Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
---|---|
Jun. 30, 2025 | |
Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | We periodically assess risks from cybersecurity threats and monitor our information systems for potential vulnerabilities. However, to date, given the small size of our company and the nature of our operations, our reliance on information systems has been limited to the use of standard off-the-shelf software (such as Google, QuickBooks, and Microsoft Office) and the use by our employees of standard personal computers. Accordingly, management has not implemented any formal process for assessing, identifying, and managing risks from cybersecurity threats. We depend on digital technologies, including information systems, infrastructure and cloud applications and services, including those of third parties with which we may deal. Sophisticated and deliberate attacks on, or security breaches in, our systems or infrastructure, or the systems or infrastructure of third parties or the cloud, could lead to corruption or misappropriation of our assets, proprietary information and sensitive or confidential data. As a company without significant investments in data security protection, we may not be sufficiently protected against such occurrences. We may not have sufficient resources to adequately protect against, or to investigate and remediate any vulnerability to, cyber incidents. It is possible that any of these occurrences, or a combination of them, could have adverse consequences on our business and lead to financial loss. However, risks from cybersecurity threats have, to date, not materially affected us, our business strategy, results of operations or financial condition. Governance As discussed above, given the nature of our current operations and our experience to date, we do not currently perceive cybersecurity as a particularly significant risk to our business. Accordingly, we have not tasked our Board of Directors with any additional cybersecurity oversight duties or designated any committee of the Board of Directors to specifically oversee cybersecurity risks to our business. |
Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] | However, risks from cybersecurity threats have, to date, not materially affected us, our business strategy, results of operations or financial condition. |
Cybersecurity Risk Board of Directors Oversight [Text Block] | Governance As discussed above, given the nature of our current operations and our experience to date, we do not currently perceive cybersecurity as a particularly significant risk to our business. Accordingly, we have not tasked our Board of Directors with any additional cybersecurity oversight duties or designated any committee of the Board of Directors to specifically oversee cybersecurity risks to our business. |
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | we have not tasked our Board of Directors with any additional cybersecurity oversight duties or designated any committee of the Board of Directors to specifically oversee cybersecurity risks to our business. |
Cybersecurity Risk Management Third Party Engaged [Flag] | true |
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | true |