v3.25.4
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
The Audit Committee of our Board of Directors is responsible for overseeing management’s processes for identifying and mitigating risks that affect our operations, including cybersecurity risks. Procedures for assessing, identifying and managing cybersecurity-related risks are incorporated into our overall risk management framework. Senior leadership regularly briefs the Audit Committee and the full Board of Directors on our cybersecurity and information security posture and the Audit Committee is apprised of cybersecurity incidents deemed to pose a critical risk to our information technology ("IT") assets or business. We have an incident response playbook that outlines the steps to be followed from incident detection to mitigation, recovery and notification, including notifying key functional areas, such as legal and financial reporting, as well as senior leadership and the Audit Committee, as appropriate. We rely upon in-house and cybersecurity vendors to monitor our IT systems and assets and have a governance structure and processes to assess, identify, manage, and report cybersecurity risks.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] The Audit Committee of our Board of Directors is responsible for overseeing management’s processes for identifying and mitigating risks that affect our operations, including cybersecurity risks. Procedures for assessing, identifying and managing cybersecurity-related risks are incorporated into our overall risk management framework. Senior leadership regularly briefs the Audit Committee and the full Board of Directors on our cybersecurity and information security posture and the Audit Committee is apprised of cybersecurity incidents deemed to pose a critical risk to our information technology ("IT") assets or business.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] We currently have one full-time employee who manages our day-to-day information technology systems and the third-party vendors engaged to assist in such management, including monitoring and addressing cybersecurity matters and reports to our Chief Financial Officer. Our cybersecurity vendor, which has a SOC 2 Type II Report and is ISO 27001 certified, utilizes industry-leading processes to monitor in real-time cybersecurity threats and risks to our systems. Our in-house IT resource receives immediate notification of incidents and engages regularly with our cybersecurity vendor through weekly and monthly reports and quarterly meetings to address any issues identified through their processes and communicates such issues in accordance with our incident response plan.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] We currently have one full-time employee who manages our day-to-day information technology systems and the third-party vendors engaged to assist in such management, including monitoring and addressing cybersecurity matters and reports to our Chief Financial Officer. Our cybersecurity vendor, which has a SOC 2 Type II Report and is ISO 27001 certified, utilizes industry-leading processes to monitor in real-time cybersecurity threats and risks to our systems. Our in-house IT resource receives immediate notification of incidents and engages regularly with our cybersecurity vendor through weekly and monthly reports and quarterly meetings to address any issues identified through their processes and communicates such issues in accordance with our incident response plan.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
We currently have one full-time employee who manages our day-to-day information technology systems and the third-party vendors engaged to assist in such management, including monitoring and addressing cybersecurity matters and reports to our Chief Financial Officer. Our cybersecurity vendor, which has a SOC 2 Type II Report and is ISO 27001 certified, utilizes industry-leading processes to monitor in real-time cybersecurity threats and risks to our systems. Our in-house IT resource receives immediate notification of incidents and engages regularly with our cybersecurity vendor through weekly and monthly reports and quarterly meetings to address any issues identified through their processes and communicates such issues in accordance with our incident response plan.
Although we have not, as of the date of this Annual Report on Form 10-K, experienced a cybersecurity incident that materially affected our business, financial condition and results of operations, we can provide no assurance that we will not experience a material cybersecurity incident in the future. While we maintain cybersecurity insurance, the costs related to cybersecurity threats or disruptions may not be fully insured. For additional information regarding the risks we face from cybersecurity threats, please see the risk factor titled “Our business and operations would suffer in the event of computer system failures, cyber-attacks or a deficiency in our cybersecurity” included in Part I, Item 1A, Risk Factors of this Annual Report on Form 10-K.
Cybersecurity Risk Role of Management [Text Block]
We currently have one full-time employee who manages our day-to-day information technology systems and the third-party vendors engaged to assist in such management, including monitoring and addressing cybersecurity matters and reports to our Chief Financial Officer. Our cybersecurity vendor, which has a SOC 2 Type II Report and is ISO 27001 certified, utilizes industry-leading processes to monitor in real-time cybersecurity threats and risks to our systems. Our in-house IT resource receives immediate notification of incidents and engages regularly with our cybersecurity vendor through weekly and monthly reports and quarterly meetings to address any issues identified through their processes and communicates such issues in accordance with our incident response plan.
Although we have not, as of the date of this Annual Report on Form 10-K, experienced a cybersecurity incident that materially affected our business, financial condition and results of operations, we can provide no assurance that we will not experience a material cybersecurity incident in the future. While we maintain cybersecurity insurance, the costs related to cybersecurity threats or disruptions may not be fully insured. For additional information regarding the risks we face from cybersecurity threats, please see the risk factor titled “Our business and operations would suffer in the event of computer system failures, cyber-attacks or a deficiency in our cybersecurity” included in Part I, Item 1A, Risk Factors of this Annual Report on Form 10-K.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] We currently have one full-time employee who manages our day-to-day information technology systems and the third-party vendors engaged to assist in such management, including monitoring and addressing cybersecurity matters and reports to our Chief Financial Officer.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] We currently have one full-time employee who manages our day-to-day information technology systems and the third-party vendors engaged to assist in such management, including monitoring and addressing cybersecurity matters and reports to our Chief Financial Officer. Our cybersecurity vendor, which has a SOC 2 Type II Report and is ISO 27001 certified, utilizes industry-leading processes to monitor in real-time cybersecurity threats and risks to our systems. Our in-house IT resource receives immediate notification of incidents and engages regularly with our cybersecurity vendor through weekly and monthly reports and quarterly meetings to address any issues identified through their processes and communicates such issues in accordance with our incident response plan.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]
We currently have one full-time employee who manages our day-to-day information technology systems and the third-party vendors engaged to assist in such management, including monitoring and addressing cybersecurity matters and reports to our Chief Financial Officer. Our cybersecurity vendor, which has a SOC 2 Type II Report and is ISO 27001 certified, utilizes industry-leading processes to monitor in real-time cybersecurity threats and risks to our systems. Our in-house IT resource receives immediate notification of incidents and engages regularly with our cybersecurity vendor through weekly and monthly reports and quarterly meetings to address any issues identified through their processes and communicates such issues in accordance with our incident response plan.
Although we have not, as of the date of this Annual Report on Form 10-K, experienced a cybersecurity incident that materially affected our business, financial condition and results of operations, we can provide no assurance that we will not experience a material cybersecurity incident in the future. While we maintain cybersecurity insurance, the costs related to cybersecurity threats or disruptions may not be fully insured. For additional information regarding the risks we face from cybersecurity threats, please see the risk factor titled “Our business and operations would suffer in the event of computer system failures, cyber-attacks or a deficiency in our cybersecurity” included in Part I, Item 1A, Risk Factors of this Annual Report on Form 10-K.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true