CERTICOM CORP
10-K, 2000-07-31
COMPUTER PROGRAMMING SERVICES
Previous: SENIOR HOUSING PROPERTIES TRUST, 8-K, 2000-07-31
Next: CERTICOM CORP, 10-K, EX-3.1, 2000-07-31





================================================================================
                       SECURITIES AND EXCHANGE COMMISSION
                             Washington, D.C. 20549
                                    FORM 10-K

|X|   Annual Report  Pursuant to Section 13 or 15(d) of the Securities  Exchange
      Act of 1934

      For the fiscal year ended April 30, 2000

                                       OR

|_|   Transition  Report  pursuant  to  Section  13 or 15(d)  of the  Securities
      Exchange  Act of  1934  for  the  transition  period  from  __________  to
      __________

      Commission file number 001-15010

                                 --------------
                                 CERTICOM CORP.
             (Exact name of registrant as specified in its charter)


     Yukon Territory, Canada                         Not Applicable
 (Province or other jurisdiction            (I.R.S. Employer Identification No.)
of incorporation or organization)

                                 --------------

                  25801 Industrial Boulevard, Hayward, CA 94545
                    (Address of principal executive offices)

       Registrant's telephone number, including area code: (510) 780-5400

                                 --------------

        Securities registered pursuant to Section 12(b) of the Act: None

    Securities registered pursuant to Section 12(g) of the Act: Common Shares

Indicate by check mark whether the registrant (1) has filed all reports required
to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during
the  preceding 12 months (or for such  shorter  period that the  registrant  was
required  to file  such  reports),  and  (2) has  been  subject  to such  filing
requirements for the past 90 days. Yes |X| No |_|.

Indicate by check mark if disclosure of delinquent  filers  pursuant to Item 405
of Regulation  S-K is not contained  herein,  and will not be contained,  to the
best of registrant's  knowledge,  in definitive proxy or information  statements
incorporated by reference in Part III of this Form 10-K or any amendment to this
Form 10-K. |X|

As of June 30,  2000,  the  aggregate  market  value of the voting stock held by
nonaffiliates  of  the  registrant  was  $870,683,486.   For  purposes  of  this
information,  the  outstanding  common  shares owned by directors  and executive
officers of the  registrant  were deemed to be common shares held by affiliates.
The  number of common  shares  outstanding  as of June 30,  2000 was  25,649,054
shares.

================================================================================



<PAGE>

<TABLE>
                                                 TABLE OF CONTENTS
<CAPTION>
                                                                                                               Page
<S>                                                                                                             <C>
Exchange Rate Information........................................................................................1

Special Note Regarding Forward-Looking Statements................................................................1

PART I

Item 1.      Business............................................................................................1

             Risk Factors.......................................................................................15

Item 2.      Properties.........................................................................................25

Item 3.      Legal Proceedings..................................................................................25

Item 4.      Submission Of Matters To A Vote Of Security Holders................................................26


PART II

Item 5.      Market For The Company's Common Shares And Related Shareholders Matters............................27

Item 6.      Selected Consolidated Financial Data...............................................................29

Item 7.      Management's Discussion And Analysis Of Financial Condition And Results Of Operations..............29

Item 7A.     Quantitative And Qualitative Disclosure About Market Risk..........................................37

Item 8.      Financial Statements And Supplementary Data........................................................37

Item 9.      Changes In And Disagreements With Accountants On Accounting And Financial Disclosure...............37


PART III

Item 10.     Directors And Executive Officers Of The Company....................................................37

Item 11.     Executive Compensation.............................................................................40

Item 12.     Security Ownership Of Certain Beneficial Owners And Management.....................................45

Item 13.     Certain Relationships And Related Transactions.....................................................46


PART IV

Item 14.     Exhibits, Financial Statements Schedules, And Reports On Form 8-K..................................46

             Signatures.........................................................................................48
</TABLE>


         Unless  otherwise  indicated,  all  information in this Form 10-K gives
effect to the 2-for-1  split of the  Company's  outstanding  common shares which
occurred on July 12, 2000.

         Certicom(R),  certicom  encryption(TM),  SSl  Plus(TM),  SSL  Plus  for
Embedded  Systems(TM),  WTLS  Plus(TM),  Certifax(TM),  Certilock(TM),  Security
Builder(R),  MobileTrust(TM),  and  Trustpoint(TM)  are  trademarks of Certicom.
There  are  also  references  in this  Form  10-K  to the  trademarks  of  other
companies,  including: Palm OS(R) is a registered trademark and Palm VII(TM) and
Palm.Net(TM) are trademarks of Palm, Inc.

         In this Form 10-K, the terms the "Company," "Certicom," "we," "us," and
"our"  refer to  Certicom  Corp.,  a Yukon  Territory  corporation,  and/or  its
subsidiaries.


                                      - i -

<PAGE>

                            EXCHANGE RATE INFORMATION

         Unless  otherwise  indicated,  all dollar amounts in this Form 10-K are
expressed in United States  dollars.  References to "$" or "U.S.$" are to United
States dollars, and references to "Cdn.$" are to Canadian dollars. The following
table sets forth, for each period indicated, information concerning the exchange
rates between U.S. dollars and Canadian dollars based on the noon buying rate in
the City of New York on the last  business  day of each month  during the period
for cable  transfers as certified  for customs  purposes by the Federal  Reserve
Bank of New York (the "Noon Buying Rate").  The table illustrates the portion of
a U.S. dollar it would take to buy one Canadian dollar.

                                                            U.S.$ per Cdn.$
                                                           Noon Buying Rate
                                                      --------------------------
Fiscal Year Ended April 30,               Average(1)   Low     High   Period End
---------------------------               ----------  ------  ------  ----------
1997...............................         0.7329    0.7513  0.7145    0.7158
1998...............................         0.7116    0.7317  0.6832    0.6992
1999...............................         0.6629    0.6982  0.6341    0.6860
2000...............................         0.6804    0.6607  0.6969    0.6756
---------------------------------------

         (1) The average of the daily Noon Buying Rates on the last business day
of each month during the period.


                SPECIAL NOTE REGARDING FORWARD-LOOKING STATEMENTS

         Certain   statements   contained   in   this   Form   10-K   constitute
"forward-looking  statements"  within the meaning of the United  States  Private
Securities Litigation Reform Act of 1995. When used in this document,  the words
"may," "would,"  "could," "will,"  "intend,"  "plan,"  "anticipate,"  "believe",
"estimate,"  "expect"  and  similar  expressions,  as they  relate  to us or our
management, are intended to identify forward-looking statements. Such statements
reflect  our  current  views with  respect to future  events and are  subject to
certain  risks,  uncertainties  and  assumptions.  Many factors  could cause our
actual results,  performance or achievements to be materially different from any
future results,  performance or achievements that may be expressed or implied by
such  forward-looking  statements,  including,  among  others,  those  which are
discussed under the heading "Risk Factors" in this Form 10-K. Should one or more
of these risks or uncertainties  materialize,  or should assumptions  underlying
the  forward-looking  statements  prove  incorrect,   actual  results  may  vary
materially  from  those  described  herein as  intended,  planned,  anticipated,
believed,  estimated  or  expected.  We do not  intend,  and do not  assume  any
obligation, to update these forward-looking statements.

                                     PART I

Item 1.      BUSINESS

Overview

         Certicom is an encryption  technology company  specializing in security
solutions  for mobile  computing and wireless  data  markets,  including  mobile
eCommerce,  or mCommerce.  Our  solutions  often use less  processing  power and
bandwidth  than  conventional  encryption  technologies,  and are therefore more
suitable  for many mobile and  wireless  environments.  Our  original  equipment
manufacturer,  or OEM, customers  incorporate our patented technology into their
applications  for handheld  computers,  mobile phones,  two-way pagers and other
Internet  information  appliances.  As these  devices  communicate  increasingly
sensitive and valuable information,  we believe the demand for stronger security
will increase.

         Our product line includes cryptographic toolkits,  information security
protocol toolkits,  and public-key  infrastructure,  or PKI,  products.  We have
announced  for  availability  later  this  year  certificate  authority,  or CA,
services and a virtual private network, or VPN, client application.  In addition
to  licensing  our  security   products,   we  provide  consulting  and  systems
integration  services to assist our  customers  in  designing  and  implementing
efficient  security  solutions.  Our  customers  include 724  Solutions,  Aether
Systems,  BellSouth  Wireless Data,  Motorola,  Palm, Inc.,  PUMATECH,  Inc. and
QUALCOMM.


                                      - 1 -

<PAGE>

Industry Background

The Growth of the Internet

         The Internet continues to evolve toward a trusted global communications
medium for  exchanging  information,  establishing  business  relationships  and
conducting  commerce  electronically.  International  Data Corporation,  or IDC,
projects  that the  number  of  Internet  users  worldwide  will  increase  from
approximately  140 million at the end of 1998 to 502 million by the end of 2003.
Rapid growth in the number of people who access the Internet  continues to drive
the  acceleration  of  on-line  business  activity.  We believe  businesses  and
consumers will continue to leverage the Internet to conduct  communications  and
transactions that traditionally would have been handled in more personal ways.

The Growth of eCommerce

         As a growing number of businesses and individuals  access the Internet,
they increasingly  establish  commercial  relationships  and conduct  electronic
commerce,  or eCommerce.  GartnerGroup  estimates that worldwide  eCommerce will
grow to approximately  $7.3 trillion in 2004.  Recent federal  legislation,  the
Electronic  Signatures in Global and National  eCommerce,  or E-SIGN, Act, gives
electronic  signatures  the same legal status as  handwritten  signatures.  This
legislation  may further  encourage  eCommerce by allowing  individuals  to sign
agreements online.

         Currently,    eCommerce    consists   of    business-to-business    and
business-to-consumer transactions conducted primarily over the wireline Internet
infrastructure.  For example,  a  business-to-business  transaction such as that
required to execute  vertical  supply chain  management  involves  data exchange
between  enterprise   servers  across  the  wireline   Internet.   In  addition,
business-to-consumer applications such as on-line banking, on-line stock trading
and  on-line  shopping   generally  involve  electronic   transactions   between
enterprise servers and personal computers or workstations.

The Growth of Mobile Computing and the Wireless Internet

         We believe  that a  substantial  portion  of the  future  growth of the
Internet will occur in the mobile and wireless  environments.  Early adoption of
the Internet relied upon a wireline  infrastructure and a large base of personal
computers  and  workstations.   While  the  number  of  personal  computers  and
workstations  continues to grow,  we expect the use of mobile  devices to expand
more  rapidly.  Increased  mobile  access  to the  Internet  by  businesses  and
consumers is being facilitated by Internet-enabled digital wireless devices such
as the Palm VII(TM) handheld computer,  the NeoPoint 1000 smartphone and the RIM
Inter@ctive(TM)  Pager 950. IDC forecasts that the number of users in the United
States of wireless devices that have the ability to send and receive information
over the  Internet  will  increase  from 7.4 million in 1999 to 61.5  million in
2003.  As  a  result,   we  believe  that  individuals  will   increasingly  use
Internet-enabled  mobile  devices to enhance their  productivity  when away from
their homes or offices.

The Growth of mCommerce

         As  technologies  for mobile  computing and wireless  data advance,  we
believe that mCommerce,  which encompasses any eCommerce transaction in a mobile
environment,  will  account  for an  increasing  portion of  eCommerce.  Current
business-to-business  mCommerce  applications include supply chain management in
vertical  markets  such as  health  care,  insurance  and real  estate.  Current
business-to-consumer  mCommerce  applications include on-line shopping,  on-line
banking and  securities  trading.  According  to IDC,  the total annual value of
wireless Internet  transactions will increase from $4.3 billion in 1998 to $38.1
billion in 2003.  While we believe that  mCommerce will continue to be a rapidly
growing part of eCommerce, certain obstacles must be overcome for this to occur.

The Importance of Security in eCommerce and mCommerce

         Speaking  with a  person  either  face-to-face  or over  the  telephone
provides a natural way of ensuring that each person  involved in a communication
or  transaction  is  known  to  the  other,  or  authenticated.   In  electronic
communication,  authentication  and other  security  services  are  required  to
protect  both  parties  to  a  communication.


                                     - 2 -

<PAGE>

For example, typical eCommerce transactions,  such as on-line shopping,  require
authentication  of the vendor and an  encrypted  communication  path between the
purchaser and the vendor to  communicate  sensitive  information  such as credit
card  numbers.  Due to the  immediacy  of  Internet  communications,  this trust
relationship between the parties should be established immediately and without a
prior introduction.

         With the increased use of the Internet by  individuals  and  businesses
for the  transmission  of  sensitive  data,  the risk of fraud is  present.  For
example, it has been reported that while 2% of Visa International's  credit card
business  relates to Internet  transactions,  50% of its disputes and discovered
frauds are in that area.

         The  potential  damage to the  emerging  Internet  economy  goes beyond
security for transactions.  In the early stages of Internet growth, institutions
could  apply their  existing  risk  management  models and  techniques  to avoid
liability and manage fraud.  Individuals were not at tremendous risk of loss due
to fraud.  However,  now that the information  available on-line is increasingly
personal, potential damage to individuals may become increasingly prevalent.

         We  believe  there is a need  for an  increased  level of trust  within
eCommerce and mCommerce applications.  Individuals, or clients, interacting with
institutions,  or servers,  should be certified by a registration authority that
is trusted  by both  parties.  Institutions  want more  assurance  that they are
transacting  with their true customer and individuals  want assurance that their
reputations  will not be damaged by  unauthorized  access to and misuse of their
personal  information.  Mutual  authentication  within  either an  eCommerce  or
mCommerce transaction would satisfy both institutions and individuals.

         Cryptographic   technology  is  used  to  address  the  above-discussed
security challenges inherent in open networks.  Cryptography delivers four basic
information security services:

         o        confidentiality,  or keeping communications secret from anyone
                  other than an intended recipient;

         o        data  integrity,  or verifying that the message or transaction
                  has not been  modified  en route  between  the  sender and the
                  recipient;

         o        authentication,  or verifying the identity of another party to
                  ensure  that  communication  is  with a  known  or  authorized
                  person; and

         o        non-repudiation,   or  signing  a  document  or  a  record  of
                  transaction to attest to its validity.  This digital signature
                  can be checked by a relying party and its  correctness  can be
                  demonstrated to a third-party arbiter, allowing enforcement of
                  legally binding digital contracts.

Limitations of Existing Security Technologies

         Currently,   the  vast  majority  of  eCommerce   transactions   use  a
conventional  encryption  algorithm  that is the de  facto  public-key  security
standard in the wireline Internet environment.  These transactions  generally do
not involve mutual  authentication  and thus are not as secure as they could be.
We believe that as eCommerce evolves, businesses will increasingly demand mutual
authentication,  particularly for employee enterprise data access and high-value
transactions.  Conventional  encryption  technologies  can be  used  for  mutual
authentication. However, while these technologies offer a high level of security
for transactions conducted over the wireline network, they have certain inherent
limitations in providing the same level of security when operating in mobile and
wireless  environments.  Specifically,  as a result of the relatively  large key
sizes used in these technologies,  mutual authentication is relatively difficult
and expensive due to the following disadvantages:

         o        Slower  Processing Speed. Key generation and digital signature
                  operations  using  these  technologies   consume   significant
                  amounts of processing  time. For example,  we have  determined
                  that the  public-key  cryptographic  components  of a mutually
                  authenticated  SSL handshake  currently take  approximately 23
                  seconds   using   conventional    technologies   on   a   Palm
                  VII(TM)handheld  computer  with  a  20  MHz  processor.   This
                  handshake,  or a similar handshake,  would be used when a Palm
                  VII(TM)  connects  to a  secure  web  server  for  a  mutually
                  authenticated mCommerce transaction. This amount of processing
                  time may be  unacceptable  in devices  that attempt to deliver
                  immediate user interaction.


                                     - 3 -

<PAGE>

         o        Large  Bandwidth  Requirements.  There is a limited  amount of
                  wireless bandwidth  available for use by mobile  applications.
                  Authentication  messages  signed using  conventional  security
                  algorithms  consume   significant   amounts  of  this  limited
                  wireless bandwidth.

         o        Increased   Battery   Requirements.   Due  to  the   increased
                  processing  time associated  with  conventional  cryptographic
                  operations,  these  operations  would  cause  a  drain  on the
                  battery power found in some wireless and mobile devices.

         While any one or more of the above disadvantages inherent in the use of
conventional  security  technologies  for  mutual  authentication  in mobile and
wireless  environments  can  be  overcome,  either  through  the  addition  of a
cryptographic  coprocessor to the device or otherwise,  we believe that the cost
of doing so would generally be significant.

Market Opportunity

         We believe that a  cost-effective  and efficient  security  solution is
required  to  realize  the full  potential  of  mCommerce  and other  mobile and
wireless applications. What is needed is a security solution designed for mobile
and wireless  devices that is  substantially  faster,  uses  significantly  less
processing   power,   bandwidth   and  battery   power,   and  provides   secure
authentication  and  encryption  to ensure the validity and privacy of mCommerce
transactions.

The Certicom Solution

         We  are an  encryption  technology  company  specializing  in  security
solutions for mobile computing and wireless data markets,  including  mCommerce.
Our products  and  services,  which we provide to many of the leading  mCommerce
OEMs,  enable trust  through  mutual  authentication.  We provide  cryptographic
toolkits,  information  security  protocol toolkits and PKI products that enable
secure  mCommerce.  In addition,  we have announced for  availability to our OEM
customers  in calendar  year 2000 CA services and a VPN client  application.  We
also  offer a wide  range  of  cryptographic  consulting  and  design  services,
including  design and review of secure  systems.  We provide  comprehensive  and
innovative  solutions to our OEM customers that allow them to develop new mobile
computing  and  wireless  data  applications  and to  accelerate  their  product
delivery, reducing their costs.

Our Elliptic Curve Cryptography-Based Solutions

         We believe that our elliptic curve cryptography, or ECC-based solutions
offer  significant  advantages in providing mutual  authentication  of mCommerce
transactions  and  applications  over  the  wireless   Internet.   Our  patented
implementation  of ECC technology  can provide a more  efficient  alternative to
conventional  public-key  cryptographic  algorithms  in many mobile and wireless
environments,  resulting in generally faster processing speed, reduced bandwidth
requirements  and decreased  battery  requirements.  These  advantages  make our
ECC-based  security  technology  particularly well suited to mobile devices that
incorporate  less  powerful  processors,  such as  handheld  computing  devices,
Internet-enabled phones and two-way pagers. We have performed extensive research
in ECC, and we have developed numerous  proprietary  techniques and hold several
patents  related  to its  implementation.  ECC is  included  in  many  prominent
standards - including  specifications  from the National  Institute of Standards
and  Technology,  or NIST,  and more  commercially-oriented  forums  such as the
American National Standards Institute, or ANSI, the Institute for Electrical and
Electronics  Engineers,   or  IEEE,  and  the  International   Organization  for
Standardization,  or ISO. For a more complete discussion of ECC, please refer to
"Cryptographic  Systems and Elliptic Curve Cryptography" at the end of this Item
1.

         We believe  that our  ECC-based  solutions  allow us to deliver  strong
security and trusted communications based on mutual  authentication,  which help
address the problem of identity  fraud on the  wireless  Internet.  ECC performs
more  efficiently  than  conventional  security  algorithms  in many  mobile and
wireless  environments.  When  applied  to mutual  authentication  on mobile and
wireless devices,  our ECC implementation can provide,  with equivalent security
strength,  the  following  technical  advantages  over  conventional  encryption
technologies:

         o        Faster    Processing    Speed.   We   have   determined   that
                  characteristics of ECC allow rapid mutual  authentication from
                  mobile and  wireless  devices.  For  example,  the  public-key
                  cryptographic   components   of  a   mutually   authenticated,
                  ECC-based,   SSL  handshake  currently  take  approximately


                                     - 4 -

<PAGE>

                  3 seconds  on a Palm  VII(TM)handheld  computer  with a 20 MHz
                  processor.  This compares to  approximately  23 seconds for an
                  SSL  handshake  using  conventional  technologies  on the same
                  device. This handshake, or a similar handshake,  would be used
                  when the Palm  VII(TM)connects  to a secure  web  server for a
                  mutually  authenticated  mCommerce  transaction.  These faster
                  processing   speeds  help  deliver  a  more   acceptable  user
                  experience with mobile and wireless devices.

         o        Reduced Bandwidth Requirements. The shorter key lengths of ECC
                  significantly  reduce  the  amount  of  data  required  to  be
                  exchanged  for  security  purposes.  This  reduced  use of the
                  limited wireless  bandwidth results in time savings for device
                  users and lower bandwidth costs.

         o        Decreased Battery Requirements.  Some ECC operations take less
                  time to process,  which  reduces  the amount of battery  power
                  consumed by a secure application. This results in an extension
                  of the battery life of the mobile and wireless devices.

         We believe our ECC-based  solutions can provide the following principal
benefits to our OEM customers:

         o        Lower  costs.  Because less  processing  power is required for
                  equivalent  security,  some mobile and wireless products built
                  with our technologies are less expensive for our OEM customers
                  to produce.

         o        Increased security.  Our ECC-based  technology enables greater
                  security than  conventional  encryption  technologies  in many
                  mobile and wireless  environments when evaluated at equivalent
                  levels of processing power, bandwidth and battery capacity.

         o        Faster  time-to-market.  By  incorporating  our  products  and
                  services,  our customers  can quickly  develop a wide range of
                  mobile computing and wireless data applications.

         o        Differentiated applications and services. Our solutions enable
                  customers  to create new  applications  and deliver  levels of
                  service that are high in value and easy to use.

         o        Increased  trust.  Our  clients  use our  solutions  to  build
                  increased  trust  into their  products  and  deliver  reliable
                  services for users of mobile and wireless devices.

Built-in Security

         Our  encryption  products and services allow our OEM customers to build
PKI, secure communication  protocols and cryptographic  algorithms directly into
their  applications  which enable rapid development of flexible trust management
solutions.  We also provide security integration services to OEMs to assist them
in the incorporation of our cryptographic  products and custom designed security
solutions into their products.

Vertically Integrated Security Offerings

         We are poised to deliver a  comprehensive  set of tools,  products  and
services  designed to provide an  integrated  ECC-based  PKI  solution to secure
network  applications,  including mobile and wireless  devices.  Our solution is
designed  to allow an entity to act as a  certificate  authority  for  mCommerce
applications and to enable enterprises to form secure communities of trust.

Strategy

         Our objective is to become the leading provider of information security
products and services for applications in the mobile computing and wireless data
markets,  including  mCommerce.  We believe that our ECC-based  technology  will
allow us to provide the  preferred  security  solution for mCommerce  OEMs.  Our
strategy includes the key elements discussed below.


                                     - 5 -

<PAGE>

Deliver a  comprehensive  security  product  line for the mobile  computing  and
wireless data markets

         We intend to become  the  provider  of the most  comprehensive  line of
security  products  and  services for the mobile  computing  and  wireless  data
markets.  Our offerings  currently  include  ECC-based  cryptographic  toolkits,
information security protocol toolkits and PKI products. We have announced,  for
availability  in the second half of calendar  year 2000,  CA services  and a VPN
client  application  allowing us to address all aspects of our customers' mobile
and  wireless  security  requirements.  Unlike  the  offerings  of  many  of our
competitors,  our patented ECC-based technology and integrated standard security
protocols have been designed  specifically  for the constraints  associated with
applications   in  the   mCommerce   market.   By   providing   an   end-to-end,
standards-based  solution that is designed for the mobile computing and wireless
data markets,  we intend to become the de facto  technology  standard and market
leader for delivering secure and trusted communications for mCommerce.

Continue to build brand awareness

         Through our  current  marketing  and  branding  efforts,  we have built
significant  brand  awareness for  Certicom.  Through  co-branding  with leading
companies,  as well as other  marketing  programs,  we intend to  establish  the
certicom  encryption(TM)  ingredient  brand  logo as the  assurance  of  trusted
communications in the mobile computing and wireless data markets.

Emphasize  research  and  development  to  produce  innovative   standards-based
security solutions

         Our implementation of our ECC-based  technology is based on 15 years of
fundamental  cryptographic research by our Chief Cryptographer and his staff, as
well as research by teams at leading  academic  institutions  with which we have
working  relationships.  Through  the  continuation  of  this  research  and the
relationship  between these research groups and our product  development groups,
we intend to continue to incorporate leading-edge  cryptographic technology into
our security products and services.  We also intend to continue to capitalize on
our  technical  expertise  in  cryptography  to  differentiate  our products and
services from other commercially available solutions.  In addition, we intend to
continue  to work with  standards  organizations  to develop  emerging  industry
standards based on our technology.

Leverage our OEM business model and strategic technology relationships

         Our security  solutions  are embedded in a wide variety of  third-party
products  and  services,  including  those  of 724  Solutions,  Aether  Systems,
BellSouth  Wireless Data, Palm, Inc. and PUMATECH,  Inc. By continuing to pursue
this  OEM  business  model,  all of our  OEM  customers  in  effect  become  our
distributors,  broadening our sales channels. We work strategically with many of
our OEM customers in developing  security solutions for their future products in
order to further the  acceptance  of our security  technology  with these market
leaders.  We intend to use these existing  strategic  relationships  and develop
additional  strategic  relationships to position  ourselves as the leader in the
mCommerce security market.

Apply our technical expertise to enter new and emerging markets

         In addition to our primary focus on security  technology for the mobile
computing and wireless data markets, our expertise in security is well-suited to
other  information  and  business  applications.  Other  applications  using our
efficient cryptographic technology include CyberSafe's secure payment solutions,
Critical  Path's  Internet  messaging  solution and XM Radio's  satellite  radio
broadcast  solution.  We intend to leverage our success in mobile  computing and
wireless data applications into related applications and markets.

Products and Services

         Our solutions include the following products and services:

         o        Cryptographic Toolkits;

         o        Information Security Protocol Toolkits;

         o        PKI Products;


                                     - 6 -

<PAGE>

         o        Certificate   Authority  Services  (announced  for  commercial
                  availability in the second half of calendar year 2000);

         o        Virtual  Private  Network  Client  (announced  for  commercial
                  availability in the second half of calendar year 2000);

         o        Consulting and Design Services; and

         o        Hardware Components.

Cryptographic Toolkits

         Our Security  Builder  software  development  toolkit family,  which is
based on our proprietary ECC-based technology,  enables customers to integrate a
comprehensive selection of cryptographic components into their applications. The
current version of Security Builder supports platforms such as Microsoft Windows
95/98/NT,  Sun Solaris,  several versions of UNIX,  Microsoft Windows CE and the
Palm OS(R) platform. We also offer integration services to port Security Builder
to other platforms,  including real-time operating systems intended for embedded
devices.

Information Security Protocol Toolkits

         Our information security protocol toolkits include:

         o        SSL Plus.  Our SSL Plus software  development  toolkit  family
                  provides  a   comprehensive   set  of  libraries  that  permit
                  customers  to add  secure  communications  quickly  and easily
                  using the secure  socket layer,  or SSL, and  transport  layer
                  security, or TLS, security protocols.  The family includes SSL
                  Plus 3.0, SSL Plus for Embedded Systems and SSL Plus for Java.
                  This  variety of  toolkits  allows  developers  to come to one
                  source  for  industry  standard  secure   communications  over
                  Internet,  Intranet,  mobile  computing  and  embedded  system
                  domains. SSL Plus is the first SSL toolkit that enables secure
                  connections of handheld computers into enterprise data systems
                  over both wired and wireless  networks.  SSL Plus is available
                  on platforms such as Microsoft Windows NT, Sun Solaris, HP/UX,
                  QNX RTOS, Microsoft Windows CE and the Palm OS(R)platform. SSL
                  Plus is  built  using  the  ANSI C  language,  and we  provide
                  services to port to other  platforms on request.  The SSL Plus
                  for  Embedded  Systems  toolkit  extends  SSL  connections  to
                  handheld computing  environments and other embedded devices by
                  integrating   our  ECC-based   technology  with  the  TLS  1.0
                  specification (the successor standard to SSL 3.0).

         o        WTLS  Plus.  This   information   security   protocol  toolkit
                  implements the wireless  transport  layer  security,  or WTLS,
                  protocol  for  secure  transport  layer   communication   over
                  wireless  networks.  WTLS is part of the wireless  application
                  protocol,  or WAP,  specification and delivers secure Internet
                  communications  and  advanced  telephony  services  on  mobile
                  phones, pagers and personal digital assistants.

PKI Products

         Our  Trustpoint  PKI product  line is a  comprehensive  set of software
components,  products and tools for PKI development  and deployment.  Trustpoint
PKI  products  can be  used by our  OEM  customers  to  build  trust  management
solutions  into  their  products.   Our  Trustpoint  product  line  consists  of
certificate toolkits, a CA, a Registration  Authority,  or RA, an administrative
console and end-entity  software.  These components operate on Linux,  Microsoft
Windows 95/98/NT,  Sun Solaris,  HP/UX,  Java JDK,  Microsoft Windows CE and the
Palm  OS(R)  platform.  Additionally,  Trustpoint  components  are built to open
industry standards for PKI  interoperability,  including X.509 and PKIX. We have
commenced  shipping our  Trustpoint  PKI  products for revenue  during the first
quarter of fiscal 2001.


                                     - 7 -

<PAGE>

Certificate Authority Services

         We have announced,  for commercial  availability in calendar year 2000,
Internet-based  trust  services  that assure the  identity  of both  servers and
clients in eCommerce and  mCommerce  information  systems.  We will market these
trust services as MobileTrust  managed  certificate  services.  MobileTrust will
package the  MobileTrust  CA service with our PKI  products,  security  protocol
toolkits and  integration  services to provide an integrated  ECC-based  managed
trust solution for our OEM customers. The MobileTrust CA service will operate in
a secure data center to provide  reliability  and  protection  against  external
threats. We currently are beta testing our trust services.

Virtual Private Network Client

         We have announced, for commercial availability in calendar year 2000, a
VPN client  application  for the Palm  Computing  Platform.  The VPN client will
deliver an IPSec standard protocol  implementation  compatible with existing VPN
installations.  The VPN  client  will also  support a wide  range of  encryption
algorithms,  enabling  interoperability  with  the  current  installed  base  of
enterprise VPN products,  and includes  Certicom's ECC for vertical  integration
with the MobileTrust CA service.

Consulting and Design Service

         We deliver advanced security solutions. Our experts in cryptography and
information  security  provide a  comprehensive  range of consulting  and design
services.  These  services are  designed to help  customers  get their  products
finished faster and with higher levels of confidence in their security. We offer
the following services:

         o        Security   Design  and   Integration.   We  offer  design  and
                  development   support   to   help   our   customers   minimize
                  time-to-market  and to maximize  performance,  efficiency  and
                  robustness of security applications.

         o        Product Review and Evaluation. We provide confidential reviews
                  of our clients' products to assist them in fielding  practical
                  and robust security  solutions.  Our reviews include  detailed
                  technical  evaluations,  architectural  overviews and business
                  plan viability analysis.

         o        Enterprise  and  Information  Security  Reviews.  We assist in
                  identifying  threats  and  evaluating  networks  and  computer
                  security  risks,  and we  recommend  solutions  for  potential
                  security  breaches.   Typically,  we  perform  risk  analysis,
                  physical  site reviews,  network  security  reviews,  security
                  architecture  design,  disaster  recovery  planning,  security
                  policies and product review and recommendations as part of our
                  enterprise consulting services.

         o        Cryptographic  Algorithm Design and Review.  We have expertise
                  in efficient cryptographic security  implementations.  We help
                  our   customers   design  and  review   custom   cryptographic
                  algorithms   for   building   strong   security  in  demanding
                  environments. Customers typically use our services in wireless
                  handheld devices, high value financial  transactions,  server-
                  and client-based applications and network security systems.

         o        Security and Cryptographic Training. We offer training courses
                  to our customers that cover a broad range of cryptographic and
                  digital  information   security  topics.   These  courses  are
                  tailored  to  help  our  customers  make  informed   decisions
                  concerning  technical  designs  and new  product  and  service
                  opportunities.

         o        Public-Key  Infrastructure Solutions. We help clients evaluate
                  PKI  products  and  define  PKI  system   architectures.   Our
                  development  teams  have  fielded  robust  solutions  for  our
                  customers  that  we  believe  meet  the  demands  of  new  and
                  challenging environments.

Hardware Components

         We offer several hardware components that are manufactured by others to
our  specifications.  These products  provide secure  processing and storage for
cryptographic  keys based on ECC-based  technology.  Our smart card product line
addresses  the  need  for  low-cost,   high-strength  user   identification  and
authentication services in a


                                     - 8 -

<PAGE>

form factor similar to a credit card. Our Certilock  security  module provides a
secure,  hardware-based  execution environment in a PCI card form factor for use
in secure application servers and certificate authorities.

Intellectual Property

         We rely on  combinations  of proprietary  technologies,  trade secrets,
patent protection and copyright  protection in the conduct of our business.  Our
cryptographic  research has resulted in ten patents granted in the United States
and  internationally.  Our research has also led to our filing  numerous  patent
applications  over the past five years.  As of June 30, 2000, we had  forty-four
pending   patent   applications,   each  of  which  is  filed  in  one  or  more
jurisdictions.  Most of our patent  applications  are filed in the United States
and Canada,  while a portion are filed in Europe and Japan. We have filed patent
applications in countries which we perceive to be significant  markets.  We also
rely on certain  trade secret  aspects of our products and services to provide a
commercially prudent level of protection to our proprietary technology,  both in
markets in which we have filed  patent  applications  and those in which we have
not.

         A majority of our pending patent applications relate to implementations
of ECC,  while some of them  relate to  techniques  used with  other  public-key
cryptosystems as well. We believe that our existing  patents,  together with our
pending patent applications, cover the most advantageous methods of implementing
ECC.  We  have  licensed  and  may in the  future  license  our  patents  to OEM
customers.  We  believe  that  our  ECC-based  technology  will be  commercially
competitive against public domain encryption systems.

         We also  engage in joint  development  work which has  resulted  in the
filing of  additional  patent  applications.  As a result  of joint  development
efforts, we jointly own two patents with Motorola.  In addition,  such work also
resulted in the filing of several  applications  for jointly  owned patents with
Pitney Bowes.

Research and Development

         We  are   engaged  in   advanced   cryptographic   research   involving
computational  algorithms and integrated circuit architectures for cryptographic
processing.  Dr. Scott Vanstone,  our Chief Cryptographer,  leads our efforts in
this area. Dr. Vanstone is also a professor of Mathematics and Computer  Science
at the  University  of Waterloo,  a leading  Canadian  center for  cryptographic
research,  and has published numerous books and articles on cryptography.  He is
an Executive Director for the Centre of Applied Cryptography,  the holder of the
NSERC/Pitney  Bowes Senior Chair of Applied  Cryptography  at the  University of
Waterloo and a Fellow, Royal Society of Canada,  Academy of Science. We maintain
a  cooperative  relationship  with the  University  of Waterloo,  including  our
sponsorship of the Certicom Chair of  Cryptography.  We also sponsor research at
Stanford University.

         As of June 30,  2000,  we employed 20  cryptographers  involved in pure
research and applied cryptographic  development.  We also retain several leading
cryptographic  researchers  at academic  institutions  as paid  consultants.  We
present at a number of  cryptography  conferences  and hold  numerous  workshops
worldwide on ECC.

         In addition to our core expertise in applied cryptographic research, we
emphasize the  development  of software  toolkits  that package core  technology
innovations and standard security  protocols into easy-to-use  products targeted
at the  development  community.  We have expertise in the development of printed
circuit  board  and   integrated   circuit   designs  that   integrate  our  ECC
implementations directly into hardware solutions.

         Our research and development staff is active in many important industry
standards  bodies,  including  the  Institute  for  Electrical  and  Electronics
Engineers,  or IEEE, the American  National  Standards  Institute,  or ANSI, the
International Organization for Standardization, or ISO, the Internet Engineering
Task Force,  or IETF,  and WAP,  among others.  We have formed our own standards
group, the Standards for Efficient  Cryptography  Group, or SECG, to promote ECC
interoperability  among the major companies planning to ship ECC-based products.
Members  of  SECG,  include  companies  such as  Hewlett-Packard,  VeriSign  and
American Express.

Customers

         As of June 30, 2000, the Company had over 100 licensed  customers.  The
following is a partial list of companies that have licensed our Security Builder
cryptographic  toolkit or SSL Plus protocol toolkit product, or custom-developed
security solutions:


                                     - 9 -

<PAGE>

           724 Solutions Inc.                 Motorola, Inc.
           Aether Systems Inc.                NeoPoint, Inc.
           AvantGo Inc.                       Palm, Inc.
           BellSouth Wireless Data, L.P.      Pitney Bowes
           ClearCommerce Corp.                PUMATECH, Inc., Inc.
           Critical Path, Inc.                QUALCOMM, Inc.
           CyberCash, Inc.                    Schlumberger Limited
           CyberSafe Corporation              Sterling Commerce, Inc.
           Datakey, Inc.                      Sybase, Inc.
           JP Systems, Inc.                   XM Satellite Radio, Inc.


         We license our cryptographic and information security protocol toolkits
to our OEM  customers,  which  in turn use them to  build  security  into  their
products  for sale to their  end-user  customers.  Listed  below are examples of
applications where our encryption technology has been implemented in products or
services offered to consumers or enterprise end-users.

Customer Applications

BellSouth Wireless Data--Fidelity Investments

         BellSouth Wireless Data is a leading provider of wireless data services
with one of the largest  wireless data networks in the United States.  BellSouth
embeds our ECC technology into its BellSouth  Powertool(TM)  application,  which
provides a development environment used by developers looking to quickly develop
secure wireless data  applications for the RIM  Inter@active(TM)  Pager 950. Our
ECC technology allows the establishment of a secure wireless communications link
between a gateway  server and a RIM two-way  pager for the transfer of sensitive
application  data  utilizing the  BellSouth  Intelligent  Wireless  Network(TM).
Fidelity Investments  licensed BellSouth's  Powertool(TM) for the development of
its Fidelity  InstantBroker(TM)  secure  wireless  brokerage  application.  This
application allows Fidelity's  brokerage customers to check account information,
receive quotes and place orders securely.

Aether Systems--Charles Schwab & Co., Inc.

         Aether  Systems is a leading  provider  of  wireless  and  mobile  data
services, allowing real-time communications and transactions across a full range
of devices and  networks.  Aether  embeds our ECC  technology  into their Aether
Intelligent  Messaging  software  platform  allowing  application  providers  to
securely  extend  their reach to wireless  platforms.  Aether chose our security
technology in order to secure  communications  from the wireless  device back to
the application server.  Financial  institutions,  such as Charles Schwab & Co.,
Inc.,  partner  with  Aether to  develop  wireless  trading  services  for their
brokerage  customers.  These services are designed to enable customers to access
their accounts and conduct  transactions from a wide range of mobile information
appliances.

724 Solutions--Bank of Montreal

         724 Solutions provides an Internet  infrastructure software solution to
financial  institutions  that  enables  them to offer  personalized  and  secure
on-line  banking,  brokerage  and  eCommerce  services  across  a wide  range of
Internet-enabled  wireless and consumer electronic devices.  724 Solutions chose
our SSL  Plus  and  Security  Builder  toolkits  to embed  ECC  technology  into
client-device  financial  applications.  For  example,  724  Solutions  uses ECC
technology in home banking and customer  solutions as well as in their  back-end
architecture.   Bank  of  Montreal  deployed  wireless  banking  and  investment
applications  based on software  provided by 724 Solutions.  These  applications
provide Bank of Montreal  customers  with the  capability to access bank account
balances and transaction  details,  transfer funds, pay bills,  conduct wireless
trading,  view  investment  portfolios  and view  credit card  transactions  and
payments.


                                     - 10 -

<PAGE>

Palm, Inc.--Amazon.com

         Palm is the world's  leading  provider of personal  companion  handheld
devices with a 68% market share in the  worldwide  personal  companion  handheld
device market in 1998  according to IDC. For its wireless Palm VII(TM)  handheld
computer,  we designed a custom  implementation of our ECC-based technology that
seamlessly  embeds  security  into the Palm  OS(R)  platform.  Palm's  ECC-based
security  allows  the  establishment  of a secure  link  between a Palm  VII(TM)
handheld  and  the  Palm.Net(TM)   wireless   communications   service  allowing
over-the-air service activation as well as secure mobile eCommerce applications.
Amazon.com  launched  its  Amazon.com  Anywhere  application,  based on software
acquired in their  acquisition  of Convergence  Corporation,  which utilizes the
secure link between the Palm VII(TM) handheld and the Palm.Net(TM)  servers that
is enabled by our security technology.  Amazon.com Anywhere allows its customers
to securely shop for books, music, software,  electronics and other products and
check the status of auction  items at  Amazon.com  when they are away from their
desktop computers.

Sales and Business Development

         We  sell  our  cryptographic  products  and  services  directly  to OEM
customers  through  dedicated  technical  sales  representatives.  We focus  our
efforts  on  market  leaders  in the  sectors  in which  the  advantages  of our
technology are most compelling.

         We have sales  offices in the United  States and  Canada.  We intend to
expand our sales and  business  development  presence  into  Europe and the Asia
Pacific region.

         In North  America,  our  sales  representatives  are  assigned  account
responsibilities  based on market sector.  This enables the team and its members
to develop  expertise in their  specific  market  sector.  Each sector team will
consist of a business  development  manager, a group of sales  specialists,  and
field application engineers.

         As the market matures for our technology,  we anticipate  complementing
our direct  sales  force with  indirect  channels  to  increase  our sales reach
worldwide.

Marketing

         We maintain  marketing programs aimed at increasing market awareness of
Certicom, our technology and the need for security solutions in general.

Demand Generation

         We  generate  demand  from  OEMs for our  products  by  exhibiting  and
speaking at industry conferences, trade shows, seminars and consortium meetings.
We focus our marketing efforts on selected  opportunities to reach technical and
business decision-makers within particular target market sectors.

Customer Education

         We  educate  our   customers   to  help  them   understand   public-key
cryptography and information  security as it applies to their specific  business
opportunities. For this we use a combination of white papers, case studies, data
sheets, product demonstrations and on-line tutorials.

Ingredient Brand

         We provide our certicom encryption(TM) ingredient brand logo, a diamond
with the words "certicom  encryption"  inside, for use by our licensees in their
end-user  product  packaging  to  indicate  the use of our  technology  in their
products. We also provide variations of our logo for use in handheld devices and
other systems where screen space is at a premium. Our logo features regularly in
our advertisements, trade show graphics, product packaging and other promotional
efforts.

Standards Marketing and Education

         We maintain an active  commitment to open standards in the cryptography
industry and participate in setting standards that pertain to various aspects of
our technology.  Our success in marketing our security  products


                                     - 11 -

<PAGE>

and  services is partially  dependent on the  acceptance  of our  technology  by
standards  organizations.  In many cases, the membership of standards committees
are comprised of representatives from our most important customers.

         Confidence in the strength of cryptographic  algorithms is essential to
the expansion of their use. We have engaged in extensive educational  activities
to explain the mathematical basis underlying elliptic curve cryptosystems. These
educational  initiatives  have been directed towards not only customers but also
the  ultimate   end-users  of  our  products,   including  banks,   credit  card
associations and governments.

Competition

         We face  competition  from  vendors  offering a wide range of  security
products and services, including the following:

Cryptographic Toolkits

         Our primary  competitor  in this market is RSA  Security,  Inc., or RSA
Security. The RSA public-key algorithm has long been established as the de facto
standard  for the  wired  Internet.  In  addition,  competition  may  come  from
solutions developed  in-house,  or by companies who attempt their own encryption
implementations without licensing commercial toolkits.

Information Security Protocols

         RSA Security also markets products in this segment.  There are a number
of  other  companies  worldwide  who  offer  commercial  protocol  products.  In
addition,  OpenSSL, a royalty-free source-code  implementation,  is used by some
companies.

PKI Products

         Competition in this segment is increasing as traditional  PKI companies
such as Entrust Technologies, Inc., or Entrust and Baltimore Technologies, Inc.,
or  Baltimore,  move into the mobile and  wireless  market.  RSA  Security  also
participates  in this segment.  In Europe and Asia,  some specialty  vendors are
emerging,  such as Sonera SmartTrust,  who develop and sell PKI products for GSM
phones.

CA Services

         Competition  in this segment may come from  companies such as VeriSign,
Inc.,  or  VeriSign,  Entrust and IBM.  These  companies  have CA  products  and
services for issuing and maintaining digital  certificates for use on public and
private networks.  Although  traditionally  desktop focused,  they have begun to
modify their offerings to address the mobile and wireless market.

VPN Client

         Competition in this segment is only just  emerging.  One other company,
V-ONE,  has  announced  a VPN client  for the  Microsoft  Windows  CE  platform.
Potential  market entrants include SSH  Communications  Security and traditional
security   software   providers   such  as   Entrust   Technologies,   Baltimore
Technologies, and RSA Security.

         In addition, we may face competition in the future from competitors who
develop new  cryptosystems.  We believe that the  important  factors in choosing
security  technologies  in our market are proven  technology,  reputation of the
vendor, efficiency of the algorithms and ease-of-use of the products. We believe
that our products currently compete favorably with those of our competitors, but
there can be no assurance that we can maintain our competitive  position against
current and future competitors.

Regulatory Matters

         Our  products  are subject to export,  import  and/or use  restrictions
imposed by the  governments  of the United States,  Canada and other  countries.
Therefore,  our ability to export and  re-export  our  products  from the United
States  and Canada to other  countries  are  subject to a variety of  government
approvals or licensing requirements.


                                     - 12 -

<PAGE>

Such  restrictions  potentially  could  have a  material  adverse  effect on our
business, financial condition and operating results.

         In general,  our products can be exported from,  imported into and used
in the United States and Canada without  licenses or other  approvals.  In other
countries,  the trends regarding export,  import and use restrictions are mixed.
For example,  France  appears to be relaxing  its  requirements,  whereas  China
appears to be imposing new  requirements.  Given that the laws,  regulations and
requirements  governing the export, import and use of encryption products change
frequently and without advance  notice,  we cannot predict their ultimate impact
on our activities.

Employees

         As of June 30,  2000,  we had 210  full-time,  part-time  and  contract
employees:  79 in  cryptographic  research  and  engineering,  41 in  sales  and
marketing,  34 in consulting and systems integration services, and 56 in finance
and  administration.  None of our employees is  represented  by a labor union or
subject to a collective bargaining agreement.  We consider our relationship with
our employees to be good.  All our employees  enter into  intellectual  property
rights assignments and non-disclosure agreements with us.

Cryptographic Systems and Elliptic Curve Cryptography

         The expansion of digital data communication and the Internet has led to
a need to protect valuable information with cryptography. There are two types of
cryptographic  systems:  symmetric-key  systems  and  public-key  systems.  In a
symmetric-key  system, both communicating parties share the same key, which must
be kept secret. Secret keys require complex key management systems to distribute
them to the appropriate parties while keeping them secret from others.

         In contrast, in a public-key system, there are two distinct but related
keys, forming a key pair: a public key and a private key. The public key is used
for encrypting  messages,  which can then be decrypted  using the  corresponding
private  key. It is  extremely  hard to determine or derive the private key from
the  public  key.  Thus,  the  public  key  can  be  openly  published   without
compromising the  confidentiality  of the  corresponding  private key, which the
user must keep  secret.  Because  the  public key need not be kept  secret,  key
management  systems for  public-key  cryptography  can be much  simpler than for
symmetric-key  systems. As symmetric-key systems deliver better performance than
public-key systems, but public-key systems provide better key management, hybrid
solutions  using both  systems are  generally  used to  construct  cryptographic
solutions.

         Public-key systems offer the ability to create digital  signatures.  To
sign digital data, a user applies his or her private key in a prescribed  manner
to the data to be signed, creating a digital signature. Subsequently, anyone can
verify the correctness of the signature using the user's public key. This allows
the user to prove that he or she  possesses  the correct  private key and proves
that the message has not been modified, thus creating:

         o        integrity, since the message can be shown to be unmodified;

         o        authentication,  because  the  user can be  identified  as the
                  holder of the private key; and

         o        non-repudiation,  because  the message  and  signature  can be
                  presented to a third party who can independently  validate the
                  signature and treat it as legally binding, where appropriate.

         Because a digital  signature allows a user to prove only that he or she
holds the private key which matches a particular public key,  additional data is
necessary to use signature  validation to create an assurance of identity.  This
is accomplished with digital certificates, which are signed messages that bind a
name  or  other  attributes  of  the  holder  of a  given  private  key  to  the
corresponding  public key. Each certificate is signed by a trusted party,  known
as the certificate authority, which makes the assertion that a given user is the
sole holder of the private key which matches the public key. The signature  from
the certificate authority allows the binding of the name to the public key to be
trusted.  This  allows a relying  party to  validate  the  identity of a user or
server by first  checking  the  validity of the  certificate,  then  verifying a
signature  against the  certified  public key.  The  collection  of  certificate
authorities,  policies and procedures  associated  with the management of public
keys is known as public-key infrastructure, or PKI.


                                     - 13 -

<PAGE>

         All known  public-key  cryptographic  systems  are based upon  advanced
mathematics.  They use the idea of a trapdoor one-way  function,  a mathematical
problem  which  is hard to  solve  without  knowledge  of some  secret  trapdoor
information.  With this knowledge,  the problem is easy to solve; without it, it
is extremely difficult. In a public-key  cryptographic system, the public key is
the  statement  of the  mathematical  problem;  the  private  key is the  secret
trapdoor  information.  For example,  one of the earliest and most commonly used
public-key  cryptographic  systems  is RSA,  which is based on taking  two large
prime numbers,  each dozens of digits long, and multiplying them together. It is
very  difficult to take the composite  result and determine the two unique prime
factors that were used to create it.  Here,  the large  composite  number is the
public  key,  and  knowledge  of  its  prime  factors  is  the  secret  trapdoor
information and can be used as the private key.

         Before  elliptic  curve  cryptography,  or ECC, was invented,  only two
major  families of public-key  cryptographic  systems were known.  Each of these
conventional  algorithm  families is based on a different one-way function.  The
families are called the integer  factorization family and the discrete logarithm
family,  and both are based on  arithmetic  using  whole  numbers.  The  integer
factorization  family consists of algorithms such as RSA. The discrete logarithm
family  is based on the  difficulty  of taking  logarithms  when  arithmetic  is
performed  while  taking  remainders  under  division by a large  number at each
stage.  The  best-known  systems  in  this  family  are the  Diffie-Hellman  key
agreement protocol and the DSA signature scheme.

         In 1985,  Neal Koblitz and Victor Miller  realized that elliptic curves
had practical application to public-key cryptography.  Elliptic curves have been
studied as mathematical  objects for over 150 years and formed the basis in 1995
of Andrew Wiles' much publicized proof of Fermat's Last Theorem--a problem which
had  remained  unsolved  for  hundreds  of  years  and at the  time was the most
celebrated  open question in  mathematics.  ECC is based on a problem related to
the discrete  logarithm family,  except that arithmetic is performed on elliptic
curve points rather than on whole numbers.

         Although  a  poorly-designed   cryptographic  system  can  be  insecure
regardless  of  how  long  its  keys  are,  the  strength  of  secure,  accepted
cryptographic  systems can generally be measured in terms of key size,  which is
measured in bits. The use of advanced mathematics in a public-key  cryptographic
system  leads  to its keys  being  relatively  large  and its  operations  being
relatively slow when compared to those of a symmetric-key cryptographic system.

         The most commonly used  public-key  systems must use a 1,024-bit key to
deliver the same  security as an 80-bit  symmetric  key and take a great deal of
computation  to create or verify  signatures  or to  encrypt  or  decrypt  data.
Because the  elliptic  curve  problem is harder to attack than the whole  number
problems used in conventional  public-key  systems,  ECC offers similar security
with just 163-bit  keys.  We believe that the  advantage of ECC over these older
public-key  systems will  increase as available  computing  power,  and thus the
ability to attack a cryptosystem,  increases.  The following  table  illustrates
this advantage by showing the key sizes for various kinds of cryptosystems  that
provide comparable security.

             Comparable key sizes for cryptographic systems, in bits

                                          Public Key
                               -------------------------------------
                                                    Conventional
               Symmetric Key         ECC             Algorithms
             ----------------  ----------------  -------------------
                     80              163               1,024
                    128              283               3,072
                    192              409               7,680
                    256              571               15,360

         Although 80-bit symmetric keys currently provide acceptable  commercial
security,  we  believe  that the next  generation  standards  for  symmetric-key
systems  will use keys in the  128-bit  to 256-bit  range in order to  withstand
attacks made possible by the rapid advance of computing  power.  For  equivalent
security  strength,  either 571-bit ECC keys or extremely  large  15,360-bit RSA
keys should be used to protect 256-bit symmetric keys in hybrid solutions. Given
that the processing  effort for a cryptographic  algorithm  generally grows with
the  key  size,  the  bandwidth  and   computational   advantages  of  ECC  grow
disproportionately as security increases.


                                     - 14 -

<PAGE>

         The security of a system is very dependent on its design. Confidence in
the security of ECC's  design  stems from 15 years of scrutiny by  cryptographic
experts.  This confidence is reflected by the inclusion of ECC in many prominent
standards,   including   specifications   from   government   bodies   and  more
commercially-oriented  forums  such as  ANSI,  IEEE and ISO.  Most  recently,  a
digital  signature  standard based on ECC has become a U.S.  Government  Federal
Information Processing Standard. Given that the standardization process in these
organizations  has typically  taken several years,  and because we monitor these
processes,   we  do  not  expect  that  any  novel   algorithms   will   achieve
standardization by these organizations in the near future.

RISK FACTORS

         You should  carefully  consider the risks described below and the other
information  in  this  Form  10-K.  If any of the  following  risks  occur,  our
business,  financial  condition  or results of  operations  could be  materially
harmed.

Risks Related to Our Business

         We have  historically  incurred  losses  and will  for the  foreseeable
         future.

         We have experienced  substantial net losses in each fiscal period since
we were formed.  As of April 30, 2000,  we had an  accumulated  deficit of $54.3
million  and, in  addition,  an  accumulated  other  comprehensive  loss of $2.5
million. The risk factors described in this Form 10-K, among other factors, make
predicting our future operating results difficult. We expect to incur additional
losses for the next few years, and we may never achieve profitability. If we do,
we may not be able to  sustain  it.  Because  we may be  unable to  sustain  our
revenue growth,  you should not consider our historical growth indicative of our
future revenue levels or operating results.

         Our business  depends on continued  development  of the  Internet,  the
         acceptance of mobile and wireless  devices and the continued  growth of
         eCommerce and mCommerce.

         Our future success is substantially  dependent upon continued growth in
the use of the Internet and the  acceptance  of mobile and wireless  devices and
their use for mobile eCommerce,  or mCommerce.  The adoption of the Internet for
commerce and communications, particularly by individuals and companies that have
historically  relied  upon  alternative  means of  commerce  and  communication,
generally  requires the  understanding and acceptance of a new way of conducting
business and exchanging information. In particular,  companies that have already
invested  substantial  resources  in other  means  of  conducting  commerce  and
exchanging  information  may be  particularly  reluctant or slow to adopt a new,
Internet-based   strategy   that  may  make   their   existing   personnel   and
infrastructure  obsolete.  To the extent that  individuals and businesses do not
consider the Internet to be a viable commercial and  communications  medium, and
do not increase their use of mobile and wireless  devices,  our business may not
grow.

         In addition,  our business may be materially  adversely affected if the
number  of users of  mobile  and  wireless  devices  does  not  increase,  or if
eCommerce  and  mCommerce  do not  become  more  accepted  and  widespread.  The
projections,  estimates  and  forecasts in this regard of third  parties that we
cite  in this  Form  10-K  could  prove  to be  overly  optimistic.  The use and
acceptance  of the Internet and of mobile and wireless  devices may not increase
for any number of reasons, including:

         o        actual  or   perceived   lack  of   security   for   sensitive
                  information, such as credit card numbers;

         o        congestion of traffic or other usage delays on the Internet;

         o        inconsistent quality of service or the lack of availability of
                  cost-effective, high-speed service;

         o        lack of high-speed modems and other communications equipment;

         o        competing technologies;

         o        possible outages or other damage to the Internet;


                                     - 15 -

<PAGE>

         o        governmental regulation; and

         o        uncertainty regarding intellectual property ownership.

         Published  reports have indicated that capacity  constraints  caused by
growth in the use of the Internet may impede further development of the Internet
to the  extent  that  users  experience  delays,  transmission  errors and other
difficulties. If the necessary infrastructure,  products, services or facilities
are not  developed,  or if the Internet does not become a viable and  widespread
commercial and  communications  medium, and if individuals and businesses do not
increase their use of mobile and wireless  devices for mCommerce,  our business,
financial  condition  and  operating  results  could  be  materially   adversely
affected.

         Unless the demand for mutual  authentication in mCommerce  transactions
         increases, our growth prospects will be materially adversely affected.

         Most of the  advantages  of our  ECC-based  technology  for  mobile and
wireless devices over conventional  security  technology are not applicable to a
transaction that does not involve the mutual  authentication  of both parties to
the  transaction.  The vast  majority of eCommerce  and  mCommerce  transactions
currently do not involve mutual  authentication.  Participants in mCommerce have
only recently begun to require mutual authentication in some applications,  such
as enterprise data access and certain high-value transactions. Unless the number
of mCommerce transactions involving mutual authentication  increases, the demand
for our products and  services,  and our growth  prospects,  will be  materially
adversely affected.

         Our success depends on ECC technology  becoming accepted as an industry
         standard.

         To date, ECC technology has not been broadly accepted. In order for our
business to be successful,  ECC technology  must become  accepted as an industry
standard,  which may never happen.  The technology of our principal  competitor,
RSA Security, is, and has been for the past several years, the de facto standard
such for security  over open  networks  like the  Internet.  RSA Security owns a
patent relating to its algorithm that expires in September,  2000. This patented
technology   should  be  freely   available  after  that  date  and  may  become
commoditized.  The inexpensive or free availability of such security  technology
could  significantly  delay  or  prevent  the  acceptance  of ECC as a  security
standard.

         Our quarterly  operating  results are subject to fluctuations and if we
         fail to meet the  expectations  of securities  analysts or investors in
         any quarter, our share price could decline significantly.

         Our quarterly  operating results have  historically  fluctuated and may
fluctuate significantly in the future.  Accordingly,  our operating results in a
particular  period are difficult to predict and may not meet the expectations of
securities  analysts or investors.  If this occurs, our share price would likely
decline significantly. Factors that may cause our operating results to fluctuate
include:

         o        the level of demand for our  products  and services as well as
                  the timing of new releases of our products;

         o        our  dependence  in any  quarter  on the timing of a few large
                  sales, as described below;

         o        our ability to maintain and grow a significant customer base;

         o        the fixed nature of a significant  proportion of our operating
                  expenses, particularly personnel, research and development and
                  facilities;

         o        costs related to the opening or expansion of our facilities;

         o        unanticipated product  discontinuation,  exchange or deferrals
                  by our original equipment manufacturer, or OEM, customers;

         o        changes in our pricing policies or those of our competitors;

         o        competition from sources that provide products similar to ours
                  for free;


                                     - 16 -

<PAGE>

         o        currency exchange rate fluctuations and other general economic
                  factors;

         o        our  effectiveness at integrating  acquisitions  with existing
                  operations; and

         o        timing of acquisitions and related costs.

         Accordingly,  we believe  that  quarter-to-quarter  comparisons  of our
results of operations are not necessarily meaningful. You should not rely on the
results of one fiscal quarter as an indication of our future performance.

         Our revenues are difficult to predict.

         We derive our revenue primarily from sales of our products and services
to our OEM customers.  Our sales vary in frequency, and OEM customers may or may
not purchase our products and services in the future. In addition, our customers
may defer the  purchase  of, or cease  using,  our  products and services at any
time,  and certain  license  agreements may be terminated by the customer at any
time.  Our  customer  contracts  typically  provide  for  base  license  fees or
technology  access fees and/or royalties based on a per unit or per usage charge
or a percentage of revenue from licensees'  products  containing our technology,
and a number of our large  contracts  provide  that we will not earn  additional
royalty  revenues from those contracts until these  customers'  shipments exceed
certain thresholds specified in the contracts. As a result, our revenues are not
recurring from period to period,  which makes them more difficult to predict. In
addition,  estimating  future revenue is difficult because we generally ship our
products  soon  after an  order  is  received  and,  as  such,  we do not have a
significant  backlog. Our expense levels are based, in part, on our expectations
of future  revenues and are largely  fixed in the short term. We may not be able
to adjust spending in a timely manner to compensate for any unexpected shortfall
in revenues.

         We may be unable to protect our  intellectual  property  rights,  which
         would materially adversely affect our business.

         We rely on one or more of the  following  to  protect  our  proprietary
rights:  patents,  trademarks,   copyrights,   trade  secrets,   confidentiality
procedures,  and  contractual  provisions.  Despite  our  efforts to protect our
proprietary rights,  unauthorized parties may attempt to copy and may succeed in
copying  aspects  of our  product  designs  and  products,  or  obtain  and  use
information we regard as  proprietary.  Preventing the  unauthorized  use of our
proprietary  technology may be difficult because it may be difficult to discover
such  use.  Stopping  unauthorized  use of  our  proprietary  technology  may be
difficult, time-consuming and costly. In addition, the laws of some countries in
which our  products  are  licensed do not protect our  products and services and
related  intellectual  property  to the same  extent as the laws of Canada,  the
United States and the European Union. While we believe that at least some of our
products are covered by one or more of our patents and these  patents are valid,
a court may not agree if the matter is litigated. There can be no assurance that
we will be successful in protecting our  proprietary  rights and, if we are not,
our business,  financial  condition  and  operating  results could be materially
adversely affected.

         Enforcement  of  intellectual  property  rights is time  consuming  and
costly and entails the possibility that some or all of our intellectual property
rights  may be  invalid  or  unenforceable  or  subject  to  adverse  claims  of
ownership.  None of our patents has faced a challenge  in the courts or in front
of an  administrative  body. There is always the possibility that some or all of
our  patents  could be found  invalid  or  unenforceable.  Likewise,  no one has
challenged our trade secrets or copyrights, but there is a possibility that some
or all of the rights we  believe  that we have could be  adversely  affected  by
litigation.

         We are engaged in joint  development  projects with certain  companies.
One of these  projects has resulted in the  issuance of jointly  owned  patents.
There is always a risk that the companies with which we are working could decide
not to  commercialize  the  joint  technology  and  that  we may  be  unable  to
commercialize joint technology without their consent and/or involvement.

         We are members of organizations which set standards. As such, we may be
required to license  patents that we own which are necessary for practice of the
standard.  Further,  to provide  products that are compliant with standards that
have been  adopted  or will be  adopted  in the  future,  we may have to license
patents owned by others.  Such licensing  requirements  may adversely affect the
value of our products.


                                     - 17 -

<PAGE>

         If the sales of our customers'  products  decline,  our royalty revenue
         would also decline.

         Our  licenses  to our OEM  customers  generally  provide  that  royalty
payments are not due to us until such time as the licensee both incorporates our
technology into its products and ships those products for sale to third parties.
Accordingly,  our royalty license revenue is linked to our OEM customers' sales,
and if those  customers'  product  shipments  decline,  then our royalty license
revenue would also decline.

         We depend on sales of our principal products.

         We  currently  derive  substantially  all our revenue from sales of our
cryptographic  toolkits and protocol information security toolkits. As a result,
any factor  adversely  affecting  sales of these  products would have a material
adverse effect on our business,  financial condition and operating results.  Our
future financial performance will depend in part on the successful  development,
introduction  and  customer  acceptance  of new  and  enhanced  versions  of our
cryptographic toolkits and protocol information security toolkits.  There can be
no assurance that we will continue to be successful in marketing our products or
any new or enhanced versions of our products.

         Our recently  announced products and services may generate little or no
         revenue.

         We  recently  announced  our PKI  tools  products  and our  certificate
authority service.  We cannot accurately predict the future level of acceptance,
if  any,  of  these  new  products  by our  customers  and we may not be able to
generate anticipated, or any, revenue from these products.

         If we cannot  successfully  control our product defects and our product
         liability,  our business,  financial  condition  and operating  results
         would be materially adversely affected.

         Our products are highly  complex  and,  from time to time,  may contain
design  defects that are  difficult to detect and correct.  Errors,  failures or
bugs may be found in our products after  commencement  of commercial  shipments.
Even if these errors are  discovered,  we may not be able to correct such errors
in a timely  manner or at all.  The  occurrence  of errors and  failures  in our
products  could  result  in  adverse  publicity  and the  loss  of,  or delay in
achieving,  market  acceptance of our products,  and correcting  such errors and
failures in our products could require significant expenditure of capital by us.
Our products are integrated into our customers'  products.  The sale and support
of these  products may entail the risk of product  liability or warranty  claims
based on damage to such equipment.  In addition,  the failure of our products to
perform  to  customer  expectations  could  give rise to  warranty  claims.  The
consequences of such errors,  failures and claims could have a material  adverse
effect on our business, financial condition and operating results.

         The  lengthy  sales  and  implementation  cycles  of our  products  and
         services could materially adversely affect us.

         We market many of our products and services  directly to OEMs. The sale
to, and implementation by, OEMs of our products and services typically involve a
lengthy education process and a significant  technical evaluation and commitment
of capital and other resources by them. This process is also subject to the risk
of delays  associated  with their  internal  budgeting and other  procedures for
approving capital expenditures, deploying new technologies within their networks
and testing and  accepting new  technologies  that affect key  operations.  As a
result, the sales and implementation cycles associated with many of our products
and  services  are  generally  lengthy,  and  we  may  not  succeed  in  closing
transactions  on a timely  basis,  or at all. If orders  expected for a specific
customer for a  particular  period are not  realized,  our  business,  financial
condition and operating results could be materially adversely affected.

         We anticipate  increased  operating  expenses,  which would  materially
         adversely  affect  our  business,  financial  condition  and  operating
         results if we do not correspondingly increase our revenue.

         We expect to increase our operating expenses significantly as we:

         o        expand our sales and  marketing  operations  and  develop  new
                  distribution channels;

         o        enhance  existing  or build  additional  software  development
                  centers;


                                     - 18 -

<PAGE>

         o        enhance our operational and financial systems;

         o        broaden our customer support capabilities; and

         o        fund greater levels of research and development.

         If we do not significantly increase our revenue to meet these increased
operating  expenses,  our business,  financial  condition and operating  results
would be materially adversely affected.

         We have only a limited operating  history,  which makes it difficult to
         evaluate an investment in our common shares.

         We have only a limited  operating  history.  In particular,  in 1997 we
shipped our first commercial  toolkit and entered the U.S. market.  Accordingly,
our  business   operations  are  subject  to  all  the  risks  inherent  in  the
establishment and maintenance of a new business enterprise,  such as competition
and viable  operations  management.  Most of our  competitors and their products
have greater market  recognition  and acceptance than we or our products do. Our
ability to market our products profitably is currently unproven. We may never be
able to achieve and sustain profitable operations.

         Acquisitions could harm our financial condition and operations.

         We   acquired   Consensus   Development   Corporation   and   Uptronics
Incorporated  in fiscal 1999 and we acquired  Trustpoint  in fiscal 2000. We may
acquire additional  businesses,  technologies,  product lines or services in the
future. Acquisitions involve a number of risks, including:

         o        the difficulty of assimilating the operations and personnel of
                  the acquired business;

         o        the potential disruption of our business;

         o        our  inability to  integrate,  train,  retain and motivate key
                  personnel of the acquired business;

         o        the   diversion  of  our   management   from  our   day-to-day
                  operations;

         o        our   inability   to   incorporate    acquired    technologies
                  successfully into our products and services;

         o        the  additional   expense   associated   with   completing  an
                  acquisition and amortizing any acquired intangible assets;

         o        increased demands for liquidity;

         o        the potential  impairment of relationships with our employees,
                  customers and strategic partners; and

         o        the  inability  to  maintain  uniform   standards,   controls,
                  procedures and policies.

         In  addition,  we may not be able to maintain  the levels of  operating
efficiency  that any  acquired  companies  had  achieved or might have  achieved
separately. Successful integration of each of their operations would depend upon
our ability to manage those  operations  and to eliminate  redundant  and excess
costs. As a result of difficulties associated with combining operations,  we may
not be able to achieve the cost savings and other benefits that we would hope to
achieve with these acquisitions.

         Given that our  management  will have to devote time and  attention  to
integrate the technology, operations and personnel of the businesses we acquire,
we may not be able to serve  our  current  customers  properly  or  attract  new
customers.  Also,  our  management  faces the  difficult  and  potentially  time
consuming challenge of implementing uniform standards,  controls, procedures and
policies throughout our various offices.  Any difficulties in this process could
disrupt our ongoing business, distract our management, result in the loss of key
personnel or customers, increase our expenses and otherwise materially adversely
affect our business, financial condition and operating results.


                                     - 19 -

<PAGE>

         In the event of any future acquisitions,  we could issue equity shares,
which would dilute our existing  shareholders'  equity interests,  incur debt or
assume  liabilities.  We cannot  assure  you that we would be able to obtain any
additional  financing on  satisfactory  terms, or at all, and this failure would
have  a  material  adverse  effect  on our  business,  financial  condition  and
operating  results.  Additional  indebtedness  would make us more  vulnerable to
economic downturns and may limit our ability to withstand competitive pressures.
The terms of any additional  indebtedness may include restrictive  financial and
operating covenants, which would limit our ability to compete and expand.

         Our business  strategy also includes  strategic  investments  and joint
ventures with other  companies.  These  transactions  are subject to many of the
same risks identified above for acquisitions.

         We  depend  on key  personnel  for our  future  success  and we have no
         protection if they leave us.

         Our  success  is  largely  dependent  on the  performance  of  our  key
employees,  particularly Scott A. Vanstone, our Chief Cryptographer. Most of our
key  technical  and  senior  management  personnel  are not bound by  employment
agreements.  Loss of the  services  of any of these key  employees  could have a
material  adverse  effect on our  business,  financial  condition  and operating
results.  We do not  maintain key person life  insurance  policies on any of our
employees.

         We may not be able to attract or retain qualified personnel.

         Competition for qualified personnel in the digital information security
industry  is  intense,  and  finding and  retaining  qualified  and  experienced
personnel in the San Francisco Bay Area is difficult.  We believe there are only
a limited  number of individuals  with the requisite  skills to serve in many of
our key positions,  and it is becoming increasingly difficult to hire and retain
these  persons.  Competitors  and others have in the past and may attempt in the
future to recruit our  employees.  A major part of our  compensation  to our key
employees is in the form of stock option grants.  A prolonged  depression in our
share  price  could make it  difficult  for us to retain  employees  and recruit
additional qualified personnel.  For example, to address this concern, in fiscal
1999, we repriced certain  outstanding  employee stock options,  as described in
Note 7 to our consolidated  financial statements included elsewhere in this Form
10-K. In addition,  the volatility and current market price of our common shares
may make it difficult to attract and retain personnel.

         If we are unable to manage our growth, our business would be disrupted.

         We have  experienced  a period of  significant  growth in our sales and
personnel that has placed strain upon our management systems and resources.  Our
sales  increased  from $4.0  million in fiscal  1999 to $12.0  million in fiscal
2000. During the same period, the number of our employees  increased from 102 to
165.  We intend to  continue  to grow in the  foreseeable  future  and to pursue
existing and potential market opportunities,  including acquisitions. Our growth
has placed,  and will continue to place,  significant  demands on our management
and operational resources, particularly with respect to:

         o        recruiting  and  retaining  skilled  technical,  marketing and
                  management  personnel in an environment where there is intense
                  competition for skilled personnel;

         o        managing a larger, more complex international organization;

         o        expanding our facilities and other  infrastructure in a timely
                  manner to accommodate a significantly larger global workforce;

         o        maintaining   and   expanding  a  cutting  edge  research  and
                  development staff;

         o        expanding our sales and marketing efforts;

         o        providing  adequate  training and  supervision to maintain our
                  high quality standards;

         o        expanding  our treasury and  accounting  functions to meet the
                  demands of a growing company;


                                     - 20 -

<PAGE>

         o        strengthening  our  financial  and  management  controls  in a
                  manner appropriate for a larger enterprise; and

         o        preserving   our   culture,    values   and    entrepreneurial
                  environment.

         Our management has limited  experience  managing a business of our size
and, in order to manage our growth  effectively,  we must  concurrently  develop
more sophisticated  operational systems,  procedures and controls. If we fail to
develop these systems,  procedures and controls on a timely basis, our business,
financial  condition  and  operating  results  could  be  materially   adversely
affected.

         If we do not  successfully  transition  our  financial,  accounting and
         treasury  systems  from Canada to  California  on a timely  basis,  our
         business could be materially adversely affected.

         Since  November  30,  1999,  we have  appointed  a new Chief  Executive
Officer  and a new Chief  Financial  Officer,  both of whom are  located  in our
Hayward,  California  office rather than our  Mississauga,  Ontario  office.  We
intend to move our internal  financial,  accounting and treasury  functions from
Mississauga  to  Hayward.  There  is a  risk  that  these  changes  could  cause
significant  disruption  in our  company and  adversely  affect  these  critical
functions.  If  that  were to  occur,  our  business,  financial  condition  and
operating results could be materially adversely affected.

         If we fail to develop and maintain  our  strategic  relationships,  our
         business would be materially adversely affected.

         One of our  business  strategies  has been to enter into  strategic  or
other collaborative  relationships with many of our OEM customers to develop new
technologies and leverage their sales and marketing  organizations.  We may need
to enter into additional  relationships to execute our business plan. We may not
be  able  to  enter  into  additional,  or  maintain  our  existing,   strategic
relationships  on  commercially  reasonable  terms. In such case, we may have to
devote substantially more resources to the development of new technology and the
distribution,  sales and marketing of our digital information  security products
and services  than we would  otherwise.  Failure of one or more of our strategic
relationships  could  materially   adversely  affect  our  business,   financial
condition and operating results.

         We do not insure against all potential losses and we could be seriously
         harmed and our reputation damaged by unexpected liabilities.

         Many of our products provide  benefits to our clients'  businesses that
are  difficult to  quantify.  Any failure in a client's  system could  adversely
affect our reputation and result in a claim for substantial  damages against us,
regardless of our responsibility for such failure. Although we generally attempt
to limit our  contractual  liability for damages  arising from  negligent  acts,
errors,  mistakes or omissions in rendering our services,  we have not been, and
cannot  assure  you  that we will  be,  able to do so in all  cases  or that any
limitations of liability set forth in our agreements  will be enforceable in all
instances or will otherwise protect us from liability for damages.  In addition,
our failure to meet client  expectations  or to deliver  error free services may
result in adverse publicity for us and damage to our reputation.

         We maintain general liability  insurance  coverage,  including coverage
for errors or omissions. However, we cannot assure you that:

         o        insurance  coverage  will  be  available  to us in  sufficient
                  amounts  to  cover  one or more  significant  claims  that are
                  successfully asserted against us;

         o        insurance  coverage will continue to be available to us in the
                  future on  reasonable  terms,  including  reasonable  premium,
                  deductible and co-insurance requirements; or

         o        our insurer will not disclaim coverage of any future claim.

         Our  business,  financial  condition  and  operating  results  could be
materially adversely affected if any of these developments were to occur.


                                     - 21 -

<PAGE>

         Our share price is, and likely will continue to be, volatile.

         We expect  that the  market  price of our common  shares may  fluctuate
substantially  as a result of  variations in our  quarterly  operating  results.
These fluctuations may be exaggerated if the trading volume of our common shares
is low. In addition, due to the  technology-intensive and emerging nature of our
business,  the  market  price of our  common  shares  may fall  dramatically  in
response to a variety of factors, including:

         o        announcements of technological or competitive developments;

         o        acquisitions  or entry into  strategic  alliances by us or our
                  competitors;

         o        the  gain or  loss  of a  significant  customer  or  strategic
                  relationship;

         o        changes in estimates of our financial  performance  or changes
                  in  recommendations  by securities  analysts regarding us, our
                  industry or our customers' industries; and

         o        general market or economic conditions.

         This risk may be  heightened  because our industry is new and evolving,
characterized by rapid technological  change and susceptible to the introduction
of new competing technologies or competitors.

         In  addition,  equity  securities  of many  technology  companies  have
experienced  significant price and volume  fluctuations.  These price and volume
fluctuations  often have been  unrelated  to the  operating  performance  of the
affected  companies.  Volatility  in the market price of our common shares could
result  in  securities  class  action  litigation.   This  type  of  litigation,
regardless  of the  outcome,  could  result  in  substantial  costs  to us and a
diversion of our management's attention and resources.

         In May,  2000,  we listed  and began  trading  on the  Nasdaq  National
Market.  We cannot predict the extent to which  investor  interest in our common
shares  will  continue to support a trading  market in the United  States or how
liquid that market might become. As discussed earlier, our financial results are
difficult to predict and could fluctuate significantly.

         System  interruptions and security breaches could materially  adversely
         affect our business.

         We plan to construct  what we believe will be a secure data center.  We
will depend on the uninterrupted  operation of that data center. We will need to
protect  this center and our other  systems  from loss,  damage or  interruption
caused by fire,  power loss,  telecommunications  failure or other events beyond
our  control.  In  addition,  most of our  systems  and the data  center  may be
located,  and  most  of our  customer  information  may be  stored,  in the  San
Francisco,  California area, which is susceptible to earthquakes.  Any damage or
failure that causes  interruptions in our data center and our other computer and
communications systems could materially adversely affect our business, financial
condition and operating results.

         Our success  also  depends upon the  scalability  of our  systems.  Our
systems  have not been  tested  at the  usage  volumes  that we  expect  will be
required in the future.  Thus, a substantial increase in demand for our products
and services could cause  interruptions in our systems.  Any such  interruptions
could  affect our ability to deliver our services  and our  business,  financial
condition and operating results.

         Although we periodically  perform,  and retain accredited third parties
to perform,  evaluations of our operational controls,  practices and procedures,
we may not be able to remain in compliance with our internal  standards or those
set by these third parties. If we fail to maintain these standards,  we may have
to expend  significant  time and money to return to compliance and our business,
financial  condition  and  operating  results  could  be  materially   adversely
affected.

         We will retain certain confidential customer information in our planned
data  center.   It  is  important  to  our  business  that  our  facilities  and
infrastructure  remain secure and be perceived by the  marketplace to be secure.
Despite our security measures,  our infrastructure may be vulnerable to physical
break-ins,  computer viruses, attacks by hackers or similar disruptive problems.
It is  possible  that we may  have to  expend  additional  financial  and  other


                                     - 22 -

<PAGE>

resources to address these  problems.  Any physical or  electronic  break-ins or
other security breaches or compromises of the information  stored at our planned
data center may jeopardize the security of information stored on our premises or
in the computer  systems and  networks of our  customers.  In such an event,  we
could face  significant  liability and  customers  could be reluctant to use our
products and services. Such an occurrence could also result in adverse publicity
and adversely affect the market's perception of our products and services, which
would  materially  adversely  affect  our  business,   financial  condition  and
operating results.

         We do not expect to be able to use our  Canadian  tax  credits and loss
         carry forwards fully before they expire over the next several years.

         As of April 30, 2000,  we had $0.6 million in Canadian  investment  tax
credits and $32.4 million in Canadian loss carry  forwards.  These  Canadian tax
credits can be used to offset only our Canadian tax liabilities in the ten years
following  incurrence.  The Canadian  loss carry  forwards can be used to offset
only our Canadian taxable income in the seven years following incurrence.  Given
that  approximately  91% of our revenue was  generated  in the United  States in
fiscal  2000,  we may not be able to use all our  Canadian  tax  credits or loss
carry forwards before they expire over the next several years.

         We have limited financial  resources and will likely require additional
         financing that may not be available.

         Our financial  resources are  substantially  smaller than the financial
resources of our current  principal  and potential  competitors.  We will likely
require  additional  equity or debt  financing  in the  future.  There can be no
assurance  that we will be able to obtain  the  additional  financial  resources
required to successfully compete in our markets on satisfactory terms or at all.
Failure to obtain such  financing  could result in the delay or  abandonment  of
some or all of our plans for  development,  which could have a material  adverse
effect on our business, financial condition and operating results.

Risks Related to the Digital Information Security Industry

         Public-key  cryptography technology is subject to the risk that it will
         be successfully attacked or decoded.

         Our digital  information  security  products  and  services are largely
based  on  public-key  cryptography  technology.  With  public-key  cryptography
technology,  a user  has both a  public  key and a  private  key.  The  security
afforded by this technology depends on the integrity of a user's private key and
on it not being stolen or otherwise  compromised.  The integrity of private keys
also depends in part on the application of certain mathematical  principles such
as  factoring  and  elliptic  curve  discrete  logarithms.   This  integrity  is
predicated on the assumption that solving  problems based on these principles is
difficult.  Should a relatively  easy  solution to these  problems be developed,
then  the  security  of  encryption   products  using  public-key   cryptography
technology would be reduced or eliminated.  Furthermore, any significant advance
in techniques for attacking  cryptographic systems could also render some or all
of our products and services obsolete or unmarketable.  Even if no breakthroughs
in methods of attacking  cryptographic  systems are made,  factoring problems or
elliptic  curve  discrete  logarithm  problems  can  theoretically  be solved by
computer  systems  significantly  faster and more powerful than those  currently
available.  In the past, there have been public  announcements of the successful
decoding of certain cryptographic messages and of the potential misappropriation
of  private  keys.  Such  publicity  could  also  adversely  affect  the  public
perception as to the safety of public-key cryptography technology.  Furthermore,
an actual or perceived  breach of security at one of our  customers,  whether or
not due to our products,  could result in adverse publicity for us and damage to
our reputation.  Such adverse public  perception or any of these other risks, if
they actually occur, could materially  adversely affect our business,  financial
condition  and  operating  results.  See  "Business--Cryptographic  Systems  and
Elliptic Curve Cryptography."

         Product development and technological change could materially adversely
         affect us.

         The digital information  security industry is an emerging industry that
is  characterized  by  rapid  technological  change  and  frequent  new  product
introductions.  Accordingly, we believe that our future success depends upon our
ability to enhance our current  products and develop and  introduce new products
offering  enhanced  performance  and  functionality  at competitive  prices.  In
addition,  technological innovation in the marketplace,  such as in the areas of
mobile  processing  power or,  wireless  bandwidth,  or the  development  of new
cryptosystems,  may reduce the  comparative  benefits of our  products and could
materially  adversely  affect our  business,  financial


                                     - 23 -

<PAGE>

condition and operating  results.  Our  inability,  for  technological  or other
reasons,  to enhance,  develop  and  introduce  products  in a timely  manner in
response  to  changing  market  conditions,   industrial   standards,   customer
requirements  or  competitive  offerings  could result in our products  becoming
obsolete,  or could  otherwise  have a material  adverse effect on our business,
financial condition and operating results.  Our ability to compete  successfully
will depend in large measure on our ability to maintain a technically  competent
research  and  development  staff  and to adapt  to  technological  changes  and
advances in the industry, including providing for the continued compatibility of
our products with evolving industry standards and protocols.

         We face intense competition that could materially adversely affect us.

         We  operate  in  a  dynamic  and  evolving   industry  that  is  highly
competitive.  We anticipate that the quality,  functionality  and breadth of our
competitors'  product  offerings  will  improve.  Most of our  competitors  have
greater  name  recognition,  larger  customer  bases and  significantly  greater
financial, technical, marketing, public relations, sales, distribution and other
resources than we do. We compete in a new and rapidly  evolving market and there
can be no  assurance  that we will be able  to  compete  effectively  with  such
companies.  In addition,  we could face  competition  from our OEMs in the event
that some or all of them develop and distribute their own systems. We also could
be materially  adversely  affected if there were a significant  movement towards
the acceptance of open source solutions that compete with our products.

         We expect that additional  competition will develop, both from existing
businesses in the digital  information  security industry and from new entrants,
as demand for  digital  information  products  and  services  expands and as the
market for these products and services becomes more  established.  We may not be
able to compete  successfully  and competitive  pressures may harm our business.
Our  largest  competitors  include RSA  Security,  which  licenses  the de facto
Internet security standard, VeriSign, Baltimore and Entrust.

         The  technology and wireless  industry may fail to grow  significantly,
         which would materially adversely affect our growth.

         There can be no assurance that the market for our existing products and
services  will  continue to grow,  that firms within the industry will adopt our
products  and  services,   or  that  we  will  be  successful  in  independently
establishing  markets for our products and services.  If the various  markets in
which our, and our OEM customers',  products and services  compete fail to grow,
or grow  more  slowly  than we  currently  anticipate,  or if we are  unable  to
establish markets for our new products and services,  our revenue and net income
may be lower than expected.

         Disputes over  intellectual  property rights are common in our industry
         and, if we become  involved in such a dispute,  we could be  materially
         adversely affected.

         The  industry  in which we compete  has many  participants  who own, or
claim  to  own,  intellectual  property.  We  indemnify  our  licensees  against
third-party  intellectual  property  claims  based  on  our  technology.  Claims
relating to  intellectual  property by any third-party  business,  individual or
university,  whether or not with merit,  could be  time-consuming  to  evaluate,
result in costly  litigation,  cause product shipment delays for products or the
cessation  of the use and sale of products or  services,  or require us to enter
into licensing  agreements  that may require the payment of a license fee and/or
royalties to the owner of the intellectual property.  Such licensing agreements,
if required, may not be available on royalty or other licensing terms acceptable
to us. Any of these situations  would materially  adversely affect our business,
financial condition and operating results. We also currently license third party
technology  for use in our products and services.  These third party  technology
licenses may not continue to be available on  commercially  reasonable  terms or
may not be available at all. Our business could be materially  harmed if we lose
the rights to certain technology.

         We could be materially adversely affected by government regulation.

         The digital  information  security  industry is governed by regulations
that could have a material adverse effect on our business.  The export of strong
cryptographic  equipment  and  software,  including  many  of our  products,  is
regulated by both the U.S. and Canadian  governments.  Governments could seek to
impose  taxes on  companies  that  engage in  electronic  commerce  or which are
involved in other markets  where we sell our products and  services.  It is also
possible  that laws  could be  enacted  covering  issues  such as user  privacy,
pricing,  content and quality of products  and services in these  markets.  Such
regulations,  taxes and laws could materially adversely affect our sales


                                     - 24 -

<PAGE>

and our OEM customers' sales.  Foreign  governments could adopt regulations that
are  detrimental  to our  interests.  For example,  the Chinese  government  has
recently  implemented  legislation  that requires all companies  exporting to or
operating in China to provide  sensitive  information  to the  government  about
their encryption  software and users. This legislation also includes  provisions
(which very  recently may have been  effectively  reversed)  requiring  that all
electronic  products in China use encryption  software  developed in China. This
legislation and similar intrusive  regulations by other countries could cause us
to compromise our source code  protection,  minimize our  intellectual  property
protection,  negatively  impact our plans for global  expansion and consequently
materially  adversely  affect our  business,  financial  condition and operating
results.

Risks Related to Our Corporate Charter; Limitations on Dividends

         We have a  shareholder  rights  plan that  could  delay or  prevent  an
         acquisition  of us even if an  acquisition  would be  beneficial to our
         shareholders.

         We have adopted a shareholder  rights plan. The provisions of this plan
could make it more  difficult  for a third  party to  acquire a majority  of our
outstanding   voting  shares,  the  effect  of  which  may  be  to  deprive  our
shareholders of a control premium that might otherwise be realized in connection
with an acquisition of us.

         The  anti-takeover  effect of certain of our charter  provisions  could
         delay or prevent an acquisition  of us even if an acquisition  would be
         beneficial to our shareholders.

         Our authorized capital consists of an unlimited number of common shares
and an unlimited number of preference shares issuable in one or more series. Our
board of directors  has the authority to issue  preference  shares and determine
the  price,  designation,  rights,  preferences,  privileges,  restrictions  and
conditions,  including voting and dividend  rights,  of these shares without any
further  vote or action by  shareholders.  The  rights of the  holders of common
shares  will be subject  to,  and may be  adversely  affected  by, the rights of
holders of any preference shares that may be issued in the future.  The issuance
of preference shares,  while providing desirable  flexibility in connection with
possible   acquisitions  and  other  corporate  purposes,  or  the  issuance  of
additional  common  shares  could make it more  difficult  for a third  party to
acquire a majority of our outstanding  voting shares, the effect of which may be
to  deprive  our  shareholders  of a control  premium  that might  otherwise  be
realized in connection with an acquisition of our Company.

         We do not  currently  intend to pay any cash  dividends  on our  common
         shares in the foreseeable future.

         We have never paid or declared any cash  dividends on our common shares
and we currently intend to retain any future earnings to finance the development
and expansion of our business. We do not anticipate paying any cash dividends on
our common shares in the foreseeable future. In addition,  any dividends paid to
residents  of the United  States would be subject to Canadian  withholding  tax,
generally at the rate of 15%.

Item 2.      PROPERTIES

         We  maintain  our  U.S.  corporate  offices  and  worldwide  sales  and
marketing,  finance,  custom design and systems  integration and  administration
operations at leased  premises  totaling  approximately  111,000  square feet at
25801 and 25821 Industrial Boulevard,  Hayward,  California.  The lease for this
facility  expires February 28, 2006. We also lease  approximately  30,300 square
feet of  office  space  at 5520  Explorer  Drive,  Mississauga,  Ontario,  which
contains our Canadian  administrative offices,  customer support,  cryptographic
research,  engineering and custom design and systems integration functions.  The
lease for this facility  expires  December 15, 2009.  We also lease  short-term,
executive suite office space in Reston,  Virginia which services the Washington,
D.C.  area.  The total  annual base rent for all three  facilities  is currently
approximately $1,733,000.

Item 3.      LEGAL PROCEEDINGS

         We are  currently  not  subject  to any  material  litigation.  We have
received a letter on behalf of Carnegie Mellon University asserting that it owns
the trademark "CERT", and that it believes our use of the stock symbol "CERT" on
the  Nasdaq  National  Market  will  cause  confusion  with  and/or  dilute  its
trademark.  Although  we  intend


                                     - 25 -

<PAGE>

to  defend  our use of the  stock  symbol  "CERT"  vigorously,  there  can be no
assurance  that we will be successful in doing so, or that this dispute with the
university will not have a material adverse impact on us.

         We have also  received a letter on behalf of Geoworks,  Inc.  asserting
that it holds a patent on certain  aspects of  technology  which are part of the
WAP standard,  and that it believes that our WTLS Plus toolkit  implements  such
technology.  After an  internal  investigation,  it is our belief that we do not
implement any validly patented technology. We have also become aware of a letter
circulated on behalf of a Mr. Bruce Dickens  asserting that he holds a patent on
certain aspects of technology  which are  implemented  within certain aspects of
the Secure Sockets Layer standard.  After an internal  investigation,  it is our
belief that we do not implement  any validly  patented  technology.  Although we
intend to  vigorously  defend any  litigation  that may arise on these  matters,
there can be no assurance  that we will be  successful in doing so, or that such
disputes will not have a material adverse impact on us. In addition, we recently
became  aware of a letter on behalf of a Mr.  Leon  Stambler  asserting  that he
holds a patent on certain aspects of technology which are implemented within the
Secure  Sockets  Layer  standard.  This latter  matter is  currently  undergoing
internal  review  of  the   technological  and  legal  issues  to  determine  an
appropriate  response,  therefore  there can be no assurance  that such asserted
patent will not have a material adverse impact upon us.

Item 4.      SUBMISSION OF MATTERS TO A VOTE OF SECURITY HOLDERS
<TABLE>
         At our Special  Meeting of  Shareholders  held on April 27,  2000,  the
following proposals were adopted by the margins indicated:

(The  numbers  below do not  reflect the  2-for-1  stock split of the  Company's
outstanding common shares which occured on July 12, 2000.)
<CAPTION>
                                                                           NUMBER OF SHARES
                                                                           -----------------
                                                          VOTES           VOTES         NOT         VOTES
                                                          FOR             AGAINST       VOTED       EXCLUDED
                                                          ---------       ---------    --------     --------
<S>                                                       <C>             <C>           <C>          <C>
1.       The amendment to the Articles of Continuance     4,868,779       144           130          0
subdividing each of the issued and outstanding common
shares of the Company on a two-for-one basis.

2.       The removal of the requirement contained in      2,756,710       1,436,793     589,086      86,464
the Company's 1997 Stock Option Plan that the aggregate
number of common shares reserved for issuance may not
exceed 15% of the common shares outstanding as of that
date.

3.       The removal of the requirement contained in      2,782,462       1,411,491     589,086      86,014
the 1997 Stock Option Plan that the total number of
common shares reserved for issuance pursuant to options
granted to insiders of the Company in any one-year
period not exceed 10% of the common shares outstanding.

4.       The increase in the total number of common       3,147,350       1,046,603     589,086      86,014
shares reserved for issuance under the 1997 Stock
Option Plan from 2,750,000 to 3,000,000.

5.       The adoption of a 2000 U.S. Stock Plan           2,842,589       1,351,364     589,086      86,014
pursuant to which the Company may grant stock options
to eligible U.S. directors, officers and employees of
the Company.

6.       The adoption of an Employee Stock Purchase       4,011,234       182,719       589,086      86,014
Plan pursuant to which eligible employees of the
Company, and its subsidiaries, may be entitled to
purchase up to a total of 500,000 common shares.

</TABLE>


                                                   - 26 -

<PAGE>


                                     PART II

Item 5.   MARKET FOR THE COMPANY'S COMMON SHARES AND RELATED SHAREHOLDER MATTERS
<TABLE>
         Our common shares are listed and traded on The Toronto Stock  Exchange,
or the TSE,  under the symbol  "CIC." Since May 2, 2000,  our common shares also
have been  listed  and  traded on the Nasdaq  National  Market  under the symbol
"CERT".  Our high and low sales  prices on the TSE for each  quarter  within the
last two  fiscal  years are  shown  below,  both in  Canadian  dollars  and U.S.
dollars.  All currency  conversions  are based on the prevailing  Cdn.$ to U.S.$
exchange rate on the last day of each respective quarter.
<CAPTION>
                                                     Canadian                          U.S.
                                                     --------                          ----
                                             High               Low             High          Low
                                             ----               ---             ----          ---
                                             Canadian $         Canadian $      U.S. $        U.S. $
<S>                                           <C>                 <C>            <C>           <C>
    1999 Fiscal Year (ended April 30, 1999)
         First Quarter.....................    Cdn.$16.00          Cdn.$9.50     $10.62        $6.30
         Second Quarter....................    Cdn.$11.13          Cdn.$4.50      $7.19        $2.91
         Third Quarter.....................    Cdn.$12.50          Cdn.$4.00      $8.27        $2.65
         Fourth Quarter....................     Cdn.$9.63          Cdn.$6.55      $6.61        $4.50

    2000 Fiscal Year (ended April 30, 2000)
         First Quarter.....................     Cdn.$7.63          Cdn.$5.18      $5.06        $3.44
         Second Quarter....................    Cdn.$10.45          Cdn.$5.65      $7.10        $3.84
         Third Quarter.....................    Cdn.$74.00          Cdn.$9.45     $51.19        $6.54
         Fourth Quarter....................   Cdn.$125.00         Cdn.$27.65     $84.45       $18.68
</TABLE>

         On July 12, 2000, we completed a two-for-one  split of our  outstanding
common shares.  As of June 30, 2000, there were 25,649,054  common shares issued
and  outstanding.  Except  as  otherwise  indicated,  all of the  prices  in the
preceding  table,  and  elsewhere  in this  document and all of the common share
numbers  in this  document,  reflect  this  split.  On July 20,  2000,  the last
reported  sale price of the  common  shares on the  Nasdaq  National  Market was
$34.38 (Cdn. $50.70) and on the Toronto Stock Exchange was Cdn.$50.50 ($34.24).

Use of Proceeds from Public Offering

         On May 3, 2000,  we completed the public  offering of 2,500,000  common
shares in the United States and Canada at a per share price of  U.S.$23.15,  for
an aggregate offering price of U.S.$57,875,000. The shares were offered pursuant
to a Form  F-10  Registration  Statement  filed  with  the U.S.  Securities  and
Exchange  Commission under Registration No. 333-11586,  and began trading on the
Nasdaq  National Market on May 2, 2000. Our placement agent for the offering was
FleetBoston Robertson Stephens,  Inc. After deducting underwriting discounts and
commissions  and  offering  expenses,  our net proceeds  from the offering  were
approximately U.S.$51,500,000.

         On May 5, 2000,  we used a portion of the  proceeds of the  offering to
repay a $10 million loan obtained from Sand Hill Capital II, LP in April,  2000.
We intend to use the remaining net proceeds from that offering for the expansion
of our  sales  and  marketing  activities,  including  hiring  additional  sales
personnel and opening new sales  offices in Europe and the Asia Pacific  region,
the development  and  enhancement of our products and services,  working capital
and general corporate purposes.

         We may also use a portion of the net proceeds of that  offering to fund
strategic  investments  or  acquisitions.  While we have  from  time to time had
preliminary  discussions regarding potential investments and acquisitions in the
ordinary course of our business, we do not currently have any agreements to make
any such investment or acquisition.


                                     - 27 -

<PAGE>

         Except as indicated above, we have not yet determined the amount of the
net proceeds to be used specifically for the purposes  specified above.  Pending
such uses, we expect to invest the net proceeds in short-term, interest-bearing,
investment grade securities.

Sales of Unregistered Securities

         On January 26, 2000, in connection  with our  acquisition of Trustpoint
of Mountain  View,  California,  we issued  201,120  common shares to the former
owners of Trustpoint.  We also converted outstanding stock options of Trustpoint
into options to acquire 98,884 of our common shares.

         During the fiscal  year ended  April 30,  2000,  the  following  common
shares were issued pursuant to the exercise of stock options:

         ------------------------ ---------------------- ----------------------
                  Month             Number of Shares        Exercise price
         ------------------------ ---------------------- ----------------------
                  June                            7,666                  $1.72
         ------------------------ ---------------------- ----------------------
                 August                           7,136                  $1.09
         ------------------------ ---------------------- ----------------------
                 October                         62,812                  $3.65
         ------------------------ ---------------------- ----------------------
                November                        127,948                  $4.58
         ------------------------ ---------------------- ----------------------
                December                        361,272                  $5.02
         ------------------------ ---------------------- ----------------------
                 January                         89,824                  $3.72
         ------------------------ ---------------------- ----------------------
                February                         55,612                  $3.57
         ------------------------ ---------------------- ----------------------
                  March                         127,190                  $4.79
         ------------------------ ---------------------- ----------------------
                  April                          10,540                  $2.42
         ------------------------ ---------------------- ----------------------

         The exercise price shown above is the  weighted-average  price based on
the shares  issued in the month.  The exchange rate is based on the average rate
for the fiscal quarter.

         To the extent sales described above occurred outside the United States,
they were not required to be  registered  under United States  securities  laws.
Those issuance of the  above-described  securities  occurring  within the United
States were deemed to be exempt from registration under the U.S.  Securities Act
of 1933 either in reliance on Section 4(2) of the U.S. Securities Act of 1933 as
transactions by an issuer not involving any public offering, or in reliance upon
Rule 701  promulgated  under the U.S.  Securities Act of 1933 and in reliance on
related state "blue sky" law exemptions as transactions pursuant to compensatory
benefit plans and contracts relating to compensation.

Dividend Policy

         We have never  declared or paid any cash dividends on any of our common
shares.  We  currently  intend to retain  earnings  to  finance  the  growth and
development of our business and, therefore, we do not anticipate paying any cash
dividends in the foreseeable  future.  Our dividend policy will be reviewed from
time to time by our board of directors in the context of our earnings, financial
condition and other relevant factors.

Holders of Common Shares

         As of June 30, 2000, there were  approximately 136 record owners of our
common shares.  This number of shareholders does not include  shareholders whose
shares  are held in trust by other  entities.  The actual  number of  beneficial
owners of our common shares is greater than the number of holders of record.


                                     - 28 -

<PAGE>

Item 6.      SELECTED CONSOLIDATED FINANCIAL DATA
<TABLE>
         The selected consolidated  financial data set forth below are presented
in U.S. dollars and have been derived from financial  statements  prepared under
accounting principles generally accepted in the United States of America or U.S.
GAAP.  The  results of  operations  for the year ended April 30,  2000,  are not
necessarily  indicative  of the results to be expected for future  periods.  The
selected  consolidated  financial data set forth are qualified in their entirety
by,  and  should  be read in  conjunction  with,  "Management's  Discussion  and
Analysis of Financial  Condition and Results of Operations" and the Consolidated
Financial  Statements  and notes thereto  included  elsewhere in this Form 10-K.
Effective May 1, 1999, we adopted the U.S.  dollar as our  functional  currency.
See Note 1 to our Consolidated Financial Statements.
<CAPTION>
                                                             Fiscal Year Ended April 30,
                                       ----------------------------------------------------------------------
                                           1996          1997           1998           1999           2000
                                       ------------   ----------   -------------   -------------   ----------
Consolidated Statement of              (in thousands of U.S. dollars except per share data and share amounts)
  Operations Data:
<S>                                     <C>            <C>           <C>           <C>            <C>
Revenues.......................         $   966        $ 1,085       $ 1,233       $  4,042       $ 12,040
Costs and expenses:
  Selling and marketing........           1,044          2,038         4,918          6,087          6,616
  Research and development.....           1,120          2,433         3,820          3,240          4,446
  Depreciation and amortization             130            130           561          5,063          7,861
  General and administrative...             518          2,549         2,762          4,277          7,099
  Purchased in-process research                             --            --          1,151            535
    and development............
  Consulting and systems                     --             --            --            587          2,080
    integration
  Cost of hardware sold........             290            234           349            125            579
Operating loss.................          (2,136)        (6,299)      (11,177)       (16,488)       (17,176)
Interest income (expense)......              77            256           965          1,015           (359)
Loss before income taxes.......          (2,059)        (6,043)      (10,212)       (15,473)       (17,535)
Income taxes...................            (115)          (112)          167            (92)           334
Net loss.......................          (1,944)        (5,931)      (10,379)       (15,381)       (17,869)
Net loss per share
Basic and diluted..............         $ (0.23)       $ (0.41)      $ (0.57)      $  (0.73)      $  (0.80)


Weighted average number of
  outstanding common shares....           8,392         14,386        18,317         21,033         22,255


                                                                   As of April 30,
                                       ----------------------------------------------------------------------
                                           1996          1997           1998           1999           2000
                                       ------------   ----------   -------------   -------------   ----------
Consolidated Balance Sheet Data:                           (in thousands of U.S. dollars)

Cash...........................         $    40        $   278       $   628       $  1,400       $ 10,508
Marketable securities..........           3,987         11,440        29,847         12,678          2,550
Total assets...................           5,498         13,784        34,467         41,615         51,516
Total shareholders' equity.....           4,536         12,444        33,035         39,171         35,991

</TABLE>
Item 7.      MANAGEMENT'S  DISCUSSION  AND ANALYSIS OF FINANCIAL  CONDITION  AND
             RESULTS OF OPERATIONS


Overview

         We  are an  encryption  technology  company  specializing  in  security
solutions  for mobile  computing and wireless  data  markets,  including  mobile
eCommerce,  or mCommerce.  Our  solutions  often use less  processing  power and
bandwidth  than  conventional  encryption  technologies,  and are therefore more
suitable  for  many  mobile  and  wireless   environments.   Our  OEM  customers
incorporate  our  patented  technology  into  their  applications  for  handheld
computers,   mobile  phones,  two-way  pagers  and  other  Internet  information
appliances.  As these devices  communicate  increasingly  sensitive and valuable
information, we believe the demand for stronger security will increase.


                                     - 29 -

<PAGE>

         Our  product  line  includes  cryptographic  and  information  security
protocol toolkits. We have announced for availability later this year public-key
infrastructure,  or PKI, products and certificate authority, or CA, services. In
addition to licensing our security  products,  we provide consulting and systems
integration  services to assist our  customers  in  designing  and  implementing
efficient  security  solutions.  Our  customers  include 724  Solutions,  Aether
Systems,  BellSouth  Wireless Data,  Motorola,  Palm, Inc.,  PUMATECH,  Inc. and
QUALCOMM.

         We were  founded  in 1985 and are  governed  by the  laws of the  Yukon
Territory,  Canada.  We determined  that  commencing  May 1, 1999 our functional
currency was the U.S. dollar and, accordingly,  we began measuring and reporting
our  results  of  operations  in U.S.  dollars  from that date.  We changed  our
functional  currency  as we  derive  a  majority  of our  revenues  and  incur a
significant portion of our expenses in U.S. dollars.

         The  following   discussion  and  analysis  relates  to  our  financial
statements that have been prepared in accordance with U.S. GAAP.

Sources of Revenue and Revenue Recognition Policy

         We derive our  revenues  from a variety of sources,  which we generally
classify as software licensing, consulting and systems integration and hardware.
We  earn  software  licensing  revenues  from  one-time  base  license  fees  or
technology access fees,  royalties based upon per unit or per usage charges or a
percentage of the revenue from licensees' products containing our technology and
annual maintenance and support fees. In addition,  a small amount of our revenue
comes  from  annual  license  fees  under  licenses  entered  into by  Consensus
Development  Corporation,  or Consensus,  prior to our acquisition of Consensus.
Our  license  agreements  may  permit  the  licensee  to  sublicense  without us
receiving any revenue from the sub-licensees. Consulting and systems integration
revenue is derived from the performance of contracted  services to licensees and
can be based  upon a  time-and-materials  framework  or a fixed  contract  for a
complete solution.  Hardware revenues comprise sales of products manufactured by
third parties to our  specifications,  and components  procured by third parties
and resold by us.

         We  generally  negotiate  sales  contracts  with our  customers  and we
generally do not use  standardized  contracts.  However,  each of our  contracts
(other than our contracts for  consulting  and systems  integration  or hardware
sales)  includes  provisions  for us to  receive  an  up-front  license  fee and
royalties.  Our royalties for mobile and wireless  devices  generally range from
$1.00 to $5.00 per unit, with other amounts if the royalties are calculated on a
per user or usage basis or as a percentage of revenue.

         In the  fiscal  year  ended  April 30,  2000,  our  software  licensing
revenue,  consulting  and  systems  integration  revenue  and  hardware  revenue
represented  approximately 77%, 16% and 7%, respectively,  of our total revenue.
In the same  period,  approximately  91% of our total  revenue was derived  from
sales in the United States, while 4% of our total revenue was derived from sales
in Canada.

         In the  fiscal  year  ended  April 30,  1999,  our  software  licensing
revenue,  consulting and systems  integration and hardware  revenue  represented
approximately 66%, 24% and 10%, respectively,  of our total revenue. In the same
period,  approximately  76% of our total  revenue was derived  from sales in the
United States,  while 15% and 9% of our total revenue were derived from sales in
Canada and Europe, respectively.

         We  recognize   software  licensing  revenue  in  accordance  with  all
applicable accounting  regulations including the American Institute of Certified
Public  Accountants  Statement  of  Position  ("SOP")  97-2,  "Software  Revenue
Recognition",  as amended.  Following the requirements of SOP 97-2, we recognize
license revenues when all the following conditions are met:

         o        we have signed a  non-cancelable  license  agreement  with the
                  customer;

         o        we have delivered the software product to the customer;

         o        the amount of the fees to be paid by the customer are fixed or
                  determinable; and

         o        we believe that collection of these fees is probable.


                                     - 30 -

<PAGE>

         Maintenance and support services revenue is recognized ratably over the
period,   usually   one-year.   Revenue  derived  from  consulting  and  systems
integration are recognized upon performance of the related services.

         In the fiscal  year ended April 30,  2000,  over 97% of our revenue was
generated in U.S. dollars. In the same period, approximately 33% of our expenses
were incurred in Canadian dollars,  and the balance was incurred in U.S. dollars
and other currencies.

         We expect that a majority of our revenue will  continue to be generated
in U.S.  dollars for the foreseeable  future and that a portion of our expenses,
including  labor  costs as well as  capital  and  operating  expenditures,  will
continue  to  be  denominated  in  Canadian  dollars.  If  the  Canadian  dollar
appreciates  against  the  U.S.  dollar,  our  results  of  operations  could be
materially adversely affected.

Costs and Expenses

         Our costs and expenses  consist of selling and marketing,  research and
development,   depreciation  and  amortization,   general  and   administrative,
purchased   in-process   research  and   development,   consulting  and  systems
integration  and cost of  hardware  sold.  Our selling  and  marketing  expenses
consist  primarily of employee  salaries and  commissions,  and include  related
travel,  public  relations and corporate  communications  costs and trade shows,
marketing  programs  and market  research.  Research  and  development  expenses
consist primarily of employee  salaries,  sponsorship of cryptographic  research
activities  at various  universities,  participation  in various  cryptographic,
wireless  and  eCommerce  standards  associations  and related  travel and other
costs.  Depreciation and amortization represents the allocation to income of the
cost of fixed assets and intangibles over their estimated useful lives.  General
and   administrative   expenses   consist   primarily   of  salaries  and  other
personnel-related   expenses  for   executive,   financial  and   administrative
personnel.  Purchased in-process research and development expenses represent the
value  of  in-process   projects  under  development   acquired  in  a  business
combination  for  which  technological  feasibility  has not  been  established.
Consulting and systems  integration  expenses consist  primarily of salaries and
travel.  Our cost of hardware sold consists  primarily of the component  cost of
our hardware  products  manufactured by third parties to our  specifications  as
well as the procured costs of third-party hardware.

         In anticipation of business  growth,  we expect to incur  significantly
higher  selling  and  marketing,  research  and  development,  and  general  and
administrative  expenses and capital  expenditures in subsequent periods. We may
not continue to grow at a pace that will support  these costs and  expenditures.
To the extent that our revenue  does not  increase at a rate  commensurate  with
these additional costs and expenditures, our results of operations and liquidity
would be materially adversely affected.

Net Losses

         We have incurred significant annual and quarterly net losses and losses
from our operations since our inception,  and we expect to incur significant net
losses and operating  losses on both an annual and quarterly  basis for at least
the next few years as we grow our business by hiring  additional  personnel  and
increase  marketing  and capital  expenditures.  Furthermore,  given the rapidly
evolving nature of our business and fluctuations in the timing of our sales, our
operating  results are difficult to forecast and,  accordingly,  our  historical
financial  results  may not be  meaningful  assessments  of our future  business
operations or prospects.  We believe that other factors will be more significant
indicators of our future business operations or prospects, including the pace of
deployment  of  mCommerce  products and  services,  the  acceptance  of ECC as a
cryptographic standard and the extent and timing of our royalty revenues.

         We pay taxes in accordance with U.S. federal,  state and local tax laws
and Canadian federal, provincial and municipal tax laws. We do not expect to pay
any  significant  corporate  income  taxes in Canada in the  foreseeable  future
because we have significant  Canadian tax credits and loss  carry-forwards.  Our
effective  tax  rate in the  fiscal  years  ended  April  30,  2000 and 1999 was
approximately 1.9% and (0.6)%, respectively.

Acquisitions

         On July 29, 1998, we acquired all of the  outstanding  common shares of
Consensus, of Berkeley,  California,  a supplier of applied security development
tools and the  manufacturer of the SSL Plus toolkit,  a widely deployed  toolkit
for the secure sockets layer,  or SSL,  protocol.  SSL is the dominant  security
protocol   on   the   Internet,


                                     - 31 -

<PAGE>

specifying session-based encryption and authentication, and is used in virtually
all Internet  browsers and commerce  servers.  The acquisition was completed for
cash consideration of approximately $3.0 million, plus the issuance of 1,894,622
of our common shares.  We also converted  outstanding stock options of Consensus
to options to acquire 799,818 of our common shares. The total  consideration for
the  acquisition  was  approximately  $24.5  million.  On November 24, 1998,  we
acquired  all of the  outstanding  common stock of  Uptronics  Incorporated,  or
Uptronics, of Sunnyvale,  California, a provider of cryptographic consulting and
security  systems  integration  services  to OEMs  for a cash  consideration  of
approximately $0.5 million and the issuance of 431,344 of our common shares. The
total  consideration  was  approximately  $2.0 million.  On January 26, 2000, we
acquired all the  outstanding  shares of common stock of  Trustpoint of Mountain
View, California,  a developer of public-key  infrastructure,  or PKI, products.
OEMs use PKI  products  to develop  applications  with the  digital  certificate
service  built-in.  The principal  benefit to us of this acquisition was that we
acquired  Trustpoint's  software  and hired  Trustpoint's  four  employees.  The
acquisition was completed with the issuance of 201,120 of our common shares.  We
also converted  outstanding  stock options of Trustpoint into options to acquire
98,884 of our common shares.  The total  consideration  for the  acquisition was
approximately  $10.5  million.  These  acquisitions  were  accounted  for by the
purchase method and the results of operations were included in our  consolidated
statements of operations from the dates of acquisition.

Results of Operations

         Our consolidated  financial  statements contained in this Form 10-K are
reported in U.S. dollars and are presented in accordance with U.S. GAAP.

         Although we have experienced  substantial  growth in revenues in recent
periods, we have incurred  substantial  operating losses since our inception and
we may incur substantial operating losses in the foreseeable future. As of April
30, 2000, we had an  accumulated  deficit of  approximately  $54.3  million.  We
expect to incur  additional  losses for at least the next few years,  and we may
never achieve profitability.  We intend to invest heavily in sales and marketing
and the development and enhancement of our product and service offerings.
<TABLE>
         The  following  table sets out,  for the  periods  indicated,  selected
financial information from our consolidated financial statements as presented in
accordance with U.S. GAAP as a percentage of revenue.
<CAPTION>
                                                               Year Ended April 30,
                                                               --------------------
                                                      1996    1997    1998    1999    2000
                                                     ------  ------  ------  ------  ------
<S>                                                    <C>      <C>    <C>     <C>     <C>
Consolidated Statement of Operations Data:             (%)      (%)    (%)     (%)     (%)
Revenues.......................................        100      100    100     100     100
Costs and expenses:
  Selling and marketing........................        108      188    399     151      55
  Research and development.....................        116      224    310      80      37
  Depreciation and amortization................         13       12     45     125      65
  General and administrative...................         54      235    224     106      59
  Purchased in-process research and development         --       --     --      28       4
  Consulting and systems integration...........         --       --     --      15      17
  Cost of hardware sold........................         30       22     28       3       5
Interest income (expense)......................          8       24     78      25      (3)

Loss before income taxes.......................       (213)    (557)  (828)   (383)   (145)
Income taxes...................................        (12)     (10)    14      (2)      3
Net loss.......................................       (201)    (547)  (842)   (381)   (148)
</TABLE>

Fiscal Year Ended April 30, 2000 Compared to Fiscal Year Ended April 30, 1999

         Revenue.  Revenue for fiscal 2000 was $12.0  million,  a 200%  increase
from $4.0 million in fiscal 1999.  The increase was  primarily  attributable  to
increased software  licensing,  which grew to approximately $9.3 million, a 247%
increase  over $2.7 million in fiscal 1999.  The increase in software  licensing
revenue was  primarily a result of a growing  market  awareness  of our products
and, to a lesser extent,  an expanded sales force.  In addition,  consulting and
systems  integration revenue grew 105% from fiscal 1999 to 2000, to $2.0 million
from $1.0 million. We added resources in this area and focused our activities on
larger scale projects,  thereby contributing to the increase in revenue, a trend
that we believe  will  continue.  Hardware  sales grew 95% to $0.8  million  for
fiscal 2000, but


                                     - 32 -

<PAGE>

decreased  as a  percentage  of  revenue  to 7% versus  10% in fiscal  1999.  We
anticipate  that  hardware  sales will remain at this  percentage  level for the
foreseeable future.

         Selling and Marketing. Selling and marketing expenses were $6.6 million
for the year ended April 30,  2000  versus  $6.1  million for the same period in
fiscal 1999. We  anticipate  this area to increase  considerably  as we add more
personnel and expand into Europe and the Asia Pacific region.

         Research and Development.  We have capitalized certain costs associated
with  the  filing  of  approximately   sixty  patent   applications  in  various
jurisdictions.   These  patent  filings  are  in  the  areas  of  ECC,   various
mathematical   computational   methodologies,   security   protocols  and  other
cryptographic  inventions.  Once granted, we amortize the individual patent cost
over three  years.  We  capitalize  patents not yet granted at their cost less a
provision for the possibility of the patent not being granted or abandoned.  Our
research  and  development  expenses for fiscal 2000  increased  37% relative to
fiscal  1999,  to $4.4  million as a result of new  product  development  in the
public-key  infrastructure  area. We expect that these expenses will continue to
increase in the foreseeable  future as we add additional  engineering  resources
and  continue to grow our  technical  capabilities  to support the growth of our
business.

         Depreciation and Amortization.  Depreciation and amortization increased
to $7.9  million in fiscal 2000  compared to $5.1  million in fiscal  1999.  The
primary  reason for the increase  was that our results for fiscal 2000  included
full-year  amortization  expenses  relating to our acquisitions of Consensus and
Uptronics and partial year  amortization  expense relating to our acquisition of
TrustPoint  while our  results  for  fiscal  1999  included  only  partial  year
amortization  expenses  relating to our acquisitions of Consensus and Uptronics.
We acquired  Consensus and Uptronics  during fiscal 1999 and  TrustPoint  during
fiscal 2000.

         General  and  Administrative.   General  and  administrative   expenses
increased  66% in fiscal 2000 to $7.1 million from $4.3 million for fiscal 1999.
The primary reason for this increase was the increase in our  infrastructure  in
California.

         Purchased  In-process  Research and  Development.  For fiscal 2000,  we
recorded a charge for purchased  in-process research and development as a result
of our acquisition of Trustpoint.  In connection with this acquisition,  we used
third-party  appraisers' estimates to determine the value of in-process projects
under development for which technological  feasibility had not been established.
The total value of these projects at the time of the  acquisition was determined
to be  approximately  $0.5 million and was expensed in fiscal 2000. The value of
the projects was  determined by estimating  the costs to develop the  in-process
technology into commercially  feasible  products,  estimating the net cash flows
which we believed would result from the products and discounting  these net cash
flows back to their present value.

         Consulting and Systems Integration.  Consulting and systems integration
expenses  were $2.1 million for fiscal 2000, a 254%  increase  over $0.6 million
for fiscal  1999.  This was  primarily  a result of  incurring  the full year of
expenses  associated with our consulting and systems  integration group acquired
from Uptronics, only five months of which were recorded in the previous year. In
addition, we increased the number of engineers in this group in order to keep up
with the  growing  demand  from our  customers.  We expect  that this trend will
continue as we continue to add resources to this group.

         Cost of Hardware  Sold.  Cost of hardware sold increased 363% in fiscal
2000 to  approximately  $0.6  million  from $0.1  million in fiscal  1999.  This
increase  is  primarily  due to higher  hardware  sales.  This  increase is also
attributable  to a shift in product  mix with a greater  proportion  of hardware
sales being generated by sales of higher cost third party procured hardware.

         Interest and Other Income (Expense).  For fiscal 2000, interest expense
was $0.4  million  compared to interest  income of $1.0 million for fiscal 1999.
This decrease was a result of a reduction in the amount of marketable securities
invested  during the year as funds were  applied to meet our cash  requirements.
This decrease also consists of currency adjustments,  primarily Canadian to U.S.
dollars.

         Income  Taxes.  Income tax  expense  was $0.3  million  for fiscal 2000
compared to a recovery of $0.1  million in fiscal  1999,  which arose due to the
receipt of  Scientific  Research  and  Experimental  Development  Tax Credits in


                                     - 33 -

<PAGE>

Canada.  Income  taxes  were  solely a result of our  operations  in the  United
States,  including  those of Consensus and Uptronics.  We have  significant  tax
credits and tax loss carry-forwards in Canada.

         Net Loss.  Our net loss  increased  16% in fiscal 2000 to $17.9 million
($0.80 per share basic and diluted)  compared to $15.4 million  ($0.73 per share
basic and diluted) in the previous fiscal year. This increase was  predominately
attributable to the amortization of  acquisition-related  intangibles.  The loss
before interest  income,  depreciation and  amortization,  and taxes amounted to
$9.3 million in fiscal 2000 ($0.42 per share basic and diluted), an 18% decrease
over $11.4 million ($0.55 per share basic and diluted) for fiscal 1999.

Fiscal Year Ended April 30, 1999 Compared to Fiscal Year Ended April 30, 1998

         Revenue. Revenue for fiscal 1999 was $4.0 million, a 228% increase from
approximately   $1.2  million  in  fiscal  1998.   The  increase  was  primarily
attributable  to  increases in software  licensing  and  consulting  and systems
integration  revenue.  Software  licensing  revenue increased to $2.7 million in
fiscal  1999 from $0.5  million in fiscal  1998,  a 397%  increase.  Significant
software  licensing  revenue  growth was evident in both the ECC-based  Security
Builder product as well as the SSL Plus product  acquired  through the Consensus
acquisition.  In addition, we completed and released SSL Plus 3.0, a new version
of SSL Plus which uses the  elliptic  curve  algorithm  in  addition  to the RSA
algorithm.

         During  fiscal 1999,  we adjusted  our  business  strategy to provide a
wider range of security  products and services to OEM  customers.  This shift in
strategy  is evident in the growth of our  consulting  and  systems  integration
revenue,  which grew to $1.0  million in fiscal 1999 from less than $0.1 million
the previous fiscal year. Revenue from hardware sales declined in fiscal 1999 to
$0.4 million from $0.6 million the previous fiscal year.

         Selling and  Marketing.  During fiscal 1999, we continued to expand our
sales and marketing  operation based in California,  both internally and through
the  acquisitions of Consensus and Uptronics.  As a result of the growth of this
operation,  selling and  marketing  expenses  increased  24% to $6.1  million in
fiscal 1999 from $4.9 million in fiscal 1998.

         Research and Development.  Research and development costs decreased 15%
in fiscal 1999 to approximately $3.2 million,  from $3.8 million in the previous
fiscal year. This decline was due to a decrease in headcount and a decreased use
of technical contractors.

         Depreciation and  Amortization.  In connection with the acquisitions of
Consensus and Uptronics, we acquired intangibles of $26.3 million, and amortized
$4.1 million of this amount in fiscal 1999. As a result,  our  depreciation  and
amortization expense was $5.1 million in fiscal 1999 compared to $0.6 million in
fiscal 1998.

         General and Administrative.  In fiscal 1999, general and administrative
expenses  increased  55% to $4.3  million  versus $2.8  million in the  previous
fiscal  year.  The  primary  reason  for  this  increase  was  the  addition  of
administrative headcount to support our growing operations in California,  along
with associated payroll taxes, benefits and overheads.

         Purchased In-process Research and Development. For the year ended April
30, 1999, we recorded a charge for purchased in-process research and development
as a result of our acquisition of Consensus. In connection with the acquisition,
we used third-party  appraisers'  estimates to determine the value of in-process
projects under  development  for which  technological  feasibility  had not been
established.  The total value of these  projects at the time of the  acquisition
was  determined  to be $1.2 million and was expensed in the year ended April 30,
1999.  The value of the  projects  was  determined  by  estimating  the costs to
develop  the  in-process   technology  into  commercially   feasible   products,
estimating  the net cash flows we believed  would  result from the  products and
discounting  these net cash flows back to their present value. The products were
substantially   completed  during  fiscal  2000.   However,   if  they  are  not
successfully  completed,  there  could be a  negative  impact  on our  operating
results.  There was no purchased  in-process  research and development charge in
1998 as the Company did not make any acquisitions in that period.

         Consulting  and  Systems   Integration.   The  consulting  and  systems
integration group resulted from the acquisition of Uptronics during the year.


                                     - 34 -

<PAGE>

         Cost of Hardware  Sold.  Cost of hardware  sold  declined 64% in fiscal
1999 to $0.1 million from $0.3 million the previous  year.  This  reduction  was
primarily  due to lower  hardware  sales and lower  unit  costs in the  Certifax
business.

         Interest  Income  (Expense).   In  fiscal  1999,  interest  income  was
approximately $1.0 million, unchanged from fiscal 1998.

         Income  Taxes.  Income tax  recovery  was $0.1  million in fiscal  1999
compared to an expense of $0.2 million in fiscal 1998. The recovery occurred due
to the receipt of Scientific  Research and Experimental  Development Tax Credits
in Canada.  Income  taxes were solely a result of our  operations  in the United
States. We have significant tax credits and tax loss carry-forwards in Canada.

         Prior to our listing on The Toronto  Stock  Exchange,  we were eligible
for refundable  Scientific Research and Experimental  Development Tax Credits in
Canada.  Due to the  uncertainty  surrounding  the  reimbursement  of these  tax
credits by various taxation authorities, we accrued a lesser tax credit than the
amount which we claimed in filing our income tax returns. During fiscal 1999, we
received $0.5 million of these refundable tax credits in excess of amounts which
we had accrued in  previous  years,  and we took this amount into income  during
fiscal  1999.  Our  income  tax  expenses  are net of  Scientific  Research  and
Experimental Development Tax Credits in Canada.

         Net Loss.  Our net loss  increased  48% in fiscal 1999 to $15.4 million
($0.73 per share basic and diluted)  compared to $10.4 million  ($0.57 per share
basic and diluted) in the previous fiscal year. This increase was  predominantly
attributable  to the  amortization  of  acquisition-related  intangibles,  which
amounted to $4.1  million in fiscal 1999  compared to zero in fiscal  1998.  The
loss before interest income,  depreciation and amortization,  and taxes amounted
to $11.4  million in fiscal  1999  ($0.55 per share  basic and  diluted),  an 8%
increase over $10.6 million ($0.58 per share basic and diluted) for fiscal 1998.

Financial Condition, Liquidity and Capital Resources

         From our inception  until  December,  1995, we financed our  operations
primarily  through  private  placements.  In December,  1995,  we completed  our
initial public offering in Canada, which raised net proceeds of $6.0 million. In
fiscal 1997, we raised $13.1 million  through a private  placement of our equity
securities.  In fiscal  1998,  we  raised  $30.5  million  through  two  private
placements of our equity securities.

         In  fiscal  1999,  our  operations  used  $9.3  million  of  cash,  the
acquisitions  of Consensus  and  Uptronics  used $4.4  million in cash,  and our
investment  in fixed  assets  and  patents  used  $1.9  million  in cash.  These
expenditures  were offset by cash  proceeds from  investing  activities of $16.1
million as a result of the sales and maturities of marketable securities.  Total
cash increase for the year was $0.8 million,  and cash and cash  equivalents and
marketable securities at April 30, 1999 were $14.1 million.

         In  fiscal  2000,  our  operations  used  $11.7  million  of cash.  Our
investment  in fixed  assets  and  patents  used  $4.3  million  in cash.  These
expenditures  were offset by cash  proceeds from  investing  activities of $10.1
million as a result of investing in marketable securities.

         In May, 2000, we completed a public offering of 2,500,000 common shares
in the United  States and Canada.  Our net proceeds from the offering were $51.5
million.  On April 27, 2000,  we borrowed $10 million from Sand Hill Capital II,
LP, or Sand  Hill,  at the U.S.  prime  rate of  interest  plus 3%.  As  partial
consideration  for making advances to us under this credit facility,  we granted
Sand Hill  warrants  to  purchase  30,000 of our common  shares with an exercise
price of Cdn.  $38.13  per  share for a period  of five  years  from the date of
grant.  We repaid the loan and  interest on May 5, 2000,  using a portion of the
proceeds received from our public offering, and terminated this facility.  Total
cash increase for the year was $9.1 million,  and cash and cash  equivalents and
marketable securities at April 30, 2000 were $13.1 million.

         We lease all of our office premises and certain furniture and equipment
under operating leases which require, in the aggregate, minimum payments of $2.1
million in fiscal  2001.  The leases  for our  offices in the United  States and
Canada expire in 2006 and 2009,  respectively.  Our  equipment  leases expire in
2009.


                                     - 35 -

<PAGE>

         We believe that, in the future, it may be advisable to augment our cash
in  order to fund our  activities.  Therefore,  we will  consider  raising  cash
whenever  market  conditions are  favorable.  Such capital may be raised through
additional public or private financing, as well as collaborative  relationships,
borrowings and other available sources.

         Our future capital requirements will be substantial and will depend on,
and could  increase as a result of, many factors,  including:  costs  associated
with  facility  expansion  and the  build-up  of our  Mobile  Trust  Certificate
Authority service; progress of our research and development programs; whether we
acquire  interests in products  currently  held by third  parties;  the time and
costs  involved in obtaining  regulatory  approvals;  costs  involved in filing,
prosecuting  and enforcing  patent claims;  competing  technological  and market
developments;  our  success  in  entering  into  collaborative  agreements;  and
administrative  and  legal  expenses.  However,  we  believe  our  cash and cash
equivalents  and  marketable  securities  position at April 30,  2000,  with the
addition of the proceeds from our May, 2000 public  offering  referred to above,
is sufficient to meet our short-term  liquidity needs. There can be no assurance
that  additional or sufficient  financing  will be available,  or, if available,
that it will be available on acceptable  terms. If we raise  additional funds by
issuing additional equity securities, dilution to then existing shareholders may
result. If adequate funds are not available, we may be required to significantly
curtail   one  or  more   of  our   research   and   development   programs   or
commercialization efforts or obtain funds through arrangement with collaborative
partners or others on less favorable terms than might otherwise be available.

Recent Accounting Pronouncements

         In June,  1998,  the FASB  issued  Statement  of  Financial  Accounting
Standards  (SFAS) No. 133,  Accounting  for Derivative  Instruments  and Hedging
Activities.  SFAS No. 133 establishes new accounting and reporting standards for
derivative  financial  instruments  and for  hedging  activities.  SFAS No.  133
requires the Company to measure all  derivatives  at fair value and to recognize
them on the balance sheet as an asset or  liability,  depending on the Company's
rights or obligations under the applicable  derivative contract.  In June, 1999,
the FASB issued SFAS No. 137,  which  deferred the effective date of adoption of
SFAS No. 133 for one year. The Company will adopt SFAS No. 133 no later than the
first quarter of fiscal year 2002.  Adoption of the new method of accounting for
derivatives and hedging  activities is not expected to have a material impact on
the Company's financial position.

         In December 1999, the Securities and Exchange  Commission  (SEC) issued
Staff  Accounting  Bulletin  No. 101 (SAB  101),  "Revenue  Recognition",  which
provides guidance on the recognition,  presentation and disclosure of revenue in
financial  statements  filed with SEC. SAB 101 outlines the basic  criteria that
must be met in order to recognize  revenue and provides guidance for disclosures
related to revenue recognition  policies. In June 2000, the SEC issued SAB 101B,
"Second Amendment:  Revenue  Recognition in Financial  Statements" which extends
the  effective  date of SAB 101 to the fourth  fiscal  quarter  of fiscal  years
commencing after December 15, 1999. Although, the company has not fully assessed
the  implications  of SAB 101,  management  does not believe the adoption of the
statement will have a significant impact on the Company's consolidated financial
position, results of operations or cash flows"

         In March 2000, the FASB issued  Interpretation  No. 44,  Accounting for
Certain  Transactions  involving Stock  Compensation,  an  interpretation of APB
Opinion  No.  25,  which  among  other  things  would,  require   variable-award
accounting  for repriced  options from the date the option is repriced until the
date of exercise.  This  interpretation  is effective  July 1, 2000, but certain
conclusions in this Interpretation cover specific events that occur after either
December 15, 1998,  or January 12, 2000.  On March 17, 1999, we repriced certain
options to purchase  382,914 shares of common stock.  Because these options were
repriced  after  December  15,  1998,  they are  covered by the  Interpretation.
Accordingly,  these options  would be accounted  for as variable  until the date
they are exercised, forfeited or expire unexercised. The portion of the options'
intrinsic value at July 1, 2000 that is  attributable  to the remaining  vesting
period will be recognized  over the future period.  However,  if the stock price
subsequently  declines below the stock price at July 1, 2000,  compensation cost
would be reduced proportionately. Additional compensation cost would be measured
for the full amount of any increases in stock price after the effective date and
will be recognized  over the remaining  vesting  period.  Any  adjustment to the
compensation cost for further changes in stock price after the options vest will
be recognized immediately.


                                     - 36 -

<PAGE>

Item 7A.     QUANTITATIVE AND QUALITATIVE DISCLOSURE ABOUT MARKET RISK

Foreign Exchange Risk

         Currency fluctuations may materially adversely affect us. A substantial
portion  of our  operating  expenses  are paid in  currencies  other  than  U.S.
dollars.  Fluctuations  in the exchange  rate  between the U.S.  dollar and such
other currencies may have a material  adverse effect on our business,  financial
condition and operating results. In particular,  we may be materially  adversely
affected by a significant  strengthening of the Canadian dollar against the U.S.
dollar.  Operating expenses incurred in fiscal 2000 in currencies other than the
U.S. dollar represented approximately 33% of our total operating expenses.

Interest Rate Risk

         We  hold  a  significant   portion  of  our  cash  in  interest-bearing
instruments  and are  exposed  to the risk of  changing  interest  rates and its
effect on future earnings.  Generally,  if interest rates decrease, our interest
income would also decrease.  We do not use any derivative  instruments to reduce
our exposure to interest rate fluctuations.

Item 8.      FINANCIAL STATEMENTS AND SUPPLEMENTARY DATA

         The response to this item is  submitted  as a separate  section of this
Form 10-K. See Part IV, Item 14 of this Form 10-K.

Item 9.      CHANGES IN  AND DISAGREEMENTS WITH  ACCOUNTANTS ON  ACCOUNTING  AND
             FINANCIAL DISCLOSURE

         None.


                                    PART III

Item 10.     DIRECTORS AND EXECUTIVE OFFICERS OF THE COMPANY
<TABLE>
         Except as indicated  below, the following table sets forth, as of April
30, 2000, the names, ages and positions of our directors and executive officers:
<CAPTION>
Name                                        Age     Position with Certicom
----                                        ---     ----------------------
<S>                                          <C>    <C>
Richard P. Dalmazzi.................         45     President, Chief Executive Officer and Director

Scott A. Vanstone...................         52     Founder, Chief Cryptographer and Director

Richard M. Depew....................         39     Executive Vice President, Field Operations

Richard D. Brounstein...............         50     Senior Vice President, Finance, Chief Financial Officer
                                                    and Secretary

Robert L. Williams..................         43     Senior Vice President, Product Development

Timothy M. Dierks...................         31     Chief Technology Officer

Stewart C. Noyce....................         38     Vice President, Marketing

Philip C. Deck......................         37     Chairman of the Board

Bernard W. Crotty(1)(2).............         38     Director


                                     - 37 -

<PAGE>

William T. Dodds(1)(2)..............         52     Director

Erling E. Rasmussen.................         57     Director

Louis E. Ryan(1)....................         45     Director

William J.  Stewart(2)..............         39     Director

<FN>
---------------------------------------
(1) Member of the Audit Committee

(2) Member of the Compensation Committee as of May 2000
</FN>
</TABLE>
         We do not have an executive committee. We are required to have an audit
committee. The term of office for each of the above directors will expire at the
time of our next annual  meeting.  Each of our directors and executive  officers
has been  engaged in his present  principal  occupation  for the  previous  five
years,  except as indicated in the following summaries of the background of each
individual:

         Richard P. Dalmazzi was  appointed as our  President,  Chief  Executive
Officer and Director in November, 1999. From September,  1998 to November, 1999,
Mr. Dalmazzi served as our President. From July, 1997 to September, 1998, he was
our Executive  Vice  President of Sales and  Marketing.  From  October,  1995 to
December,  1996,  he was Senior  Vice  President  of Digital  Arts and  Sciences
Corporation,  a developer of an image  database  engine for the  Internet.  From
February,  1995 to  September,  1995,  he was  President  and  COO of  Strategic
Communications Corp., a developer of a wireless data communications  service for
the financial services industry. From August, 1992 to January, 1995, he was Vice
President and General Manager, OEM Division of Geoworks Corporation, a developer
of embedded operating systems for the Internet appliance market. From September,
1978 to August, 1992, Mr. Dalmazzi held various positions with IBM.

         Scott A. Vanstone,  Ph.D.,  assisted in founding us in March,  1985 and
was appointed our Chief  Cryptographer in January,  1995. Dr. Vanstone is also a
professor of  Mathematics  and Computer  Science,  an Executive  Director of the
Centre of Applied Cryptography,  and the holder of the NSERC/Pitney Bowes Senior
Chair of Applied Cryptography at the University of Waterloo.

         Richard M. Depew was  appointed  our Executive  Vice  President,  Field
Operations  in February,  2000.  From July,  1998 to February,  2000,  Mr. Depew
served as our Vice President,  Worldwide Sales.  Prior to joining Certicom,  Mr.
Depew was Vice President of Sales at Litronic,  Inc. from December, 1995 to July
1998.  Prior to this,  Mr. Depew was Chief  Executive  Officer of LION Software,
Inc.

         Richard D. Brounstein was appointed our Senior Vice President, Finance,
Chief  Financial  Officer and  Secretary  in  February,  2000.  Prior to joining
Certicom,  Mr.  Brounstein  served as Vice President Finance and Chief Financial
Officer of VidaMed,  Inc. from May, 1997 to January,  2000. From August, 1989 to
February, 1997, Mr. Brounstein served as Vice President Finance & Administration
and Chief Financial Officer of MedaSonics Inc.

         Robert L.  Williams was appointed  our Senior Vice  President,  Product
Development in November, 1999. From January, 1999 to November, 1999 he served as
interim President of Nexsys-Commtech  Inc. Mr. Williams served as Vice President
of Operations for Mobile Computing Corporation from September, 1990 to December,
1998.

         Timothy  M.  Dierks  was  appointed  our Chief  Technology  Officer  in
November, 1999. From October, 1998 through November, 1999, he served as our Vice
President of Engineering. From July, 1998 to October, 1998, Mr. Dierks served as
our Vice  President  of Product  Architecture.  Prior to joining us, Mr.  Dierks
served as Vice President of Consensus Development Corporation from January, 1996
to July,  1998.  Mr. Dierks filled several  technical and management  roles from
November, 1991 to January, 1996 with Apple Computer Inc.

         Stewart  C.  Noyce has served as our Vice  President,  Marketing  since
November, 1998. Prior to joining us, Mr. Noyce served as a Principal at TruNorth
Consulting from June, 1997 to October, 1998. From October, 1996 to May, 1997, he
was Director, Product Management at Phone.com. From November, 1992 to May, 1996,
he was Director, Product Management at Geoworks Corporation.


                                     - 38 -

<PAGE>

         Philip C. Deck has served as our Chairman  since  January,  1996.  From
September,  1998 to November,  1999, Mr. Deck also served as our Chief Executive
Officer.  From  February,  1997 to  September,  1998, he served as our Chairman,
President and Chief Executive Officer. From January, 1996 to February, 1997, Mr.
Deck served as our Chairman. From April, 1994 to January, 1996, Mr. Deck was our
President and Chief Executive Officer.

         Bernard W. Crotty has served on our board since  October 16, 1996.  Mr.
Crotty was Counsel with Gibson,  Dunn & Crutcher LLP, in Los Angeles from April,
1998 to March, 2000. From February, 1994 to April 1, 1998, he was a partner with
McCarthy Tetrault, Barristers & Solicitors in Toronto, Ontario.

         William  T.  Dodds has been a member of our board  since  February  10,
1997. Mr. Dodds is Vice President of The Woodbridge Co. Limited. From September,
1996 to the  present,  Mr.  Dodds has been a member of the board of directors of
Axxent Inc., a company  listed on the Toronto  Stock  Exchange  since  November,
1999.

         Erling E.  Rasmussen  has served on our board since August 25, 1997. He
is the Corporate  Vice  President and Director of  Technology  Motorola,  Inc.'s
Systems Solutions Group.

         Louis E. Ryan has been a member of our board since  October  16,  1996.
Mr. Ryan is the President of Clicknet  Software Inc. From July, 1996 to January,
1997, Mr. Ryan was the President of CKS New Media Inc. Previously,  Mr. Ryan was
the  Executive  Vice  President of Worldwide  Sales and a co-founder  of Delrina
Corporation, now a division of Symantec Corporation.

         William J.  Stewart  has been a member of our board  since  October 16,
1996.  Mr.  Stewart  served as  President of Asia  Pacific  Ventures  Technology
Partners  since 1989.  He has been a General  Partner of Asia  Pacific  Ventures
since 1994.


                                     - 39 -

<PAGE>

Item 11.     EXECUTIVE COMPENSATION
<TABLE>
         The  following  table sets  forth,  for the fiscal year ended April 30,
2000, all  compensation of the Chief Executive  Officer,  former Chief Executive
Officer  and  current  Chairman  of the Board and each of our three  other  most
highly  compensated  executive  officers who earned more than $100,000 in fiscal
2000 and were serving as executive  officers as of April 30, 2000.  In addition,
it includes our current Senior Vice President  Finance,  Chief Financial Officer
and Secretary and one of our former executive  officers who was not an executive
officer on or after April 30, 2000  (collectively,  all such  current  executive
officers and former executive officer are the "Named Executive Officers").
<CAPTION>
                                           Summary Compensation Table

                                                                                                     Long-Term
                                                   Annual Compensation(1)                           Compensation
                                                   -------------------                              ------------

Name and Principal Position                                   Bonus/         Other Annual            Securities
---------------------------         Fiscal       Salary     Commission       Compensation            Underlying
                                     Year         ($)          ($)              ($)                  Options (#)
                                     ----         ---          ---              ---                  -----------
<S>                                    <C>      <C>           <C>               <C>                   <C>
Richard P. Dalmazzi(2)                 2000     217,920       68,532            6,000                 260,000
     President and Chief Executive     1999     180,000       70,000            8,880                 120,000
     Officer                           1998     122,788       33,333            5,000                 280,000

Philip C. Deck(3)                      2000     187,119           --            6,105                 100,000
     Chairman of the Board             1999     171,233           --            6,145                 180,000
                                       1998     147,260           --            8,977                 240,000

Bruce A. MacInnis(4)                   2000     112,271       47,875            5,903                  40,000
     Former Vice President Finance     1999     102,740       34,247            5,770                  60,000
     and Administration, Chief         1998      95,890       24,658            5,770                  52,000
     Financial Officer and
     Secretary

Richard D. Brounstein(4)               2000      41,170           --               --                 220,000
     Senior Vice President             1999          --           --               --                      --
     Finance, Chief Financial          1998          --           --               --                      --
     Officer and Secretary

Scott A. Vanstone                      2000     124,519           --            6,532                 100,000
     Chief Cryptographer               1999     109,589           --            5,403                 120,000
                                       1998      85,616           --           10,806                 100,000

Richard M. Depew                       2000     135,000      121,111            6,000                 160,000
      Executive Vice President,        1999      99,141       31,157            4,500                  40,000
      Field Operations                 1998          --           --               --                      --

<FN>
Notes:
(1)      The aggregate  compensation paid by us to all of our directors and executive  officers (14 persons) for
         the fiscal year ended April 30, 2000 was $1,528,600.

(2)      Richard P. Dalmazzi was appointed our President,  Chief Executive  Officer and Director on November 30,
         1999.

(3)      Philip C. Deck resigned as our Chief Executive Officer on November 30, 1999.

(4)      Bruce A. MacInnis resigned as our Vice President Finance & Administration,  Chief Financial Officer and
         Secretary in February, 2000, and was replaced by Richard D. Brounstein.

</FN>
</TABLE>
                                                     - 40 -

<PAGE>

            Option Grants During the Fiscal Year Ended April 30, 2000
<TABLE>
         The following  table sets forth  information  concerning  options which
were  granted to each of the Named  Executive  Officers  during the fiscal  year
ended April 30, 2000.
<CAPTION>
                                                                                            Potential Realizable
                                         % of Total                                          Value of Assumed
                             Securities    Options                                          Annual Rate of Stock
                               Under      Granted to     Exercise or                       Price Appreciation for
                              Options    Employees in    Base Price                          Option Term (2)(3)
                              Granted      Fiscal        ($/Common                          --------------------
  Name                          (#)        Year(1)         Share)       Expiration Date     5% ($)       10% ($)
  ----                          ---        -------         ------       ---------------     ------       -------
<S>                          <C>           <C>              <C>         <C>                <C>           <C>
  Richard P. Dalmazzi         40,000       1.44%            $4.39       May 12, 2004       $   48,875    $  108,002
                             220,000       7.90%            16.13       November 30, 2004     987,375     2,181,841
  Philip C. Deck             100,000       3.59%             4.39       May 12, 2004          122,188       270,004
  Bruce A. MacInnis           40,000       1.44%             4.39       May 12, 2004           48,875       108,002
  Richard D. Brounstein      220,000       7.90%            38.17       February 7, 2005    2,336,616     5,163,310
  Scott A. Vanstone          100,000       3.59%             4.39       May 12, 2004          122,188       270,004
  Richard M. Depew            40,000       1.44%             4.39       May 12, 2004           48,875       108,002
                              40,000       1.44%             3.94       August 17, 2004        43,800        96,786
                              80,000       2.87%            18.75       December 10, 2004     417,320       922,168

<FN>
(1)  Based on a total of  2,783,866  option  shares  granted  to our  employees,
     directors and consultants during fiscal 2000.

(2)  The  potential  realizable  value  is  calculated  based on the term of the
     option  at the time of grant.  Stock  price  appreciation  of 5% and 10% is
     assumed  pursuant  to rules  promulgated  by the  Securities  and  Exchange
     Commission  and  does not  represent  our  prediction  of our  stock  price
     performance. There is no assurance provided to any executive officer or any
     other  holder of the  Company's  securities  that the  actual  stock  price
     appreciation  over the option  term will be at the assumed 5% or 10% annual
     rates of compounded stock price appreciation or at any other defined level.
     Unless the market price of the common  shares  appreciates  over the option
     term,  no  value  will be  realized  from  the  option  grants  made to the
     executive  officers.   The  potential   realizable  value  at  5%  and  10%
     appreciation  is calculated by assuming that the exercise price on the date
     of grant  appreciates  at the  indicated  rate for the  entire  term of the
     option and that the option is exercised  at the exercise  price and sold on
     the last day of its term at the appreciated price.

(3)  The stock price and the option  exercise price are based on our 2000 fiscal
     year average rate, U.S. $0.6804 per Cdn. $1.00.

</FN>
</TABLE>

   Aggregated Option Exercises During the Fiscal Year Ended April 30, 2000 and
                          Fiscal Year-End Option Values
<TABLE>
         The following table sets forth  information  concerning the exercise of
options  during  the  fiscal  year  ended  April  30,  2000 by each of the Named
Executive  Officers and the fiscal  year-end  value of  unexercised  options and
SARs, on an aggregated basis.
<CAPTION>
                              Number
                             of Shares    Value           Number of Shares          Value of Unexercised In-The-
                            Acquired on  Realized       Underlying Unexercised       Money Options At April 30,
         Name                Exercise    ($) (1)      Options At April 30, 2000             2000($)(2)
         ----                --------    -------      -------------------------             ----------

                                                    Exercisable    Unexercisable   Exercisable    Unexercisable
                                                    -----------    -------------   -----------    -------------
<S>                            <C>        <C>          <C>            <C>          <C>            <C>
Richard P. Dalmazzi            50,000     $738,336     167,500        492,500      $3,512,360     $7,836,707
Philip C. Deck                     --           --     181,316        259,862       3,765,719      5,545,948
Bruce A. MacInnis              62,958    1,355,764      54,480         93,878       1,135,201      2,006,127
Richard D. Brounstein              --           --          --        220,000              --             --


                                                      - 41 -

<PAGE>

                              Number
                             of Shares    Value           Number of Shares          Value of Unexercised In-The-
                            Acquired on  Realized       Underlying Unexercised       Money Options At April 30,
         Name                Exercise    ($) (1)      Options At April 30, 2000             2000($)(2)
         ----                --------    -------      -------------------------             ----------

                                                    Exercisable    Unexercisable   Exercisable    Unexercisable
                                                    -----------    -------------   -----------    -------------
Scott A. Vanstone              50,000    1,850,688     187,156        205,436       4,017,766      4,378,316
Richard M. Depew                   --           --      17,500        182,500         357,646      2,707,551
<FN>
(1)   Based upon the market price of the  purchased  shares on the exercise date
      less the option exercise price payable for such shares.  The exchange rate
      is based on our 2000  fiscal  year  average  rate,  U.S.  $0.6804 per Cdn.
      $1.00.

(2)  Based  upon the  market  price of  $25.51  per  share,  which was the U.S.$
     equivalent  of the closing  price of our common shares on The Toronto Stock
     Exchange on the last trading day of our 2000 fiscal  year,  less the option
     exercise price payable per share.

</FN>
</TABLE>

Employment Contracts

         Philip C. Deck  performs  his duties as  Chairman of our Company in our
Mississauga,  Ontario office pursuant to an Employment  Agreement as of November
30, 1999 which  expires on May 15, 2003.  In the event that any person  acquires
more  than 50% of our  outstanding  voting  securities,  then all of Mr.  Deck's
options and other rights to acquire our securities shall vest immediately.

         Richard P.  Dalmazzi  performs  his duties as our  President  and Chief
Executive  Officer in our Hayward,  California  office pursuant to an Employment
Contract made as of November 30, 1999.  This  agreement  terminates on April 30,
2001,  but is  automatically  renewable  for  successive  periods  of  one  year
following  April 30 in each year  starting in 2001 unless either party has given
at least  180 days'  written  notice to the  other  that  such  agreement  is to
terminate at the end of the term in question.  In the event that Mr.  Dalmazzi's
employment is terminated by us, other than for cause,  Mr.  Dalmazzi is entitled
to be paid the amount of his salary for the unexpired term of the agreement.  In
the  event  there  is a change  of  control  and Mr.  Dalmazzi's  employment  is
terminated without cause, or Mr. Dalmazzi voluntarily  terminates his employment
with good reason, then all of Mr. Dalmazzi's options and other rights to acquire
securities shall vest immediately.

         Scott A. Vanstone performs his duties as our Chief Cryptographer in our
Mississauga,  Ontario office pursuant to a Services Agreement as of May 1, 1999.
This  agreement  terminates on April 30, 2004, but may be renewed for successive
periods of one year by mutual consent of the parties. Either party may terminate
the agreement on April 30 of any year by giving at least 90 days' written notice
to the  other  that  the  agreement  is to  terminate  at the end of the term in
question. In addition, in the event of a take-over bid, an amalgamation,  a plan
of arrangement or other form of business transition pursuant to which holders of
our  common  shares  cease to own at least 33% of the voting  securities  of our
Company or the surviving entity resulting from such transaction,  we have agreed
to issue to Mr. Vanstone 100,000 common shares.  These shares,  if issued to Mr.
Vanstone,  will vest over a three-year  period  commencing  twelve  months after
completion of the transaction giving rise to their issuance.

         Richard D. Brounstein  performs his duties as our Senior Vice President
Finance, Chief Financial Officer and Secretary in our Hayward, California office
pursuant to an employment contract as of February 7, 2000. This agreement is for
no fixed term,  but is  terminable at the option of either party at any time. In
the event that Mr.  Brounstein's  contract is  terminated  by us, other than for
cause, or Mr. Brounstein  voluntarily terminates his employment with good reason
after a change of control of our Company,  Mr.  Brounstein is entitled (i) to be
paid nine months' salary; (ii) to receive nine months acceleration of vesting of
all unvested  stock  options;  (iii) to receive nine  months'  continued  health
insurance benefits;  and (iv) to receive up to $10,000 in outplacement services.
In the event there is a change of control of our  Company  and Mr.  Brounstein's
employment is terminated without cause, or Mr. Brounstein voluntarily terminates
his employment with good reason, then 50% of Mr. Brounstein's  options and other
rights to acquire securities shall vest immediately.


                                     - 42 -

<PAGE>

Compensation of Directors

         Each of our directors who is not a full-time employee of our Company or
one of our  affiliates  or a nominee  of a  shareholder  who has  requested  and
received a right to  representation  on our board of  directors  and who has not
previously received remuneration,  is remunerated (exclusive of, and in addition
to payments on account of travelling  and other  out-of-pocket  expenses) at the
rate of $10,000  per annum  plus an  additional  $1,000 for each  meeting of the
board of directors attended.  In addition,  each director so entitled to receive
remuneration  is granted  options vesting so as to permit the purchase of 20,000
common shares each year having a per share  exercise  price based on the closing
market  price on the last  trading day prior to the date the option was granted.
Directors  so  entitled  to receive  remuneration  are also  granted  options in
relation to an additional  10,000 common shares in respect of each  committee of
the board of  directors of which they are a member or for which they perform the
functions  based on the  foregoing  market  price or the  payment  of $2,500 per
committee in lieu thereof.  Such options vest over a period of one year. Bernard
W. Crotty, a director of our Company,  was formerly Counsel with Gibson,  Dunn &
Crutcher LLP, a law firm which  performed  legal services for us over the course
of our  fiscal  year  ended  April  30,  2000.  From  time to time,  Mr.  Crotty
personally provides legal services to us for which he is compensated.

Employee Benefit Plans

         We have three stock option plans and one stock  purchase  plan pursuant
to which our  common  shares  may be issued.  As of April 30,  2000,  options to
acquire 5,155,300 common shares at an average exercise price of $12.36 per share
were outstanding.

         As of April 30, 2000, there were outstanding options to acquire 222,648
shares of our common  stock that were  granted  pursuant to our  original  stock
option  plan (the  "Original  Plan").  Options  to acquire a total of 151,604 of
these shares were granted to our executive  officers and directors.  The options
issued under the Original Plan have a term of five years and become  exercisable
at a rate of 33% during each twelve-month period following the first anniversary
from  the  date  of  grant  of the  option.  These  options  become  immediately
exercisable in the event that any person  acquires 90% of the common shares.  In
connection with the listing of our common shares on the TSE on June 17, 1997, we
agreed  with such stock  exchange  that we would not grant any  further  options
under the Original Plan.

         The Certicom  Corp.  1997 Stock  Option Plan (the "1997 Plan")  permits
stock  options to be granted  which have a term of not greater  than five years.
The  options  issued  under the 1997 Plan  become  exercisable  at a rate of one
quarter of the total amount  granted on the first  anniversary  of a grant and a
further  2.0833%  each month after the  initial  one-year  period.  No more than
6,000,000  common  shares may be issued  under the 1997 Plan.  During the fiscal
year ended April 30, 2000,  we granted  options under the 1997 Plan to acquire a
total of 1,230,000  common shares to our executive  officers at an average price
of $14.87 per common share. Additionally,  pursuant to the 1997 Plan, we granted
options to acquire  1,553,866 common shares to individuals  other than executive
officers.

         On April 27, 2000, our  shareholders  adopted the Certicom  Corp.  2000
United States Stock Plan (the "2000 Plan") and the Certicom Corp. Employee Stock
Purchase Plan (the "Stock Purchase Plan").  Under the 2000 Plan,  options may be
granted to our directors,  officers,  employees and  consultants  who are United
States residents on the date of the grant.  Unless  otherwise  determined by the
plan  administrator,  options issued under the 2000 Plan become exercisable at a
rate of one quarter of the total amount  granted on the first  anniversary  of a
grant and a further  2.0833% each month after the initial  one-year  period.  An
option may have a term up to 10 years. No more than 2,000,000  common shares may
be issued  under the 1997 Plan.  Under the terms of the 2000  Plan,  we are also
permitted to grant stock purchase  rights.  As of April 30, 2000,  there were no
options outstanding under the 2000 Plan.

         The Stock Purchase Plan permits  eligible  employees who participate in
the plan to acquire  our common  shares at the lesser of 85% of the fair  market
value of the common shares on the first business day of each offering  period or
85% of the fair market value of the common  shares on the last business day of a
purchase  period.  An offering period is a 12-month period that begins on July 1
and  January 1 of each year.  Each  offering  period  consists  of two  purchase
periods which end on the following  June 30 and December 31. The first  offering
period  under the Stock  Purchase  Plan began on July 1, 2000.  Up to  1,000,000
common shares may be issued under the Stock Purchase Plan.


                                     - 43 -

<PAGE>

Shareholder Rights Plan

         Our directors and shareholders have approved a shareholder rights plan.
The terms of the  shareholder  rights plan are such that a take-over bid must be
made for all of our common  shares and must be open for 60 days after the bid is
made.  If at least 50% of the common shares held by persons  independent  of the
bidder are  deposited or tendered  pursuant to the bid, and not  withdrawn,  the
bidder may take up and pay for such shares.  The bid must then remain open for a
further period of 10 clear business days on the same terms.

         In the event a  take-over  bid is made that  does not  adhere  with the
above terms,  the rights  attaching to each common share will  separate from the
common  shares and become  exercisable  eight trading days after the earlier of:
(a) a  person  having  acquired  20% or more of the  common  shares,  or (b) the
commencement  or  announcement  in respect of a take-over  bid to acquire 20% or
more of the common shares. After separation,  rights will be evidenced by rights
certificates  which  are  transferable  and will be traded  separately  from the
common shares.

         The rights,  when exercisable,  permit the holder to purchase,  for the
exercise  price of the rights,  common  shares having a value (based on the then
prevailing  market  price) equal to twice such  exercise  price (i.e.,  at a 50%
discount).  The  exercise  price of the  rights  will be equal to five times the
prevailing market price at the time the rights separated from the common shares.
Rights that are beneficially  owned by the person making the take-over bid which
does not adhere to the above terms shall become null and void.

         The  term of the  shareholder  rights  plan is ten  years,  subject  to
reconfirmation   by   shareholders   at  every  third  annual   meeting  of  our
shareholders.


                                     - 44 -

<PAGE>

Item 12.     SECURITY OWNERSHIP OF CERTAIN BENEFICIAL OWNERS AND MANAGEMENT

         The  following  table  sets forth  certain  information  regarding  the
beneficial  ownership  of  our  common  shares  as of  April  30,  2000.  To our
knowledge,  no person  beneficially  owns 5% or more of our common  shares.  The
information is provided with respect to:

         o        each of our directors;

         o        each of our Named Executive Officers; and

         o        all of our  directors,  Named  Executive  Officers  and  other
                  executive officer as a group (14 persons).
<TABLE>
         Except as otherwise  indicated  by  footnote,  and subject to community
property laws where applicable,  the named person has sole voting and investment
power with  respect to all of the shares of common  stock shown as  beneficially
owned. An asterisk indicates  beneficial ownership of less than 1% of the common
stock outstanding.  Percentage ownership is based on 23,087,866 shares of common
stock  outstanding  as of April 30,  2000.  Shares of common  stock  subject  to
options  exercisable  on or before  June 29,  2000  (within 60 days of April 30,
2000) are deemed to be outstanding  and to be  beneficially  owned by the person
holding such options for the purpose of computing  the  percentage  ownership of
such person but are not treated as outstanding  for the purpose of computing the
percentage ownership of any other person.
<CAPTION>
                                                              Number of     Percentage of Shares
          Name and Address of Beneficial Owner(1)               Shares       Beneficially Owned
          ---------------------------------------               ------       ------------------
<S>                                                             <C>                 <C>
Philip C. Deck (2)                                              582,872             2.50%
Scott A. Vanstone (3)                                           222,742               *
Richard P. Dalmazzi (4)                                         195,000               *
Louis E. Ryan (5)                                               116,058               *
Bernard W. Crotty (6)                                            80,582               *
William J. Stewart (7)                                           53,914               *
Richard M. Depew (8)                                             30,000               *
William T. Dodds (9)                                             16,104               *
Erling E. Rasmussen                                                  --               *
Richard D. Brounstein                                                --               *
Bruce A. MacInnis (10)                                           26,430               *
                                                                 ------
All directors, Named Executive
  Officers and other executive officer
  as a group (14 persons) (11)                                1,569,990             6.47%

<FN>
--------------------
(1)   The address of each of Messrs. Deck,  Vanstone,  MacInnis and Dodds is c/o
      Certicom Corp., 5520 Explorer Drive, Mississauga,  Ontario L4W 5L1 Canada.
      The address of each of Messrs.  Dalmazzi,  Ryan, Crotty,  Stewart,  Depew,
      Rasmussen  and  Brounstein  is  c/o  Certicom  Corp.,   25801   Industrial
      Boulevard, Hayward, CA 94545.
(2)   Includes options that are exercisable with respect to 220,650 shares on or
      before June 29, 2000.
(3)   Includes options that are exercisable with respect to 222,742 shares on or
      before June 29, 2000.
(4)   Includes options that are exercisable with respect to 195,000 shares on or
      before June 29, 2000.
(5)   Includes options that are exercisable with respect to 116,058 shares on or
      before June 29, 2000.
(6)   Includes  options that are exercisable with respect to 80,582 shares on or
      before June 29, 2000.
(7)   Includes  options that are exercisable with respect to 53,914 shares on or
      before June 29, 2000.
(8)   Includes  options that are exercisable with respect to 30,000 shares on or
      before June 29, 2000.
(9)   Includes  options that are exercisable with respect to 16,104 shares on or
      before June 29, 2000.
(10)  Includes  options that are exercisable with respect to 26,430 shares on or
      before June 29, 2000.
(11)  Includes  options that are exercisable with respect to 1,185,268 shares on
      or before June 29, 2000.
</FN>
</TABLE>

                                     - 45 -
<PAGE>

Item 13. CERTAIN RELATIONSHIPS AND RELATED TRANSACTIONS

         None.


                                     PART IV

Item 14. EXHIBITS, FINANCIAL STATEMENTS SCHEDULES, AND REPORTS ON FORM 8-K

1.   Consolidated Financial Statements
<TABLE>
         The following  consolidated  financial  statements are filed as part of
this report:
<CAPTION>

                                                                                          Page
                                                                                          ----
<S>                                                                                        <C>
         o        Consolidated Balance Sheets as at April 30, 1999 and 2000                F-3

         o        Consolidated Statements of  Operations  for  each of the years
                  ended April 30, 1998, 1999 and 2000                                      F-4

         o        Consolidated Statements of Shareholders' Equity for  the years
                  ended April 30, 1998, 1999 and 2000                                      F-5

         o        Consolidated Statements  of  Cash  Flows for  the  years ended
                  April 30, 1998, 1999 and 2000                                            F-6

         o        Notes to Consolidated Financial Statements                               F-7
</TABLE>
2.   Consolidated  Financial  Statement  Schedules

     Schedule  II--Valuation and Qualifying Accounts and Reserves

3.   Reports on Form 8-K

     None.

4.   Exhibits

                                Index to Exhibits

Exhibit Number                            Description
--------------                            -----------

3.1               Restated Articles of Continuance of the Company

3.2               By-laws of the Company

4.1               Specimen   Certificate   for  Common  Shares  of  the  Company
                  (incorporated  by  reference  to  the  Company's  Registration
                  Statement on Form 8-A, dated March 14, 2000)

10.1              Lease  Agreement,  dated  October 30, 1998, by and between The
                  Multi-Employer  Property Trust and Certicom  Corp., as amended
                  by First  Amendment  to Lease  Agreement,  dated  November 17,
                  1998,  as  further  amended  by  Second   Amendment  to  Lease
                  Agreement, dated April 1, 2000

10.2              Lease  Agreement,  dated  March 29,  1999,  by and between The
                  Airport Corporate Centre Office Park, Inc. and Certicom Corp.,
                  as amended by First Amendment to Lease Agreement,  dated April
                  25, 2000

10.3              Lease  Agreement,  dated  December  7,  1998,  by and  between
                  Alliance Reston,  L.P., d/b/a Alliance Business  Centers,  and
                  Certicom Corp., as amended by First  Amendment,  dated June 2,
                  1999, as further  amended by Second  Amendment,  dated May 18,
                  2000


                                     - 46 -

<PAGE>

10.4              Certicom Corp. Stock Option Plan (incorporated by reference to
                  the Company's  Registration Statement filed on Form S-8, dated
                  May 2, 2000)

10.5              1997 Employee Stock Purchase Plan  (incorporated  by reference
                  to the  Company's  Registration  Statement  filed on Form S-8,
                  dated May 2, 2000)

10.6              Certicom Corp. 2000 United States Stock Plan  (incorporated by
                  reference to the  Company's  Registration  Statement  filed on
                  Form S-8, dated May 17, 2000)

10.7              Certicom Corp. 2000 Employee Stock Purchase Plan (incorporated
                  by reference to the Company's  Registration Statement filed on
                  Form S-8, dated May 17, 2000)

10.8              Employment   Agreement,   dated  November  20,  1999,  between
                  Certicom Corp. and Richard P. Dalmazzi

10.9              Employment  Agreement,  dated May 1,  1999,  between  Certicom
                  Corp. and Dr. Scott A. Vanstone

10.10             Employment Agreement, dated February 7, 2000, between Certicom
                  Corp. and Richard D. Brounstein

21.1              List of Subsidiaries

22.1              Published  Report  Regarding  Matters  Submitted  to  Vote  of
                  Security Holders

23.1              Independent Auditors' Consent

24.1              Power of Attorney (included on page 48 of this Form 10-K)

27.1              Financial Data Schedule


                                     - 47 -

<PAGE>


SIGNATURES

         Pursuant to the  requirements  of Section 13 or 15(d) of the Securities
Exchange  Act of 1934,  the  Company has duly caused this report to be signed on
its behalf by the undersigned,  thereunto duly  authorized,  on this 31st day of
July, 2000.


                                                           Certicom Corp.

                                                  By:/s/ Richard P. Dalmazzi
                                                     ---------------------------
                                                         Richard P. Dalmazzi
                                                             President,
                                                       Chief Executive Officer


         Each person whose  signature  appears  below  constitutes  and appoints
Richard  P.  Dalmazzi  and  Richard  D.   Brounstein  as  his  true  and  lawful
attorneys-in-fact and agents, with full power of substitution for him in any and
all  capacities,  to  sign  any  and all  amendments  (including  post-effective
amendments) to this Form 10-K, and to file the same, with all exhibits  thereto,
and other  documents in connection  therewith,  with the Securities and Exchange
Commission,  granting  unto said  attorneys-in-fact  and agents,  full power and
authority to do and perform each and every act and thing requisite and necessary
to be done in connection  therewith,  as fully to all intents and purposes as he
might or could do in person.
<TABLE>
         Pursuant to the  requirements  of the Securities  Exchange Act of 1934,
this  report has been  signed  below by the  following  persons on behalf of the
Company and in the capacities and on the dates indicated.
<CAPTION>
                  Name                                          Title                          Date
                  ----                                          -----                          ----
<S>                                          <C>                                            <C>
/s/ Richard P. Dalmazzi                           President, Chief Executive Officer        July 31, 2000
--------------------------------------       and Director (Principal Executive Officer)
Richard P. Dalmazzi

/s/ Richard D. Brounstein                         Chief Financial Officer, Senior Vice      July 31, 2000
--------------------------------------       President, Finance and Secretary (Principal
Richard D. Brounstein                             Financial and Accounting Officer)

/s/ Scott A. Vanstone                                         Director                      July 31, 2000
--------------------------------------
Scott A. Vanstone

/s/ Philip C. Deck                                            Director                      July 31, 2000
--------------------------------------
Philip C. Deck

/s/ Bernard W. Crotty                                         Director                      July 31, 2000
--------------------------------------
Bernard W. Crotty

/s/ William T. Dodds                                          Director                      July 31, 2000
--------------------------------------
William T. Dodds

/s/ Erling E. Rasmussen                                       Director                      July 31, 2000
--------------------------------------
Erling E. Rasmussen

/s/ Louis E. Ryan                                             Director                      July 31, 2000
--------------------------------------
Louis E. Ryan

/s/ William J. Stewart                                        Director                      July 31, 2000
--------------------------------------
William J. Stewart

</TABLE>

                                                      - 48 -

<PAGE>


                         CERTICOM CORP. AND SUBSIDIARIES

         Consolidated Financial Statements as of April 30, 1999 and 2000
              and for the Years Ended April 30, 1998, 1999 and 2000
                        and Independent Auditors' Report


<PAGE>

<TABLE>
                                        CERTICOM CORP. AND SUBSIDIARIES

                                  Index to Consolidated Financial Statements
<CAPTION>
                                                                                                                 Page
<S>                                                                                                               <C>
Independent Auditors' Report.................................................................................     F-2
Consolidated Balance Sheets as of April 30, 1999 and 2000....................................................     F-3
Consolidated Statements of Operations for the Years Ended April 30, 1998, 1999 and 2000......................     F-4
Consolidated Statements of Shareholders' Equity for the Years Ended April 30, 1998, 1999 and 2000............     F-5
Consolidated Statements of Cash Flows for the Years Ended April 30, 1998, 1999 and 2000......................     F-6
Notes to Consolidated Financial Statements for the Years Ended April 30, 1998, 1999 and 2000.................     F-7
</TABLE>

                                                     F-1

<PAGE>

                          INDEPENDENT AUDITORS' REPORT

To the Board of Directors and Shareholders of Certicom Corp.

We have audited the accompanying  consolidated  balance sheets of Certicom Corp.
and its subsidiaries as at April 30, 2000 and 1999 and the related  consolidated
statements of  operations,  shareholders'  equity and cash flows for each of the
three years in the period  ended April 30,  2000.  Our audits also  included the
financial statement schedules listed in the index at item 14. These consolidated
financial statements and financial statement schedules are the responsibility of
the Company's  management.  Our responsibility is to express an opinion on these
financial statements and financial statement schedules based on our audits.

We conducted our audits in accordance with auditing standards generally accepted
in the  United  States of  America.  Those  standards  require  that we plan and
perform an audit to obtain reasonable assurance whether the financial statements
are free of material misstatement. An audit includes examining, on a test basis,
evidence supporting the amounts and disclosures in the financial statements.  An
audit also includes  assessing the accounting  principles  used and  significant
estimates  made by  management,  as well as  evaluating  the  overall  financial
statement  presentation.  We believe that our audits provide a reasonable  basis
for our opinion.

In our opinion,  such consolidated  financial  statements present fairly, in all
material respects, the financial position of Certicom Corp. and its subsidiaries
as at April 30,  2000 and 1999,  and the results of their  operations  and their
cash flows for each of the three  years in the period  ended  April 30,  2000 in
conformity with accounting principles generally accepted in the United States of
America.  Also,  in  our  opinion,  such  financial  statement  schedules,  when
considered in relation to the basic consolidated financial statements taken as a
whole,  present  fairly  in all  material  respects  the  information  set forth
therein.

Accounting  principles  generally accepted in Canada vary in certain significant
respects from accounting  principals  generally accepted in the United States of
America.  We expect to report  separately to the  shareholders of the Company on
financial  statements for the same period prepared in accordance with accounting
principals generally accepted in Canada.

/s/ DELOITTE & TOUCHE LLP
-------------------------
Chartered Accountants

Toronto, Canada
June 13, 2000


                                       F-2

<PAGE>

<TABLE>
                                            CERTICOM CORP. AND SUBSIDIARIES

                                              CONSOLIDATED BALANCE SHEETS
                                             (In thousands of U.S. dollars)
<CAPTION>

                                                                                                    April 30,
                                                                                            --------------------------
                                            ASSETS                                              1999         2000
                                                                                                ----         ----
<S>                                                                                           <C>           <C>

Current assets:
  Cash............................................................................            $ 1,400        $10,508
  Marketable securities, available for sale.......................................             12,678          2,550
  Accounts receivable (net of allowance for doubtful accounts of $13 and $161)....              1,452          3,862
  Unbilled receivables............................................................                624          2,115
  Inventories.....................................................................                396            218
  Prepaid expenses and deposits...................................................                641          1,740
                                                                                              -------        -------
           Total current assets...................................................             17,191         20,993

Property and equipment, net.......................................................              2,837          5,213

Patents...........................................................................                518            873

Acquired intangibles (net of accumulated amortization of $4,280 and $10,586)......             21,069         24,437
                                                                                              -------        -------

Total assets......................................................................            $41,615        $51,516
                                                                                              =======        =======
                             LIABILITIES AND SHAREHOLDERS' EQUITY

Current liabilities:
  Accounts payable................................................................            $   521        $   974
  Accrued liabilities.............................................................                986          2,107
  Income taxes payable............................................................                220            430
  Deferred revenue................................................................                402            909
  Note payable....................................................................                 -          10,000
                                                                                              -------        -------
           Total current liabilities..............................................              2,129         14,420

Lease inducements.................................................................                315          1,105
                                                                                              -------        -------
           Total liabilities......................................................              2,444         15,525
                                                                                              -------        -------
Commitments and contingencies (Note 11)

Shareholders' equity:
  Common stock, no par value; shares authorized: unlimited;
    shares issued and outstanding: 21,823,754 and 23,087,866......................             67,840         80,859
  Additional paid-in capital......................................................             10,266         11,922
  Accumulated other comprehensive loss............................................             (2,511)        (2,497)
  Deficit.........................................................................            (36,424)       (54,293)
                                                                                              -------        -------
           Total shareholders' equity.............................................             39,171         35,991
                                                                                              -------        -------
Total liabilities and shareholders' equity........................................            $41,615        $51,516
                                                                                              =======        =======
<FN>
                                        See notes to consolidated financial statements.
</FN>
</TABLE>
                                                            F-3

<PAGE>

<TABLE>
                                           CERTICOM CORP. AND SUBSIDIARIES

                                        CONSOLIDATED STATEMENTS OF OPERATIONS
                                (In thousands of U.S. dollars, except per share data)
<CAPTION>

                                                                                           Years Ended April 30,
                                                                                    -------------------------------------
                                                                                       1998          1999          2000
                                                                                       ----          ----          ----
<S>                                                                                 <C>           <C>           <C>
Revenues........................................................................    $  1,233      $  4,042      $ 12,040

Costs and expenses:
  Selling and marketing.........................................................       4,918         6,087         6,616
  Research and development......................................................       3,820         3,240         4,446
  Depreciation and amortization.................................................         561         5,063         7,861
  General and administrative....................................................       2,762         4,277         7,099
  Purchased in-process research and development.................................          -          1,151           535
  Systems integration...........................................................          -            587         2,080
  Cost of hardware sold.........................................................         349           125           579
                                                                                    --------      --------      --------
           Total costs and expenses.............................................      12,410        20,530        29,216
                                                                                    --------      --------      --------

Operating loss..................................................................     (11,177)      (16,488)      (17,176)
Interest income (expense), net..................................................         965         1,015          (359)
                                                                                    --------      --------      --------

Loss before income taxes........................................................     (10,212)      (15,473)      (17,535)
Income taxes....................................................................         167           (92)          334
                                                                                    --------      --------      --------
Net loss........................................................................     (10,379)      (15,381)      (17,869)

Other comprehensive income (loss):
  Unrealized gain (loss) on marketable securities, available for sale...........          16           (18)           14
  Foreign currency translation adjustment.......................................      (1,118)       (1,052)           -
                                                                                    --------      --------      --------
Comprehensive loss..............................................................    $(11,481)     $(16,451)     $(17,855)
                                                                                    ========      ========      ========
Basic and diluted net loss per common share (1).................................    $  (0.57)     $  (0.73)     $  (0.80)
                                                                                    ========      ========      ========
Shares used in computing basic and diluted net loss per share (1)...............      18,317        21,033        22,255
                                                                                    ========      ========      ========
<FN>
(1) Share and per share  amounts  have been  retroactively  adjusted  to reflect the  two-for-one  stock split which was
    effective July 12, 2000

                                     See notes to consolidated financial statements.
</FN>
</TABLE>


                                                          F-4

<PAGE>

<TABLE>
                                                 CERTICOM CORP. AND SUBSIDIARIES

                                         CONSOLIDATED STATEMENTS OF SHAREHOLDERS' EQUITY
                                            Years Ended April 30, 1998, 1999 and 2000
                                      (In thousands of U.S. dollars, except number of shares)
<CAPTION>
                                                                                                           Accumulated      Total
                                                         Common Stock           Additional                     Other        Share-
                                                     ----------------------      Paid-in                   Comprehensive   holders'
                                                      Shares        Amount       Capital       Deficit         Loss         Equity
                                                      ------        ------       -------       -------         ----         ------
<S>                                                  <C>           <C>          <C>          <C>           <C>            <C>
Balances, May 1, 1997..............................  15,992,038    $ 23,103     $    344     $ (10,664)    $   (339)      $12,444
Net loss...........................................        -           -            -          (10,379)         -         (10,379)
Exercise of employee options.......................     773,834       1,168         -             -             -           1,168
Exercise of underwriter options....................      97,600         104         -             -             -             104
Private placements.................................   1,000,000       6,289        3,464          -             -           9,753
Issue of common shares on exercise of
  special warrants.................................   1,500,000      20,551          163          -             -          20,714
Stock compensation.................................        -           -             333          -             -             333
Net unrealized gain on marketable securities,
  available for sale...............................        -           -            -             -              16            16
Foreign currency translation adjustment............        -           -            -             -          (1,118)       (1,118)
                                                     ----------    --------     --------     ---------     --------       -------
Balances, April 30, 1998...........................  19,363,472      51,215        4,304       (21,043)      (1,441)       33,035
Net loss...........................................        -           -            -          (15,381)         -         (15,381)
Acquisitions.......................................   2,325,966      16,091        5,919          -             -          22,010
Exercise of employee options.......................     134,316         534         (268)         -             -             266
Stock compensation.................................        -           -             311          -             -             311
Net unrealized loss on marketable securities,
  available for sale...............................        -           -            -             -             (18)          (18)
Foreign currency translation adjustment............        -           -            -             -          (1,052)       (1,052)
                                                     ----------    --------     --------     ---------     --------       -------
Balances, April 30, 1999...........................  21,823,754      67,840       10,266       (36,424)      (2,511)       39,171
Net loss...........................................        -           -            -          (17,869)         -         (17,869)
Acquisitions.......................................     201,120       7,306        3,080          -             -          10,386
Exercise of employee options.......................   1,062,992       5,713       (1,742)         -             -           3,971
Stock compensation.................................        -           -             318          -             -             318
Net unrealized gain on marketable securities,
  available for sale...............................        -           -            -             -              14            14
                                                     ----------    --------     --------     ---------     --------       -------
Balances, April 30, 2000...........................  23,087,866    $ 80,859     $ 11,922     $ (54,293)    $ (2,497)      $35,991
                                                     ==========    ========     ========     =========     ========       =======
<FN>
                                         See notes to consolidated financial statements.
</FN>
</TABLE>


                                                               F-5

<PAGE>

<TABLE>
                                           CERTICOM CORP. AND SUBSIDIARIES

                                        CONSOLIDATED STATEMENTS OF CASH FLOWS
                                            (In thousands of U.S. dollars)
<CAPTION>
                                                                                      Years Ended April 30,
                                                                             ----------------------------------------
                                                                                1998           1999          2000
                                                                                ----           ----          ----
<S>                                                                           <C>           <C>           <C>
Cash flows from operating activities:
  Net loss................................................................... $(10,379)     $(15,381)     $(17,869)
  Adjustments to reconcile net loss to net cash used in
    operating activities:
    Depreciation and amortization............................................      561           959         1,555
    Amortization of acquired intangibles.....................................     -            4,104         6,306
    Write-off of purchased in-process research and development...............     -            1,151           535
    Stock compensation.......................................................      333           311           318
    Changes in assets and liabilities:
      Accounts receivable and unbilled receivables...........................     (294)       (1,461)       (3,901)
      Inventories............................................................      102          (174)          178
      Investment tax credits receivable......................................        7           266          -
      Prepaid expenses and deposits..........................................     (522)           41        (1,102)
      Accounts payable.......................................................      (19)           32           453
      Accrued liabilities....................................................      205           513         1,084
      Income taxes payable...................................................      143            77           210
      Deferred revenue.......................................................        7           277           507
                                                                              --------      --------      --------
           Net cash used in operating activities.............................   (9,586)       (9,285)      (11,726)
                                                                              --------      --------      --------
Cash flows from investing activities:
  Business acquisitions (net of cash acquired)...............................     -           (4,443)          182
  Purchase of property and equipment.........................................   (1,605)       (1,722)       (3,902)
  Patents....................................................................     (190)         (217)         (355)
  Purchase of marketable securities, available for sale...................... (117,017)      (91,445)       (4,855)
  Sales and maturities of marketable securities, available for sale..........   87,170       107,554        14,983
                                                                              --------      --------      --------
           Net cash (used in) provided by investing activities...............  (31,642)        9,727         6,053
                                                                              --------      --------      --------
Cash flows from financing activities:
  Issuance of common shares..................................................   31,739           266         3,971
  Note payable...............................................................     -             -           10,000
  Repurchase of debenture payable............................................      (23)          (22)         -
  Redemption of mandatorily redeemable preferred shares......................     (219)         (209)         -
  Lease inducements..........................................................     -              315           931
                                                                              --------      --------      --------
           Net cash provided by financing activities.........................   31,497           350        14,902
                                                                              --------      --------      --------
Effect of exchange rates on cash.............................................     (757)          (20)         (121)
                                                                              --------      --------      --------
(Decrease) increase in cash and equivalents..................................  (10,758)          772         9,108
Cash and equivalents, beginning of year......................................   11,386           628         1,400
                                                                              --------      --------      --------
Cash and equivalents, end of year............................................ $    628      $  1,400      $ 10,508
                                                                              ========      ========      ========
Supplemental disclosure of cash flow information -
  Cash paid for income taxes................................................. $   -         $    117      $   -
                                                                              ========      ========      ========
Noncash investing and financing activities -
  Issue of common shares and options on business acquisitions................ $   -         $ 22,010      $ 10,386
                                                                              ========      ========      ========

<FN>
                                  See notes to consolidated financial statements.
</FN>
</TABLE>


                                                       F-6

<PAGE>

                         CERTICOM CORP. AND SUBSIDIARIES

                   NOTES TO CONSOLIDATED FINANCIAL STATEMENTS
                    Years Ended April 30, 1998, 1999 and 2000

1.    Description of Business and Significant Accounting Policies

      Description of Business

      Certicom  Corp.  and its  wholly-owned  subsidiaries  (the  "Company") are
      suppliers  of  digital  information  security  products  and  services  to
      original  equipment   manufacturers   (OEMs)  of  information   technology
      products.  The  Company's  products  and  services  include  cryptographic
      technology  and security  protocol  licensing,  cryptographic  consulting,
      information  security  architecture  and design,  and the sale of security
      hardware products such as smart cards and PC cards.

      Significant Accounting Policies

      Generally Accepted  Accounting  Principles - These consolidated  financial
      statements  have been prepared in accordance  with  accounting  principles
      generally  accepted in the United States of America  ("generally  accepted
      accounting principles").

      Principles of  Consolidation  - These  consolidated  financial  statements
      include the accounts of Certicom Corp. and its wholly-owned  subsidiaries.
      All  significant   inter-company   transactions  and  balances  have  been
      eliminated.

      Accounting   Estimates  -  The  preparation  of  financial  statements  in
      conformity  with  generally  accepted   accounting   principles   requires
      management  to make  estimates  and  assumptions  that affect the reported
      amount of assets and liabilities  and disclosure of contingent  assets and
      liabilities  at the  date of the  financial  statements  and the  reported
      amounts of revenues  and  expenses  during the  reporting  period.  Actual
      results could differ from those estimates.

      Cash Equivalents - For the purposes of the consolidated statements of cash
      flows,  cash  equivalents  are defined as highly liquid  investments  with
      maturities of three months or less.

      Marketable  Securities - The Company  follows the  provisions  of SFAS No.
      115, Accounting for Certain Investments in Debt and Equity Securities. The
      Statement  requires the Company to record  securities which management has
      classified  as  available  for sale at fair  market  value  and to  record
      unrealized gains and losses on securities available for sale as a separate
      component of shareholders' equity until realized.

      As the Company's  management  expects to sell a portion of the  marketable
      securities  in the next fiscal  year in order to meet its working  capital
      requirements, it has classified them as current assets.

      Inventories  are recorded at the lower of cost,  on a first-in,  first-out
      basis, and net realizable value.

      Property and Equipment is recorded at cost.  Depreciation and amortization
      is  provided  for over the  estimated  useful  lives of the  assets at the
      following annual rates:

      Furniture and fixtures        -   Straight-line over five years
      Computer equipment            -   Straight-line over three years
      Software                      -   Straight-line over two years
      Lab equipment                 -   Straight-line over three years
      Leasehold improvements        -   Straight-line over the term of the lease


                                       F-7

<PAGE>

                         CERTICOM CORP. AND SUBSIDIARIES

                   NOTES TO CONSOLIDATED FINANCIAL STATEMENTS
              Years Ended April 30, 1998, 1999 and 2000 (Continued)

      Lease  Inducements are amortized to income on a  straight-line  basis over
      the term of the lease.

      Patents  are  recorded  at cost and are  amortized  over three  years on a
      straight-line basis.

      Acquired Intangibles represent customer lists,  trademarks,  workforce, in
      process  research  and  development,  purchased  technology  and  goodwill
      arising  on  business   acquisitions   and  are  being   amortized   on  a
      straight-line  basis over periods ranging from three to five years, except
      purchased  in-process  research and development without alternative future
      use which is expensed when acquired.

      Long-Lived  Assets - The Company  follows the  provisions of SFAS No. 121,
      Accounting  for the  Impairment  of Long-Lived  Assets and for  Long-Lived
      Assets To Be Disposed Of. SFAS No. 121 prescribes the accounting treatment
      for long-lived  assets,  identifiable  intangibles and goodwill related to
      those assets when there are  indications  that the carrying value of those
      assets may not be recoverable.

      Revenue Recognition and Deferred Revenues - The Company recognizes revenue
      in accordance with applicable accounting  regulations,  including American
      Institute of Certified Public  Accountants  (AICPA)  Statement of Position
      (SOP) 97-2, Software Revenue Recognition, as amended.

      Revenue  from sales of products  is  recognized  when a contract  has been
      executed,  the  product  has been  shipped,  the sales  price is fixed and
      determinable, and collection of the resulting receivable is probable.

      Revenue earned on software arrangements involving multiple elements (i.e.,
      software products, upgrades/enhancements,  post contract customer support,
      installation,  training etc.) is allocated to each element based on vendor
      specific  objective  evidence of relative fair value of the elements.  The
      revenue allocated to post contract support is recognized  ratably over the
      term of the support and revenue  allocated  to service  elements  (such as
      training and  installation)  is recognized as the services are  performed.
      When arrangements  contain multiple elements and vendor specific objective
      evidence  exists for all  undelivered  elements,  the  Company  recognizes
      revenue  for  the  delivered  elements  using  the  residual  method.  For
      arrangements   containing   multiple   elements  wherein  vendor  specific
      objective  evidence does not exist for all undelivered  elements,  revenue
      for the  delivered  and  undelivered  elements  is deferred  until  vendor
      specific objective evidence exists or all elements have been delivered.

      Research and Product  Development - The Company  expenses all research and
      development  costs as they are incurred.  Scientific  research tax credits
      are  recognized at the time the related costs are incurred and recovery is
      reasonably assured.

      Stock-Based  Compensation  - The  Company  follows the  provisions  of APB
      Opinion No. 25, which requires  compensation cost for stock-based employee
      compensation  plans to be measured  based on any  difference  on the grant
      date  between  the  quoted  market  price of the stock  and the  amount an
      employee must pay to acquire the stock.

      Foreign  Currency  Translation - For the period up to April 30, 1999,  the
      functional  currency  of the  Company was the  Canadian  dollar.  As such,
      assets and liabilities of the Company were  translated to U.S.  dollars at
      the year-end  exchange rates.  Income and expense items were translated at
      the average rate of exchange  prevailing  during the year.  The adjustment
      resulting  from  translating  the  financial  statements is reflected as a
      component of comprehensive earnings.


                                      F-8

<PAGE>

                         CERTICOM CORP. AND SUBSIDIARIES

                   NOTES TO CONSOLIDATED FINANCIAL STATEMENTS
              Years Ended April 30, 1998, 1999 and 2000 (Continued)

      For the period  from May 1, 1999,  the  Company  has  determined  that its
      functional  currency  is the U.S.  dollar as it derives a majority  of its
      revenues  and incurs a  significant  portion of its  expenditures  in U.S.
      dollars.  As  such,   monetary  assets  and  liabilities   denominated  in
      currencies  other than the U.S. dollar are translated into U.S. dollars at
      the rate of  exchange  prevailing  at year end while other  balance  sheet
      items are  translated  at historic  rates.  Revenue and expense  items are
      translated  at the rate of  exchange  in effect on the  transaction  dates
      except for depreciation and amortization  which are translated at historic
      rates.  Realized as well as unrealized  foreign  exchange gains and losses
      are included in income in the year in which they occur.

      Income  Taxes - The  Company  follows  the  provisions  of SFAS  No.  109,
      Accounting  for  Income  Taxes,  which  requires  an asset  and  liability
      approach to financial accounting for income taxes.

      Basic and Diluted Net Loss per Share - The Company  follows the provisions
      of SFAS No. 128,  Earnings  Per Share.  Basic net loss per common share is
      based on the weighted  average  number of shares  outstanding  during each
      period.  Stock options are not included in the computation of the weighted
      average  number of shares  outstanding  for  dilutive  net loss per common
      share during the period as the effect would be antidilutive.

      Fair Value of  Financial  Instruments  - The  carrying  value of financial
      assets  and  liabilities   approximate  their  carrying  value,  based  on
      management's estimates.

      Concentration  of Credit Risk -  Financial  instruments  that  potentially
      subject the  Company to  concentrations  of credit  risk  consist of cash,
      marketable  securities and accounts receivable.  Risk associated with cash
      are  mitigated  by  banking  and  creditworthy  institutions.   Marketable
      securities  consists primarily of bonds and commercial paper.  Credit risk
      with respect to the trade receivables is spread over diverse customers who
      make up the  Company's  customer  base.  At April 30,  2000,  one customer
      accounted for 17% of total accounts receivable (1999 - nil).

      Certain Significant Risks and Uncertainties - The Company  participates in
      a dynamic high-technology industry and believes that changes in any of the
      following  areas  could have a material  adverse  effect on the  Company's
      future financial position,  results of operations or cash flows:  advances
      and  trends  in  new  technologies  and  industry  standards;  competitive
      pressures in the form of new products and services or price  reductions on
      current products and services;  changes in the overall demand for products
      and services  offered by the Company;  market  acceptance of the Company's
      products and services;  development of sales channels;  changes in certain
      strategic relationships or customers  relationships;  litigation or claims
      against the  Company  based on  intellectual  property,  patent,  product,
      regulatory  or other  factors;  and the  Company's  ability to attract and
      retain necessary employees to support its growth.

      Recent Accounting  Pronouncements - In June 1998, the Financial Accounting
      Standards  Board (FASB)  issued SFAS No. 133,  Accounting  for  Derivative
      Instruments  and Hedging  Activities  ("SFAS 133").  SFAS 133  establishes
      accounting and reporting standards for derivative  instruments,  including
      certain derivative instruments embedded in other contracts and for hedging
      activities.  SFAS 133 requires that an entity recognize all derivatives as
      either assets or  liabilities  in the statement of financial  position and
      measure those  instruments at fair value. The impact of adopting SFAS 133,
      which is effective for all fiscal  quarters of the  Company's  fiscal year
      beginning May 1, 2001, has not been determined.


                                      F-9

<PAGE>

                         CERTICOM CORP. AND SUBSIDIARIES

                   NOTES TO CONSOLIDATED FINANCIAL STATEMENTS
              Years Ended April 30, 1998, 1999 and 2000 (Continued)

      In March 2000, the Securities and Exchange  Commission  (SEC) issued Staff
      Accounting Bulletin No. 101A, Amendment:  Revenue Recognition in Financial
      Statements.  SAB 101A amends Staff Accounting  Bulletin No. 101 (SAB 101),
      Revenue Recognition in Financial  Statements,  to defer the implementation
      date of SAB 101 for  registrants  with  fiscal  years that  begin  between
      December  16, 1999 and March 15, 2000.  SAB 101  provides  guidance on the
      recognition,   presentation   and   disclosure  of  revenue  in  financial
      statements of all public  registrants.  Changes in the  Company's  revenue
      recognition  policy resulting from the  interpretation of SAB 101 would be
      reported as a change in  accounting  principle.  The change in the revenue
      recognition policy could result in a cumulative  adjustment in the quarter
      the Company  adopts SAB 101.  Although the Company has not fully  assessed
      the  implications of SAB 101,  management does not believe the adoption of
      this   statement   will  have  a  significant   impact  on  the  Company's
      consolidated financial position, results of operations or cash flows.

      In March  2000,  the FASB issued  Interpretation  No. 44,  Accounting  for
      Certain  Transactions  involving Stock Compensation,  an interpretation of
      APB  Opinion  No.  25,   which,   among  other   things,   would   require
      variable-award accounting for repriced options from the date the option is
      repriced until the date of exercise. This interpretation is effective July
      1, 2000,  but certain  conclusions in this  Interpretation  cover specific
      events that occur after either  December 15, 1998, or January 12, 2000. On
      March 17, 1999, the Company  repriced  certain options to purchase 765,828
      shares of common  stock.  Beginning  July 1, 2000,  these  options will be
      subject to variable award accounting under the Interpretation.

      Reclassifications - Certain  reclassifications  have been made in the 1998
      and  1999  financial  statement   presentation  to  conform  to  the  2000
      presentation.  These  reclassifications  had  no  effect  on net  loss  or
      stockholders' equity.

2.    Acquisitions

      During  the years  ended  April  30,  2000 and 1999 the  Company  made the
      acquisitions  described in the paragraphs  that follow,  each of which has
      been accounted for as a purchase.  The consolidated  financial  statements
      include  the  operating   results  of  each  business  from  the  date  of
      acquisition.

      The  amounts   allocated  to  purchased   research  and  development  were
      determined  through  generally  accepted  valuation  techniques  and  were
      expensed upon acquisition because  technological  feasibility had not been
      established and no future alternative use existed.


                                      F-10

<PAGE>

                         CERTICOM CORP. AND SUBSIDIARIES

                   NOTES TO CONSOLIDATED FINANCIAL STATEMENTS
              Years Ended April 30, 1998, 1999 and 2000 (Continued)

      Acquisition of Consensus Development Corporation
<TABLE>
      On July 29, 1998,  Certicom acquired all of the outstanding  common shares
      of  Consensus  Development  Company,  a  corporation  based  in  Berkeley,
      California.  Consensus  licenses  SSL  Plus,  a  developer's  toolkit  for
      integrating  security for the Secure Socket Layer (SSL) security protocol.
      Details  of the  consideration  and the  fair  values  of the  net  assets
      acquired are as follows (U.S. dollars in thousands):
<CAPTION>
<S>                                                                               <C>
Net assets acquired:
  Noncash working capital (net of cash of $19)..................................  $   (114)
  Property and equipment........................................................       178
  Noncurrent liabilities........................................................       (18)
  Purchased in-process research and development charged to operations...........     1,151
  Purchased technology..........................................................     4,925
  Other acquired intangibles....................................................     1,116
  Goodwill......................................................................    17,299
                                                                                  --------
Total net assets acquired.......................................................  $ 24,537
                                                                                  ========
Consideration:
  Cash..........................................................................  $  3,032
  Common shares (1,894,622 shares issued).......................................    14,770
  Options to acquire 799,818 common shares......................................     5,919
  Acquisition costs.............................................................       816
                                                                                  --------
Total consideration.............................................................  $ 24,537
                                                                                  ========
</TABLE>

      The valuations of purchased  in-process  research and  development,  other
      acquired  intangibles and purchased technology were based upon independent
      appraisals  received  from  third  parties.   Based  upon  the  valuation,
      management  estimates  that  $1,151,000  of  the  purchase   consideration
      represents  purchased  in-process  technology  that  had not  yet  reached
      technological  feasibility and had no future alternative use. Accordingly,
      this amount was immediately expensed upon consummation of the acquisition.

      The  purchased  in-process  research and  development  was  determined  by
      identifying  the  on-going  research  projects  for  which   technological
      feasibility  had not been achieved and assessing the  anticipated  date of
      completion  of the  research  and  development  effort.  The  value of the
      in-process research and development was determined by estimating the costs
      to develop the  in-process  research  and  development  into  commercially
      feasible  products,  and  estimating  the net present  value of cash flows
      expected  to  result  from  the  product.  The  state  of  completion  was
      determined by  estimating  the costs and time incurred to date relative to
      those costs and time to be incurred  to develop the  purchased  in-process
      research and development into commercially viable products.  The resulting
      net cash  flows  only from the  percentage  of  research  and  development
      efforts  complete at the date of  acquisition  were used to determine  the
      value of the  in-process  research  and  development.  The  discount  rate
      included a factor that took into account the  uncertainty  surrounding the
      successful   development   of  the  purchased   in-process   research  and
      development projects.

      Other acquired intangibles include the fair value of trademarks,  customer
      base and workforce.


                                      F-11

<PAGE>

                         CERTICOM CORP. AND SUBSIDIARIES

                   NOTES TO CONSOLIDATED FINANCIAL STATEMENTS
              Years Ended April 30, 1998, 1999 and 2000 (Continued)

      The value  assigned to purchased  technology was determined by discounting
      the  expected  future cash flows of the existing  developed  technologies,
      taking into account the  characteristics  and applications of the product,
      the size of existing markets,  growth rates of existing and future markets
      as well as an evaluation of past and anticipated product-life cycles.

      Acquisition of Uptronics, Inc.

      On November 24, 1998,  Certicom  acquired  all of the  outstanding  common
      shares of Uptronics,  Inc., a corporation based in Sunnyvale,  California.
      Uptronics,  Inc.  provides  cryptographic  consulting and security systems
      integration  services to OEMs.  Details of the  consideration and the fair
      values  of the  net  assets  acquired  are as  follows  (U.S.  dollars  in
      thousands):

Net assets acquired:
  Noncash working capital (net of cash of $32).......................... $   64
  Property and equipment................................................     28
  Other acquired intangibles............................................    556
  Goodwill..............................................................  1,318
                                                                         ------
Total net assets acquired............................................... $1,966
                                                                         ======

Consideration:
  Cash.................................................................. $  476
  Common shares (431,344 shares issued).................................  1,321
  Acquisition costs.....................................................    169
                                                                         ------
Total consideration..................................................... $1,966
                                                                         ======

      Acquired  intangibles  include the fair value of  workforce  and  customer
base.


                                      F-12

<PAGE>

                         CERTICOM CORP. AND SUBSIDIARIES

                   NOTES TO CONSOLIDATED FINANCIAL STATEMENTS
              Years Ended April 30, 1998, 1999 and 2000 (Continued)

      Acquisition of Trustpoint

      On January 26,  2000,  Certicom  acquired  all of the  outstanding  common
      shares of Trustpoint,  a corporation  based in Mountain View,  California.
      Trustpoint is a provider of comprehensive, flexible, cross-platform public
      key   infrastructure   (PKI)  products  that  allow   Original   Equipment
      Manufacturers   (OEMs)  to  develop  applications  with  built-in  digital
      certificate services.  Details of the consideration and the fair values of
      the net assets acquired are as follows (U.S. dollars in thousands):

Net assets acquired
  Noncash working capital (net of cash of $302)........................   $ (34)
  Property and equipment...............................................      29
  Purchased in-process research and development charged to operations..     535
  Other acquired intangibles...........................................     343
  Goodwill.............................................................   9,633
                                                                        -------
Total net assets acquired.............................................. $10,506
                                                                        =======
Consideration:
  Common shares (201,120 shares issued)................................ $ 7,306
  Options to acquire 98,884 common shares..............................   3,080
  Acquisition costs....................................................     120
                                                                        -------
Total consideration.................................................... $10,506
                                                                        =======

      The valuations of purchased  in-process  research and  development,  other
      acquired  intangibles and purchased  technology were based upon appraisals
      received  from  third  parties.  Based  upon  the  valuation,   management
      estimates that $535,000 of the purchase consideration represents purchased
      in-process technology that had not yet reached  technological  feasibility
      and  had  no  future  alternative  use.   Accordingly,   this  amount  was
      immediately  expensed upon consummation of the acquisition.  The purchased
      in-process  research and  development  was determined by  identifying  the
      ongoing research projects for which technological feasibility had not been
      achieved and assessing the anticipated  date of completion of the research
      and  development   effort.  The  value  of  the  in-process  research  and
      development  was  determined  by  estimating  the  costs  to  develop  the
      in-process  research and development into commercially  feasible products,
      and estimating the net present value of cash flows expected to result from
      the product.  The state of completion  was  determined  by estimating  the
      costs and time  incurred  to date  relative  to those costs and time to be
      incurred to develop the purchased in-process research and development into
      commercially  viable products.  The resulting net cash flows only from the
      percentage  of research and  development  efforts  complete at the date of
      acquisition  were used to determine the value of the  in-process  research
      and  development.  The  discount  rate  included  a factor  that took into
      account the  uncertainty  surrounding  the  successful  development of the
      purchased in-process research and development projects.

      Acquired  intangibles include the fair value of workforce,  customer base,
      and trademarks.

      Unaudited Pro Forma Financial Information

      The  following  table   represents   unaudited   consolidated   pro  forma
      information  as if  the  acquisitions  of  Consensus  and  Trustpoint  had
      occurred at the beginning of the years immediately  preceding the years in
      which they were acquired. The pro forma data is presented for illustrative
      purposes only and is not necessarily indicative of the combined results of
      operations  of future  periods or the  results  that  actually


                                      F-13

<PAGE>

                         CERTICOM CORP. AND SUBSIDIARIES

                   NOTES TO CONSOLIDATED FINANCIAL STATEMENTS
              Years Ended April 30, 1998, 1999 and 2000 (Continued)

      would have  occurred  had the  acquisitions  been in effect for the entire
      specified  periods.  The pro forma combined results include the effects of
      the purchase price allocation on amortization of acquired  intangibles (in
      thousands of U.S. dollars, except per share data).

                                                          Years Ended April 30,
                                                          ----------------------
                                                              1999        2000
                                                              ----        ----
Pro forma revenue .......................................  $  4,932    $ 12,764
Pro forma net loss ......................................  $(19,663)   $(19,456)
Pro forma net loss per share - basic and diluted ........  $  (0.89)   $  (0.87)
Number of shares used in calculation - basic and diluted.    22,034      22,404

      Unaudited  pro  forma  consolidated  results  after  giving  effect to the
      acquisition of Uptronics,  Inc. would not have been  materially  different
      from the reported amount for either year.

3.    Marketable Securities, Available for Sale

      The following  table  summarizes  the  Company's  investment in marketable
      securities (in thousands of U.S. dollars):

                                                  April 30, 1999
                                 -----------------------------------------------
                                                Gross      Gross
                                 Carrying     Unrealized  Unrealized      Fair
                                  Value         Gains      Losses        Value
                                  -----         -----      ------        -----
Bonds.........................   $12,561        $ 32        $  -        $12,593
Other.........................       119           -          34             85
                                 -------        ----        ----        -------
                                 $12,680        $ 32        $ 34        $12,678
                                 =======        ====        ====        =======


                                                       April 30, 2000
                                           -------------------------------------
                                                            Gross
                                            Carrying      Unrealized      Fair
                                             Value          Gains         Value
                                             -----          -----         -----
Bonds .............................         $1,394         $    4         $1,398
Commercial paper ..................          1,131              8          1,139
Other .............................             13            -               13
                                            ------         ------         ------
                                            $2,538         $   12         $2,550
                                            ======         ======         ======


                                      F-14

<PAGE>

                         CERTICOM CORP. AND SUBSIDIARIES

                   NOTES TO CONSOLIDATED FINANCIAL STATEMENTS
              Years Ended April 30, 1998, 1999 and 2000 (Continued)

4.    Property and Equipment

      Property   and    equipment   consist   of   the   following (U.S. dollars
      in thousands):

                                                                 April 30,
                                                          ----------------------
                                                             1999          2000
                                                             ----          ----

Furniture and fixtures .............................      $   767       $   724
Computer equipment .................................        2,087         2,717
Software ...........................................          325         1,649
Lab equipment ......................................           24            24
Leasehold improvements .............................        1,549         3,532
                                                          -------       -------
Total cost .........................................        4,752         8,646
Accumulated depreciation and amortization ..........       (1,915)       (3,433)
                                                          -------       -------
                                                          $ 2,837       $ 5,213
                                                          =======       =======

5.    Note Payable

      On April 27, 2000,  the Company  entered into an agreement  with Sand Hill
      Capital II, LP ("Sand Hill") for a line of credit of  $15,000,000  bearing
      interest at 12%. At year end, the Company had borrowed $10,000,000 against
      this line.  In  connection  with the  financing,  the Company  also issued
      30,000 share purchase  warrants which entitle Sand Hill to purchase 30,000
      common  shares of the Company for  Cdn$38.13  until  April 27,  2005.  The
      amount  borrowed was repaid in May, 2000, and the line of credit  facility
      was terminated.

6.    Common Shares

      Authorized capital

      As of April 30, 2000, the Company's  authorized  share capital consists of
      an:

        Unlimited number of common shares, no par value
        Unlimited number of preference shares

      In August  1999,  the articles of the Company were amended and restated to
      (i) remove and cancel the authorized and unissued  Preferred Shares,  (ii)
      create an unlimited number of Preference  Shares,  issuable in series, and
      (iii)  authorize the directors of the Company from time to time before the
      issue thereof to fix the number of shares and  determine the  designation,
      rights, privileges, restrictions and conditions attaching to the shares of
      each series of Preference Shares.

      Stock Split

      On July 12, 2000,  the Company  effected a two-for-one  stock split of the
      outstanding  shares of common  stock.  All share and per share  amounts in
      these consolidated  financial statements have been adjusted to give effect
      to the stock split.


                                      F-15

<PAGE>

                         CERTICOM CORP. AND SUBSIDIARIES

                   NOTES TO CONSOLIDATED FINANCIAL STATEMENTS
              Years Ended April 30, 1998, 1999 and 2000 (Continued)

7.    Stock Incentive Plans

      Employee Stock Option Plans

      The Company's 1997 Stock Option Plan (the "New Plan") is administered by a
      committee of the Board and was adopted on June 17, 1997.  The total number
      of common shares  reserved for issuance  under the New Plan may not exceed
      6,000,000.  Subject to the discretion of the Board or an option committee,
      options granted under the New Plan have a term of 5 years from the date of
      grant and vest as to 25% of the common  shares  subject to such option one
      year after the date of the grant of the option,  and a further  2.0833% of
      the common  shares  subject to such option  each month after such  initial
      one-year  period.  Options  may  become  immediately  exercisable  in  the
      discretion  of  the  Board  in  the  event  of  a  takeover  bid,  merger,
      amalgamation  or  other  reorganization  and  may  also be  exercised  for
      specified periods following the termination or death of the option holder.
      Options also become  immediately  exercisable in the event that any person
      acquires ninety percent of the common shares. No option may be exercisable
      for more than ten years after its grant. The exercise price for options is
      determined  on the basis of the closing  price of the common shares on The
      Toronto Stock Exchange on the trading date immediately  preceding the date
      of the grant of the option.

      The Company's  original plan (its "original  plan") is  administered  by a
      committee  (the  "Committee")  of the Board of  Directors.  Subject to the
      discretion  of the  Committee,  options have a term of five years and vest
      for the  purpose of exercise  as to 33% during  each  twelve-month  period
      following the first  anniversary from the date of the grant of the option.
      Options  become  immediately  exercisable  in the  event  that any  person
      acquires ninety percent of the common shares and may be also exercised for
      specified  periods  following the termination of employment or death of an
      option holder.  No option may be exercisable more than ten years after its
      grant.  The exercise price for options was determined at the discretion of
      the Committee.  In connection with the listing of its common shares on The
      Toronto  Stock  Exchange on June 17,  1997,  the Company  agreed with such
      stock  exchange  that it would  not grant any  further  options  under the
      original plan.

      On April 27, 2000, the Company's  shareholders approved a new stock option
      plan (the  "U.S.  Plan") for  employees  who are  residents  of the United
      States.  The total number of common shares reserved for issuance under the
      U.S. Plan may not exceed 2,000,000. Subject to the discretion of the Board
      or an option committee, options granted under the U.S. Plan have a term of
      five years from the date of grant and vest as to 25% of the common  shares
      subject to such option one year after the date of the grant of the option,
      and a further  2.0833% of the common  shares  subject to such  option each
      month after such initial one-year period.  Options may become  immediately
      exercisable  at the  discretion  of the Board in the event of a  take-over
      bid,  merger,  amalgamation  or  other  reorganization  and  may  also  be
      exercised for specified  periods following the termination or death of the
      option holder.  No option may be exercisable  for more than 10 years after
      its grant.  The exercise  price for options is  determined on the basis of
      the closing  price of the common shares on the NASDAQ  National  Market on
      the  trading  date  immediately  preceding  the  date of the  grant of the
      option.


                                      F-16

<PAGE>

                         CERTICOM CORP. AND SUBSIDIARIES

                   NOTES TO CONSOLIDATED FINANCIAL STATEMENTS
              Years Ended April 30, 1998, 1999 and 2000 (Continued)

<TABLE>
      The following table summarizes information about stock options outstanding
      at April 30, 2000:
<CAPTION>
                                     Options Outstanding
                        --------------------------------------------         Options Vested
                                            Weighted                  -----------------------------
        Range                               Average        Weighted                        Weighted
         of                                Remaining       Average                         Average
      Exercise              Number        Contractual      Exercise      Number           Exercise
       Prices            Outstanding      Life (Years)      Price      Exercisable          Price
       ------            -----------      ------------      -----      -----------          -----
<S>                       <C>               <C>           <C>          <C>                <C>
$ 1.86 - $ 3.38             850,172         3.44          $ 3.00         305,508          $ 2.88
$ 3.39 - $ 5.07           2,142,180         2.96            4.70         608,750            4.56
$ 5.08 - $ 6.76             593,682         3.12            5.64         300,718            5.53
$ 6.77 - $33.78             814,400         4.69           17.36             -               -
$33.79 - $78.03             754,866         4.80           44.51           5,000           34.16
                          ---------                       ------       ---------          ------
                          5,155,300         3.60          $12.36       1,219,976          $ 4.50
                          =========                       ======       =========          ======
</TABLE>
<TABLE>
      Changes for the  employee  stock option plans during the years ended April
      30, 2000, 1999 and 1998 were as follows:
<CAPTION>
                                                                       Years Ended April 30,
                                                  -----------------------------------------------------------------
                                                          1998                  1999                 2000
                                                  --------------------- ---------------------- --------------------
                                                             Weighted                 Weighted              Weighted
                                                    Number    Average       Number    Average     Number    Average
                                                     of      Exercise         of      Exercise      of      Exercise
                                                    Shares     Price        Shares     Price      Shares     Price
                                                    ------     -----        ------     ------     ------     -----
<S>                                               <C>          <C>        <C>          <C>       <C>         <C>
Options outstanding, beginning of year .......    2,637,030    $ 6.30     3,512,562    $ 7.11    3,603,198   $ 4.46

Options granted ..............................    1,899,880     11.24     1,681,300      3.89    2,783,866    19.37
Options exercised ............................     (774,034)    (1.49)      (96,678)    (2.56)    (850,000)   (4.48)
Options canceled .............................     (250,314)    (9.34)     (770,660)    (7.48)    (381,764)   (5.31)
Options canceled for reissuance ..............          -          -     (2,843,584)    (9.74)         -         -
Options reissued .............................          -          -      2,120,258      5.06          -         -
                                                  ---------    ------    ----------    ------   ----------   ------
Options outstanding, end of year .............    3,512,562    $ 7.11     3,603,198    $ 4.46    5,155,300   $12.36
                                                  =========    ======    ==========    ======   ==========   ======
Options exercisable, end of year .............      526,222    $ 7.39       376,618    $ 4.26    1,219,976   $ 4.50
                                                  =========    ======    ==========    ======   ==========   ======
Weighted average fair value of options granted
  during the year ............................    $    5.40              $     1.91             $    19.71
                                                  =========              ==========             ===========
</TABLE>
      Accounting for Stock-Based Compensation

      As a result of the Company  applying APB No. 25, SFAS No. 123,  Accounting
      for   Stock-Based   Compensation,   requires   disclosure   of  pro  forma
      compensation  expense arising from the Company's stock  compensation plans
      based on the fair value of the options  granted.  The pro forma expense is
      measured as the fair value of the award at the date it is granted using an
      option-pricing  model that  takes  into  account  the  exercise  price and
      expected term of the option,  the current price of the  underlying  stock,
      its expected volatility,  expected dividends on the stock and the expected
      risk-free  rate of return  during the  expected  term of the  option.  The
      compensation  cost is  recognized  over the  service  period,  usually the
      period from the grant date to the vesting date.


                                      F-17

<PAGE>

                         CERTICOM CORP. AND SUBSIDIARIES

                   NOTES TO CONSOLIDATED FINANCIAL STATEMENTS
              Years Ended April 30, 1998, 1999 and 2000 (Continued)
<TABLE>
      Had the compensation  cost for the Company's plan been determined based on
      the fair value at the dates of award  under the plan  consistent  with the
      method of SFAS No. 123, the  Company's  net loss and basic and diluted net
      loss per common share would have been  increased to the pro forma  amounts
      indicated below (in thousands of U.S. dollars, except per share amounts):
<CAPTION>
                                                                     Years Ended April 30,
                                                           ----------------------------------------
                                                              1998           1999            2000
                                                              ----           ----            ----
<S>                                                        <C>             <C>            <C>
Net loss:
  As reported..........................................    $(10,379)       $(15,381)      $(17,869)
  Pro forma............................................    $(15,112)       $(22,395)      $(27,913)
Basic and diluted net loss per common share:
  As reported..........................................    $  (0.57)       $  (0.73)      $  (0.80)
  Pro forma............................................    $  (0.83)       $  (1.07)      $  (1.25)
</TABLE>
      As SFAS No. 123 has not been  applied to options  granted  prior to May 1,
      1995, the resulting pro forma  compensation cost may not be representative
      of that to be expected in future years.
<TABLE>
      The fair value of the options at the date of grant was estimated using the
      Black-Scholes model with the following weighted average assumptions:
<CAPTION>
                                                                     Years Ended April 30,
                                                           ----------------------------------------
                                                              1998           1999            2000
                                                              ----           ----            ----
<S>                                                          <C>            <C>             <C>
Expected life (years)..................................          4              4               4
Risk free interest rate................................       4.99%          5.08%           6.02%
Expected volatility....................................      60.00%         60.00%          91.00%
Dividend yield.........................................          -              -               -
</TABLE>
      During the year ended April 30, 1997  certain  option  grants were made at
      prices  significantly  below the market price.  The excess of market price
      over the exercise price is being  amortized over the vesting period of the
      related options.

      Conversion of Stock Options

      As described in Note 2, the Company assumed certain options in conjunction
      with the  acquisition of Consensus and converted  these to 799,818 options
      of the Company at a weighted  average  exercise  price of $0.42 per share.
      During the years ended April 30, 2000 and 1999, 204,072 and 49,788 of such
      options were exercised.  The amounts relating to options  exercised during
      the year  were  transferred  from  additional  paid-in  capital  to common
      shares.

      Stock Option Repricing

      On March 17,  1999,  the  Board of  Directors  approved  the  exchange  of
      1,106,240  options to  acquire  common  shares  for  options to acquire an
      aggregate of 382,914  common shares having a lower exercise price of $5.44
      per share equal to the quoted  market  price of the  shares.  All of these
      options  were held by  directors  and/or  senior  officers of the Company.
      Beginning  July 1, 2000,  these options will be subject to  variable-award
      accounting  under FASB  Interpretation  No.  44,  Accounting  for  Certain
      Transactions  Involving  Stock  Compensation,  an  Interpretation  of  APB
      Opinion No. 25.


                                      F-18

<PAGE>

                         CERTICOM CORP. AND SUBSIDIARIES

                   NOTES TO CONSOLIDATED FINANCIAL STATEMENTS
              Years Ended April 30, 1998, 1999 and 2000 (Continued)

      On August 17,  1998,  the Board of  Directors  approved  the  exchange  of
      1,737,344  options to acquire common shares for the same number of options
      having a lower  exercise  price of $4.98  per  share  equal to the  quoted
      market  price of the shares.  All of these  options were held by employees
      (excluding directors and/or senior officers of the Company).

8.    Income Taxes
<TABLE>
      The tax effect of significant temporary differences  representing deferred
      tax assets is as follows (in thousands of U.S. dollars):
<CAPTION>
                                                                     Years Ended April 30,
                                                         ------------------------------------------
                                                              1998           1999            2000
                                                              ----           ----            ----
<S>                                                        <C>            <C>            <C>
Deferred tax assets:
  Operating loss carryforwards.........................    $ 7,650        $ 11,729       $ 14,442
  Research and development tax credit carryforwards....        450             647            638
  Research expenditures deducted for accounting but
    capitalized for tax................................         22             423            579
  Provincial superallowance............................        227             270            266
  Fixed assets.........................................       (160)            182            653
  Lease inducement.....................................          -               -            164
  Other................................................        226            166             279
                                                           -------        --------       --------
Net deferred tax assets................................      8,415          13,417         17,021
Valuation allowance....................................     (8,415)        (13,417)       (17,021)
                                                           -------        --------       --------
                                                           $     -        $      -       $      -
                                                           =======        ========       ========
</TABLE>
      The Company has  determined  that  realization is not more likely than not
      and  therefore  a  valuation  allowance  has been  recorded  against  this
      deferred income tax asset.
<TABLE>
      A reconciliation  between the Company's  statutory and effective tax rates
      is as follows:
<CAPTION>
                                                                     Years Ended April 30,
                                                         ------------------------------------------
                                                              1998           1999            2000
                                                              ----           ----            ----
<S>                                                           <C>            <C>             <C>
Statutory rate.........................................       44.6%          44.6%           44.6%
Permanent differences..................................       (0.4)          (0.2)           (0.5)
Net operating loss carryforwards.......................      (44.2)         (44.4)          (44.1)
Foreign taxes..........................................        1.6            0.7             1.9
Scientific research investment tax credit..............          -           (1.3)              -
                                                           -------        --------       --------
Effective tax rate.....................................        1.6%          (0.6)%           1.9%
                                                           =======        ========       ========
</TABLE>
      The Company has certain  non-capital  losses of $32,366,000 and investment
      tax credits of $623,000 available in Canada,  which can be applied against
      future taxable income and future taxes  payable,  respectively,  and which
      expire from 2001 to 2009.

      In addition,  at April 30, 2000,  the Company had an unclaimed  scientific
      and  research and  experimental  development  expenditure  pool balance of
      approximately  $1,566,000  which can be  applied  against  future  taxable
      income.


                                      F-19

<PAGE>

                         CERTICOM CORP. AND SUBSIDIARIES

                   NOTES TO CONSOLIDATED FINANCIAL STATEMENTS
              Years Ended April 30, 1998, 1999 and 2000 (Continued)

9.    Segmented Information

      The  Company  operates  in one  reportable  segment  and  is a  developer,
      manufacturer  and  vendor  of  digital   information   security  products,
      technologies  and  services  within the  industry  segment  of  electronic
      commerce.
<TABLE>
      Information  about the Companies'  revenues is as follows (in thousands of
      U.S. dollars):
<CAPTION>
                                                                     Years Ended April 30,
                                                         ----------------------------------------
                                                              1998           1999          2000
                                                              ----           ----          ----
<S>                                                         <C>            <C>           <C>
Software license revenue...............................     $  536         $2,665        $ 9,259
Consulting revenue.....................................         71            971          1,988
Hardware revenue.......................................        626            406            793
                                                            ------         ------        -------
                                                            $1,233         $4,042        $12,040
                                                            ======         ======        =======

      Information about the Company's  geographic  operations is given below (in
      thousands of U.S. dollars):

                                                                     Years Ended April 30,
                                                         ----------------------------------------
                                                              1998           1999          2000
                                                              ----           ----          ----
Sales:
  United States........................................     $  562         $3,072        $10,971
  Canada...............................................        623            588            494
  Europe and other.....................................         48            382            575
                                                            ------         ------        -------
                                                            $1,233         $4,042        $12,040
                                                            ======         ======        =======


                                                                           Years Ended April 30,
                                                                            1999          2000
                                                                            ----          ----
Total long-lived assets:
  United States.......................................................     $22,761       $27,222
  Canada..............................................................       1,663         3,301
                                                                           -------       -------
                                                                           $24,424       $30,523
                                                                           =======       =======
</TABLE>

                                               F-20

<PAGE>

                         CERTICOM CORP. AND SUBSIDIARIES

                   NOTES TO CONSOLIDATED FINANCIAL STATEMENTS
              Years Ended April 30, 1998, 1999 and 2000 (Continued)

11.   Commitments and Contingencies

      At April 30, 2000 the Company has operating leases for office and research
      premises and  furniture and equipment  with the following  minimum  annual
      rental payments (in thousands of U.S. dollars):

  Years Ending
    April 30,
    ---------

      2001..........................................................     $ 2,124
      2002..........................................................       2,417
      2003..........................................................       2,330
      2004..........................................................       2,370
      2005..........................................................       2,390
Thereafter..........................................................       5,316
                                                                         -------
                                                                         $16,947
                                                                         =======

      Rental  expense  under  operating  leases  amounted  to  $208,000 in 1998,
      $438,000 in 1999 and $1,520,000 in 2000.

      The  Company  has an  outstanding  letter of  guarantee  of  approximately
      $1,028,000 in respect of a lease for its office premises.

12.   Subsequent Event

      On May 3, 2000,  the  Company  completed a public  offering  of  2,500,000
      common  shares in the United States of America and Canada for net proceeds
      of $51,500,000.

                                     * * * * *


                                      F-21
<PAGE>

<TABLE>
         Schedule II--Valuation and Qualifying Accounts and Reserves
<CAPTION>
         For the years ended April 30, 1998, 1999 and 2000 (U.S. dollars in thousands)


--------------------------------- ------------------ ------------------- ----------------- ---------------
                                  Balance at         Additions Charged
                                  beginning of       to Costs and        Deductions        Balance at
Descriptions                      period             Expenses            write-offs (1)    end of period
--------------------------------- ------------------ ------------------- ----------------- ---------------
<S>                                              <C>                <C>                <C>            <C>
Year end 4/30, 1998                               7                   7                --              14
--------------------------------- ------------------ ------------------- ----------------- ---------------
Year end 4/30, 1999                              14                  41                42              13
--------------------------------- ------------------ ------------------- ----------------- ---------------
Year end 4/30, 2000                              14                 147                --             161
--------------------------------- ------------------ ------------------- ----------------- ---------------
<FN>
(1) Uncollectible accounts written off, net of recoveries
</FN>
</TABLE>




© 2022 IncJournal is not affiliated with or endorsed by the U.S. Securities and Exchange Commission