Cybersecurity Risk Management and Strategy Disclosure |
9 Months Ended |
---|---|
Sep. 30, 2025 | |
Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | number of cybersecurity measures were employed to reduce the likelihood that cybersecurity incidents would materialize, including: (i) employing a variety of reputable and recognized hardware, software and other security measures in the design and maintenance of our information technology and data security systems; (ii) conducting periodic testing and verification of information and data security systems, including engaging third-party assessors to perform penetration testing of our systems to identify vulnerabilities; (iii) confirming with our critical vendors whether they experienced cyber breaches of their IT systems or otherwise involving Company information; (iv) verifying third-party IT system integrity through a review of System and Organization (“SOC”) audit review reports provided by certain of our vendors; and (v) providing periodic employee security awareness training relating to phishing and other scams, malware and various cyber-related risks. We also engaged third-party vendors to assist with incident detection and monitoring and to implement and maintain other cybersecurity measures specific to our operations and portfolio properties. We also created and maintained processes that provided a playbook in the event of a cyber incident. These processes provided assessment and response tools designed to mitigate damage from attacks and integrate third-party digital forensics, legal providers and law enforcement as part of the response plan. We also instituted a variety of safeguards to counter ransomware threats. We integrated our cybersecurity program into our overall risk management processes by instituting corporate measures and protocols to ensure ongoing operations in the event of a disaster or major business disruption affecting the corporate headquarters, infrastructure or key personnel. Our employee guidelines also addressed employee computer usage, including a variety of restrictions and protocols intended to enhance cybersecurity and reduce the risk of a successful cyber-attack.
|
Cybersecurity Risk Management Processes Integrated [Flag] | true |
Cybersecurity Risk Management Processes Integrated [Text Block] | We integrated our cybersecurity program into our overall risk management processes by instituting corporate measures and protocols to ensure ongoing operations in the event of a disaster or major business disruption affecting the corporate headquarters, infrastructure or key personnel. Our employee guidelines also addressed employee computer usage, including a variety of restrictions and protocols intended to enhance cybersecurity and reduce the risk of a successful cyber-attack.
|
Cybersecurity Risk Management Third Party Engaged [Flag] | true |
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
Cybersecurity Risk Board of Directors Oversight [Text Block] | ur Board of Trustees oversaw our IT department’s management of our cybersecurity program through its Audit Committee. For EQC LT, our Trustees oversaw our IT department’s management of our cybersecurity program. Through our policies, plans, guidelines, processes and other communications, any material cybersecurity incident would have been reported to our executive officers, as well as to the Audit Committee and/or the Board of the Company, and to the Trustees of EQC LT. |
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | ur Board of Trustees oversaw our IT department’s management of our cybersecurity program through its Audit Committee. For EQC LT, our Trustees oversaw our IT department’s management of our cybersecurity program. |
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | Through our policies, plans, guidelines, processes and other communications, any material cybersecurity incident would have been reported to our executive officers, as well as to the Audit Committee and/or the Board of the Company, and to the Trustees of EQC LT. |
Cybersecurity Risk Role of Management [Text Block] | ur Board of Trustees oversaw our IT department’s management of our cybersecurity program through its Audit Committee. For EQC LT, our Trustees oversaw our IT department’s management of our cybersecurity program. Through our policies, plans, guidelines, processes and other communications, any material cybersecurity incident would have been reported to our executive officers, as well as to the Audit Committee and/or the Board of the Company, and to the Trustees of EQC LT. |
Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | ur Board of Trustees oversaw our IT department’s management of our cybersecurity program through its Audit Committee. For EQC LT, our Trustees oversaw our IT department’s management of our cybersecurity program. |
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | cybersecurity program was managed on a day-to-day basis by our IT department, which was led by our SVP - Information Technology, who has a Master of Business Administration degree and a Master Certification in Cybersecurity from Colorado State University along with more than 25 years of experience |
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Through our policies, plans, guidelines, processes and other communications, any material cybersecurity incident would have been reported to our executive officers, as well as to the Audit Committee and/or the Board of the Company, and to the Trustees of EQC LT. |