Cybersecurity Risk Management, Strategy and Governance |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Item 1C. Cybersecurity.
We recognize the critical importance of developing, implementing and maintaining robust cybersecurity measures to safeguard our information systems and protect the confidentiality, integrity and availability of our data.
Managing Material Risks and Integrated Overall Risk Management
We have implemented a risk-based approach to identify and assess the cybersecurity threats that could affect our business and information systems. Our cybersecurity program is aligned with industry standards and includes technical, administrative and physical controls, including encryption, firewalls, anti-virus systems and well-documented processes and policies. We continue to promote a company-wide culture of cybersecurity risk management. Cybersecurity considerations are integrated in our decision-making processes. We have an experienced IT team led by our Vice President of Information Systems, who has many years of experience in IT management, and reports directly to the Chief Executive Officer and works closely with our management team to evaluate and address cybersecurity risks in alignment with our business objectives and operational needs. Our VP of Information Systems provides regular updates on cybersecurity to the Audit Committee of the board of directors. Our board of directors, as a whole and through the Audit Committee of the board of directors, exercises oversight with respect to cybersecurity and our risk management strategy, consistent with its approach to overseeing our enterprise risk management as a whole.
Engagement of Third Parties on Risk Management
We engage with a range of external experts, including cybersecurity assessors, consultants and auditors in evaluating and testing our risk management systems. These partnerships enable us to leverage specialized knowledge and insights. Our collaboration with these third parties includes regular audits, threat assessments and consultation on security enhancements.
Oversight of Third-Party Risk
We have established processes to oversee and manage risks relating to third-party service providers. For example, our Security Operations Center, employs a Security Information and Event Management ("SIEM") and other systems to monitor risks while also conducting security assessments of third-party providers before engagement and maintain ongoing monitoring to ensure compliance with our cybersecurity standards.
Risks from Cybersecurity Threats
We have not encountered cybersecurity challenges that have materially impaired our business strategy, results of operations or financial condition. From time to time, we experience cybersecurity events that require investigation. For additional information regarding whether any risks from cybersecurity threats, including as a result of any cybersecurity incidents are reasonably likely to materially affect our company, including our business strategy, results of operations or financial condition, please refer to Item 1A, "Risk Factors," in this Annual Report on Form 10-K, including the risk factor entitled "We are subject to cybersecurity risks to our operational systems, security systems, infrastructure, and data processed by us or third-party vendors." |
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | We have implemented a risk-based approach to identify and assess the cybersecurity threats that could affect our business and information systems. Our cybersecurity program is aligned with industry standards and includes technical, administrative and physical controls, including encryption, firewalls, anti-virus systems and well-documented processes and policies. We continue to promote a company-wide culture of cybersecurity risk management. Cybersecurity considerations are integrated in our decision-making processes. |
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Role of Management [Text Block] | We have an experienced IT team led by our Vice President of Information Systems, who has many years of experience in IT management, and reports directly to the Chief Executive Officer and works closely with our management team to evaluate and address cybersecurity risks in alignment with our business objectives and operational needs. Our VP of Information Systems provides regular updates on cybersecurity to the Audit Committee of the board of directors. Our board of directors, as a whole and through the Audit Committee of the board of directors, exercises oversight with respect to cybersecurity and our risk management strategy, consistent with its approach to overseeing our enterprise risk management as a whole. |
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | Vice President of Information Systems, who has many years of experience in IT management, and reports directly to the Chief Executive Officer and works closely with our management team to evaluate and address cybersecurity risks in alignment with our business objectives and operational needs. |
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | experienced IT team led by our Vice President of Information Systems, who has many years of experience in IT management, and |
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Our VP of Information Systems provides regular updates on cybersecurity to the Audit Committee of the board of directors. Our board of directors, as a whole and through the Audit Committee of the board of directors, exercises oversight with respect to cybersecurity and our risk management strategy, consistent with its approach to overseeing our enterprise risk management as a whole. |
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |