XML 82 R27.htm IDEA: XBRL DOCUMENT v3.25.3
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Aug. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Cybersecurity Risk Management and Strategy
We depend on integrated information systems to conduct our business. In order to defend against cybersecurity threats, we have developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information. The frameworks used to design and assess our program include the National Institute of Standards and Technology Cybersecurity Framework and The Sarbanes-Oxley Act of 2002. This does not imply that we meet any particular technical standards, specifications, or requirements, only that we use these frameworks as a guide to help us identify, assess, and manage cybersecurity risks relevant to our business.
Our cybersecurity risk management program is integrated into our overall enterprise risk management program and shares common methodologies, reporting channels, and governance processes that apply across the enterprise risk management
program to other legal, compliance, strategic, operational, and financial risk areas. Our cybersecurity risk management program includes:
risk assessments designed to help identify material cybersecurity risks to our critical systems and information;
a security team principally responsible for managing our cybersecurity risk assessment processes, security controls, and responses to cybersecurity incidents;
the use of external service providers, where appropriate, to assess, test or otherwise enhance our security controls;
cybersecurity awareness training of our employees, including our incident response personnel;
tabletop exercises conducted at the management level to ensure the Company is prepared in the event of a cybersecurity incident and to help identify areas of improvement for the cyber security incident response and risk management programs;
a cybersecurity incident response plan that includes procedures for responding to cybersecurity incidents, cybersecurity resilience and recovery; and
a third-party risk management process for service providers, suppliers, and vendors who access our critical systems and data.
We have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected us, our operations, business strategy, results of operations, or financial condition. However, we face risks from cybersecurity threats that, if realized, are reasonably likely to materially affect us, our operations, business strategy, results of operations, or financial condition. See Item 1A "Risk Factors".