Cybersecurity Risk Management, Strategy, and Governance |
12 Months Ended |
---|---|
Jun. 30, 2025 | |
Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Item 1C. Cybersecurity We have implemented cybersecurity practices appropriate for the size and complexity of our operations. Our IT systems are professionally managed, and access to Company data is restricted to authorized personnel using secure access protocols. We take a proactive approach to managing cybersecurity risks. This includes regular updates to our systems, access controls, and training programs to help employees recognize and avoid phishing, spam, and other common cyber threats. To date, we have not experienced any material cybersecurity incidents. We continue to monitor evolving threats and adjust our practices as necessary to help protect our systems, data, and operations. |
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |