Owlet, Inc. 10-K Cybersecurity GRC - 2024-03-08

Page last updated on July 16, 2024

Owlet, Inc. reported their cybersecurity risk management and governance process in a yearly 10-K filed on 2024-03-08 17:26:18 EST.

Filings

10-K filed on 2024-03-08

Owlet, Inc. filed a 10-K at 2024-03-08 17:26:18 EST
Accession Number: 0001628280-24-010048

Note: filing items unformatted. Drop us a note with the above URL to help us prioritize formatting it!

Item 1C. Cybersecurity.

Item 1C. Cybersecurity. We have developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information. Our cybersecurity risk management program is designed and assessed to align with practices recommended by the National Institute of Standards and Technology (NIST) and the FDA, to help us identify, assess and manage cybersecurity risks relevant to our business. This does not imply that we meet any particular technical standards, specifications, or requirements, only that we use these standards as a guide to help us identify, assess, and manage cybersecurity risks relevant to our business. Our cybersecurity risk management program is integrated into our Quality Management system, our overall enterprise risk management, and shares common methodologies, reporting channels and governance processes that apply across the Company to other legal, compliance, strategic, operational, and financial risk areas. Key elements of our cybersecurity risk management program include, but are not limited to the following: - a framework for identifying, mitigating and responding to cybersecurity threats and vulnerabilities; - cybersecurity management and support, including team members responsible for managing (1) our cybersecurity risk assessment processes, (2) our security controls, and (3) our response to cybersecurity incidents; - the use of external service providers, where appropriate, to assess, test or otherwise assist with aspects of our security controls, including benchmarking against NIST and FDA standards, and support customer data transfer; - cybersecurity awareness training for employees; - security tools in our system to monitor and detect cybersecurity threats; - cyber liability insurance - a cybersecurity incident response plan that includes how to respond to cybersecurity incidents; and 60 - a third-party risk management process, including contractual obligations, for service providers, suppliers and vendors who have access to our critical systems and information. We have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected or are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition. For more information, see Part I. Item 1A “Risk Factors- Risks Related to Our Business and Operations- Our business and operations may suffer in the event of IT system failures, cyberattacks or deficiencies in our cybersecurity.” Cybersecurity Governance Our Board considers cybersecurity risk as part of its risk oversight function and has delegated to the Audit Committee (the “Committee”) oversight of cybersecurity and other IT risks. The Committee oversees management’s implementation of our cybersecurity risk management program. Our Chief Technology Officer (CTO) and Chief Operating Officer are responsible for assessing and managing our material risks from cybersecurity threats, and provide the Audit Committee of the Board of Directors with quarterly updates on the performance of our program. The CTO regularly updates the full Board of Directors on information security matters and risk, including cybersecurity, as requested by the Committee. In addition, management updates the Committee, as necessary, regarding any significant cybersecurity incidents. Our management team stays informed about and monitors efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include briefings from internal security personnel; threat intelligence and other information obtained from governmental, public or private sources, including external consultants engaged by us; and alerts and reports produced by security tools deployed in the IT environment. Our Company has also established a data security team, comprised of cross-functional team members to address cybersecurity threats and incidents and engage third-party consultants as needed to address these risks.


Company Information

NameOwlet, Inc.
CIK0001816708
SIC DescriptionMeasuring & Controlling Devices, NEC
TickerOWLT - NYSEOWLTW - OTC
Website
Category
Emerging growth company
Fiscal Year EndDecember 30