XML 45 R28.htm IDEA: XBRL DOCUMENT v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Jun. 30, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Risk Management and Strategy

We recognize the importance of managing cybersecurity threats and risks related to our business, and we have adopted a multi-faceted and proactive strategy to identify, evaluate, address, respond and neutralize cybersecurity threats and attacks. We employ a combination of technical solutions, security policies and procedures, employee training programs, and regular security audits to enhance and fortify our defenses. We utilize advanced monitoring tools and anomaly detection systems to swiftly identify any suspicious activities or deviations from normal operation. Our security infrastructure includes firewalls, intrusion detection systems, encryption protocols, and access controls to protect our systems and data from unauthorized access or malicious attacks. In the event a cybersecurity incident is detected, we have established incident response procedures to contain the threat, minimize the impact, and restore normal operations as quickly as possible. We also conduct periodic risk assessments to identify cybersecurity threats, as well as assessments in the event of a material change in our business practices that may affect our information systems that are vulnerable to such cybersecurity threats. We believe that our cybersecurity risk management process has been and continues to be an integral part of our overall risk management process of the Company as our cybersecurity team collaborates closely with our information technology team, senior management, Audit Committee and Cybersecurity Subcommittee, and internal audit team to address any such threats and incidents.

Our cybersecurity team plays a critical role in managing our cybersecurity risk. They oversee security controls and orchestrate our response to incidents on a day-to-day basis, including threats arising internally or from our vendors, suppliers or other third parties that we conduct business with. In addition, we have developed and implemented information security policies, standards, procedures and security guidelines that are based on industry standards, particularly the National Institute of Standards and Technology (NIST) Cybersecurity Framework. Furthermore, we have implemented and maintained employee policies design to reduce risk of cyber-attacks and educate employees on protocol in the event of a potential cybersecurity incident.

We use third-party service providers in various functions throughout our business. We have implemented stringent processes to oversee and manage cybersecurity risk with these third parties, which includes risk assessment activities, enforcement of policies to ensure compliance with current cybersecurity standards and monitoring activities, and periodic review of potential cyber breaches announcements made by the third-party service providers.
Cybersecurity Risk Management Processes Integrated [Flag] false
Cybersecurity Risk Management Processes Integrated [Text Block] We recognize the importance of managing cybersecurity threats and risks related to our business, and we have adopted a multi-faceted and proactive strategy to identify, evaluate, address, respond and neutralize cybersecurity threats and attacks.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Governance

Our senior management team, including our cybersecurity team, are responsible for day-to-day implementation, assessment, and management of our cybersecurity risk management processes. Our cybersecurity team includes Vice President of Information Technology and Information Security Officer with a team of eight full-time information technology professionals and several outside security vendors to manage our information security program. When a cybersecurity incident is identified, our computer incident response team will notify the Information Security Officer immediately, and upon assessment of the nature and severity of the incident, internal and external parties may be further notified to determine the appropriate response strategy, and written preliminary and final reports will be submitted to management. Our Vice President of Information Technology and Information Security Officer have served in various roles in information technology and information security, and together they have over 55 years of experience in this field. Our Information Security Officer is a certified information systems security professional (CISSP). The cybersecurity team has primary responsibility for our overall cybersecurity risk management program, including monitoring the prevention, detection, mitigation, and remediation of cybersecurity incidents, and works in partnership with senior management team, including our Chief Executive Officer and Chief Financial Officer, as well as our Board of Directors.

Our Board of Directors (the “Board”) plays an active role in overseeing and managing the Company’s cybersecurity risks. The Audit Committee of the Board has established a Cybersecurity Subcommittee for the purpose of assessing, analyzing and managing the Company’s key cybersecurity and information technology risks, and to ensure that our systems are adequate to protect against security breach and effectively safeguard the Company’s IT infrastructure, assets, intellectual property, and data. The roles and responsibilities of the Cybersecurity Subcommittee are determined, from time to time, by the Audit Committee. The Cybersecurity Subcommittee meets quarterly with our management team to discuss various matters relating to IT and cybersecurity risks, and our senior management team communicates and coordinates directly with the Cybersecurity Subcommittee in the event of any cybersecurity incident. The Cybersecurity Subcommittee is given the following responsibilities:
Oversight of policies, procedures, plans, and execution intended to provide security, confidentiality, availability, and integrity of the information.
Oversight of the quality and effectiveness of the Company’s policies and procedures with respect to its IT systems;
Review and oversight on policies and procedures of the Company in preparation for responding to cybersecurity incidents.
Oversight of risks related to IT systems and processes, including privacy, network security and data security, and any internal audits of such systems and processes.
Review and oversight of preparation of the Company’s public disclosures, including SEC filings, relating to the Company’s IT systems, including privacy, network security, and data security, and
Report to the Audit Committee and the Board of significant and material cybersecurity incidents.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our senior management team, including our cybersecurity team, are responsible for day-to-day implementation, assessment, and management of our cybersecurity risk management processes. Our cybersecurity team includes Vice President of Information Technology and Information Security Officer with a team of eight full-time information technology professionals and several outside security vendors to manage our information security program. When a cybersecurity incident is identified, our computer incident response team will notify the Information Security Officer immediately, and upon assessment of the nature and severity of the incident, internal and external parties may be further notified to determine the appropriate response strategy, and written preliminary and final reports will be submitted to management. Our Vice President of Information Technology and Information Security Officer have served in various roles in information technology and information security, and together they have over 55 years of experience in this field. Our Information Security Officer is a certified information systems security professional (CISSP). The cybersecurity team has primary responsibility for our overall cybersecurity risk management program, including monitoring the prevention, detection, mitigation, and remediation of cybersecurity incidents, and works in partnership with senior management team, including our Chief Executive Officer and Chief Financial Officer, as well as our Board of Directors.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
Our Board of Directors (the “Board”) plays an active role in overseeing and managing the Company’s cybersecurity risks. The Audit Committee of the Board has established a Cybersecurity Subcommittee for the purpose of assessing, analyzing and managing the Company’s key cybersecurity and information technology risks, and to ensure that our systems are adequate to protect against security breach and effectively safeguard the Company’s IT infrastructure, assets, intellectual property, and data. The roles and responsibilities of the Cybersecurity Subcommittee are determined, from time to time, by the Audit Committee. The Cybersecurity Subcommittee meets quarterly with our management team to discuss various matters relating to IT and cybersecurity risks, and our senior management team communicates and coordinates directly with the Cybersecurity Subcommittee in the event of any cybersecurity incident. The Cybersecurity Subcommittee is given the following responsibilities:
Oversight of policies, procedures, plans, and execution intended to provide security, confidentiality, availability, and integrity of the information.
Oversight of the quality and effectiveness of the Company’s policies and procedures with respect to its IT systems;
Review and oversight on policies and procedures of the Company in preparation for responding to cybersecurity incidents.
Oversight of risks related to IT systems and processes, including privacy, network security and data security, and any internal audits of such systems and processes.
Review and oversight of preparation of the Company’s public disclosures, including SEC filings, relating to the Company’s IT systems, including privacy, network security, and data security, and
Report to the Audit Committee and the Board of significant and material cybersecurity incidents.
Cybersecurity Risk Role of Management [Text Block] Our senior management team, including our cybersecurity team, are responsible for day-to-day implementation, assessment, and management of our cybersecurity risk management processes. Our cybersecurity team includes Vice President of Information Technology and Information Security Officer with a team of eight full-time information technology professionals and several outside security vendors to manage our information security program. When a cybersecurity incident is identified, our computer incident response team will notify the Information Security Officer immediately, and upon assessment of the nature and severity of the incident, internal and external parties may be further notified to determine the appropriate response strategy, and written preliminary and final reports will be submitted to management. Our Vice President of Information Technology and Information Security Officer have served in various roles in information technology and information security, and together they have over 55 years of experience in this field. Our Information Security Officer is a certified information systems security professional (CISSP). The cybersecurity team has primary responsibility for our overall cybersecurity risk management program, including monitoring the prevention, detection, mitigation, and remediation of cybersecurity incidents, and works in partnership with senior management team, including our Chief Executive Officer and Chief Financial Officer, as well as our Board of Directors.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our Vice President of Information Technology and Information Security Officer have served in various roles in information technology and information security, and together they have over 55 years of experience in this field. Our Information Security Officer is a certified information systems security professional (CISSP).
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our Vice President of Information Technology and Information Security Officer have served in various roles in information technology and information security, and together they have over 55 years of experience in this field.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The roles and responsibilities of the Cybersecurity Subcommittee are determined, from time to time, by the Audit Committee. The Cybersecurity Subcommittee meets quarterly with our management team to discuss various matters relating to IT and cybersecurity risks, and our senior management team communicates and coordinates directly with the Cybersecurity Subcommittee in the event of any cybersecurity incident.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true