Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Risk
Management and StrategyWe
recognize the critical importance of maintaining the safety and security of our systems and data and have implemented a holistic process
for overseeing and managing cybersecurity and related risks. We depend on the accuracy, capacity, and security of our information technology
systems and those used by our third-party service providers. To protect the confidentiality, integrity, and availability of our critical
systems and information, we have developed and implemented a cybersecurity risk management program that includes a cybersecurity incident
response plan. Our cybersecurity risk management program covers our business and was crafted following frameworks established by the
National Institute of Standards and Technology. While using these frameworks guides our approach to identifying, assessing, and managing
cybersecurity risks relevant to our business, it does not imply compliance with any specific technical standards, specifications or requirements.
The program is integrated into our overall enterprise risk management program and shares common methodologies, reporting channels and
governance processes that apply across the enterprise risk management program to other legal, compliance, strategic, operational, and
financial risk areas. In addition, our program emphasizes the maintenance of controls and procedures for the prompt escalation of certain
cybersecurity incidents, conducting cybersecurity risk assessments, regularly assessing and deploying technical safeguards, establishing
incident response and recovery plans, and providing relevant privacy and cybersecurity information to employees to enhance awareness
and response to cybersecurity threats. As of the date of this Report, we are not aware of any risks from cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected or are reasonably likely to materially affect our business strategy, results of operations or financial condition. |
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | We recognize the critical importance of maintaining the safety and security of our systems and data and have implemented a holistic process for overseeing and managing cybersecurity and related risks. We depend on the accuracy, capacity, and security of our information technology systems and those used by our third-party service providers. To protect the confidentiality, integrity, and availability of our critical systems and information, we have developed and implemented a cybersecurity risk management program that includes a cybersecurity incident response plan. Our cybersecurity risk management program covers our business and was crafted following frameworks established by the National Institute of Standards and Technology. While using these frameworks guides our approach to identifying, assessing, and managing cybersecurity risks relevant to our business, it does not imply compliance with any specific technical standards, specifications or requirements. The program is integrated into our overall enterprise risk management program and shares common methodologies, reporting channels and governance processes that apply across the enterprise risk management program to other legal, compliance, strategic, operational, and financial risk areas. |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Board of Directors Oversight [Text Block] | GovernanceThe Board of Directors, along with its Audit Committee, oversees the management of cybersecurity risks and receives quarterly reports from management on the detection and remediation of cybersecurity incidents, as well as on material security risks and vulnerabilities. Through our outsourced managed service provider, we are informed about, and monitor the prevention, detection, mitigation and remediation of cybersecurity incidents through the management of, and participation in the monitoring systems and processes described above. The information about such incidents is reported to the Company’s Chief Executive Officer and Chief Financial Officer, who then would report such information to the Company’s Board of Directors, in some cases, earlier than the regular quarterly reports depending on the nature and severity of the incident. |
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Board of Directors, along with its Audit Committee, oversees the management of cybersecurity risks and receives quarterly reports from management on the detection and remediation of cybersecurity incidents, as well as on material security risks and vulnerabilities. |
| Cybersecurity Risk Role of Management [Text Block] | Through our outsourced managed service provider, we are informed about, and monitor the prevention, detection, mitigation and remediation of cybersecurity incidents through the management of, and participation in the monitoring systems and processes described above. The information about such incidents is reported to the Company’s Chief Executive Officer and Chief Financial Officer, who then would report such information to the Company’s Board of Directors, in some cases, earlier than the regular quarterly reports depending on the nature and severity of the incident. |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | Board of Directors, along with its Audit Committee |
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |