v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Risk Management and Strategy 

We have established internal policies and processes for identifying, assessing, and managing material risk from cybersecurity threats, and have integrated these processes into our overall risk management systems and processes. We routinely assess material risks from cybersecurity threats, including any potential unauthorized occurrence on or conducted through our information systems that may result in adverse effects on the confidentiality, integrity, or availability of our information systems or any information residing therein.

 

We conduct risk assessments to identify cybersecurity threats annually as well as in the event of a material change in our business practices that may affect information systems that are vulnerable to such cybersecurity threats. These risk assessments include identification of reasonably foreseeable internal and external risks, the likelihood and potential damage that could result from such risks, and the sufficiency of existing policies, procedures, systems, and safeguards in place to manage such risks.

 

Following these risk assessments, we re-design, implement, and maintain reasonable safeguards to mitigate identified risks; reasonably address any identified gaps in existing safeguards; and monitor the effectiveness of our safeguards.. In the absence of sufficient IT talents, we rely on our director, IT manager, and IT vendors, such as Alibaba Cloud and DingTalk systems, to ensure the network security of our company’s information infrastructure, while appointing information security manager specifically responsible for the effectiveness of the company’s information infrastructure

 

As part of our overall risk management system, we assess our safeguards in collaboration with various functional teams, including Information Security, Information Technology, and train our employees on these safeguards. Personnel at all levels and teams are required to receive periodic security awareness training to ensure that they understand our cybersecurity policies and their roles in protecting our information systems or any information residing therein.

 

We have a set of company-wide policies and procedures concerning cybersecurity matters that include security risk assessment, identity and access control, vendor security and network security. There are other policies related to cybersecurity involving employees’ use of company equipment and resources, remote work and workplace security and safety. These policies are reviewed periodically and approved by appropriate members of management.

 

We engage assessors, consultants, and/or other third parties in connection with our risk assessment processes. These service providers assist us to design and implement our cybersecurity policies and procedures, as well as to monitor and test our safeguards. These services include Web Application Penetration Testing, Infrastructure security testing, consultant engagements, incident response preparedness, and vendor security review. We require each third-party service provider to certify that it has the ability to implement and maintain appropriate security measures, consistent with all applicable laws, in connection with the services they provide to us, and to promptly report any suspected breach of its security measures that may affect us.

 

For additional information regarding whether any risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, have materially affected or are reasonably likely to materially affect our company, including our business strategy, results of operations, or financial condition, please see Item 3.D. “Risk Factors” of this Annual Report on Form 20-F, including the risk factors titled “Any significant cybersecurity incident or disruption of our information technology systems or those of third-party partners could materially damage user relationships and subject us to significant reputational, financial, legal and operation consequences”.

 
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] We have established internal policies and processes for identifying, assessing, and managing material risk from cybersecurity threats, and have integrated these processes into our overall risk management systems and processes. We routinely assess material risks from cybersecurity threats, including any potential unauthorized occurrence on or conducted through our information systems that may result in adverse effects on the confidentiality, integrity, or availability of our information systems or any information residing therein.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Cybersecurity Governance 

One of the key functions of our board of directors is informed oversight of our risk management process, including risks from cybersecurity threats. Our board of directors is responsible for oversight of our risk management framework, which is designed to monitor and manage strategic and operational risks. Management is responsible for the day-to-day identification, assessment, and management of risks in our operations, including cybersecurity risks. Our board of directors administers its cybersecurity risk oversight function directly as a whole.

 

Our infrastructure mainly relies on third party vendors, such as Alibaba Cloud and the Housekeeper system, a standalone version of the ERP system, to prevent network attacks. In order to control the company’s expenses, our daily network operation security is outsourced to an IT consulting company for professional daily maintenance. The administrative approval system relies on DingTalk, and we have reason to believe in the quality of services provided by large third-party service providers to protect the security of the company’s information infrastructure.

 

Our director and CEO Mr. Xu has experiences in IT industry and he and IT manager oversee our cybersecurity policies and processes, including those described in “Risk Management and Strategy” above. The processes by which our IT manager is informed about and monitors the prevention, detection, mitigation, and remediation of cybersecurity incidents include the following: tabletop exercises, vulnerability management programs, internal & external security risk assessments, threat modeling processes of new services, third party security risk functions, incident response processes, phishing awareness programs, and additional control validation services.

 

Our IT manager reports to our CEO on needed basis or at least annually regarding the company’s cybersecurity risks, detection plans and suggestions for any preventive measures as well as contingency plans, any recent cybersecurity incidents, and mitigation and remediation responses. The CEO reports to the board of directors on key cybersecurity risk management topics, as appropriate.

 
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our board of directors is responsible for oversight of our risk management framework, which is designed to monitor and manage strategic and operational risks.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Our board of directors administers its cybersecurity risk oversight function directly as a whole.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Management is responsible for the day-to-day identification, assessment, and management of risks in our operations, including cybersecurity risks. Our board of directors administers its cybersecurity risk oversight function directly as a whole.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our director and CEO Mr. Xu has experiences in IT industry and he and IT manager oversee our cybersecurity policies and processes, including those described in “Risk Management and Strategy” above.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true