XML 40 R23.htm IDEA: XBRL DOCUMENT v3.25.4
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Sep. 30, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Risk Management and Strategy

The Company has established processes to assess, identify, and manage risks from cybersecurity threats as part of our broader enterprise-wide risk management system and processes, which is overseen by our Board through our Audit Committee, along with our executive management.

Our cybersecurity program focuses on all areas of our business, including cloud-based environments, devices used by employees and contractors, facilities, networks, applications, vendors, disaster recovery, business continuity and controls and safeguards enabled through business processes and tools. We continuously monitor for unauthorized access to our information technology systems and identify potential security threats through various automated detection solutions. To protect the security of our information infrastructure and protect our systems and information from unauthorized access, we draw on the knowledge and insights of an external information technology consultant who acts as our primary IT administrator and employ an array of third-party tools and technologies. As part of its oversight, the Audit Committee also oversees and identifies risks from cybersecurity threats associated with our use of an external information technology consultant, as well cybersecurity threats posed by our engagement of other similar third-party providers.

As of the date of this Annual Report, we have not encountered any risks from cybersecurity threats that have materially affected or are reasonably likely to materially affect the Company, including its business strategy, results of operations, or financial condition. For more information on our cybersecurity related risks, see “Risk Factors - Risks Related to Our Business and Our Industry” included elsewhere in this Annual Report on Form 10-K.

Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The Board is responsible for overseeing our enterprise risk management program.
Cybersecurity Risk Board of Directors Oversight [Text Block]

The Board is responsible for overseeing our enterprise risk management program. The Audit Committee of the Board has been designated by the Board to oversee cybersecurity risks and our processes to identify, prioritize, assess, manage, and mitigate those risks. The Audit Committee receives updates on cybersecurity and information technology matters and related risk exposures from our Chief Financial Officer.

Cybersecurity Risk Role of Management [Text Block]

The Board is responsible for overseeing our enterprise risk management program. The Audit Committee of the Board has been designated by the Board to oversee cybersecurity risks and our processes to identify, prioritize, assess, manage, and mitigate those risks. The Audit Committee receives updates on cybersecurity and information technology matters and related risk exposures from our Chief Financial Officer.

The Chief Financial Officer oversees the operation of our cybersecurity program and has over 10 years of executive experience overseeing risk management and internal controls. The Chief Financial Officer is informed about and monitors the prevention, detection, mitigation, and remediation of cybersecurity incidents through the Chief Financial Officer’s oversight of the Company’s information technology function and supervision of the Company’s IT administrator.

Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee of the Board has been designated by the Board to oversee cybersecurity risks and our processes to identify, prioritize, assess, manage, and mitigate those risks.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block]

The Chief Financial Officer oversees the operation of our cybersecurity program and has over 10 years of executive experience overseeing risk management and internal controls. The Chief Financial Officer is informed about and monitors the prevention, detection, mitigation, and remediation of cybersecurity incidents through the Chief Financial Officer’s oversight of the Company’s information technology function and supervision of the Company’s IT administrator.

Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The Chief Financial Officer is informed about and monitors the prevention, detection, mitigation, and remediation of cybersecurity incidents through the Chief Financial Officer’s oversight of the Company’s information technology function and supervision of the Company’s IT administrator.