Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
---|---|
Mar. 31, 2025 | |
Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | We are increasingly dependent on third-party provided software applications and computing infrastructure to conduct key operations. We depend on both our own procured systems, networks, and technology as well as the systems, networks and technology of our contractors, consultants, vendors and other business partners. Given
the importance of cybersecurity to our business, we maintain a cybersecurity
program that is based on a set of cybersecurity policies and processes to
support our controls and our preparedness for treatment of identified
information security risks. We also undergo periodic evaluations of our
cybersecurity program through cybersecurity assessment and cybersecurity
incident response tabletop exercises, conducted by our cybersecurity advisors.
As a result of such assessments and exercises, a number of processes have been
established or are being improved upon to support the protection of our data
and systems.
Process for Assessing, Identifying and Managing Material Risks from Cybersecurity Threats
In the event of a cybersecurity incident, we maintain a Cybersecurity Incident Response Plan. Pursuant to the plan and its escalation protocols, designated personnel are responsible for assessing the severity of an incident and associated threat, containing the threat, remediating the threat, including recovery of data and access to systems, analyzing any reporting obligations associated with the incident, and performing post-incident analysis and program enhancements. We have a relationship with various law firms to assist with advisory on legal aspects of containing incidents and communicating accordingly. Governance Management Oversight The existing controls and processes employed to assess, identify and manage material risks from cybersecurity threats are implemented and overseen by our information technology (“IT”) consultant. Our IT consultant leverages its over 35 years of experience. Our IT consultant is responsible for the day-to-day management of the cybersecurity program, including the prevention, detection, investigation, response to, and recovery from cybersecurity incidents. Our IT consultant reports on its
activities to senior management who then assess and manage risks of
cybersecurity threats.
Board Oversight
While our Board of Directors (the “Board”) has overall responsibility for risk oversight, the Audit Committee of the Board (the “Audit Committee”) oversees cybersecurity risk matters. The Audit Committee is responsible for reviewing, monitoring, reporting and, where appropriate, providing recommendations to the Board regarding compliance with our internal policies and its progress in remedying any material deficiencies, including those related to our security policies, including the physical safeguarding of corporate assets and security of our networks and information systems. The Audit Committee receives periodic updates regarding the cybersecurity program, including top threats and risks, and updates on the cybersecurity roadmap.
Cybersecurity Risks We
maintain a Risk Management Policy that governs the process in which we identify
cybersecurity risks, evaluate their associated impacts and risk levels, and
document them accordingly in the Cybersecurity Risk Register.
|
Cybersecurity Risk Management Third Party Engaged [Flag] | true |
Cybersecurity Risk Management Processes Integrated [Flag] | true |
Cybersecurity Risk Management Processes Integrated [Text Block] | we maintain a cybersecurity program that is based on a set of cybersecurity policies and processes to support our controls and our preparedness for treatment of identified information security risks. We also undergo periodic evaluations of our cybersecurity program through cybersecurity assessment and cybersecurity incident response tabletop exercises, conducted by our cybersecurity advisors. |
Cybersecurity Risk Board of Directors Oversight [Text Block] | Governance Management Oversight The existing controls and processes employed to assess, identify and manage material risks from cybersecurity threats are implemented and overseen by our information technology (“IT”) consultant. Our IT consultant leverages its over 35 years of experience. Our IT consultant is responsible for the day-to-day management of the cybersecurity program, including the prevention, detection, investigation, response to, and recovery from cybersecurity incidents. Our IT consultant reports on its
activities to senior management who then assess and manage risks of
cybersecurity threats.
Board Oversight
While our Board of Directors (the “Board”) has overall responsibility for risk oversight, the Audit Committee of the Board (the “Audit Committee”) oversees cybersecurity risk matters. The Audit Committee is responsible for reviewing, monitoring, reporting and, where appropriate, providing recommendations to the Board regarding compliance with our internal policies and its progress in remedying any material deficiencies, including those related to our security policies, including the physical safeguarding of corporate assets and security of our networks and information systems. The Audit Committee receives periodic updates regarding the cybersecurity program, including top threats and risks, and updates on the cybersecurity roadmap.
Cybersecurity Risks We
maintain a Risk Management Policy that governs the process in which we identify
cybersecurity risks, evaluate their associated impacts and risk levels, and
document them accordingly in the Cybersecurity Risk Register.
|
Cybersecurity Risk Role of Management [Text Block] | Management Oversight The existing controls and processes employed to assess, identify and manage material risks from cybersecurity threats are implemented and overseen by our information technology (“IT”) consultant. Our IT consultant leverages its over 35 years of experience. Our IT consultant is responsible for the day-to-day management of the cybersecurity program, including the prevention, detection, investigation, response to, and recovery from cybersecurity incidents.
|
Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | The existing controls and processes employed to assess, identify and manage material risks from cybersecurity threats are implemented and overseen by our information technology (“IT”) consultant. |
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | IT consultant leverages its over 35 years of experience |
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Our IT consultant is responsible for the day-to-day management of the cybersecurity program, including the prevention, detection, investigation, response to, and recovery from cybersecurity incidents. |
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | While our Board of Directors (the “Board”) has overall responsibility for risk oversight, the Audit Committee of the Board (the “Audit Committee”) oversees cybersecurity risk matters. |
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Audit Committee is responsible for reviewing, monitoring, reporting and, where appropriate, providing recommendations to the Board regarding compliance with our internal policies and its progress in remedying any material deficiencies, including those related to our security policies, including the physical safeguarding of corporate assets and security of our networks and information systems. |
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |