Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Mar. 31, 2025 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management, Strategy, and Governance [Abstract] | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | We
recognize that cybersecurity risks represent a significant operational and reputational threat to our business. Our cybersecurity risk
management program is designed to identify, assess, mitigate, and respond to cybersecurity threats in a timely and effective manner.
The program is integrated into our broader enterprise risk management framework through a defense-in-depth approach. Key components include:
We monitor cybersecurity threats across our systems through both automated tools and manual review processes. Management is responsible for the overall implementation and effectiveness of our cybersecurity program. This includes allocating resources, establishing policies, and ensuring employee adherence to security practices. The Company’s Vice President of Operations manages our cyber security process and reports to our President and Chief Operating Officer and our Chief Executive Officer who reports to the Company’s Board of Directors.
The Company’s Board of Directors has specific oversight responsibilities related to cybersecurity, including review of security controls and incident response plans. Management provides updates to the Audit Committee on cybersecurity risks and the effectiveness of our cybersecurity program.
As of the date of this filing, we have not experienced any material cybersecurity incidents that have materially impacted our operations, financial condition, or results of operations. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management Processes Integrated [Flag] | true | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management Processes Integrated [Text Block] | Our cybersecurity risk management program is designed to identify, assess, mitigate, and respond to cybersecurity threats in a timely and effective manner. The program is integrated into our broader enterprise risk management framework through a defense-in-depth approach. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management Third Party Engaged [Flag] | true | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |