v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Jun. 30, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
We have established policies and processes for assessing, identifying, and managing material risk from cybersecurity threats and have integrated these processes into our overall risk management systems and processes. We have aligned our cybersecurity program with recognized security frameworks such as NIST-CSF (National Institute of Standard and Technologies – Cybersecurity Framework). We routinely assess material risks from cybersecurity threats, including any potential unauthorized occurrence on or conducted through our information systems that may result in adverse effects on the confidentiality, integrity, or availability of our information systems or any information residing therein.
We maintain a risk based approach to identify cybersecurity threats, and conduct assessments to determine if our information systems are vulnerable to such cybersecurity threats. This includes identification of reasonably foreseeable internal and external risks, the likelihood and potential damage that could result from such risks, and the sufficiency of existing policies, procedures, systems, and safeguards in place to manage such risks.
We maintain reasonable safeguards to minimize identified risks; reasonably address any identified gaps in existing safeguards; and regularly monitor the effectiveness of our safeguards. We devote significant resources and designate high-level personnel, including our Chief Information Officer and Global Head of Cybersecurity, to manage the risk mitigation process.
We have implemented technical solutions that are designed to protect our information systems from cybersecurity threats, including firewalls, intrusion prevention and detection systems, anti-malware functionality, and access controls. We regularly evaluate, monitor, and improve these solutions. As part of our overall risk management system, we monitor and test our safeguards and train our employees on these safeguards, in collaboration with human resources, information technology, legal, compliance and ethics and management. Personnel at all levels and departments are made aware of our cybersecurity policies through periodic trainings.
We periodically engage consultants, auditors, or other third parties. These service providers assist us to design, implement or assess our cybersecurity policies and procedures, as well as to monitor and test our safeguards. We work with our third-party suppliers and service providers to address the use of appropriate security measures in connection with their work with us.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
We have established policies and processes for assessing, identifying, and managing material risk from cybersecurity threats and have integrated these processes into our overall risk management systems and processes. We have aligned our cybersecurity program with recognized security frameworks such as NIST-CSF (National Institute of Standard and Technologies – Cybersecurity Framework). We routinely assess material risks from cybersecurity threats, including any potential unauthorized occurrence on or conducted through our information systems that may result in adverse effects on the confidentiality, integrity, or availability of our information systems or any information residing therein.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] One of the key functions of our Board of Directors is informed oversight of our risk management process, including risks from cyber security threats. Our Board of Directors is responsible for monitoring and assessing strategic risk exposure, and our executive officers are responsible for the day-to-day management of the material risks we face. Our Board of Directors administers its cybersecurity risk oversight function through the Nominating and Corporate Governance (“NCG”) Committee.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Board of Directors administers its cybersecurity risk oversight function through the Nominating and Corporate Governance (“NCG”) Committee.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
The NCG Committee is briefed quarterly by management on, among other things, our company’s cybersecurity risks and activities, including any recent cybersecurity incidents and related responses, cybersecurity systems testing, activities of third parties, and the like. The NCG Committee provides regular updates to the Board of Directors on such reports.
Cybersecurity Risk Role of Management [Text Block]
Our Chief Information Officer and Global Head of Cybersecurity have combined relevant experience of more than 45 years, including over 20 years in cybersecurity, and they oversee our cyber security policies and processes, including those described in “Risk Management and Strategy” above. Our Global Head of Cybersecurity monitors and keeps informed about prevention, detection, mitigation, and remediation efforts through regular communication and reporting from our cybersecurity team, and through the use of technological tools and software and results from third party assessments.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our Chief Information Officer and Global Head of Cybersecurity have combined relevant experience of more than 45 years, including over 20 years in cybersecurity, and they oversee our cyber security policies and processes, including those described in “Risk Management and Strategy” above.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our Chief Information Officer and Global Head of Cybersecurity have combined relevant experience of more than 45 years, including over 20 years in cybersecurity
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Our Global Head of Cybersecurity monitors and keeps informed about prevention, detection, mitigation, and remediation efforts through regular communication and reporting from our cybersecurity team, and through the use of technological tools and software and results from third party assessments.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true