Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | We are committed to our privacy and security programs, and our security team strives to protect our customer and employee data from cybersecurity risks. We have procedures in place to address suspected security breaches and notify users determined to be affected and applicable regulators of a breach where we are legally required to do so. Because our business involves the collection, use, storage, and transmission of personal information, we are subject to numerous federal, state, local, and foreign laws, regulations, and other obligations relating to privacy and data security. Countries around the world have adopted or are proposing similar laws and regulations relating to privacy and data security, and we may become subject to them as we expand our operations into new geographic markets. From time to time, and at least annually, we review and update if necessary our privacy standards and policies in response to evolving regulatory requirements and internal Unity requirements. Unity personnel are provided annual privacy training, with additional targeted training for key participants in our privacy program. We have a security policy which outlines mandatory security requirements for all of our employees, contractors or other agents. This policy is supported by internal standards, directives and procedures and our security infrastructure and tools. The security program includes implementation of software security throughout the development life cycle, vulnerability and configuration management software across certain of our data infrastructure, and our products and services offerings. Our risk management process includes annual employee education and annual analysis of security-related risks from across the company, which are then prioritized for mitigation or remediation. Our approach to cybersecurity is integrated into our overall company-wide approach to risk management, including regular consultations between our Data Privacy Officer and Interim Chief Information Security Officer and our internal audit team. Our management team, including our Interim Chief Information Security Officer and our Data Privacy Officer, also regularly reports to the Audit Committee of our board of directors regarding their evaluation of risks from cybersecurity threats against our overall business objectives and other relevant cybersecurity matters. We engage third party services in connection with our processes for vendor security reviews and security incidents. Assessments of our program are performed by our internal audit team or through independent third-party engagements. We are continuing to refine our processes to oversee and identify the risks from cybersecurity threats associated with our use of any third-party service provider.
|
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | We are committed to our privacy and security programs, and our security team strives to protect our customer and employee data from cybersecurity risks. We have procedures in place to address suspected security breaches and notify users determined to be affected and applicable regulators of a breach where we are legally required to do so.
|
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Board of Directors Oversight [Text Block] | The Audit Committee of our board of directors is responsible for overseeing our cybersecurity risk management processes, including oversight of mitigation of risks from cybersecurity threats. The Audit Committee of our board of directors meets on a quarterly basis with our Interim Chief Information Security Officer about our cybersecurity risk management and strategy, including any significant investigations, and periodically with our Data Privacy Officer about our privacy program.
|
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Audit Committee of our board of directors is responsible for overseeing our cybersecurity risk management processes, including oversight of mitigation of risks from cybersecurity threats. |
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Audit Committee of our board of directors meets on a quarterly basis with our Interim Chief Information Security Officer about our cybersecurity risk management and strategy, including any significant investigations, and periodically with our Data Privacy Officer about our privacy program. |
| Cybersecurity Risk Role of Management [Text Block] | Our Interim Chief Information Security Officer and Data Privacy Officer oversee our assessment, prevention, detection and management of cybersecurity risks, and report to our executive team, including our Chief Financial Officer and Chief Legal Officer. Collectively, they have expertise in cybersecurity, privacy law and regulation, and governance, and their teams comprise personnel with a broad range of experience across the private and public sectors, the technology industry, and in different geographic regions. Our Interim Chief Information Security Officer has over 30 years of experience in multiple business verticals and has led security organizations and managed global practices for Fortune 500 technology companies. Our security team follows a documented incident response process, which we are continuing to evaluate and enhance. Pursuant to this process, incidents which may result in economic loss to the company, reputational harm or require notifications to individuals or government authorities are reported to relevant members of our executive team. Our Interim Chief Information Security Officer also provides a regular summary of significant investigations to our Chief Financial Officer and Chief Legal Officer, as well as our Audit Committee, and our Data Privacy Officer reports on our compliance posture with respect to new and pending laws and regulations periodically as well. The Audit Committee of our board of directors is responsible for overseeing our cybersecurity risk management processes, including oversight of mitigation of risks from cybersecurity threats. The Audit Committee of our board of directors meets on a quarterly basis with our Interim Chief Information Security Officer about our cybersecurity risk management and strategy, including any significant investigations, and periodically with our Data Privacy Officer about our privacy program.
|
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | Our Interim Chief Information Security Officer and Data Privacy Officer oversee our assessment, prevention, detection and management of cybersecurity risks, and report to our executive team, including our Chief Financial Officer and Chief Legal Officer. |
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | Our Interim Chief Information Security Officer and Data Privacy Officer oversee our assessment, prevention, detection and management of cybersecurity risks, and report to our executive team, including our Chief Financial Officer and Chief Legal Officer. Collectively, they have expertise in cybersecurity, privacy law and regulation, and governance, and their teams comprise personnel with a broad range of experience across the private and public sectors, the technology industry, and in different geographic regions. Our Interim Chief Information Security Officer has over 30 years of experience in multiple business verticals and has led security organizations and managed global practices for Fortune 500 technology companies.
|
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | The Audit Committee of our board of directors meets on a quarterly basis with our Interim Chief Information Security Officer about our cybersecurity risk management and strategy, including any significant investigations, and periodically with our Data Privacy Officer about our privacy program. |
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |