Browse Definitions:

SEC Form 10-Q

Contributor(s): Ivy Wigmore

SEC Form 10-Q is the Securities and Exchange Commission’s form for the quarterly performance filings of public companies. 

According to SEC regulations, all publicly-traded companies must submit a 10-Q for each of the first three fiscal quarters in their year, due within 40 days of the end of the quarter. The fourth quarter report is combined with the report for the full fiscal year, on SEC Form 10-K. There is a separate form, 10-QSB, for small businesses.

Form 10-Q filings were mandated to provide accurate and timely information for investors. Information in a 10-Q filing includes:

  • Financial statements.
  • Management discussion and analysis (MD&A) of any material changes in revenues and expenses in the context of previous quarterly comparisons.
  • The effects of any changes in accounting practices.
  • Any legal proceedings ongoing or upcoming.
  • Specifics of any proceedings involving civil rights or environmental legislation.
  • Changes in securities.
  • Information about any matters voted on by security holders.
  • Other significant events not covered by the above.

Unlike Form 10-K, the 10-Q report is not usually audited. Corporate 10-Q and 10-K filings are maintained in the SEC’s EDGAR database.

This was last updated in November 2013

Continue Reading About SEC Form 10-Q

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.


Dateiendungen und Dateiformate

Gesponsert von:


  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...




  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.

  • external storage device

    An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the ...


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.