We could not find any results for:
Make sure your spelling is correct or try broadening your search.
Share Name | Share Symbol | Market | Type |
---|---|---|---|
Akoustis Technologies Inc | NASDAQ:AKTS | NASDAQ | Common Stock |
Price Change | % Change | Share Price | Bid Price | Offer Price | High Price | Low Price | Open Price | Shares Traded | Last Trade | |
---|---|---|---|---|---|---|---|---|---|---|
0.00 | 0.00% | 0.0592 | 0.0581 | 0.0597 | 0 | 00:00:00 |
UNITED STATES
SECURITIES AND EXCHANGE COMMISSION
WASHINGTON, D.C. 20549
FORM
(Amendment No. 1)
(Mark One)
For the fiscal year ended
or
For the transition period from ____________________ to ____________________
Commission file number:
(Exact name of registrant as specified in its charter)
(State or other jurisdiction of incorporation or organization) | (IRS Employer Identification No.) | |
(Address of principal executive offices) | (Postal Code) |
Registrant’s telephone number, including area code:
Securities registered under Section 12(b) of the Act:
Title of Each Class: | Trading Symbol | Name of each exchange on which registered: | ||
The Nasdaq Stock Market LLC ( |
Securities registered under Section 12(g) of the Act:
None
Indicate by check mark if the registrant is a
well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes ☐
Indicate by check mark if the registrant is not
required to file reports pursuant to Section 13 or 15(d) of the Exchange Act. Yes ☐
Indicate by check mark whether the registrant
(1) has filed all reports required to be filed by Section 13 or 15(d) of the Exchange Act during the preceding 12 months (or for such
shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past
90 days.
Indicate by check mark whether the registrant
has submitted electronically every Interactive Data File required to be submitted pursuant to Rule 405 of Regulation S-T during the preceding
12 months (or for such shorter period that the registrant was required to submit such files).
Indicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, smaller reporting company, or an emerging growth company. See the definitions of “large accelerated filer,” “accelerated filer,” “smaller reporting company,” and “emerging growth company” in Rule 12b-2 of the Exchange Act.
Large Accelerated Filer | ☐ | Accelerated Filer | ☐ | |
☒ | Smaller reporting company | |||
Emerging growth company |
If an emerging growth company, indicate by check mark if the registrant has elected not to use the extended transition period for complying with any new or revised financial accounting standards provided pursuant to Section 13(a) of the Exchange Act. ☐
Indicate by check mark whether the registrant
has filed a report on and attestation to its management’s assessment of the effectiveness of its internal control over financial
reporting under Section 404(b) of the Sarbanes-Oxley Act (15 U.S.C. 7262(b)) by the registered public accounting firm that prepared or
issued its audit report.
If securities are registered pursuant to Section
12(b) of the Act, indicate by check mark whether the financial statements of the registrant included in the filing reflect the correction
of an error to previously issued financial statements.
Indicate by check mark whether any of those error corrections are restatements that required a recovery analysis of incentive-based compensation received by any of the registrant’s executive officers during the relevant recovery period pursuant to §240.10D-1(b). ☐
Indicate by check mark whether the registrant
is a shell company (as defined in Rule 12b-2 of the Exchange Act). Yes ☐ No
The aggregate market value of the registrant’s
common stock, par value $0.001 per share (“Common Stock”), held by non-affiliates on December 31, 2023 was approximately $
As of October 2, 2024, there were
Auditor Name: | Auditor Location: | Auditor Firm ID: | ||
EXPLANATORY NOTE
PART I
Item 1C. Cybersecurity
We rely upon internally and externally managed information technology systems and networks for the collection and storage of sensitive data and business information. We approach cybersecurity risks with a comprehensive risk management and governance strategy designed to assess, identify, and manage cybersecurity risks to our business.
Risk Management and Strategy
Our cybersecurity program is designed to detect cybersecurity threats and vulnerabilities, protect our information systems from such threats, and ensure the confidentiality, integrity, and availability of systems and information used, owned, or managed by us. Our focus is on protecting sensitive information, such as the personal information of our customers and employees, and confidential business information that a competitor or a malicious actor could leverage. Our cybersecurity program has several components, including the adoption of information security protocols, standards, and guidelines consistent with industry best practices; engaging third-party service providers to conduct security assessments; performing periodic internal audits of our cybersecurity protocols. We adhere to the National Institute for Standards and Technology (NIST) SP 800-171 and Cybersecurity Maturity Model Certification (CMMC) 2.0 frameworks, which provide a set of standards, guidelines, and best practices to manage cybersecurity-related risks.
We have established policies and processes for assessing, identifying, and managing material risk from cybersecurity threats and have integrated these processes into our overall risk management systems and processes. We conduct regular risk assessments to identify cybersecurity threats and assessments in the event of a material change in our business practices that may affect information systems that are vulnerable to such cybersecurity threats. These risk assessments include identifying reasonably foreseeable internal and external risks, the likelihood and potential damage that could result from such risks, and the sufficiency of existing policies, procedures, systems, and safeguards in place to manage such risks. Following these risk assessments, we implement and maintain reasonable safeguards to minimize identified risks, reasonably address any identified gaps in existing safeguards, and regularly monitor the effectiveness of our safeguards.
We have implemented technical solutions designed to protect our information systems from cybersecurity threats, including firewalls, intrusion prevention and detection systems, antimalware and endpoint protection functionality, and access and identity controls. We regularly evaluate, monitor, and improve these solutions. As part of our overall risk management system, we monitor and test our safeguards and train our employees on these safeguards, in collaboration with human resources, information technology, legal, compliance and ethics, and management. Personnel at all levels and departments are made aware of our cybersecurity policies through periodic training. Further training is performed on a scheduled basis, covering cybersecurity topics and overall security hygiene, which reflect current techniques and tactics employees may encounter.
We have experienced incidents in the past and may experience them in the future. However, we have not experienced any cybersecurity incidents that have been determined to affect us materially, our business strategy, results of operations, or financial condition. As external events evolve, we will continue to evaluate and address these conditions as needed in our Business Continuity and Incident Response programs. For additional information regarding risks from cybersecurity threats, please refer to “Item 1A. Risk Factors – General Risks – Security breaches and other disruptions could compromise our proprietary information and expose us to liability, which would cause our business and reputation to suffer.”
Governance
One of the key functions of our Board of Directors is informed oversight of our risk management process, including risks from cybersecurity threats. Our Board of Directors is responsible for monitoring and assessing strategic risk exposure, and our executive officers are responsible for the day-to-day management of the material risks we face. Our Board of Directors administers its cybersecurity risk oversight function directly as a whole, as well as through the IT Governance Committee.
Our Vice President of Information Technology regularly reports to our IT Governance Committee, which oversees our IT strategy, programs and risks, including the cybersecurity practices, procedures and controls management used to identify, assess and manage our key cybersecurity programs and risks, ensure the protection of the confidential intellectual property, information and data of the Company and its customers and ensure compliance with applicable data protection laws and regulations. Our Vice President of Information Technology has relevant experience of more than 25 years in information technology and cyber and information security, and he oversees our cybersecurity policies and processes, including those described in “Risk Management and Strategy” above. He also holds multiple certifications including Computer Information Systems Security Professional (CISSP), Certified in Information Systems Management (CISM), Certified in Information Systems Audit (CISA), Certified in Risk and Information Systems Control (CRISC), and CompTIA Advanced Security Practitioner (CASP+). Our Vice President of Information Technology monitors and stays informed about prevention, detection, mitigation, and remediation efforts through regular communication and reporting from our IT department, and through the use of technological tools and software and results from third party assessments. Our Vice President of Information Technology provides quarterly briefings to the IT Governance Committee regarding our company’s cybersecurity risks and activities, including any recent cybersecurity incidents and related responses, cybersecurity systems testing, and activities of third parties. Our IT Governance Committee provides regular updates to the Board of Directors on such reports.
1
PART IV
ITEM 15. EXHIBITS AND FINANCIAL STATEMENT SCHEDULES
The following Consolidated Financial Statements are set forth in Part II, Item 8 of the Original Report.
Consolidated Financial Statements
Consolidated Balance Sheets | F-4 |
Consolidated Statements of Operations | F-5 |
Consolidated Statements of Changes in Stockholders’ Equity (Deficit) | F-6 |
Consolidated Statements of Cash Flows | F-7 |
Notes to Consolidated Financial Statements | F-8 |
Financial Statement Schedules
All financial statement schedules are omitted because they are not applicable or the required information is shown in the financial statements or notes thereto.
2
Exhibits
EXHIBIT INDEX
3
4
* | Filed herewith |
† | Management contract or compensatory plan or arrangement |
5
SIGNATURES
Pursuant to the requirements of Section 13 or 15(d) of the Securities Exchange Act of 1934, as amended, the Registrant has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized.
AKOUSTIS TECHNOLOGIES, INC. | ||
Dated: October 11, 2024 | By: | /s/ Kenneth E. Boller |
Kenneth E. Boller | ||
Chief Financial Officer |
6
Exhibit 31.3
CERTIFICATION PURSUANT TO RULE 13a-14(a) OR 15d-14(a)
OF THE SECURITIES EXCHANGE ACT OF 1934
I, Kamran Cheema, certify that:
1. | I have reviewed this Amendment No. 1 to the Annual Report on Form 10-K of Akoustis Technologies, Inc.; and |
2. | Based on my knowledge, this report does not contain any untrue statement of a material fact or omit to state a material fact necessary to make the statements made, in light of the circumstances under which such statements were made, not misleading with respect to the period covered by this report; |
Date: October 11, 2024 | /s/ Kamran Cheema |
Kamran Cheema | |
Chief Executive Officer | |
(Principal Executive Officer) |
Exhibit 31.4
CERTIFICATION PURSUANT TO RULE 13a-14(a) OR 15d-14(a)
OF THE SECURITIES EXCHANGE ACT OF 1934
I, Kenneth E. Boller, certify that:
1. | I have reviewed this Amendment No. 1 to the Annual Report on Form 10-K of Akoustis Technologies, Inc.; and |
2. | Based on my knowledge, this report does not contain any untrue statement of a material fact or omit to state a material fact necessary to make the statements made, in light of the circumstances under which such statements were made, not misleading with respect to the period covered by this report; |
Date: October 11, 2024 | /s/ Kenneth E. Boller |
Kenneth E. Boller | |
Chief Financial Officer | |
(Principal Financial and Accounting Officer) |
Document And Entity Information - USD ($) $ in Millions |
12 Months Ended | ||
---|---|---|---|
Jun. 30, 2024 |
Oct. 02, 2024 |
Dec. 31, 2023 |
|
Document Information Line Items | |||
Entity Registrant Name | AKOUSTIS TECHNOLOGIES, INC. | ||
Trading Symbol | AKTS | ||
Document Type | 10-K/A | ||
Current Fiscal Year End Date | --06-30 | ||
Entity Common Stock, Shares Outstanding | 154,590,918 | ||
Entity Public Float | $ 60.4 | ||
Amendment Flag | true | ||
Amendment Description | Akoustis Technologies, Inc. (the “Company”) is filing this Amendment No. 1 on Form 10-K/A for the fiscal year ended June 30, 2024 to amend the Annual Report on Form 10-K that was originally filed on October 8, 2024 (the “Original Report”) to include Item 1C. Cybersecurity. This Amendment No. 1 also updates, amends and supplements Part IV, Item 15 of the Original Report to include the filing of new Exhibits 31.3 and 31.4, certifications of our Chief Executive Officer and Chief Financial Officer, pursuant to Rule 13a-14(a) of the Securities Exchange Act of 1934, as amended. No other changes have been made to the Original Report, and this amended Annual Report is presented as of the filing date of the Original Report and does not reflect events occurring after that date or modify or update disclosures in any way other than as described herein. | ||
Entity Central Index Key | 0001584754 | ||
Entity Current Reporting Status | Yes | ||
Entity Voluntary Filers | No | ||
Entity Filer Category | Non-accelerated Filer | ||
Entity Well-known Seasoned Issuer | No | ||
Document Period End Date | Jun. 30, 2024 | ||
Document Fiscal Year Focus | 2024 | ||
Document Fiscal Period Focus | FY | ||
Entity Small Business | true | ||
Entity Emerging Growth Company | false | ||
Entity Shell Company | false | ||
ICFR Auditor Attestation Flag | false | ||
Document Annual Report | true | ||
Document Transition Report | false | ||
Entity File Number | 001-38029 | ||
Entity Incorporation, State or Country Code | DE | ||
Entity Tax Identification Number | 33-1229046 | ||
Entity Address, Address Line One | 9805 Northcross Center Court | ||
Entity Address, Address Line Two | Suite A | ||
Entity Address, City or Town | Huntersville | ||
Entity Address, State or Province | NC | ||
Entity Address, Postal Zip Code | 28078 | ||
Local Phone Number | 997-5735 | ||
City Area Code | 1-704 | ||
Title of 12(b) Security | Common Stock, $0.001 par value | ||
Security Exchange Name | NASDAQ | ||
Entity Interactive Data Current | Yes | ||
Document Financial Statement Error Correction [Flag] | false | ||
Auditor Name | Marcum LLP | ||
Auditor Location | New York, NY | ||
Auditor Firm ID | 688 |
1 Year Akoustis Technologies Chart |
1 Month Akoustis Technologies Chart |
It looks like you are not logged in. Click the button below to log in and keep track of your recent history.
Support: +44 (0) 203 8794 460 | support@advfn.com
By accessing the services available at ADVFN you are agreeing to be bound by ADVFN's Terms & Conditions