TABLE TRAC INC - (TBTC)

10-K Filing Date: March 29, 2024
Item 1B. Unresolved Staff Comments.

 

Not applicable.

 

Item 1C. Cyber Security.

 

Risk Management and Strategy

 

As of December 31, 2023, cybersecurity and data protection policies and procedures have been implemented. Risks from cybersecurity threats are regularly evaluated as a part of our broader risk management activities and as a fundamental component of our internal control system. Our employees receive awareness notices and are informed about new email threats and recent phishing attempts and email frauds. We have capable employees with significant expertise in cybersecurity related to our industry. We evaluate, create and deploy advanced technologies for continuous cybersecurity monitoring across our information technology environment which are designed to prevent, detect, and minimize cybersecurity attacks, as well as alert management of such attacks.

 

Our Information Technology General Controls are firmly established based on recognized industry standards and cover areas such as risk management, data backup, and disaster recovery.

 

To date, we are not aware of any cybersecurity threats or incidents that have materially affected or are reasonably likely to materially affect our business, results of operations or financial condition. For additional information about our cybersecurity risks, see “Any disruption in our software and related information technology systems due to a cyber incident could adversely affect our business, operating results and financial condition” under the heading “Risk Factors Relating To Our Business” in Item 1A. of this Annual Report.

 

Governance

 

The Board of Directors has oversight of the cyber security risk management and strategy. The senior leadership, including our Chief Executive Officer and Chief Financial Officer, regularly meets with and provides periodic briefings to our Board of Directors regarding our cybersecurity risks and activities, including any recent cybersecurity incidents and related responses, cybersecurity systems testing, activities of third parties, and the like. Our Chief Executive Officer and Chief Financial Officer are responsible for implementing and maintaining our cybersecurity risk assessment and management processes.