XML 49 R31.htm IDEA: XBRL DOCUMENT v3.25.3
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Aug. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Management is responsible for cybersecurity risk management, which is part of our enterprise risk management and business continuity processes. We regularly evaluate our cybersecurity risk profile as well as the status and activities of our cybersecurity program, which aligns to the industry-recognized Center for Internet Security or CIS framework. We employ a defense-in-depth strategy which involves multiple layers of security controls to help prevent and detect possible risks and employ measures to protect our systems from business disruption. Our cybersecurity program includes tools and activities to prevent, detect, and analyze current and emerging cybersecurity threats, as well as plans and strategies to address threats and incidents. We also engage with third-party service providers, who possess expertise in information technology and cybersecurity, to aid in the design, implementation, and management of our cybersecurity infrastructure and protocols.
As part of our continuing education, employees are required to participate in cybersecurity awareness training at the commencement of their employment and annually thereafter. We reinforce this training with monthly internal phishing tests and cybersecurity newsletters to educate our employees on the latest cybersecurity threats and the most effective preventative measures.
As of the date of this Annual Report, we have not identified any cybersecurity threats that have had, or are likely to have, a material impact on our operations, including our business strategy, financial results, or financial condition. For more information on the risks associated with cybersecurity, refer to the “Risk Factors” section contained in Item 1A of this Form 10-K.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Management is responsible for cybersecurity risk management, which is part of our enterprise risk management and business continuity processes. We regularly evaluate our cybersecurity risk profile as well as the status and activities of our cybersecurity program, which aligns to the industry-recognized Center for Internet Security or CIS framework.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
The Audit Committee oversees our cybersecurity risk and mitigation strategies. This committee is regularly briefed by management on the status and effectiveness of our cybersecurity initiatives, including policies and actions taken to monitor, identify, evaluate, mitigate, and report significant risks. The Audit Committee has specific training in overseeing cybersecurity risks, including a member who has earned Carnegie Mellon’s CERT (Certificate in Cyber-Risk Oversight) and another with a certificate earned over cybersecurity risk. In addition, the Audit Committee receives periodic briefings from external experts in the area and regularly reports its oversight activities to the full board.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee oversees our cybersecurity risk and mitigation strategies. This committee is regularly briefed by management on the status and effectiveness of our cybersecurity initiatives, including policies and actions taken to monitor, identify, evaluate, mitigate, and report significant risks.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] This committee is regularly briefed by management on the status and effectiveness of our cybersecurity initiatives, including policies and actions taken to monitor, identify, evaluate, mitigate, and report significant risks. The Audit Committee has specific training in overseeing cybersecurity risks, including a member who has earned Carnegie Mellon’s CERT (Certificate in Cyber-Risk Oversight) and another with a certificate earned over cybersecurity risk. In addition, the Audit Committee receives periodic briefings from external experts in the area and regularly reports its oversight activities to the full board.
Cybersecurity Risk Role of Management [Text Block]
Management is responsible for implementing our cybersecurity program. Our Chief Financial Officer works with our Vice President of Global Information & Technology (“IT”) and regional IT members to lead our enterprise-wide information security program and manage our Cybersecurity Incident Response Plan. With over 30 years of experience in technology and information systems leadership our Vice President, Global IT oversees a highly experienced professional team within its global network. These teams work closely with internal stakeholders to develop, implement, and maintain a comprehensive security strategy that protects our enterprise and supports our business objectives. They also coordinate incident response efforts and proactively address emerging security threats. The recommendations of the management team are consulted when updating our information security policies, procedures, and standards.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Management is responsible for implementing our cybersecurity program. Our Chief Financial Officer works with our Vice President of Global Information & Technology (“IT”) and regional IT members to lead our enterprise-wide information security program and manage our Cybersecurity Incident Response Plan.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] With over 30 years of experience in technology and information systems leadership our Vice President, Global IT oversees a highly experienced professional team within its global network.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] These teams work closely with internal stakeholders to develop, implement, and maintain a comprehensive security strategy that protects our enterprise and supports our business objectives. They also coordinate incident response efforts and proactively address emerging security threats. The recommendations of the management team are consulted when updating our information security policies, procedures, and standards.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true