Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - LRDC

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

Item 1A. Risk Factors

Not Applicable

Item 1B. Unresolved Staff Comments

Not Applicable

Item 1C. Cybersecurity

We have a range of security measures that are designed to protect against the unauthorized access to and misappropriation of our information, corruption of data, intentional or unintentional disclosure of confidential information, or disruption of operations. We have cloud security tools and governance processes designed to assess, identify, and manage material risks from cybersecurity threats. In addition, we maintain an information security training program designed to address phishing and email security, password security, data handling security, cloud security, operational technology security processes, and cyber-incident response and reporting processes.

We are committed to maintaining the highest standards of cybersecurity to protect our data, intellectual property, and customer information from cyber threats. As part of this commitment, we leverage a sophisticated cybersecurity framework that integrates the robust capabilities of the Microsoft cloud ecosystem. We use an outside third-party cloud provider to provide communication and computer services, including email, internet access and file storage and sharing. We use an outside third-party cloud provider to provide communication and computer services, including email, internet access and file storage and sharing. Access passwords are changed on a regular basis. Access passwords are changed on a regular basis. All employees have received formal training on password controls and on email safety procedures. All employees have received formal training on password controls and on email safety procedures. Our policy requires all employees to send any suspicious emails to our contracted computer expert for evaluation. Our policy requires all employees to send any suspicious emails to our contracted computer expert for evaluation. Access to any sensitive databases is on a limited and need-to-know basis. Access to any sensitive databases is on a limited and need-to-know basis. Should there be a data breach, our board of directors is immediately notified. Should there be a data breach, the board of directors would be immediately notified. As of the filing date of this report, to the best of our knowledge, we have not encountered any cyber security incidents. As of the filing date of this report, there has been no cyber security incident encountered to the best of our knowledge.

The Microsoft cloud ecosystem, including Microsoft 365, Azure, SharePoint Online, Microsoft Defender, and Microsoft InTune, forms the backbone of our cybersecurity infrastructure. These platforms offer advanced security features such as data encryption in transit and at rest, network security controls, identity and access management, and threat protection capabilities. Microsoft’s constant investment in cybersecurity research and development ensures that we benefit from cutting-edge security technologies and practices.

6

Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
HTH 5 days ago
HASI 5 days ago
OSCR 5 days ago
HCSG 5 days ago
MTH 5 days ago
MORN 5 days ago
DOV 5 days ago
PLD 5 days ago
CPS 5 days ago
EQR 5 days ago
VRTX 5 days ago
JPM 5 days ago
NEE 5 days ago
WY 5 days ago
HR 5 days ago
AON 5 days ago
ROKU 5 days ago
KMI 5 days, 1 hour ago
FROG 5 days, 1 hour ago
VRT 5 days, 1 hour ago
EXAS 5 days, 1 hour ago
UBER 5 days, 1 hour ago
AMGN 5 days, 1 hour ago
TRUP 5 days, 1 hour ago
NTGR 5 days, 1 hour ago
INSP 5 days, 1 hour ago
LEA 5 days, 1 hour ago
AAP 5 days, 1 hour ago
LSCC 5 days, 1 hour ago
NWL 5 days, 1 hour ago
TRIP 5 days, 1 hour ago
OM 5 days, 1 hour ago
WAB 5 days, 1 hour ago
TEX 5 days, 1 hour ago
RHI 5 days, 2 hours ago
GPI 5 days, 2 hours ago
HBAN 5 days, 2 hours ago
FCX 5 days, 2 hours ago
AGCO 5 days, 2 hours ago
PII 5 days, 2 hours ago
CHRW 5 days, 2 hours ago
CSL 5 days, 2 hours ago
WEX 5 days, 2 hours ago
ATMU 5 days, 3 hours ago
MHO 5 days, 3 hours ago
ITW 5 days, 3 hours ago
SXT 5 days, 3 hours ago
AXTA 5 days, 3 hours ago
TROW 5 days, 4 hours ago
DCH 5 days, 4 hours ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard