XML 22 R10.htm IDEA: XBRL DOCUMENT v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Jun. 30, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Item 1C. Cybersecurity

 

Risk Management and Strategy


We have implemented a comprehensive technology and cybersecurity program as part of our overall risk management strategy. This program is designed to ensure our information systems are resilient, effective, and capable of defending against emerging risks and cybersecurity threats.

 

Our program emphasizes defense, rapid detection, and swift remediation of cybersecurity threats and incidents. It includes robust cybersecurity policies and a crisis response and management plan to facilitate prompt management, response, and communication of cybersecurity threats and incidents.

 

Our cybersecurity crisis management plan outlines the procedures and actions to be taken in the event of a cybersecurity incident, including detection, response, mitigation, and remediation. Upon identifying a potential threat or incident, our cybersecurity incident response team assigns a risk level classification and initiates the necessary escalation and other steps as per our plan. Incidents assessed as potentially high-risk are promptly escalated to our Chief Executive Officer (CEO), who determines the activation of relevant elements of our crisis response and management plan. The CEO informs our Board of Directors about cybersecurity incidents as appropriate, considering factors such as financial, operational, legal, or reputational impact.

 

To date, we have not identified any risks from known cybersecurity threats, including prior incidents, that have materially affected or are reasonably likely to materially affect our operations, business strategy, results of operations, or financial condition.
 

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] We have implemented a comprehensive technology and cybersecurity program as part of our overall risk management strategy.
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] To date, we have not identified any risks from known cybersecurity threats, including prior incidents, that have materially affected or are reasonably likely to materially affect our operations, business strategy, results of operations, or financial condition.
Cybersecurity Risk Board of Directors Oversight [Text Block]

Risk Governance


The full Board of Directors holds overall responsibility for overseeing the identification and mitigation of cybersecurity risks. This responsibility has not been delegated to any single committee, as the Board’s structure and size allow for comprehensive oversight. Periodically, management provides updates to the Board regarding our internal control program, including significant changes to our IT infrastructure and cybersecurity program. Management also directly communicates any material risks from cybersecurity threats to the Board.

 

Our Director of Information Technology leads our cybersecurity program and reports directly to our CEO. Our director is supported by a Senior Systems Administrator, and together they bring over 65 years of combined information technology experience to the day-to-day management of information security. We leverage external partners to provide expanded monitoring coverage and triage of events before escalation to internal team members. Our third-party service provider supplements our internal IT team, offering 24/7/365 coverage and initial mitigation through continuous monitoring and security alerts.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The full Board of Directors holds overall responsibility for overseeing the identification and mitigation of cybersecurity risks. This responsibility has not been delegated to any single committee, as the Board’s structure and size allow for comprehensive oversight.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Periodically, management provides updates to the Board regarding our internal control program, including significant changes to our IT infrastructure and cybersecurity program. Management also directly communicates any material risks from cybersecurity threats to the Board.
Cybersecurity Risk Role of Management [Text Block] Periodically, management provides updates to the Board regarding our internal control program, including significant changes to our IT infrastructure and cybersecurity program. Management also directly communicates any material risks from cybersecurity threats to the Board.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our Director of Information Technology leads our cybersecurity program and reports directly to our CEO.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our director is supported by a Senior Systems Administrator, and together they bring over 65 years of combined information technology experience to the day-to-day management of information security.