Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
---|---|
Jun. 30, 2025 | |
Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | We
depend on software applications, information technology systems, computing infrastructure and cloud service providers to operate our
business. These systems are managed, hosted, provided or used by third parties, to assist in conducting our business and which have their
own cyber security measures in place. We do not separately implement generally applicable industry standards or best practices processes
for the assessment, identification, and management of material risks from cybersecurity threats to our information technology systems.
We do not maintain a cyber incident reporting and response process and our information security policies and procedures are not reviewed
on a regular basis. We have not experienced a cybersecurity incident that resulted in a material adverse impact to our business or operations; however, there can be no guarantee that we will not experience such an incident in the future. If our limited security measures are breached and an unauthorized party obtains access to our proprietary business information, our information systems may be perceived as being unsecure, which could harm our business and reputation, and our proprietary business information could be misappropriated which could have an adverse effect on our business and results of operations. We have not implemented a governance structure and processes to assess, identify, manage, and report cybersecurity risk. |
Cybersecurity Risk Management Processes Integrated [Flag] | false |
Cybersecurity Risk Management Third Party Engaged [Flag] | true |
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |