XML 22 R9.htm IDEA: XBRL DOCUMENT v3.25.4
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Sep. 30, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

 

Risk Assessment and Strategy

 

We regularly evaluate cybersecurity risk from computer viruses and more sophisticated and targeted cyber-related attacks such as ransomware, as well as cybersecurity failures resulting from human error and technological errors. Such risks are reviewed by our management on a periodic basis as deemed appropriate.

 

Our overall strategy in combatting known cybersecurity risks includes a variety of individual tactics, including:

 

 

Utilizing e-mail services and cloud based storage systems offered by well-known reputable software and service providers which incorporate cybersecurity protections in their products.

     
  the use of antivirus software, virtual private networks, email security, as well as other software to prevent and detect data intrusions.

 

 

  if necessary, the use of third-party security experts if and when an incident is detected.

 

We are not aware of having experienced any material cybersecurity incidents. We are not aware of any existent cybersecurity threats that would materially affect, or are reasonably likely to materially affect, our business strategy, results of operations or financial conditions. For more information, please see “Cybersecurity” under Item 1A “Risk Factors” above.

Cybersecurity Risk Board of Directors Oversight [Text Block]

Board Oversight

 

As the Board of Directors has yet to establish any committees, Management regularly updates our Board regarding Management’s efforts to minimize cybersecurity risks.

 

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block]

 

As the Board of Directors has yet to establish any committees, Management regularly updates our Board regarding Management’s efforts to minimize cybersecurity risks.