XML 22 R12.htm IDEA: XBRL DOCUMENT v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
May 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

ITEM 1C. CYBERSECURITY

 

Information Technology

 

We are committed to using technology to improve our competitive position. We depend on a variety of information systems and technologies (including cloud technologies) to manage the operations of our growing customer base. Our core business systems consist mostly of purchased and licensed software programs that integrate together and with our web-based radio automation systems.

 

We manage data security and privacy at the highest levels. Our Chief Executive Officer (CEO) is actively engaged in oversight of cybersecurity and IT infrastructure and works with outsourced vendors to manage all network operations. Our vendors keep our CEO informed on cybersecurity and privacy matters throughout the year. We have strengthened our data protection capabilities through investments in our infrastructure hardware and software.

 

During the fiscal year ended May 31, 2025, the Company did not experience any material cybersecurity incidents.

Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] During the fiscal year ended May 31, 2025, the Company did not experience any material cybersecurity incidents.
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Chief Executive Officer
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Our vendors keep our CEO informed on cybersecurity and privacy matters throughout the year.