Cybersecurity Risk Management and Strategy Disclosure |
9 Months Ended |
---|---|
Dec. 31, 2024 | |
Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Cybersecurity risk management
is an integral part of our overall risk management program. Our cybersecurity risk management program is based on industry best practices
and provide a framework for handling cybersecurity threats and incidents, including threats and incidents associated with the use of
applications developed and services provided by third-party service providers, and facilitate coordination across different departments
of our company. This framework includes steps for assessing the severity of a cybersecurity threat, identifying the source of a cybersecurity
threat including whether the cybersecurity threat is associated with a third-party service provider, implementing cybersecurity countermeasures
and mitigation strategies and informing management and our board of directors of material cybersecurity threats and incidents. Our cybersecurity
team also engages third-party security experts for risk assessment and our cybersecurity team is responsible for our system enhancements.
In addition, our cybersecurity team provides training to all employees annually. Our board of directors has overall oversight responsibility for our risk management, and delegates cybersecurity risk management oversight to the audit committee of the board of directors. The audit committee is responsible for ensuring that management has processes in place designed to identify and evaluate cybersecurity risks to which the company is exposed and implement processes and programs to manage cybersecurity risks and mitigate cybersecurity incidents. The audit committee also reports material cybersecurity risks to our full board of directors. Management is responsible for identifying, considering and assessing material cybersecurity risks on an ongoing basis, establishing processes to ensure that such potential cybersecurity risk exposures are monitored, putting in place appropriate mitigation measures and maintaining cybersecurity programs. Our cybersecurity programs are under the direction of our chief executive officer who receives reports from our cybersecurity team and monitors the prevention, detection, mitigation, and remediation of cybersecurity incidents. Our chief executive officer has rich management experience, including cybersecurity management. Our vice president of technology, the member of our cybersecurity team, is an experienced information system security professional and information security manager with years of experience. Management, including the chief executive officer and our cybersecurity team, regularly update the audit committee on the company’s cybersecurity programs, material cybersecurity risks and mitigation strategies and provide cybersecurity reports annually that cover, among other topics, third-party assessments of the company’s cybersecurity programs, developments in cybersecurity and updates to the company’s cybersecurity programs and mitigation strategies.
In the nine months ended December 31, 2024, we did not identify any cybersecurity threats that have materially affected or are reasonably likely to materially affect our business strategy, results of operations, or financial condition. However, despite our efforts, we cannot eliminate all risks from cybersecurity threats, or provide assurances that we have not experienced an undetected cybersecurity incident. For more information about these risks, please see “Item 3. Key Information—3.D. Risk Factors—Risk Related to Our Business and Industry—Our business generates and processes a large amount of data, and we are required to comply with PRC and other applicable laws relating to privacy and cybersecurity. The improper use or disclosure of data could have a material and adverse effect on our business and prospects” on pages 19 to 21 of this transition report. |
Cybersecurity Risk Management Third Party Engaged [Flag] | true |
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | Our board of directors has overall oversight responsibility for our risk management, and delegates cybersecurity risk management oversight to the audit committee of the board of directors. |