Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
---|---|
Mar. 31, 2025 | |
Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] |
We use, store and process data for and about our customers, employees, partners and suppliers. We have implemented a cybersecurity risk management program that is designed to identify, assess, and mitigate risks from cybersecurity threats to this data and our systems and business operations, including vetting and managing third-party service providers with comprehensive due diligence, continuous monitoring and strict compliance with industry standards. In addition, we provide cybersecurity awareness training to our employees, incident response personnel, and senior management, including training on best practices for data privacy and security. Our enterprise risk management program considers cybersecurity threat risks alongside other Company risks as part of our overall risk assessment process. |
Cybersecurity Risk Management Processes Integrated [Flag] | true |
Cybersecurity Risk Management Processes Integrated [Text Block] | We have implemented a cybersecurity risk management program that is designed to identify, assess, and mitigate risks from cybersecurity threats to this data and our systems and business operations, including vetting and managing third-party service providers with comprehensive due diligence, continuous monitoring and strict compliance with industry standards. |
Cybersecurity Risk Management Third Party Engaged [Flag] | true |
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
Cybersecurity Risk Board of Directors Oversight [Text Block] |
The Board is responsible for overseeing assessments of major risks facing the Company and for reviewing options to mitigate these risks. It has delegated oversight responsibility for information security matters to the Audit Committee, Chief Financial Officer (“CFO”) and our internal information technology (“IT”) resources. Our Director of IT manages our internal team of security professionals, as well as our third-party IT service providers, which provides 24/7 security monitoring. The personnel comprising our IT team include a certified information system security professional and other professionals with many years of experience across a variety of technological sub-specialties.
Our CFO oversees our cybersecurity risk management, including appropriate risk mitigation strategies, systems, processes, and controls, and receives updates from IT and our third-party IT service providers on cybersecurity and information security matters. The CFO communicates with the Audit Committee and the Board periodically regarding the state of our cybersecurity risk management, current and evolving threats and recommendations for changes. We have also implemented a cyber incident response plan that provides a protocol to report certain incidents to the CFO with the goal of timely assessment of such incidents, determining applicable disclosure requirements and communicating with the Audit Committee and the Board for timely and accurate reporting of any material cybersecurity incident. The incident response plan is reviewed and tested in the annual cybersecurity desktop exercise. |
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Board is responsible for overseeing assessments of major risks facing the Company and for reviewing options to mitigate these risks. It has delegated oversight responsibility for information security matters to the Audit Committee, Chief Financial Officer (“CFO”) and our internal information technology (“IT”) resources. |
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | The CFO communicates with the Audit Committee and the Board periodically regarding the state of our cybersecurity risk management, current and evolving threats and recommendations for changes. |
Cybersecurity Risk Role of Management [Text Block] | Our CFO oversees our cybersecurity risk management, including appropriate risk mitigation strategies, systems, processes, and controls, and receives updates from IT and our third-party IT service providers on cybersecurity and information security matters. |
Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | Our CFO oversees our cybersecurity risk management, including appropriate risk mitigation strategies, systems, processes, and controls, and receives updates from IT and our third-party IT service providers on cybersecurity and information security matters. |
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | The personnel comprising our IT team include a certified information system security professional and other professionals with many years of experience across a variety of technological sub-specialties. |
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | We have also implemented a cyber incident response plan that provides a protocol to report certain incidents to the CFO with the goal of timely assessment of such incidents, determining applicable disclosure requirements and communicating with the Audit Committee and the Board for timely and accurate reporting of any material cybersecurity incident. The incident response plan is reviewed and tested in the annual cybersecurity desktop exercise. |
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |