Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - MGYR

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

ITEM 1A.Risk Factors

Not required for smaller reporting companies.

ITEM 1B.Unresolved Staff Comments

Not applicable.

ITEM 1C.Cybersecurity

The Board of Directors and Information Security Officer are responsible for overseeing the Information Security Program. The Board of Directors receives reports from, and oversees, IT Risk Assessment, Cybersecurity Risk Assessment, Annual IT Program Status Report, Vendor Management Risk Assessment, and Internal Vulnerability Reports and current Cyber Events briefings. The Board of Directors also makes budgeting, procedure, and policy decisions designed and intended to improve the Company’s residual risk.

The Technology and Security Committee consists of the Company’s senior management, the IT Management, and business unit management. The primary function of the Technology and Security Committee is to perform Strategic Planning, discuss hardware and software replacement, new projects, current cybersecurity threats, and ongoing cybersecurity issues and threats. The IT Director provides an IT status report to the Board of Directors on a monthly basis.

The Company has adopted an Incident Response Plan (the “Plan”) to monitor, detect, mitigate and remediate cybersecurity incidents. The Plan requires that business unit management have a working knowledge of the Company’s Information Security Program and Incident Response Policies. Pursuant to the Plan, the IT Director identifies information owners for sensitive customer information and creates an incident response team. Each Department Manager, upon notification of a potential unauthorized access, manipulation of data or theft of any item identified under the Gramm-Leach-Bliley Act (the “GLBA”) Inventory and Asset Classification, is responsible for further assessing the situation in order to document the suspected or actual breach and forward the appropriate documentation to IT Management. The documentation of the suspected or actual incident includes the following:

(a) Identify the nature and scope of the incident;

(b) Identify the information systems affected;

(c) Identify the types of customer information potentially affected.

18

Once the Incident Response Team has determined that unauthorized access, manipulation of data or theft of any item identified under GLBA Inventory and Asset Classification has occurred, Executive Management, the Information Security Officer, the Compliance Officer and the Information Technology Management must be contacted immediately.

If theft of any item identified under GLBA Inventory and Asset Classification has occurred, and it cannot be determined what specific information was included on the Asset, the Asset is treated as if it contained sensitive customer information and Senior Management, the Information Security Officer, the Compliance Officer and Information Technology Management must be contacted immediately. If Management declares an incident or if there is a confirmed theft or loss of customer information, appropriate regulatory authorities, law enforcement, and legal counsel are notified.

During the fiscal year ended September 30, 2025, the risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, have not materially affected the Company, its business strategy, results of operations, or financial condition.

Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
TRCK an hour ago
MGYR 2 hours ago
USBC 3 hours ago
BLIN 18 hours ago
SDCH 20 hours ago
AVO 20 hours ago
ARKR 20 hours ago
AVGO 20 hours ago
OCC 1 day, 1 hour ago
LESL 1 day, 3 hours ago
HPE 1 day, 4 hours ago
NNE 1 day, 4 hours ago
DE 1 day, 4 hours ago
FCEL 1 day, 5 hours ago
LIVE 1 day, 19 hours ago
ATHR 1 day, 19 hours ago
NDSN 1 day, 20 hours ago
JOB 1 day, 20 hours ago
KEYS 1 day, 20 hours ago
TTC 1 day, 22 hours ago
PLAB 1 day, 22 hours ago
VERU 2 days, 2 hours ago
OPXS 2 days, 3 hours ago
SKYI 2 days, 20 hours ago
PSPX 2 days, 21 hours ago
ENRT 3 days, 17 hours ago
INHD 3 days, 19 hours ago
GNSS 3 days, 20 hours ago
ESOA 3 days, 20 hours ago
QIPT 4 days, 5 hours ago
EURK 6 days, 15 hours ago
NX 6 days, 19 hours ago
FSFG 6 days, 19 hours ago
EDSA 6 days, 20 hours ago
PRKA 6 days, 20 hours ago
ODRS 6 days, 20 hours ago
AMAT 6 days, 20 hours ago
JOUT 6 days, 22 hours ago
CIEN 6 days, 23 hours ago
PFX 1 week ago
CMP 1 week ago
FWDI 1 week ago
NGVC 1 week ago
MITK 1 week ago
HPQ 1 week, 1 day ago
DLHC 1 week, 1 day ago
ASYS 1 week, 1 day ago
GNVR 1 week, 2 days ago
REVG 1 week, 2 days ago
GENC 1 week, 2 days ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard