XML 275 R36.htm IDEA: XBRL DOCUMENT v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Jun. 30, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Our enterprise risk management framework considers cybersecurity risk in conjunction with our other Company risks as part of the overall risk assessment process. Our enterprise risk management team collaborates with the cybersecurity function, led by the Chief Information Security Officer (“CISO”), to gather their insights and risk mitigation strategies for managing cybersecurity threats. This integrated approach helps us assess, identify, and manage cybersecurity risks along with our other operational, financial and strategic risks, assisting in more effectively managing interdependencies among risks and enhancing risk mitigation strategies.

We have implemented a cybersecurity program including processes, technologies, and controls to assess, identify, and manage material risks from cybersecurity threats. This program includes implementing new technologies to proactively identify and monitor new vulnerabilities and reduce risk, conducting due diligence of third-party vendors’ information security programs, maintaining security policies and standards and regularly updating and testing our response planning and protocols. We maintain a formal information security training program for employees that includes training on matters such as phishing and email security best practices. Employees are also required to complete mandatory training on data privacy. We also have a third-party cybersecurity risk review process, including requiring key third-party service providers to complete initial and periodic security assessments, which prioritizes, monitors and assesses the risks associated with our third-party service provider interactions.

To evaluate and enhance our cybersecurity program, we periodically utilize third-party experts to undertake maturity assessments of the program.

We have also adopted a cybersecurity incident response plan that is designed to effectively identify, analyze, contain, remediate and eradicate, escalate, report, and appropriately document cybersecurity incidents. The plan also includes a materiality assessment framework that sets forth procedures and escalation protocols to support our assessment of whether a cybersecurity incident is material and subject to SEC reporting requirements. Such escalation protocols include the involvement of the CISO and other senior leaders across various functions, including finance, legal, privacy and global communications, as appropriate. We also maintain insurance coverage that, subject to its terms and conditions, is intended to address costs associated with certain aspects of cybersecurity incidents.
We have experienced cybersecurity incidents of varying degrees on our information technology; however, we have not identified any risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, that have materially affected or are reasonably likely to materially affect our business strategy, results of operation or financial condition. However, we cannot eliminate all risks and the compromise or interruption of, or damage to, our information technology (including our operational technology and websites) by cybersecurity incidents could have a material negative impact on our business. For a more detailed discussion of the risks, see Risks related to Technology and Cybersecurity Matters within Item 1A. Risk Factors.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
Our enterprise risk management framework considers cybersecurity risk in conjunction with our other Company risks as part of the overall risk assessment process. Our enterprise risk management team collaborates with the cybersecurity function, led by the Chief Information Security Officer (“CISO”), to gather their insights and risk mitigation strategies for managing cybersecurity threats. This integrated approach helps us assess, identify, and manage cybersecurity risks along with our other operational, financial and strategic risks, assisting in more effectively managing interdependencies among risks and enhancing risk mitigation strategies.
We have implemented a cybersecurity program including processes, technologies, and controls to assess, identify, and manage material risks from cybersecurity threats. This program includes implementing new technologies to proactively identify and monitor new vulnerabilities and reduce risk, conducting due diligence of third-party vendors’ information security programs, maintaining security policies and standards and regularly updating and testing our response planning and protocols. We maintain a formal information security training program for employees that includes training on matters such as phishing and email security best practices. Employees are also required to complete mandatory training on data privacy.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
The Audit Committee of the Board of Directors oversees our information security program, which includes oversight of the cybersecurity program and management of cybersecurity risks. The Audit Committee receives at least semi-annual updates from the CISO, which typically address our cybersecurity strategy, initiatives, key security metrics, business response plans and the evolving cyber threat landscape and a detailed threat assessment relating to information technology risks.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block]
The Audit Committee of the Board of Directors oversees our information security program, which includes oversight of the cybersecurity program and management of cybersecurity risks. The Audit Committee receives at least semi-annual updates from the CISO, which typically address our cybersecurity strategy, initiatives, key security metrics, business response plans and the evolving cyber threat landscape and a detailed threat assessment relating to information technology risks.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
The Audit Committee of the Board of Directors oversees our information security program, which includes oversight of the cybersecurity program and management of cybersecurity risks. The Audit Committee receives at least semi-annual updates from the CISO, which typically address our cybersecurity strategy, initiatives, key security metrics, business response plans and the evolving cyber threat landscape and a detailed threat assessment relating to information technology risks.
At the management level, our cybersecurity program is led by the CISO, who is responsible for assessing and managing material risks from cybersecurity threats, including the prevention, mitigation, detection, and remediation of cybersecurity incidents. The CISO is informed about cybersecurity threats and incidents in accordance with the cybersecurity incident response plan as discussed above. The CISO, who reports to the Chief Technology, Data and Analytics Officer, regularly provides updates to the Chair of the Audit Committee and Chief Financial Officer. We also have protocols by which certain cybersecurity incidents are reported promptly to the Chair of the Audit Committee and Chief Financial Officer, as appropriate. The Company’s CISO has served in various cybersecurity roles for over 20 years, leading a variety of cybersecurity and risk capabilities and also holds multiple cybersecurity certifications such as Certified Information Systems Security Professional, Certified Information Systems Auditor, and Certified in Risk and Information Systems Control.
Cybersecurity Risk Role of Management [Text Block]
The Audit Committee of the Board of Directors oversees our information security program, which includes oversight of the cybersecurity program and management of cybersecurity risks. The Audit Committee receives at least semi-annual updates from the CISO, which typically address our cybersecurity strategy, initiatives, key security metrics, business response plans and the evolving cyber threat landscape and a detailed threat assessment relating to information technology risks.
At the management level, our cybersecurity program is led by the CISO, who is responsible for assessing and managing material risks from cybersecurity threats, including the prevention, mitigation, detection, and remediation of cybersecurity incidents. The CISO is informed about cybersecurity threats and incidents in accordance with the cybersecurity incident response plan as discussed above. The CISO, who reports to the Chief Technology, Data and Analytics Officer, regularly provides updates to the Chair of the Audit Committee and Chief Financial Officer. We also have protocols by which certain cybersecurity incidents are reported promptly to the Chair of the Audit Committee and Chief Financial Officer, as appropriate. The Company’s CISO has served in various cybersecurity roles for over 20 years, leading a variety of cybersecurity and risk capabilities and also holds multiple cybersecurity certifications such as Certified Information Systems Security Professional, Certified Information Systems Auditor, and Certified in Risk and Information Systems Control.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] The Audit Committee receives at least semi-annual updates from the CISO, which typically address our cybersecurity strategy, initiatives, key security metrics, business response plans and the evolving cyber threat landscape and a detailed threat assessment relating to information technology risks.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] The Company’s CISO has served in various cybersecurity roles for over 20 years, leading a variety of cybersecurity and risk capabilities and also holds multiple cybersecurity certifications such as Certified Information Systems Security Professional, Certified Information Systems Auditor, and Certified in Risk and Information Systems Control.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]
The Audit Committee of the Board of Directors oversees our information security program, which includes oversight of the cybersecurity program and management of cybersecurity risks. The Audit Committee receives at least semi-annual updates from the CISO, which typically address our cybersecurity strategy, initiatives, key security metrics, business response plans and the evolving cyber threat landscape and a detailed threat assessment relating to information technology risks.
At the management level, our cybersecurity program is led by the CISO, who is responsible for assessing and managing material risks from cybersecurity threats, including the prevention, mitigation, detection, and remediation of cybersecurity incidents. The CISO is informed about cybersecurity threats and incidents in accordance with the cybersecurity incident response plan as discussed above. The CISO, who reports to the Chief Technology, Data and Analytics Officer, regularly provides updates to the Chair of the Audit Committee and Chief Financial Officer. We also have protocols by which certain cybersecurity incidents are reported promptly to the Chair of the Audit Committee and Chief Financial Officer, as appropriate.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true