...
Qosmos, the market leader for IP traffic classification and network intelligence technology, has announced that it will launch the Launch L7 Viewer at CloudExpo | @ThingsExpo Silicon Valley, being held November 1 – 3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The L7 Viewer is a traffic analysis tool that provides complete visibility of all network traffic that crosses a virtualized infrastructure, up to Layer 7. It facilitates and accelerates common IT tasks such as VM migra...
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
Rapid innovation, changing business landscapes, and new IT demands force businesses to make changes quickly. In the eyes of many, containers are at the brink of becoming a pervasive technology in enterprise IT to accelerate application delivery. In this presentation, you'll learn about the: The transformation of IT to a DevOps, microservices, and container-based architecture What are containers and how DevOps practices can operate in a container-based environment A demonstration of how Docke...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
In the 21st century, security on the Internet has become one of the most important issues. We hear more and more about cyber-attacks on the websites of large corporations, banks and even small businesses. When online we’re concerned not only for our own safety but also our privacy. We have to know that hackers usually start their preparation by investigating the private information of admins – the habits, interests, visited websites and so on. On the other hand, our own security is in danger bec...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessi...