XML 54 R24.htm IDEA: XBRL DOCUMENT v3.25.3
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Sep. 27, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Role of Management [Text Block]
Governance
 Our Chief Information Officer (CIO) has over 30 years of experience in cybersecurity and has primary management oversight of the Company’s cybersecurity and cyber risk management activities. The CIO administers our cyber risk assessments, oversees ongoing risk management processes, and regularly reports to the Audit Committee. During fiscal 2025, the Audit Committee received regular briefings from the CIO on cybersecurity matters, including updates on current and emerging threats, progress on information security initiatives, assessments of the Company’s cybersecurity program, and the results of internal and third-party evaluations.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our Chief Information Officer (CIO) has over 30 years of experience in cybersecurity
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our Chief Information Officer (CIO) has over 30 years of experience in cybersecurity and has primary management oversight of the Company’s cybersecurity and cyber risk management activities. The CIO administers our cyber risk assessments, oversees ongoing risk management processes, and regularly reports to the Audit Committee.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true
Cybersecurity Risk Board of Directors Oversight [Text Block] The CIO administers our cyber risk assessments, oversees ongoing risk management processes, and regularly reports to the Audit Committee. During fiscal 2025, the Audit Committee received regular briefings from the CIO on cybersecurity matters, including updates on current and emerging threats, progress on information security initiatives, assessments of the Company’s cybersecurity program, and the results of internal and third-party evaluations.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The CIO administers our cyber risk assessments, oversees ongoing risk management processes, and regularly reports to the Audit Committee. During fiscal 2025, the Audit Committee received regular briefings from the CIO on cybersecurity matters, including updates on current and emerging threats, progress on information security initiatives, assessments of the Company’s cybersecurity program, and the results of internal and third-party evaluations.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] During fiscal 2025, the Audit Committee received regular briefings from the CIO on cybersecurity matters, including updates on current and emerging threats, progress on information security initiatives, assessments of the Company’s cybersecurity program, and the results of internal and third-party evaluations.
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Risk Management and Strategy
Risk Assessment
Global cybersecurity threats and targeted attacks are an evolving risk to data, infrastructure, and overall operations.  These risks are addressed through a comprehensive, cross-functional approach that is focused on preserving the confidentiality, integrity and availability of the information that we collect and store by identifying, preventing and mitigating cyber security threats and effectively responding to cybersecurity incidents when they occur.
Cybersecurity Assessments
We engage third parties to perform assessments of our cybersecurity programs, including audits and independent reviews of our information security control environment and operating effectiveness. The results of such assessments, audits and reviews are reported to the Audit Committee and we adjust our cybersecurity policies, standards, processes and practices as necessary based on the information provided by these assessments, audits and reviews. Targeted security assessments were conducted and penetration tests throughout the year by internal teams as well as through engagement with third party service providers, including information security maturity assessments, audits and independent reviews of our information security control environment and operating effectiveness.
Effects and Impacts of Cybersecurity Risks
As of the date of this report, we have not identified any risks from known cybersecurity threats, including any prior cybersecurity incidents, that have materially affected or are reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition. (See Item 1A. Risk Factors).
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] These risks are addressed through a comprehensive, cross-functional approach that is focused on preserving the confidentiality, integrity and availability of the information that we collect and store by identifying, preventing and mitigating cyber security threats and effectively responding to cybersecurity incidents when they occur.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The results of such assessments, audits and reviews are reported to the Audit Committee and we adjust our cybersecurity policies, standards, processes and practices as necessary based on the information provided by these assessments, audits and reviews.
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block]
As of the date of this report, we have not identified any risks from known cybersecurity threats, including any prior cybersecurity incidents, that have materially affected or are reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition. (See Item 1A. Risk Factors).