Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - TWOH

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

ITEM 1A. RISK FACTORS

Not applicable to smaller reporting companies.

ITEM 1B. UNRESOLVED STAFF COMMENTS

None

ITEM 1C. CYBERSECURITY

Risk Management and Strategy

We recognize the importance of identifying, assessing and managing material risks associated with cybersecurity threats, as such term is defined in Item 106(a) of Regulation S-K. These risks include, among other things: operational risks, intellectual property theft, fraud, extortion, harm to employees or customers and violation of data privacy or security laws.

Identifying and assessing cybersecurity risk is integrated into our overall risk management systems and processes. Cybersecurity risks related to our business, technical operations, privacy and compliance issues are identified and addressed through a multi-faceted approach including third party assessments, internal IT controls, governance, risk and compliance reviews.

The Company’s failure to protect personal information adequately and breaches in cyber security and data protection could have an adverse effect on its business.

A wide variety of provincial, state, national, and international laws and regulations apply to the collection, use, retention, protection, disclosure, transfer, and other processing of personal data. These data protection and privacy-related laws and regulations are evolving and being tested in courts and may result in ever-increasing regulatory and public scrutiny as well as escalating levels of enforcement and sanctions. Any actual or perceived loss, improper retention or misuse of certain information or alleged violations of laws and regulations relating to privacy, data protection and data security, and any relevant claims, could result in enforcement action against the Company, including fines, imprisonment of company officials and public censure, claims for damages by customers and other affected individuals, damage to the Company’s reputation and loss of goodwill (both in relation to existing customers and prospective customers), any of which could have an adverse effect on the Company’s operations, financial performance, and business. Evolving and changing definitions of personal data and personal information, within the European Union, the United States, and elsewhere, especially relating to classification of IP addresses, machine identification, location data, and other information, may limit or inhibit the Company’s ability to operate or expand its business, including limiting strategic partnerships that may involve the sharing of data. Any perception of privacy or security concerns or an inability to comply with applicable laws, regulations, policies, industry standards, contractual obligations or other legal obligations, even if unfounded, may result in additional cost and liability to the Company, harm its reputation and inhibit adoption of its products by current and future customers, and adversely affect the Company’s business, financial condition, and operating results.

The Company has implemented and maintained security measures intended to protect personally identifiable information. However, the Company’s security measures remain vulnerable to various threats posed by hackers and criminals. If the Company’s security measures are overcome and any personally identifiable information that the Company collect or store becomes subject to unauthorized access, it may be required to comply with costly and burdensome breach notification obligations. The Company may also be subject to investigations, enforcement actions and private lawsuits. In addition, any data security incident is likely to generate negative publicity and have a negative effect on the Company’s business.

We believe we maintain an information technology and cybersecurity program appropriate for a company our size, taking into account our operations and risks. We are committed to cybersecurity and vigilantly protecting all our resources and information from unauthorized access. Our cybersecurity approach incorporates external resources to manage and monitor the evolving threat landscape, effective board oversight of cybersecurity risks and knowledgeable teams responsible for preventing and detecting cybersecurity risks.

6

Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
CHPG 11 minutes ago
BWMG 17 minutes ago
QNCX 46 minutes ago
SOBR an hour ago
ASPI an hour ago
FGI an hour ago
PLCE an hour ago
TWOH 2 hours ago
AAPI 4 hours ago
BLNC 4 hours ago
PGOL 5 hours ago
CMLS 9 hours ago
BB 1 day ago
IXAQF 1 day, 1 hour ago
TLYS 1 day, 1 hour ago
BEEM 1 day, 1 hour ago
URSB 1 day, 1 hour ago
DFNS 1 day, 2 hours ago
BYND 1 day, 19 hours ago
ALCY 1 day, 22 hours ago
HYEX 1 day, 22 hours ago
MOBQ 2 days ago
GAME 2 days ago
PPSI 2 days ago
HSPT 2 days, 1 hour ago
BBGI 2 days, 1 hour ago
BUDZ 2 days, 2 hours ago
HBUV 2 days, 2 hours ago
VIRC 2 days, 4 hours ago
GRUSF 2 days, 20 hours ago
SMTK 2 days, 20 hours ago
SBMW 3 days ago
AIEV 3 days ago
SKIL 3 days, 1 hour ago
QMCI 3 days, 2 hours ago
JAGX 3 days, 11 hours ago
CLCS 3 days, 22 hours ago
CMBMF 3 days, 23 hours ago
ELVG 4 days, 1 hour ago
SMXT 4 days, 1 hour ago
IQST 4 days, 1 hour ago
JBK 4 days, 6 hours ago
SAFX 1 week, 3 days ago
RVRC 1 week, 3 days ago
AIRS 1 week, 3 days ago
CYCU 1 week, 3 days ago
CBDY 1 week, 3 days ago
GEMI 1 week, 3 days ago
SOLC 1 week, 3 days ago
ZVSA 1 week, 3 days ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard