Annual report [Section 13 and 15(d), not S-K Item 405]

Cybersecurity Risk Management, Strategy, and Governance

v3.25.0.1
Cybersecurity Risk Management, Strategy, and Governance
12 Months Ended
Nov. 30, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

ITEM 1C. CYBERSECURITY.

Risk Management Strategy

We have established policies and processes for assessing, identifying, and managing material risks from cybersecurity threats, and have integrated these processes into our overall risk management systems and processes. We routinely assess material risks from cybersecurity threats, including any potential unauthorized occurrence on or conducted through our information systems that may result in adverse effects on the confidentiality, integrity, or availability of our information systems or any information residing therein.

We have begun to conduct risk assessments at least annually to identify cybersecurity threats. These risk assessments include identifying reasonably foreseeable potential internal and external risks, the likelihood of occurrence and any potential damage that could result from such risks, and the sufficiency of existing policies, procedures, systems, controls and other safeguards we have put in place to manage such risks. Our risk management process also encompasses cybersecurity risks associated with the use of our major third-party vendors and service providers. Following these risk assessments, we design, implement, and maintain reasonable safeguards to minimize the identified risks; reasonably address any identified gaps in existing safeguards; update existing safeguards as necessary; and monitor the effectiveness of our safeguards.

We believe we have allocated adequate resources related to our cybersecurity risk management processes and have designated our Chief Information Officer with the responsibility of managing the cybersecurity risk assessment and mitigation process with the oversight of the Chief Financial Officer responsible for the consolidated financial statements for the year ended November 30, 2024. As part of our overall risk management program, we provide cybersecurity training to employees in high-risk.

Governance

One of the key functions of our Board of Directors is informed oversight of our risk management process, including risks arising from cybersecurity threats. Our Board of Directors is responsible for monitoring and assessing strategic risk exposure, and our executive officers are responsible for the day-to-day management of the material risks we face. Our Board of Directors administers its cybersecurity risk oversight function directly as a whole.

Our Chief Information Officer is primarily responsible for assessing and managing material risks from cybersecurity threats on a day-to-day basis.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] We have established policies and processes for assessing, identifying, and managing material risks from cybersecurity threats, and have integrated these processes into our overall risk management systems and processes.
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Board of Directors Oversight [Text Block]

Governance

One of the key functions of our Board of Directors is informed oversight of our risk management process, including risks arising from cybersecurity threats. Our Board of Directors is responsible for monitoring and assessing strategic risk exposure, and our executive officers are responsible for the day-to-day management of the material risks we face. Our Board of Directors administers its cybersecurity risk oversight function directly as a whole.

Our Chief Information Officer is primarily responsible for assessing and managing material risks from cybersecurity threats on a day-to-day basis
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] One of the key functions of our Board of Directors is informed oversight of our risk management process, including risks arising from cybersecurity threats
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Board of Directors is responsible for monitoring and assessing strategic risk exposure, and our executive officers are responsible for the day-to-day management of the material risks we face. Our Board of Directors administers its cybersecurity risk oversight function directly as a whole.
Cybersecurity Risk Role of Management [Text Block]

One of the key functions of our Board of Directors is informed oversight of our risk management process, including risks arising from cybersecurity threats. Our Board of Directors is responsible for monitoring and assessing strategic risk exposure, and our executive officers are responsible for the day-to-day management of the material risks we face. Our Board of Directors administers its cybersecurity risk oversight function directly as a whole.

Cybersecurity Risk Management Positions or Committees Responsible [Text Block]

Our Chief Information Officer is primarily responsible for assessing and managing material risks from cybersecurity threats on a day-to-day basis.