Risk Factors Dashboard
Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.
View risk factors by ticker
Search filings by term
Risk Factors - CHMX
-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing
Smaller reporting companies are not required to provide the information required by this item.
ITEM 1B. UNRESOLVED STAFF COMMENTS
None.
ITEM 1C. CYBERSECURITY DISCLOSURE
The analysis of susceptibility to cyberattack distinguishes between two main types of risk, the first area being the business that relates to the technology and the second, more generally, as relates to the activities of the administration and management and encompasses the corporate records of the Company. In addition, the needs and requirements of cyber security control vary according to whether the person is operating from a mobile phone or a computer. Moreover, issues relating to cybersecurity are overshadowed by the fact that the Company operates from a variety of different offices in different companies; each employee operates using their own personal computer and in most cases this is also used for personal purposes resulting in an enhanced risk of breach from such alternative use. There is no single backup system for all files to preserve corporate records.
There is no single required operating system (although most coworkers use MacBook) nor single software required for all coworkers, except Microsoft Word, Excel and PowerPoint, however, different employees operate different versions of these software. Employees are expected, but not required to keep their software up to date.
The Company has no established process for assessing, identifying, and managing any material risks from cybersecurity threats. Breaches are not required to be reported.
All personnel are expected to maintain a computer free from games and potentially hazardous sites such as non-solicited offers of services, purchases or investments, get rich-quick-schemes, sites with pornographic content. Personnel are required to maintain good internet security software and regularly to check their computers for cyber breaches or viruses.
Recently Filed
Ticker * | File Date |
---|---|
MRKY | 18 hours ago |
CSLR | 18 hours ago |
CHMX | 19 hours ago |
KORE | 19 hours ago |
SCPX | 20 hours ago |
FORL | 20 hours ago |
KATX | 21 hours ago |
ITOX | 22 hours ago |
PWDY | 1 day, 2 hours ago |
VHAI | 1 day, 3 hours ago |
NAYA | 1 day, 15 hours ago |
GLST | 1 day, 16 hours ago |
GITS | 1 day, 16 hours ago |
FRST | 1 day, 19 hours ago |
ETWO | 1 day, 19 hours ago |
KIDZ | 1 day, 19 hours ago |
CRWE | 1 day, 19 hours ago |
KAYS | 1 day, 21 hours ago |
SRRE | 2 days, 1 hour ago |
STRG | 2 days, 14 hours ago |
JMTM | 2 days, 18 hours ago |
NTRB | 2 days, 18 hours ago |
EVLV | 2 days, 18 hours ago |
QIND | 3 days, 1 hour ago |
CASK | 3 days, 4 hours ago |
GDLG | 5 days, 19 hours ago |
TRMB | 5 days, 20 hours ago |
MIND | 5 days, 21 hours ago |
MVNC | 6 days ago |
NBBI | 6 days, 3 hours ago |
APOG | 6 days, 22 hours ago |
HELE | 1 week ago |
BKYI | 1 week ago |
TOGI | 1 week ago |
STZ | 1 week ago |
AYR | 1 week ago |
CCTC | 1 week, 1 day ago |
OSRH | 1 week, 1 day ago |
COPR | 1 week, 1 day ago |
AZZ | 1 week, 2 days ago |
ACI | 1 week, 2 days ago |
BSPK | 1 week, 2 days ago |
LTRY | 1 week, 3 days ago |
HOFT | 1 week, 5 days ago |
STCB | 1 week, 5 days ago |
SCS | 1 week, 6 days ago |
WNLV | 1 week, 6 days ago |
TGAAF | 1 week, 6 days ago |
PLCE | 1 week, 6 days ago |
BBW | 2 weeks ago |