Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Cybersecurity Risk Management and Processes
into its comprehensive risk management framework to protect the confidentiality, integrity, and availability of its critical systems and information.
Our cybersecurity risk management program is being designed based on various cybersecurity frameworks, including National Institute of Standards and Technology and the Center for Internet Security, as well as information security standards issued by the International Organization for Standardization, including ISO 27001 and ISO 27002. The Company uses these frameworks and information security standards as a guide to identify, assess, and management cybersecurity risks relevant to the business.
The Company has implemented or is implementing the following key elements into the cybersecurity risk management program:
Formalization and implementation of robust IT security policies;
Conducting vulnerability assessments;
Revision of user access request documentation to clearly define the roles and permissions assigned to users;
Thorough review of the accuracy and completeness of user listings and access;
Preservation of evidence related to system modifications; and
Continued collaboration with external specialists to aid in the ongoing evaluation of existing policies and procedures.
In addition, the Company has a strategic , which encompasses the following key elements:
Establishment of a dedicated cybersecurity governance committee;
Standardization of cybersecurity incident response procedures and formats;
Conducting penetration tests on a quarterly basis;
Enhancement of segregation of duties to mitigate the risk of self-review of transactions within the system;
|
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | Our cybersecurity risk management program is being designed based on various cybersecurity frameworks, including National Institute of Standards and Technology and the Center for Internet Security, as well as information security standards issued by the International Organization for Standardization, including ISO 27001 and ISO 27002. The Company uses these frameworks and information security standards as a guide to identify, assess, and management cybersecurity risks relevant to the business. |
| Cybersecurity Risk Management Third Party Engaged [Flag] | false |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] | |
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Our Board of Directors actively collaborates with management to supervise cybersecurity risks. |
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | our Board of Directors has the responsibility to satisfy itself that the risk management processes designed and implemented by management are appropriate and functioning as designed. |
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | In general, we seek to address cybersecurity risks through a cross-functional approach |
| Cybersecurity Risk Role of Management [Text Block] | Management considers cybersecurity risk as part of its risk oversight function and is in the process of establishing a cybersecurity governance committee. |