stockmarketproxy
/
TYLNYSE SEC EDGAR

TYLER TECHNOLOGIES INC

Services-Prepackaged Software·PLANO, TX·FY end 12/31·CIK 860731
OverviewFinancialsCompensationGovernanceInsidersFilings

Board of Directors

8 members · 7 independent · FY 2025
DirectorRoleTenureAgeCommitteesIndep.Annual fees
H. Lynn Moore, Jr.CEO and Director9y58
Glenn A. CarterLead Independent Director11y70NCGComp$367,307
Margot L. CarterDirector2y58NCG$319,807
Brenda A. ClineDirector11y65AuditNCG$349,807
Ronnie D. Hawkins, Jr.Director4y70Comp
Cecil W. JonesDirector1y67
Daniel M. PopeDirector9y63CompAudit$349,807
Andrew D. TeedDirector2y54Audit$321,057

Risk-factor diff

FY 2025 10-K vs. FY 2024
+26 new35 removed

Net-new paragraphs in the most recent 10-K's Item 1A. Companies rarely add risk language without a real reason — additions here are often a leading signal of management concerns.

NEW · FY 2025

An investment in our common stock involves a high degree of risk. Investors evaluating our company should carefully consider the factors described below and all other information contained in this Annual Report. These disclosures reflect the Company’s beliefs and opinions as to factors that could materially and adversely affect the Company and its securities in the future. References to past events are provided by way of example only and are not intended to be a complete listing or a representation as to whether or not such factors have occurred in the past or their likelihood of occurring in …

NEW · FY 2025

Cyber-attacks, the use of artificial intelligence and security vulnerabilities can disrupt our business and harm our competitive position.

NEW · FY 2025

Threats to IT security can take, and have in the past taken, a variety of forms. Individuals, groups of hackers, and sophisticated organizations, including state-sponsored organizations, may take steps that pose threats to our clients and our IT. Bad actors have in the past and may in the future develop and deploy malicious software to gain access to our internal networks, and/or to attack our products and services, gain access to data centers we use to host client deployments, or act in a coordinated manner to launch distributed denial of service or other coordinated attacks. Cyber threats ar…

NEW · FY 2025

To satisfy our obligations under client contracts, we often engage third parties to provide certain deliverables or fulfill certain software or services requirements. We may also use third parties to ensure that our services and solutions integrate with the software, systems, or infrastructure requirements of other vendors and service providers used by us internally or by our clients. Our ability to operate our internal systems and/or to serve our clients and deliver our solutions in a timely manner depends on our ability to retain and maintain relationships, including contractual arrangements…

NEW · FY 2025

We rely on third-party providers—including Amazon Web Services (AWS)—for hosting services and other technology-related services needed to deliver certain of our cloud solutions and other functionality. Any disruption in the services provided by such third-party providers could adversely affect our business and subject us to liability.

+ 21 more new paragraphs not shown

Policies & disclosures

Clawback, anti-hedging, stock ownership, and related-party policies will populate from extracted proxy sections.