Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | ||||||||
---|---|---|---|---|---|---|---|---|---|
Mar. 31, 2025 | |||||||||
Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |||||||||
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Although
we are unable to eliminate all risks associated with cybersecurity threats and we cannot provide full assurance that our cybersecurity
risk management processes will be fully complied with or effective, we have adopted policies and procedures that are designed to facilitate
the identification, assessment, and management of those risks, including any such risks that have the potential to be material.Risk
management and strategy
We have developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information. Our cybersecurity risk management program is aligned to the Company’s business strategy and shares common methodologies, reporting channels and governance processes that apply to other areas of enterprise risk, including legal, compliance, strategic, operational, and financial risk. Key elements of our cybersecurity risk management program include:
In the last three fiscal years, the Company has not experienced any material cybersecurity incidents, and expenses incurred from cybersecurity incidents were immaterial. |
||||||||
Cybersecurity Risk Management Processes Integrated [Text Block] | We have developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information. Our cybersecurity risk management program is aligned to the Company’s business strategy and shares common methodologies, reporting channels and governance processes that apply to other areas of enterprise risk, including legal, compliance, strategic, operational, and financial risk. Key elements of our cybersecurity risk management program include: | ||||||||
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true | ||||||||
Cybersecurity Risk Board of Directors Oversight [Text Block] | As
part of our overall enterprise risk management program, we prioritize the identification and management of cybersecurity risk at several
levels. Our Board of Directors has overall oversight responsibility for our risk management, and delegates cybersecurity risk management
oversight to the Audit Committee, which is responsible for ensuring that management has processes in place designed to identify and evaluate
cybersecurity risks and implement processes and programs to manage cybersecurity risks and mitigate cybersecurity incidents. Management is responsible for identifying, considering and assessing material cybersecurity risks on an ongoing basis, establishing processes to ensure that such potential cybersecurity risk exposures are monitored, putting in place appropriate mitigation measures and maintaining cybersecurity programs. |
||||||||
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our Board of Directors has overall oversight responsibility for our risk management, and delegates cybersecurity risk management oversight to the Audit Committee, which is responsible for ensuring that management has processes in place designed to identify and evaluate cybersecurity risks and implement processes and programs to manage cybersecurity risks and mitigate cybersecurity incidents. | ||||||||
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |