Risk Factors Dashboard
Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.
View risk factors by ticker
Search filings by term
Risk Factors - TWOH
-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing
Not applicable to smaller reporting companies.
ITEM 1B. UNRESOLVED STAFF COMMENTS
None
ITEM 1C. CYBERSECURITY
We recognize the importance of identifying, assessing and managing material risks associated with cybersecurity threats, as such term is defined in Item 106(a) of Regulation S-K. These risks include, among other things: operational risks, intellectual property theft, fraud, extortion, harm to employees or customers and violation of data privacy or security laws.
The Company’s failure to protect personal information adequately and breaches in cyber security and data protection could have an adverse effect on its business.
A wide variety of provincial, state, national, and international laws and regulations apply to the collection, use, retention, protection, disclosure, transfer, and other processing of personal data. These data protection and privacy-related laws and regulations are evolving and being tested in courts and may result in ever-increasing regulatory and public scrutiny as well as escalating levels of enforcement and sanctions. Any actual or perceived loss, improper retention or misuse of certain information or alleged violations of laws and regulations relating to privacy, data protection and data security, and any relevant claims, could result in enforcement action against the Company, including fines, imprisonment of company officials and public censure, claims for damages by customers and other affected individuals, damage to the Company’s reputation and loss of goodwill (both in relation to existing customers and prospective customers), any of which could have an adverse effect on the Company’s operations, financial performance, and business. Evolving and changing definitions of personal data and personal information, within the European Union, the United States, and elsewhere, especially relating to classification of IP addresses, machine identification, location data, and other information, may limit or inhibit the Company’s ability to operate or expand its business, including limiting strategic partnerships that may involve the sharing of data. Any perception of privacy or security concerns or an inability to comply with applicable laws, regulations, policies, industry standards, contractual obligations or other legal obligations, even if unfounded, may result in additional cost and liability to the Company, harm its reputation and inhibit adoption of its products by current and future customers, and adversely affect the Company’s business, financial condition, and operating results.
The Company has implemented and maintained security measures intended to protect personally identifiable information. However, the Company’s security measures remain vulnerable to various threats posed by hackers and criminals. If the Company’s security measures are overcome and any personally identifiable information that the Company collect or store becomes subject to unauthorized access, it may be required to comply with costly and burdensome breach notification obligations. The Company may also be subject to investigations, enforcement actions and private lawsuits. In addition, any data security incident is likely to generate negative publicity and have a negative effect on the Company’s business.
We believe we maintain an information technology and cybersecurity program appropriate for a company our size, taking into account our operations and risks. We are committed to cybersecurity and vigilantly protecting all our resources and information from unauthorized access.
| 6 |
Recently Filed
| Ticker * | File Date |
|---|---|
| CHPG | 11 minutes ago |
| BWMG | 17 minutes ago |
| QNCX | 46 minutes ago |
| SOBR | an hour ago |
| ASPI | an hour ago |
| FGI | an hour ago |
| PLCE | an hour ago |
| TWOH | 2 hours ago |
| AAPI | 4 hours ago |
| BLNC | 4 hours ago |
| PGOL | 5 hours ago |
| CMLS | 9 hours ago |
| BB | 1 day ago |
| IXAQF | 1 day, 1 hour ago |
| TLYS | 1 day, 1 hour ago |
| BEEM | 1 day, 1 hour ago |
| URSB | 1 day, 1 hour ago |
| DFNS | 1 day, 2 hours ago |
| BYND | 1 day, 19 hours ago |
| ALCY | 1 day, 22 hours ago |
| HYEX | 1 day, 22 hours ago |
| MOBQ | 2 days ago |
| GAME | 2 days ago |
| PPSI | 2 days ago |
| HSPT | 2 days, 1 hour ago |
| BBGI | 2 days, 1 hour ago |
| BUDZ | 2 days, 2 hours ago |
| HBUV | 2 days, 2 hours ago |
| VIRC | 2 days, 4 hours ago |
| GRUSF | 2 days, 20 hours ago |
| SMTK | 2 days, 20 hours ago |
| SBMW | 3 days ago |
| AIEV | 3 days ago |
| SKIL | 3 days, 1 hour ago |
| QMCI | 3 days, 2 hours ago |
| JAGX | 3 days, 11 hours ago |
| CLCS | 3 days, 22 hours ago |
| CMBMF | 3 days, 23 hours ago |
| ELVG | 4 days, 1 hour ago |
| SMXT | 4 days, 1 hour ago |
| IQST | 4 days, 1 hour ago |
| JBK | 4 days, 6 hours ago |
| SAFX | 1 week, 3 days ago |
| RVRC | 1 week, 3 days ago |
| AIRS | 1 week, 3 days ago |
| CYCU | 1 week, 3 days ago |
| CBDY | 1 week, 3 days ago |
| GEMI | 1 week, 3 days ago |
| SOLC | 1 week, 3 days ago |
| ZVSA | 1 week, 3 days ago |