Browse Definitions :
Definition

fiscal year

Contributor(s): Ivy Wigmore

A fiscal year is the twelve-month period that an organization uses for budgeting, forecasting and reporting.

Although many organizations follow the calendar year, a fiscal year can start at any point in the year and end 12 months later. The fiscal year of the United States government, for example, runs from October 1 to September 30. Fiscal years are identified according to the year in which they end.

Usually a fiscal year begins on the first day of the beginning month and ends on the last day of the 12th month. However, some companies choose to have fiscal years that comprise only full weeks and end on a particular day of the week. In those cases, fiscal years are not exactly twelve months long, some being 52 weeks long and others 53.  

Fiscal year is abbreviated as FY. For reporting purposes, it is usually combined with the specific year, for example as FY 2015 or FY15. Similarly, fiscal quarter is abbreviated as Q and combined with dates to identify the specific period.

In the United States, the Securities and Exchange Commission (SEC) requires publicly traded companies to file performance reports for fiscal years on Form 10-K. Quarterly reports are filed on Form 10-Q. Corporate 10-Q and 10-K filings are maintained in the SEC’s EDGAR database.

This was last updated in November 2013

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close