Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2024 | ||||||||||||||||
Cybersecurity Risk Management, Strategy, and Governance [Line Items] | ||||||||||||||||
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | The Board of Directors is responsible for overseeing our risk management program and cybersecurity is a critical element of this program | |||||||||||||||
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | The Board of Directors is responsible for overseeing our risk management program and cybersecurity is a critical element of this program. Management is responsible for the day-to-day administration of our risk management program and our cybersecurity policies, processes, and practices. Our cybersecurity policies, standards, processes, and practices are based on recognized frameworks and other applicable industry standards are standalone from our overall risk management system and processes. In general, we seek to address material cybersecurity threats through a company-wide approach that addresses the confidentiality, integrity, and availability of our information systems or the information that the Company collects and stores, by assessing, identifying and managing cybersecurity issues as they occur. Cybersecurity Risk Management and Strategy Our cybersecurity risk management strategy focuses on several areas:
We conduct periodic assessment and testing of our policies, standards, processes, and practices in a manner intended to address cybersecurity threats and events. The results of such assessments, audits, and reviews are evaluated by management and reported to the Audit Committee and the Board, and we adjust our cybersecurity policies, standards, processes, and practices as necessary based on the information provided by these assessments, audits, and reviews. Governance The Board, in coordination with the Audit Committee, oversees our risk management program, including the management of cybersecurity threats. The Board and the Audit Committee each receive regular presentations and reports on developments in the cybersecurity space, including risk management practices, recent developments, evolving standards, vulnerability assessments, third-party and independent reviews, the threat environment, technological trends, and information security issues encountered by our peers and third parties. The Board and the Audit Committee also receive prompt and timely information regarding any cybersecurity risk that meets pre-established reporting thresholds, as well as ongoing updates regarding any such risk. On an annual basis, the Board and the Audit Committee discuss our approach to overseeing cybersecurity threats with members of senior management. Senior management works collaboratively across the Company to implement a program designed to protect our information systems from cybersecurity threats and to promptly respond to any material cybersecurity incidents in accordance with our incident response and recovery plans. To facilitate the success of our cybersecurity program, cross-functional teams throughout the Company address cybersecurity threats and respond to cybersecurity incidents. Through ongoing communications with these teams, our outsourced information technology team and senior management are informed about and monitor the prevention, detection, mitigation and remediation of cybersecurity threats and incidents in real time, and report such threats and incidents to the Audit Committee when appropriate. Material Effects of Cybersecurity Incidents Risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, have not materially affected and are not reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition. |
|||||||||||||||
Cybersecurity Risk Role of Management [Text Block] | Management is responsible for the day-to-day administration of our risk management program and our cybersecurity policies, processes, and practices. | |||||||||||||||
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true | |||||||||||||||
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Board, in coordination with the Audit Committee, oversees our risk management program, including the management of cybersecurity threats. | |||||||||||||||
Cybersecurity Risk Board of Directors Oversight [Text Block] | The Board, in coordination with the Audit Committee, oversees our risk management program, including the management of cybersecurity threats. The Board and the Audit Committee each receive regular presentations and reports on developments in the cybersecurity space, including risk management practices, recent developments, evolving standards, vulnerability assessments, third-party and independent reviews, the threat environment, technological trends, and information security issues encountered by our peers and third parties. The Board and the Audit Committee also receive prompt and timely information regarding any cybersecurity risk that meets pre-established reporting thresholds, as well as ongoing updates regarding any such risk. On an annual basis, the Board and the Audit Committee discuss our approach to overseeing cybersecurity threats with members of senior management. |
|||||||||||||||
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Board and the Audit Committee each receive regular presentations and reports on developments in the cybersecurity space, including risk management practices, recent developments, evolving standards, vulnerability assessments, third-party and independent reviews, the threat environment, technological trends, and information security issues encountered by our peers and third parties. The Board and the Audit Committee also receive prompt and timely information regarding any cybersecurity risk that meets pre-established reporting thresholds, as well as ongoing updates regarding any such risk. On an annual basis, the Board and the Audit Committee discuss our approach to overseeing cybersecurity threats with members of senior management. | |||||||||||||||
Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true | |||||||||||||||
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | Senior management works collaboratively across the Company to implement a program designed to protect our information systems from cybersecurity threats and to promptly respond to any material cybersecurity incidents in accordance with our incident response and recovery plans. To facilitate the success of our cybersecurity program, cross-functional teams throughout the Company address cybersecurity threats and respond to cybersecurity incidents. | |||||||||||||||
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Through ongoing communications with these teams, our outsourced information technology team and senior management are informed about and monitor the prevention, detection, mitigation and remediation of cybersecurity threats and incidents in real time, and report such threats and incidents to the Audit Committee when appropriate. | |||||||||||||||
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true | |||||||||||||||
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] | Material Effects of Cybersecurity Incidents Risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, have not materially affected and are not reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition. |
|||||||||||||||
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |