IIOT-OXYS, Inc. - (ITOX)
10-K Filing Date: July 03, 2024
For purposes of this section:
“Cybersecurity incident” means an unauthorized occurrence, or a series of related unauthorized occurrences, on or conducted through our information systems that jeopardizes the confidentiality, integrity, or availability of our information systems or any information residing therein.
“Cybersecurity threat” means any potential unauthorized occurrence on or conducted through our information systems that may result in adverse effects on the confidentiality, integrity, or availability of our information systems or any information residing therein.
“Information systems” means electronic information resources, owned or used by us, including physical or virtual infrastructure controlled by such information resources, or components thereof, organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of our information to maintain or support our operations.
5 |
Risk Management and Strategy
Our website is monitored by a third party to check if our website is secure. We are prepared to inform all parties necessary if any breach of cyber-security were to happen. We have never had this problem and so we have never had to inform consultants, auditors, or other third parties.
We have never had a breach of cyber-security at any point in our past. The risk to us of cybersecurity threats is in data storage of customer questions and emails. A breach of customers’ data could negatively materially affect our public trust and could result in loss of customers and revenue.
Governance
Our board of directors has no specific processes for monitoring cybersecurity within the company. There is no subcommittee specifically for monitoring cybersecurity in the company.
Our management monitors our websites and online accounts frequently to manage risks associated with cyber-security risks. Our management communicates with our board on matters of cybersecurity but, has not had to inform them of any breaches thus far.