v3.25.4
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Cybersecurity Risk Management and Strategy 

The cybersecurity risk management program, processes, and strategy described in this section are limited to the personal and business information belonging to or maintained by the Company (collectively, “Confidential Information”), our own third-party critical systems and services supporting or used by the Company (collectively, “Critical Systems”), and service providers.

 

We will consider developing and implementing a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our Confidential Information and Critical Systems. Our cybersecurity risk management program will be integrated into our overall enterprise risk management program and includes a cybersecurity incident response plan.

 

Our contemplated cybersecurity risk management program shall include:

 

  risk assessments designed to help identify material cybersecurity risks to our Confidential Information, Critical Systems and the broader enterprise IT environment;
  a security team principally responsible for managing (1) our cybersecurity risk assessment processes, (2) our security controls, and (3) our response to cybersecurity incidents;
  cybersecurity awareness and spear-phishing resistance training of our employees, and senior management;
  a cybersecurity incident response plan that includes procedures for responding to cybersecurity incidents; and
  a vendor management policy for service providers.

 

We have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected or are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition. We face risks from cybersecurity threats that, if realized, could have a material adverse effect on us including an adverse effect on our business, financial condition and results of operations.

 
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] a security team principally responsible for managing (1) our cybersecurity risk assessment processes, (2) our security controls, and (3) our response to cybersecurity incidents;
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Cybersecurity Governance 

Our executive management team, along with our managed information technology service provider, is responsible for assessing and managing risks from cybersecurity threats to the Company, including our Confidential Information and Critical Systems. The team has primary responsibility for our overall cybersecurity risk management program. Our management team works closely with our information technology service provider.

 

Our management team meets with our information technology service provider periodically to discuss then-current cybersecurity issues, which may include efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, including threat intelligence and other information obtained from governmental, public or private sources, and external service providers engaged by us; and alerts and reports produced by security tools deployed in the information technology environment including a spear-phishing report.

 

Our Board considers cybersecurity risk as part of its risk oversight function and oversight of cybersecurity and other information technology risks.

 

23
 

 

Our Board oversees management’s implementation of our cybersecurity risk management program. Our executive management team is responsible for updating the Board, as necessary, regarding significant cybersecurity incidents.

 

Our Board receives periodic reports from management (as deemed applicable) on our cybersecurity risks and cybersecurity risk management program.

 
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Board considers cybersecurity risk as part of its risk oversight function and oversight of cybersecurity and other information technology risks
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our Board oversees management’s implementation of our cybersecurity risk management program. Our executive management team is responsible for updating the Board, as necessary, regarding significant cybersecurity incidents