v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Risk management and strategy

We are in the process of developing a cybersecurity risk management program, consisting of cybersecurity policies, procedures, compliance and awareness programs to mitigate risk and to ensure compliance with security, availability and confidentiality trust principles. Following the completion of the development of our cybersecurity risk management program, the cybersecurity process will be integrated into our overall risk management system and process, and, initially, will be solely internally managed. Management is responsible for identifying risks that threaten achievement of the control activities stated in the management’s description of the services organizations systems. Management has started to implement a process for identifying relevant risks that could affect the organization’s ability to provide secure and reliable service to its users. The risk assessment will occur annually, or as business needs change, and covers identification of risks that could act against the company’s objectives as well as specific risks related to a compromise to the security of data. Most of the information generated and collected by us is stored and maintained by third-party vendors and service providers. We believe that each of these providers has its own cybersecurity protocols to which our management believes to be adequate for protecting our files in their possession. For more information about these risks, please see “Item 1.A – Risk Factors – Risks Related to Our Business and Industry – Significant disruptions of our information technology systems or breaches of our data security could adversely affect our business.” in this annual report.

Cybersecurity Risk Management Processes Integrated [Text Block] Following the completion of the development of our cybersecurity risk management program, the cybersecurity process will be integrated into our overall risk management system and process, and, initially, will be solely internally managed.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] false
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Board of Directors Oversight [Text Block]

Governance

Our Board of Directors considers cybersecurity risk as part of its risk oversight function and oversees cybersecurity risk strategy and governance and other information technology risks. Our Chief Executive Officer and Chief Financial Officer are responsible for assessing and managing cybersecurity risk, and providing briefings regarding the assessment and management of such risk to the Board of Directors. Although our senior management do not have direct cybersecurity expertise obtained through certifications, their experience managing the Company, which includes consulting and coordinating as necessary with a third party information technology expert referred to below, enables them to effectively assess and manage material risks from cybersecurity threats.

The Company retained an information technology expert third party company to assist in managing relevant risks. In particular, the Company outsources its information technology function and monitoring to a third party provider whereby it benefits from a professionally managed network monitoring, management, maintenance, detection and response system and a 24/7 security operations center with both onsite and remote support services. Any cybersecurity incident would be reported to the Company promptly by our third party consultant and material and potentially material incidents would be assessed by management and the Board of Directors for remediation and future prevention and detection.

The Company, at least annually, updates its policies or procedures that could help mitigate cybersecurity risks. Notwithstanding the extensive approach we take to cybersecurity, we may not be successful in preventing or mitigating a cybersecurity incident that could have a material adverse effect on us. The Company has incorporated cybersecurity coverage in its insurance policies; however, there is no assurance that the insurance the Company maintains will cover all cybersecurity breaches or that policy limits will be sufficient to cover all related losses.

As of the date of this report, we are not aware of any material risks from cybersecurity threats that have materially affected or are reasonably likely to materially affect us, including our business strategy, results of operations or financial condition.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Board of Directors considers cybersecurity risk as part of its risk oversight function and oversees cybersecurity risk strategy and governance and other information technology risks. Our Chief Executive Officer and Chief Financial Officer are responsible for assessing and managing cybersecurity risk, and providing briefings regarding the assessment and management of such risk to the Board of Directors.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Any cybersecurity incident would be reported to the Company promptly by our third party consultant and material and potentially material incidents would be assessed by management and the Board of Directors for remediation and future prevention and detection.
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block]

As of the date of this report, we are not aware of any material risks from cybersecurity threats that have materially affected or are reasonably likely to materially affect us, including our business strategy, results of operations or financial condition.

Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false