v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Mar. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] We recognize that cybersecurity risks represent a significant operational and reputational threat to our business. Our cybersecurity risk management program is designed to identify, assess, mitigate, and respond to cybersecurity threats in a timely and effective manner. The program is integrated into our broader enterprise risk management framework through a defense-in-depth approach. 

Key components include:

 

  Regular internal and external vulnerability assessments and penetration testing;
     
  Ongoing employee training with user phishing simulation tests;
     
  A dedicated incident response plan, tested and refined annually;
     
  Use of multi-factor authentication, encryption, and access control policies;
     
  Disaster Recovery and Business Continuity Plans;
     
  Policy acknowledgment;
     
  Yearly risk assessments;
     
  Enforcement of least privilege access across environments;
     
  Continuous improvement loop using CI/CD pipeline, providing accountability and segregation of duties:
     
  24/7 monitoring by security operation center;
     
  Engagement with third-party security consultants for audits and advisory services.

 

We monitor cybersecurity threats across our systems through both automated tools and manual review processes. Management is responsible for the overall implementation and effectiveness of our cybersecurity program. This includes allocating resources, establishing policies, and ensuring employee adherence to security practices. The Company’s Vice President of Operations manages our cyber security process and reports to our President and Chief Operating Officer and our Chief Executive Officer who reports to the Company’s Board of Directors.

 

The Company’s Board of Directors has specific oversight responsibilities related to cybersecurity, including review of security controls and incident response plans. Management provides updates to the Audit Committee on cybersecurity risks and the effectiveness of our cybersecurity program.

 

As of the date of this filing, we have not experienced any material cybersecurity incidents that have materially impacted our operations, financial condition, or results of operations.

 
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Our cybersecurity risk management program is designed to identify, assess, mitigate, and respond to cybersecurity threats in a timely and effective manner. The program is integrated into our broader enterprise risk management framework through a defense-in-depth approach.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false