Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - CVAT

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

ITEM 1A. RISK FACTORS

Not applicable for smaller reporting companies.

ITEM 1B. UNRESOLVED STAFF COMMENTS

None.

ITEM 1C. CYBERSECURITY

Risk

The manner in which we store and/or transmit sensitive data in connection with our research and development and our day-to-day operations. We recognize the importance of assessing, identifying, and managing material risks associated with cybersecurity threats, as such term is defined in Item 106(a) of Regulation S-K. These risks include, among other things: operational risks, intellectual property theft, fraud, extortion, harm to employees and violation of data privacy or security laws.

Identifying and assessing cybersecurity risk is integrated into our overall risk management systems and processes. Cybersecurity risks related to our business, technical operations, privacy and compliance issues are identified through review by our internal information technology governance, risk and compliance policies. To defend, detect and respond to cybersecurity incidents, we, among other things: may conduct proactive privacy and cybersecurity reviews of systems and applications, audit applicable data, conduct employee training, monitor emerging laws and regulations related to data protection and information security and implement appropriate changes.

Our risk management program also assesses third party risks, and we perform third-party risk management to identify and mitigate risks from our vendors, suppliers, and other business partners associated with our use of third-party service providers. Cybersecurity risks are evaluated when determining the selection and oversight of applicable third-party service providers and potential fourth-party risks when handling and/or processing our employee, business or customer data.

Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
HRZN 5 days, 21 hours ago
HY 5 days, 21 hours ago
ARCT 5 days, 21 hours ago
QSI 5 days, 21 hours ago
FTEK 5 days, 21 hours ago
ACEL 5 days, 21 hours ago
RYM 5 days, 21 hours ago
ANAB 5 days, 21 hours ago
PRKS 5 days, 21 hours ago
ABVC 5 days, 21 hours ago
FTCO 5 days, 21 hours ago
CVEO 5 days, 21 hours ago
DAR 5 days, 21 hours ago
ELVN 5 days, 21 hours ago
SANA 5 days, 21 hours ago
UPLD 5 days, 21 hours ago
HNGE 5 days, 21 hours ago
JRVR 5 days, 21 hours ago
IMNM 5 days, 21 hours ago
CENX 5 days, 21 hours ago
ADSK 5 days, 21 hours ago
RIGL 5 days, 21 hours ago
CALC 5 days, 21 hours ago
STAA 5 days, 21 hours ago
EVOX 5 days, 21 hours ago
CODQL 5 days, 23 hours ago
HLIO 5 days, 23 hours ago
CFFI 6 days ago
SRTA 6 days, 1 hour ago
YORW 6 days, 2 hours ago
CBL 6 days, 3 hours ago
INGM 6 days, 4 hours ago
AMRC 6 days, 5 hours ago
HNI 6 days, 5 hours ago
PRME 6 days, 5 hours ago
OFS 6 days, 5 hours ago
SRRK 6 days, 6 hours ago
PASG 6 days, 6 hours ago
AMLX 6 days, 6 hours ago
HYMC 6 days, 17 hours ago
ANIK 6 days, 18 hours ago
DAAQ 6 days, 19 hours ago
RAAQ 6 days, 19 hours ago
HTLD 6 days, 19 hours ago
NBBK 6 days, 20 hours ago
AMRN 6 days, 20 hours ago
CECO 6 days, 20 hours ago
SIVR 6 days, 20 hours ago
GLTR 6 days, 20 hours ago
PALL 6 days, 20 hours ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard