XML 23 R9.htm IDEA: XBRL DOCUMENT v3.25.4
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Sep. 30, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Cybersecurity 

We currently maintain customary cybersecurity tools intended to prevent or detect unauthorized access to our information technology (“IT”) networks and applications as well as to mitigate the risk of common cybersecurity threats. We continue to develop and implement additional processes, including those intended to follow an internal IT Security Policy, which will seek to assess, identify, and manage material risks from cybersecurity threats to our IT systems and information that we create, use, transmit, receive, and maintain in our business. We will seek to integrate these processes and policies into an overall enterprise risk management process. We expect our processes for assessing, identifying, and managing material risks from cybersecurity threats, including threats associated with our use of third-party service providers, will include our efforts to identify the relevant assets that could be affected, determine possible threat sources and threat events, assess threats based on their potential likelihood and impact, and identify controls that are in place, or necessary, to manage and/or mitigate such risks.

 

We may not currently be sufficiently protected against cybersecurity risks. Our existing resources may be insufficient to adequately protect us against, or to investigate and remediate any vulnerability from, cybersecurity incidents. It is possible that any of these occurrences, or a combination of them, could have material adverse consequences on our operations, business strategy or financial condition.

 

In the event of a cybersecurity incident affecting us, we would assess any potential unauthorized attempts to access our IT systems or similar events that may adversely affect the availability or integrity of our IT systems or the security and confidentiality of the data we create, use, transmit, receive, and maintain in our business. Our management team would develop an incident response plan and report to the board of directors on our incident response plan for addressing and mitigating risks associated with such an incident.

 

Primary responsibility for assessing cybersecurity risks rests with our audit committee of the Board, who work together with our management team, including our chief executive officer and our president and chief financial officer to manage cybersecurity risk.

 

To date, we have not experienced any cybersecurity threats or incidents that have materially affected our operations, business strategy or financial condition.

 
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] To date, we have not experienced any cybersecurity threats or incidents that have materially affected our operations, business strategy or financial condition.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Our management team would develop an incident response plan and report to the board of directors on our incident response plan for addressing and mitigating risks associated with such an incident.