Risk Factors Dashboard
Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.
View risk factors by ticker
Search filings by term
Risk Factors - HWKE
-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing
We are a smaller reporting company as defined in Rule 12b-2 of the Exchange Act and are not required to provide the information required under this item.
Item 1B. Unresolved Staff Comments
We are a smaller reporting company as defined in Rule 12b-2 of the Exchange Act and are not required to provide the information required under this item.
Item 1C. Cybersecurity Disclosures.
We rely upon internally and externally managed information technology systems and networks for the collection and storage of sensitive data and business information. We approach cybersecurity risks with a comprehensive risk management and governance strategy designed to assess, identify, and manage cybersecurity risks to our business.
Risk Management and Strategy
Our cybersecurity program is designed to detect cybersecurity threats and vulnerabilities, protect our information systems from such threats, and ensure the confidentiality, integrity, and availability of systems and information used, owned or managed by us. Our focus is on protecting sensitive information, such as personal information of our customers and employees, and confidential business information that could be leveraged by a competitor or a malicious actor.
Our cybersecurity program has several components, including the adoption of information security protocols, standards, and guidelines consistent with best industry practices; engaging third-party service providers to conduct security assessments and penetration testing; and performing periodic internal audits of our cybersecurity protocols. We employ a risk-based process designed to manage cybersecurity risks presented by third-party vendors that may have access to our sensitive information and/or information technology (“IT”) systems. This process may consider the nature of the services provided, the sensitivity and quantity of information processed, the criticality of any potentially impacted IT systems, and/or the strength of the vendor’s cybersecurity practices.
We monitor potential cybersecurity risks through tracking. These key risks are characterized by various factors such as the likelihood of us experiencing a particular type of cybersecurity incident, the speed at which each type of cybersecurity incident could impact the Company, and management’s assessment of the Company’s ability to respond quickly and efficiently.
An incident response plan aligned with best practices guidelines governs our response to cybersecurity incidents. The incident response plan outlines how we can detect, analyze, contain, eradicate, recover, and perform post-incident activities in the event of a cybersecurity incident. It also contains an internal, risk-based escalation framework designed to ensure that all relevant individuals are promptly informed of any cybersecurity incident and dictates procedures for determining whether a cybersecurity incident is material without unreasonable delay.
Material Effects from Risks of Cybersecurity Threats
While we may experience minor data and cybersecurity incidents from time to time, to our knowledge, the risks posed by cybersecurity threats have not materially affected and are not reasonably likely to materially affect our business strategy, results of operations or financial condition. However, there can be no assurance that we will not be materially affected by such risks in the future. A successful cybersecurity attack may expose us to misuse of information or systems, the compromising of confidential information, manipulation or destruction of data, production downtimes, and operations disruptions.
Governance
Role of Management
One of the key functions of our executive officers, in connection with our IT team, is informed oversight of our risk management process, which includes risks from cybersecurity threats. Our executive ooficers monitor and assess strategic risk exposure, and manage the material risks we face.
Our executive officers who have experience in IT, work with our board of directors to manage our cybersecurity policies and processes. Together, they stay informed and manage how we identify, address, prevent and resolve cybersecurity issues and related matters. They also track how we prevent, identify, lessen, and address cybersecurity issues. This is done through regular checks of our systems, tests to identify security weaknesses, and maintaining an incident response plan.
In addition to such regular system checks, our executive officers, together with the board of directors, regularly discuss active, emerging and potential cybersecurity risks. They keep each other informed about significant changes affecting cybersecurity, and they periodically update management with these changes, as well as our cybersecurity risks, so that management can administer its oversight function as a part of its broader oversight and risk management.
Recently Filed
Ticker * | File Date |
---|---|
AVGO | 14 hours ago |
TOL | 15 hours ago |
CSPI | 15 hours ago |
CIEN | 16 hours ago |
A | 1 day, 12 hours ago |
ARKR | 1 day, 14 hours ago |
LTCH | 1 day, 14 hours ago |
LIVE | 1 day, 14 hours ago |
HEI | 1 day, 14 hours ago |
ESOA | 1 day, 15 hours ago |
AVO | 1 day, 15 hours ago |
JOB | 1 day, 15 hours ago |
ABM | 1 day, 15 hours ago |
MGYR | 1 day, 15 hours ago |
OPXS | 1 day, 15 hours ago |
HPE | 1 day, 23 hours ago |
NDSN | 2 days, 14 hours ago |
HOV | 2 days, 14 hours ago |
NVOS | 2 days, 15 hours ago |
YCBD | 2 days, 15 hours ago |
TTC | 2 days, 18 hours ago |
APDN | 3 days, 14 hours ago |
KEYS | 3 days, 15 hours ago |
SONN | 3 days, 22 hours ago |
NMTC | 3 days, 22 hours ago |
EPIX | 4 days ago |
UPXI | 4 days, 14 hours ago |
CMP | 4 days, 14 hours ago |
QIPT | 4 days, 14 hours ago |
MITK | 4 days, 14 hours ago |
ALID | 4 days, 14 hours ago |
RICK | 4 days, 15 hours ago |
ASRE | 4 days, 15 hours ago |
VERU | 4 days, 15 hours ago |
NX | 5 days, 1 hour ago |
FSFG | 1 week ago |
EDSA | 1 week ago |
ODRS | 1 week ago |
PRKA | 1 week ago |
AMAT | 1 week ago |
GNSS | 1 week ago |
LEE | 1 week ago |
ESSA | 1 week ago |
HPQ | 1 week, 1 day ago |
SDCH | 1 week, 1 day ago |
LPTV | 1 week, 1 day ago |
ASYS | 1 week, 1 day ago |
NGVC | 1 week, 1 day ago |
GTIM | 1 week, 1 day ago |
LQDT | 1 week, 1 day ago |