Browse Definitions :
Definition

SEC Form 10-K

SEC Form 10-K is the United States Securities and Exchange Commission’s form for the annual performance filings of public companies. According to SEC regulations, all publicly-traded companies must submit a 10-K for each fiscal year, due within 75 days of the end of a company’s fiscal year. Because the dates of the fiscal year can vary from one organization to another, the due dates for 10-K filings also vary.

All public companies are required to submit three quarterly filings on Form 10-Q. The information for the fourth fiscal quarter is included in 10-K because the reporting periods end simultaneously.

Like the 10-Q report, a 10-K filing includes:

  • Financial statements.
  • Management discussion and analysis (MD&A) of any material changes in revenues and expenses in the context of previous quarterly comparisons.
  • The effects of any changes in accounting practices.
  • Any legal proceedings ongoing or upcoming.
  • Specifics of any proceedings involving civil rights or environmental legislation.
  • Changes in securities.
  • Information about any matters voted on by security holders.
  • Other significant events not covered by the above.

However, a 10-K filing is much more detailed and requires more analysis of corporate and environmental events, as well as a more in-depth comparison to previous reporting periods and projections of future performance. Unlike a 10-Q filing, a 10-K filing must be audited.

Corporate 10-Q and 10-K filings are maintained in the SEC’s EDGAR database.

This was last updated in November 2013
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • chief risk officer (CRO)

    The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory ...

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close