Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | We have implemented and maintain various information security processes designed to identify, assess, and manage material risks from cybersecurity threats to our critical computer networks, third-party hosted services, communications systems, hardware and software, and critical data, including intellectual property, and confidential information that is proprietary, strategic or competitive in nature (“Information Systems and Data”). Our assessment, identification and management of material risks from cybersecurity threats are integrated into the Company’s overall risk management processes. We rely on a multidisciplinary team, including our Chief Technology Officer, information technology department, legal department, security management, and engineering operations, (the “Security Function”) to help assess, identify and manage the Company’s cybersecurity threats and risks. Various members of the Security Function monitor and evaluate our cybersecurity threat environment using various methods including, for example, using manual and automated tools, subscribing to reports and services that identify cybersecurity threats, analyzing reports of threats and threat actors, conducting scans of the threat environment, evaluating threats reported to us, audits, conducting threat assessments, conducting vulnerability assessments to identify vulnerabilities, use of external intelligence feeds, and internal tabletop and incident response exercises. Depending on the environment, systems and data at issue, we implement and maintain various technical, physical, and organizational measures, processes, standards, and policies designed to manage and mitigate material risks from cybersecurity threats to our Information Systems and Data, including, for example, an incident response plan, risk assessments, incident detection and response, vulnerability management processes, disaster recovery/business continuity processes, encryption of data, network security controls, data segregation, access controls, physical security, systems monitoring, vendor risk management processes, employee training, penetration testing, cybersecurity insurance, dedicated cybersecurity staff, and asset management, tracking and disposal. We work with third-parties from time to time to assist us to identify, assess, and manage risks from cybersecurity threats, including, for example, professional services firms, including outside legal counsel and penetration testing firms. We use certain third-party service providers to perform a variety of functions that help us operate our business, such as application providers and hosting companies. Depending on the nature of the services provided, the sensitivity and information processed, and the identity of the service provider, our vendor management process may include different levels of assessment designed to help identify cybersecurity risk associated with a provider. Such assessments include, for example, reviewing the written security program of such provider and conducting security assessments and audits. For a description of the risks from cybersecurity threats that may materially affect the Company and how they may do so, see Part I, Item 1A, “Risk Factors” for a description of the risks from cybersecurity threats that may materially affect the Company and how they may do so, including the risk factor titled, If our information technology systems or data, or those of third parties with whom we work, are or were compromised, we could experience adverse impacts resulting from such compromise, including, but not limited to, interruptions to our operations such as to our LungTraX Platform services or our clinical trials, claims that we breached our data protection obligations, harm to our reputation, business operations, and financial condition, as well as a loss of customers or sales.
|
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | Our assessment, identification and management of material risks from cybersecurity threats are integrated into the Company’s overall risk management processes. We rely on a multidisciplinary team, including our Chief Technology Officer, information technology department, legal department, security management, and engineering operations, (the “Security Function”) to help assess, identify and manage the Company’s cybersecurity threats and risks. Various members of the Security Function monitor and evaluate our cybersecurity threat environment using various methods including, for example, using manual and automated tools, subscribing to reports and services that identify cybersecurity threats, analyzing reports of threats and threat actors, conducting scans of the threat environment, evaluating threats reported to us, audits, conducting threat assessments, conducting vulnerability assessments to identify vulnerabilities, use of external intelligence feeds, and internal tabletop and incident response exercises.
|
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Our board of directors addresses the Company’s cybersecurity risk management as part of its general oversight function. The board of directors’ Audit Committee is responsible for overseeing the Company’s cybersecurity risk management processes, including the Company’s oversight and mitigation of risks from cybersecurity threats.
|
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our board of directors addresses the Company’s cybersecurity risk management as part of its general oversight function. The board of directors’ Audit Committee is responsible for overseeing the Company’s cybersecurity risk management processes, including the Company’s oversight and mitigation of risks from cybersecurity threats.
|
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our cybersecurity risk assessment and management processes are implemented and maintained by certain members of Company management, including the Senior Director of Information Technology, who has worked in various roles responsible for securing networks and application systems, the Cloud Security Engineering Manager, the Chief Executive Officer, the Chief Technology Officer, the General Counsel, and the Chief Operating Officer and Chief Financial Officer and Chief Operation Officer. These members of management are responsible for hiring appropriate personnel, integrating cybersecurity risk considerations into the Company’s overall risk management strategy, and communicating key priorities to relevant personnel. They are also responsible for approving budgets, helping to prepare for cybersecurity incidents, approving cybersecurity processes, and reviewing security assessments and other security-related reports. When material incidents are identified, these members of management are responsible for determining whether such incidents are material and may escalate material incidents to the Audit Committee and/or investors, based on the particular circumstances. |
| Cybersecurity Risk Role of Management [Text Block] | Our board of directors addresses the Company’s cybersecurity risk management as part of its general oversight function. The board of directors’ Audit Committee is responsible for overseeing the Company’s cybersecurity risk management processes, including the Company’s oversight and mitigation of risks from cybersecurity threats. Our cybersecurity risk assessment and management processes are implemented and maintained by certain members of Company management, including the Senior Director of Information Technology, who has worked in various roles responsible for securing networks and application systems, the Cloud Security Engineering Manager, the Chief Executive Officer, the Chief Technology Officer, the General Counsel, and the Chief Operating Officer and Chief Financial Officer and Chief Operation Officer. These members of management are responsible for hiring appropriate personnel, integrating cybersecurity risk considerations into the Company’s overall risk management strategy, and communicating key priorities to relevant personnel. They are also responsible for approving budgets, helping to prepare for cybersecurity incidents, approving cybersecurity processes, and reviewing security assessments and other security-related reports. When material incidents are identified, these members of management are responsible for determining whether such incidents are material and may escalate material incidents to the Audit Committee and/or investors, based on the particular circumstances. The Audit Committee receives periodic updates from management concerning the Company’s significant cybersecurity threats, risks, and the processes the Company has implemented to address them. In addition, the Audit Committee and management maintain an ongoing dialogue regarding emerging or potential cybersecurity risks.
|
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | The Audit Committee receives periodic updates from management concerning the Company’s significant cybersecurity threats, risks, and the processes the Company has implemented to address them. In addition, the Audit Committee and management maintain an ongoing dialogue regarding emerging or potential cybersecurity risks. |
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | Our cybersecurity risk assessment and management processes are implemented and maintained by certain members of Company management, including the Senior Director of Information Technology, who has worked in various roles responsible for securing networks and application systems, the Cloud Security Engineering Manager, the Chief Executive Officer, the Chief Technology Officer, the General Counsel, and the Chief Operating Officer and Chief Financial Officer and Chief Operation Officer. |
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Our board of directors addresses the Company’s cybersecurity risk management as part of its general oversight function. The board of directors’ Audit Committee is responsible for overseeing the Company’s cybersecurity risk management processes, including the Company’s oversight and mitigation of risks from cybersecurity threats.
|
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |