Browse Definitions :
Definition

SEC Form 10-K

Contributor(s): Ivy Wigmore

SEC Form 10-K is the United States Securities and Exchange Commission’s form for the annual performance filings of public companies. According to SEC regulations, all publicly-traded companies must submit a 10-K for each fiscal year, due within 75 days of the end of a company’s fiscal year. Because the dates of the fiscal year can vary from one organization to another, the due dates for 10-K filings also vary.

All public companies are required to submit three quarterly filings on Form 10-Q. The information for the fourth fiscal quarter is included in 10-K because the reporting periods end simultaneously.

Like the 10-Q report, a 10-K filing includes:

  • Financial statements.
  • Management discussion and analysis (MD&A) of any material changes in revenues and expenses in the context of previous quarterly comparisons.
  • The effects of any changes in accounting practices.
  • Any legal proceedings ongoing or upcoming.
  • Specifics of any proceedings involving civil rights or environmental legislation.
  • Changes in securities.
  • Information about any matters voted on by security holders.
  • Other significant events not covered by the above.

However, a 10-K filing is much more detailed and requires more analysis of corporate and environmental events, as well as a more in-depth comparison to previous reporting periods and projections of future performance. Unlike a 10-Q filing, a 10-K filing must be audited.

Corporate 10-Q and 10-K filings are maintained in the SEC’s EDGAR database.

This was last updated in November 2013

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close