XML 25 R10.htm IDEA: XBRL DOCUMENT v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Jun. 30, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Risk Management and Strategy
We have implemented and maintain an information security program designed to identify, assess, and manage material risks from cybersecurity threats to our critical computer networks, third party hosted services, communications systems, hardware and software, and our critical data including intellectual property, clinical trial participant and patient-related data, and confidential information that is proprietary, strategic or competitive in nature. We believe our information security program is appropriate for a company of our size and stage of development, taking into account our operations and risks.
Our cybersecurity policies and processes include:
 
   
Mechanisms, controls, and technologies designed to prevent or mitigate system intrusion or data loss, theft, misuse, or other security incidents or vulnerabilities and maintain a stable and secure information technology environment.
 
   
Information security policies, network and device security, encryption standards, risk management, as well as security tools such as malware protection and secure authentication tools.
 
   
We conduct ongoing monitoring of critical systems for any compromised or potentially compromised accounts, and conduct regular trainings for our employees and senior management on cyber and information security.
Governance
The Audit Committee of our Board of Directors oversees and reviews the Company’s cybersecurity risks and the steps management has taken to protect against threats to the Company’s information systems and security. The senior leadership team, including our Chief Financial Officer and Chief Executive Officer, provides periodic reports to our Board and the Audit Committee, as applicable.
To date, we have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected us, including our operations, business strategy, results of operations, or financial condition.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] To date, we have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected us, including our operations, business strategy, results of operations, or financial condition.
Cybersecurity Risk Board of Directors Oversight [Text Block] The Audit Committee of our Board of Directors oversees and reviews the Company’s cybersecurity risks and the steps management has taken to protect against threats to the Company’s information systems and security.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee of our Board of Directors oversees and reviews the Company’s cybersecurity risks and the steps management has taken to protect against threats to the Company’s information systems and security.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The senior leadership team, including our Chief Financial Officer and Chief Executive Officer, provides periodic reports to our Board and the Audit Committee, as applicable.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true