XML 69 R9.htm IDEA: XBRL DOCUMENT v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Jun. 30, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Risk Assessment and Strategy 

We regularly evaluate cybersecurity risk from computer viruses and more sophisticated and targeted cyber-related attacks such as ransomware, as well as cybersecurity failures resulting from human error and technological errors. Such risks are reviewed by our management on a periodic basis as deemed appropriate.

 

Our overall strategy in combatting known cybersecurity risks includes a variety of individual tactics, including:

 

  the use of antivirus software, virtual private networks, email security, as well as other software to prevent and detect data intrusions.
     
  the deployment of updates and patches as they are available and maintaining the current versions of major software to reduce the exposure to vulnerabilities.
     
  the use of third-party service to conduct mandatory online training for all employees regarding identifying and avoiding cyber-security risks.
     
  the review of the security procedures used by third parties that may host or otherwise have access to Fuel Tech’s data.
     
  the deployment of third-party cyber-security experts to perform penetration testing on our internal and external networks and systems in an effort to identify potential vulnerabilities.
     
  if necessary, the use of third-party security experts if and when an incident is detected

 

We are not aware of having experienced any material cybersecurity incidents. We are not aware of any existent cybersecurity threats that would materially affect, or are reasonably likely to materially affect, our business strategy, results of operations or financial conditions. For more information, please see “Cybersecurity” under Item 1A “Risk Factors” above.

 
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] We are not aware of having experienced any material cybersecurity incidents. We are not aware of any existent cybersecurity threats that would materially affect, or are reasonably likely to materially affect, our business strategy, results of operations or financial conditions. For more information, please see “Cybersecurity” under Item 1A “Risk Factors” above.
Cybersecurity Risk Board of Directors Oversight [Text Block] Board Oversight 

As the Board of Directors has yet to establish any committees, Management regularly updates our Board regarding Management’s efforts to minimize cybersecurity risks.

 
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] As the Board of Directors has yet to establish any committees, Management regularly updates our Board regarding Management’s efforts to minimize cybersecurity risks.