Risk Factors Dashboard
Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.
View risk factors by ticker
Search filings by term
Risk Factors - MGYR
-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing
Not required for smaller reporting companies.
ITEM 1B. | Unresolved Staff Comments |
Not applicable.
ITEM 1C. | Cybersecurity |
The Board of Directors and Information Security Officer are responsible for overseeing the Information Security Program. The Board of Directors receives reports from, and oversees, IT Risk Assessment, Cybersecurity Risk Assessment, Annual IT Program Status Report, Vendor Management Risk Assessment, and Internal Vulnerability Reports and current Cyber Events briefings. The Board of Directors also makes budgeting, procedure, and policy decisions designed and intended to improve the Company’s residual risk.
The Technology and Security Committee consists of the Company’s senior management, the IT Management, and business unit management. The primary function of the Technology and Security Committee is to perform Strategic Planning, discuss hardware and software replacement, new projects, current cybersecurity threats, and ongoing cybersecurity issues and threats. The IT Director provides an IT status report to the Board of Directors on a Monthly basis.
The Company has adopted an Incident Response Plan (the “Plan”) to monitor, detect, mitigate and remediate cybersecurity incidents. The Plan requires that business unit management have a working knowledge of the Company’s Information Security Program and Incident Response Policies. Pursuant to the Plan, the IT Director identifies information owners for sensitive customer information and creates an incident response team. Each Department Manager, upon notification of a potential unauthorized access, manipulation of data or theft of any item identified under the Gramm-Leach-Bliley Act (the “GLBA”) Inventory and Asset Classification, is responsible for further assessing the situation in order to document the suspected or actual breach, and forward the appropriate documentation to IT Management. The documentation of the suspected or actual incident includes the following:
(a) Identify the nature and scope of the incident;
(b) Identify the information systems affected;
(c) Identify the types of customer information potentially affected.
Once the Incident Response Team has determined that unauthorized access, manipulation of data or theft of any item identified under GLBA Inventory and Asset Classification has occurred, Executive Management, the Information Security Officer, the Compliance Officer and the Information Technology Management must be contacted immediately.
If theft of any item identified under GLBA Inventory and Asset Classification has occurred, and it cannot be determined what specific information was included on the Asset, the Asset is treated as if it contained sensitive customer information and Senior Management, the Information Security Officer, the Compliance Officer and Information Technology Management must be contacted immediately. If Management declares an incident or if there is a confirmed theft or loss of customer information, appropriate regulatory authorities, law enforcement, and legal counsel are notified.
18
During the fiscal year ended September 30, 2024, the risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, have not materially affected the Company, its business strategy, results of operations, or financial condition.
Recently Filed
Ticker * | File Date |
---|---|
AVGO | 17 hours ago |
TOL | 18 hours ago |
CSPI | 19 hours ago |
CIEN | 19 hours ago |
A | 1 day, 16 hours ago |
ARKR | 1 day, 17 hours ago |
LTCH | 1 day, 17 hours ago |
LIVE | 1 day, 17 hours ago |
HEI | 1 day, 18 hours ago |
ESOA | 1 day, 18 hours ago |
AVO | 1 day, 18 hours ago |
JOB | 1 day, 18 hours ago |
ABM | 1 day, 18 hours ago |
MGYR | 1 day, 18 hours ago |
OPXS | 1 day, 19 hours ago |
HPE | 2 days, 2 hours ago |
NDSN | 2 days, 17 hours ago |
HOV | 2 days, 18 hours ago |
NVOS | 2 days, 18 hours ago |
YCBD | 2 days, 18 hours ago |
TTC | 2 days, 22 hours ago |
APDN | 3 days, 18 hours ago |
KEYS | 3 days, 18 hours ago |
SONN | 4 days, 2 hours ago |
NMTC | 4 days, 2 hours ago |
EPIX | 4 days, 4 hours ago |
UPXI | 4 days, 17 hours ago |
CMP | 4 days, 17 hours ago |
QIPT | 4 days, 17 hours ago |
MITK | 4 days, 18 hours ago |
ALID | 4 days, 18 hours ago |
RICK | 4 days, 18 hours ago |
ASRE | 4 days, 19 hours ago |
VERU | 4 days, 19 hours ago |
NX | 5 days, 4 hours ago |
FSFG | 1 week ago |
EDSA | 1 week ago |
ODRS | 1 week ago |
PRKA | 1 week ago |
AMAT | 1 week ago |
GNSS | 1 week ago |
LEE | 1 week ago |
ESSA | 1 week ago |
HPQ | 1 week, 1 day ago |
SDCH | 1 week, 1 day ago |
LPTV | 1 week, 1 day ago |
ASYS | 1 week, 1 day ago |
NGVC | 1 week, 1 day ago |
GTIM | 1 week, 1 day ago |
LQDT | 1 week, 1 day ago |