v3.25.4
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Risk Management and Strategy

Technical Safeguards

As part of our Cybersecurity Program, the Company deploys technical safeguards that are designed to protect our information systems from cybersecurity threats, which are evaluated and improved through vulnerability assessments and cybersecurity threat intelligence.

Risk Assessment

Our Cybersecurity Program also includes a regular risk assessment which is generally based on frameworks established by the National Institute of Standards and Technology (“NIST”), the results of which are reported to our Audit Committee.

Third-Party Risk Management

We also maintain policies and procedures designed to identify and mitigate cybersecurity risks related to our use of material third-party vendors. This includes reviewing the internal controls of certain third-party service providers to assess their procedures to mitigate material security risks.    

Incident Response and Recovery Planning

We maintain an Information Security Incident Response Plan (the “Response Plan”) governing detection, mitigation and remediation of cybersecurity incidents and threats. The Response Plan includes controls and procedures that provide for the prompt escalation of certain cybersecurity incidents so that decisions regarding public disclosure and reporting of such incidents can be made by management in a timely manner, with appropriate involvement by our Board. We regularly test the effectiveness of the Response Plan.

External Assessments

We obtain periodic assessments by third party experts to assess our vulnerability management and security controls and to assist us in identifying and mitigating security risks. These assessments include annual penetration testing and comprehensive independent cybersecurity assessments conducted every other year, which are generally based on the NIST cybersecurity frameworks and may also incorporate other established cybersecurity best practices and standards.

Education and Awareness

We provide cybersecurity training for all directors, officers and employees and periodic additional training for senior management through our cyber insurance carrier.

As of the date of this report, we are not aware of any risks from cybersecurity threats that have materially affected the Company, including our business strategy, results of operations or financial condition. For information regarding cybersecurity risks that may materially affect our Company, see the risk factor titled “We rely on information technology in our operations, and any material failure, inadequacy, interruption or security failure of that technology, including related to artificial intelligence, could harm our business. Privacy and security laws and regulations may also increase costs for our business.” under “Risk Factors” in Part I, Item 1A to this Annual Report on Form 10-K.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Our Cybersecurity Program also includes a regular risk assessment which is generally based on frameworks established by the National Institute of Standards and Technology (“NIST”), the results of which are reported to our Audit Committee.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Our Board and management exercise oversight over the Company’s cybersecurity program, which represents an important component of the Company’s overall approach to enterprise risk management.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Omega’s Vice President of Information Technology (“VP of IT”) manages a team responsible for leading enterprise-wide strategy, policy, standards, architecture, processes and risk assessment related to information security and data protection, including data privacy and network security (our “Cybersecurity Program”) and chairs a management-level AI Committee, responsible for AI governance, including technology, legal and financial risks associated with AI initiatives, within the Company.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The VP of IT reports directly to the Company’s Chief Financial Officer and provides periodic reporting on our Cybersecurity Program to our senior management team, our Board and the Audit Committee of our Board.The Response Plan includes controls and procedures that provide for the prompt escalation of certain cybersecurity incidents so that decisions regarding public disclosure and reporting of such incidents can be made by management in a timely manner, with appropriate involvement by our Board. We regularly test the effectiveness of the Response Plan.
Cybersecurity Risk Role of Management [Text Block] Vice President of Information Technology (“VP of IT”) manages a team responsible for leading enterprise-wide strategy, policy, standards, architecture, processes and risk assessment related to information security and data protection, including data privacy and network security (our “Cybersecurity Program”)
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Vice President of Information Technology (“VP of IT”) manages a team responsible for leading enterprise-wide strategy, policy, standards, architecture, processes and risk assessment related to information security and data protection, including data privacy and network security (our “Cybersecurity Program”)
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] The VP of IT has served in various roles in information technology and information security for over 30 years and, along with other members of our IT department, holds relevant and applicable certifications.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The Board and Audit Committee receive periodic reports about the prevention, detection, mitigation and remediation of cybersecurity incidents, including material security risks and information security vulnerabilities. Additionally, risks associated with the Cybersecurity Program and AI initiatives are integrated into the Company’s enterprise risk management assessment and reported to our Board at least twice per year. We also share the key results of third-party assessments with our Board and Audit Committee.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true