Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Our cybersecurity program is designed to protect our information, and that of our customers, against cybersecurity threats that may result in adverse effects on the confidentiality, integrity, and availability of our information systems. Our cybersecurity risk management program, which is integrated into our overall enterprise risk management program, includes policies, processes and technologies to assess, identify and manage risks from cybersecurity threats and leverages the National Institute of Standards and Technology Cybersecurity Framework. Governance Our Board, with assistance from its Audit Committee, oversees the Company’s enterprise risk management process, including the management of risks arising from cybersecurity threats. Our Audit Committee receives reports on significant cybersecurity developments from the management team responsible for overseeing the Company’s risk and cybersecurity management processes, including our Chief Compliance Officer and Chief Security Officer. We also have protocols by which certain cybersecurity incidents are escalated within the Company and, where appropriate, reported to our Board in a timely manner. At the management level, our Chief Security Officer leads the team responsible for implementing, monitoring and maintaining our cybersecurity risk management program across our business. He has extensive cybersecurity knowledge and skills gained from over 20 years of relevant work experience, including various leadership and management roles in information technology at the Company and elsewhere. He also has a Master of Science in information systems. Risk Management and Strategy Our cybersecurity program includes technical safeguards, including automated tools managed and monitored by our cybersecurity team. Additionally, we regularly conduct penetration and vulnerability testing and tabletop exercises, along with regular team member training on cybersecurity matters. We also employ systems and processes designed to oversee, identify, and reduce the potential impact of a security incident at a third-party vendor, service provider or customer or otherwise implicating the third-party technology and systems we use. We engage independent third-party consultants and other service providers from time to time to conduct security assessments and audits and to assess and enhance our cybersecurity practices. These third parties support our efforts to assess the effectiveness of our cybersecurity controls, identify potential vulnerabilities, benchmark our practices against industry standards and enhance our overall cybersecurity posture. While we have not identified any material cybersecurity threats or incidents since the beginning of the last fiscal year that have had a material adverse effect on our business, there can be no guarantee that we will not be the subject of future successful attacks, threats or incidents. For more information on our cybersecurity related risks, see “Item 1A. Risk Factors Risks Related to Our Business – Our business could be negatively impacted by cybersecurity threats and other disruptions.”.
|
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | Our cybersecurity program is designed to protect our information, and that of our customers, against cybersecurity threats that may result in adverse effects on the confidentiality, integrity, and availability of our information systems. Our cybersecurity risk management program, which is integrated into our overall enterprise risk management program, includes policies, processes and technologies to assess, identify and manage risks from cybersecurity threats and leverages the National Institute of Standards and Technology Cybersecurity Framework.
|
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Our Board, with assistance from its Audit Committee, oversees the Company’s enterprise risk management process, including the management of risks arising from cybersecurity threats. Our Audit Committee receives reports on significant cybersecurity developments from the management team responsible for overseeing the Company’s risk and cybersecurity management processes, including our Chief Compliance Officer and Chief Security Officer. We also have protocols by which certain cybersecurity incidents are escalated within the Company and, where appropriate, reported to our Board in a timely manner. At the management level, our Chief Security Officer leads the team responsible for implementing, monitoring and maintaining our cybersecurity risk management program across our business. He has extensive cybersecurity knowledge and skills gained from over 20 years of relevant work experience, including various leadership and management roles in information technology at the Company and elsewhere. He also has a Master of Science in information systems. Risk Management and Strategy Our cybersecurity program includes technical safeguards, including automated tools managed and monitored by our cybersecurity team. Additionally, we regularly conduct penetration and vulnerability testing and tabletop exercises, along with regular team member training on cybersecurity matters. We also employ systems and processes designed to oversee, identify, and reduce the potential impact of a security incident at a third-party vendor, service provider or customer or otherwise implicating the third-party technology and systems we use. We engage independent third-party consultants and other service providers from time to time to conduct security assessments and audits and to assess and enhance our cybersecurity practices. These third parties support our efforts to assess the effectiveness of our cybersecurity controls, identify potential vulnerabilities, benchmark our practices against industry standards and enhance our overall cybersecurity posture. While we have not identified any material cybersecurity threats or incidents since the beginning of the last fiscal year that have had a material adverse effect on our business, there can be no guarantee that we will not be the subject of future successful attacks, threats or incidents. For more information on our cybersecurity related risks, see “Item 1A. Risk Factors Risks Related to Our Business – Our business could be negatively impacted by cybersecurity threats and other disruptions.”.
|
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our Board, with assistance from its Audit Committee, oversees the Company’s enterprise risk management process, including the management of risks arising from cybersecurity threats. |
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our Audit Committee receives reports on significant cybersecurity developments from the management team responsible for overseeing the Company’s risk and cybersecurity management processes, including our Chief Compliance Officer and Chief Security Officer. We also have protocols by which certain cybersecurity incidents are escalated within the Company and, where appropriate, reported to our Board in a timely manner.
|
| Cybersecurity Risk Role of Management [Text Block] | At the management level, our Chief Security Officer leads the team responsible for implementing, monitoring and maintaining our cybersecurity risk management program across our business. He has extensive cybersecurity knowledge and skills gained from over 20 years of relevant work experience, including various leadership and management roles in information technology at the Company and elsewhere. He also has a Master of Science in information systems.
|
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | At the management level, our Chief Security Officer leads the team responsible for implementing, monitoring and maintaining our cybersecurity risk management program across our business. |
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | He has extensive cybersecurity knowledge and skills gained from over 20 years of relevant work experience, including various leadership and management roles in information technology at the Company and elsewhere. He also has a Master of Science in information systems.
|
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Our Audit Committee receives reports on significant cybersecurity developments from the management team responsible for overseeing the Company’s risk and cybersecurity management processes, including our Chief Compliance Officer and Chief Security Officer. We also have protocols by which certain cybersecurity incidents are escalated within the Company and, where appropriate, reported to our Board in a timely manner.
|
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |