XML 44 R22.htm IDEA: XBRL DOCUMENT v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

The Company recognizes the importance of maintaining the trust and confidence of our employees, counterparties and customers.  Our management is actively involved in oversight of our risk management efforts including cybersecurity.  Our policies, standards, and procedures for identifying and managing material risks from cybersecurity threats are integrated into our overall risk management system.  

RISK MANAGEMENT AND STRATEGY

The Company stores and transmits data including sensitive and nonpublic data regarding our company, employees, counterparties and customers, among others. It is critical that we do so in a secure manner to maintain the confidentiality and integrity of such confidential information. We have established physical, electronic, and organizational measures to safeguard and secure our systems to prevent a data compromise, and rely on commercially available systems, software, tools, and monitoring to provide security for our information technology systems and the processing, transmission and storage of digital information. Like many companies, we are the subject of attempts by unauthorized actors to disrupt our operations, access our data, or otherwise cause damage to our technology infrastructure, including through the use of phishing, malware and other attack vectors.

The risk of a security breach or disruption, particularly through cyber-attacks or cyber-intrusion, including by computer hackers, foreign governments, and cyber-terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased. In addition, the prevalent use of mobile devices that access confidential information increases the risk of data security breaches, which could lead to the loss of confidential information or other intellectual property. The costs to us to mitigate network security problems, bugs, viruses, worms, malicious software programs and security vulnerabilities could be significant, and while we have implemented security measures to protect our data security and information technology systems, our efforts to address these problems may not be successful, and these problems could result in unexpected interruptions, delays, cessation of service and other harm to our business and our competitive position. If such an event were to occur and cause interruptions in our operations, it could result in a material disruption of our product development programs.

In addition, we are subject to cybersecurity risk in connection with vendors we utilize.  For example, a weakness in vendor systems or software products that we use in the operation of our business may provide a mechanism for a cyber threat actor to access the Company’s systems or information through trusted paths.  Recent global supply chain security incidents such as compromises of reputable software update services are illustrative of this type of occurrence. To date, Westwater has not been materially affected by cybersecurity incidents.

In light of the nature of the data at risk and the cyber-related threats faced by the Company, the Company employs an agency-wide cybersecurity detection, protection and prevention program for the protection of the Company’s operations and assets. This program includes cybersecurity protocols and controls, network protection, system monitoring and detection processes, a vendor risk management process, and regular cybersecurity and privacy training for employees.  However, cybersecurity is an evolving landscape, and we are constantly learning from our own experiences as well as the

experiences of others, and there can be no assurance that our processes and procedures will be successful in preventing all cybersecurity incidents.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Our management is actively involved in oversight of our risk management efforts including cybersecurity.  Our policies, standards, and procedures for identifying and managing material risks from cybersecurity threats are integrated into our overall risk management system.The Company stores and transmits data including sensitive and nonpublic data regarding our company, employees, counterparties and customers, among others. It is critical that we do so in a secure manner to maintain the confidentiality and integrity of such confidential information. We have established physical, electronic, and organizational measures to safeguard and secure our systems to prevent a data compromise, and rely on commercially available systems, software, tools, and monitoring to provide security for our information technology systems and the processing, transmission and storage of digital information. Like many companies, we are the subject of attempts by unauthorized actors to disrupt our operations, access our data, or otherwise cause damage to our technology infrastructure, including through the use of phishing, malware and other attack vectors.The risk of a security breach or disruption, particularly through cyber-attacks or cyber-intrusion, including by computer hackers, foreign governments, and cyber-terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased. In addition, the prevalent use of mobile devices that access confidential information increases the risk of data security breaches, which could lead to the loss of confidential information or other intellectual property. The costs to us to mitigate network security problems, bugs, viruses, worms, malicious software programs and security vulnerabilities could be significant, and while we have implemented security measures to protect our data security and information technology systems, our efforts to address these problems may not be successful, and these problems could result in unexpected interruptions, delays, cessation of service and other harm to our business and our competitive position. If such an event were to occur and cause interruptions in our operations, it could result in a material disruption of our product development programs.In light of the nature of the data at risk and the cyber-related threats faced by the Company, the Company employs an agency-wide cybersecurity detection, protection and prevention program for the protection of the Company’s operations and assets. This program includes cybersecurity protocols and controls, network protection, system monitoring and detection processes, a vendor risk management process, and regular cybersecurity and privacy training for employees.  However, cybersecurity is an evolving landscape, and we are constantly learning from our own experiences as well as the experiences of others, and there can be no assurance that our processes and procedures will be successful in preventing all cybersecurity incidents.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] The Company’s Board of Directors is responsible for the oversight of risks related to cybersecurity threats.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Board of Directors
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Management communicates with the Board of Directors on a regular basis regarding cybersecurity efforts through risk reporting and the development and testing of procedures and exercises for responding to both internal and external cyber threats.
Cybersecurity Risk Role of Management [Text Block] The Company’s Information Technology department, which is headed by the Company’s Information Technology Manager, who maintains a current CompTIA Security+ Continuing Education (CE) Certification and has over 20 years of experience in information securityThe Information Technology department is responsible for the Company’s information technology program, including addressing cybersecurity risks, and utilizes specialized vendors to enhance the program.The Information Technology department assesses the effectiveness of its cybersecurity efforts through ongoing monitoring.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Company’s Information Technology Manager
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] The Company’s Information Technology department, which is headed by the Company’s Information Technology Manager, who maintains a current CompTIA Security+ Continuing Education (CE) Certification and has over 20 years of experience in information security.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true