Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - MGYR

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

ITEM 1A.Risk Factors

Not required for smaller reporting companies.

ITEM 1B.Unresolved Staff Comments

Not applicable.

ITEM 1C.Cybersecurity

The Board of Directors and Information Security Officer are responsible for overseeing the Information Security Program. The Board of Directors receives reports from, and oversees, IT Risk Assessment, Cybersecurity Risk Assessment, Annual IT Program Status Report, Vendor Management Risk Assessment, and Internal Vulnerability Reports and current Cyber Events briefings. The Board of Directors also makes budgeting, procedure, and policy decisions designed and intended to improve the Company’s residual risk.

The Technology and Security Committee consists of the Company’s senior management, the IT Management, and business unit management. The primary function of the Technology and Security Committee is to perform Strategic Planning, discuss hardware and software replacement, new projects, current cybersecurity threats, and ongoing cybersecurity issues and threats. The IT Director provides an IT status report to the Board of Directors on a Monthly basis.

The Company has adopted an Incident Response Plan (the “Plan”) to monitor, detect, mitigate and remediate cybersecurity incidents. The Plan requires that business unit management have a working knowledge of the Company’s Information Security Program and Incident Response Policies. Pursuant to the Plan, the IT Director identifies information owners for sensitive customer information and creates an incident response team. Each Department Manager, upon notification of a potential unauthorized access, manipulation of data or theft of any item identified under the Gramm-Leach-Bliley Act (the “GLBA”) Inventory and Asset Classification, is responsible for further assessing the situation in order to document the suspected or actual breach, and forward the appropriate documentation to IT Management. The documentation of the suspected or actual incident includes the following:

(a) Identify the nature and scope of the incident;

(b) Identify the information systems affected;

(c) Identify the types of customer information potentially affected.

Once the Incident Response Team has determined that unauthorized access, manipulation of data or theft of any item identified under GLBA Inventory and Asset Classification has occurred, Executive Management, the Information Security Officer, the Compliance Officer and the Information Technology Management must be contacted immediately.

If theft of any item identified under GLBA Inventory and Asset Classification has occurred, and it cannot be determined what specific information was included on the Asset, the Asset is treated as if it contained sensitive customer information and Senior Management, the Information Security Officer, the Compliance Officer and Information Technology Management must be contacted immediately. If Management declares an incident or if there is a confirmed theft or loss of customer information, appropriate regulatory authorities, law enforcement, and legal counsel are notified.

18

During the fiscal year ended September 30, 2024, the risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, have not materially affected the Company, its business strategy, results of operations, or financial condition.

Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
AVGO 17 hours ago
TOL 18 hours ago
CSPI 19 hours ago
CIEN 19 hours ago
A 1 day, 16 hours ago
ARKR 1 day, 17 hours ago
LTCH 1 day, 17 hours ago
LIVE 1 day, 17 hours ago
HEI 1 day, 18 hours ago
ESOA 1 day, 18 hours ago
AVO 1 day, 18 hours ago
JOB 1 day, 18 hours ago
ABM 1 day, 18 hours ago
MGYR 1 day, 18 hours ago
OPXS 1 day, 19 hours ago
HPE 2 days, 2 hours ago
NDSN 2 days, 17 hours ago
HOV 2 days, 18 hours ago
NVOS 2 days, 18 hours ago
YCBD 2 days, 18 hours ago
TTC 2 days, 22 hours ago
APDN 3 days, 18 hours ago
KEYS 3 days, 18 hours ago
SONN 4 days, 2 hours ago
NMTC 4 days, 2 hours ago
EPIX 4 days, 4 hours ago
UPXI 4 days, 17 hours ago
CMP 4 days, 17 hours ago
QIPT 4 days, 17 hours ago
MITK 4 days, 18 hours ago
ALID 4 days, 18 hours ago
RICK 4 days, 18 hours ago
ASRE 4 days, 19 hours ago
VERU 4 days, 19 hours ago
NX 5 days, 4 hours ago
FSFG 1 week ago
EDSA 1 week ago
ODRS 1 week ago
PRKA 1 week ago
AMAT 1 week ago
GNSS 1 week ago
LEE 1 week ago
ESSA 1 week ago
HPQ 1 week, 1 day ago
SDCH 1 week, 1 day ago
LPTV 1 week, 1 day ago
ASYS 1 week, 1 day ago
NGVC 1 week, 1 day ago
GTIM 1 week, 1 day ago
LQDT 1 week, 1 day ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard