v3.25.1
Cybersecurity
12 Months Ended
Apr. 30, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity

Item 1C. Cybersecurity.

 

We use, store, and process limited data related to our operations. As of the date of this filing, we have not yet implemented a formal cybersecurity risk management program designed to identify, assess, and mitigate risks from cybersecurity threats. We intend to implement a cybersecurity risk management program as our business operations and technology infrastructure evolve.

 

Cyber Risk Management and Strategy

 

We plan to implement and maintain a cybersecurity risk management program under the oversight of our Board of Directors. Once implemented, this program will include systematic processes for identifying, assessing, and mitigating cybersecurity risks and will be integrated into our overall risk management processes. We intend to adopt a risk-based approach to managing cyber threats, supported by commonly used cybersecurity technologies, such as cloud-based monitoring and threat detection tools.

 

We expect to utilize third parties and consultants to assist in the identification and assessment of risks, including to support tabletop exercises and to conduct security testing.

 

As part of this effort, we also intend to implement controls to assess and manage risks associated with third-party service providers who may have access to our systems or data. This may include review process for such providers’ cybersecurity practices, risk assessments, contractual requirement and system monitoring.

 

We expect to regularly evaluate and enhance our cybersecurity policies and procedures in response to emerging threats or developments affecting our industry.

 

In 2025, we did not identify any cybersecurity threats that have materially affected or are reasonably likely to materially affect our business strategy, results of operations, or financial condition. However, despite our efforts, we cannot eliminate all risks from cybersecurity threats, or provide assurances that we have not experienced undetected cybersecurity incidents.