Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] |
Risk Management and Strategy
The Company has adopted a cybersecurity risk management program that includes processes designed to identify, assess, manage, and monitor risks from
cybersecurity threats. We have integrated cybersecurity risk management into our broader risk management framework to promote a
company-wide culture of cybersecurity awareness and risk management. These processes include conducting an assessment of internal and external threats to the security, confidentiality, integrity and availability of
Company data and systems along with other material risks to Company operations, at least annually and whenever there are material changes to the Company’s systems or operations, and responding to risks identified. The Company’s cybersecurity and risk
management program is based on National Institute of Standards and Technology (NIST) frameworks. As part of our risk management process, the Company also engages outside providers to conduct periodic security assessments. As part of our third-party risk management program, we conduct assessments of vendor cybersecurity risks, including risks associated with our cloud vendors and other third parties.
Cybersecurity Threats
As of the date of this report, we have not identified any risks from a cybersecurity threat or incident that we believe has or is reasonably likely to have a material effect on our business strategy, results of operations, or financial condition. Despite our continuing efforts, we cannot
guarantee that our cybersecurity safeguards will prevent breaches or breakdowns of our or our third-party service providers’ information technology systems, particularly in the face of continually evolving cybersecurity threats and increasingly
sophisticated threat actors. For more information, see Item 1A Risk Factors, “Our business and operations would suffer in the event of system failures or unplanned
events, including cyber incidents, network security breaches, service interruptions, or data corruption.”
|
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | These processes include conducting an assessment of internal and external threats to the security, confidentiality, integrity and availability of Company data and systems along with other material risks to Company operations, at least annually and whenever there are material changes to the Company’s systems or operations, and responding to risks identified. The Company’s cybersecurity and risk management program is based on National Institute of Standards and Technology (NIST) frameworks. As part of our risk management process, the Company also engages outside providers to conduct periodic security assessments. As part of our third-party risk management program, we conduct assessments of vendor cybersecurity risks, including risks associated with our cloud vendors and other third parties. |
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] |
As of the date of this report, we have not identified any risks from a cybersecurity threat or incident that we believe has or is reasonably likely to have a material effect on our business strategy, results of operations, or financial condition. Despite our continuing efforts, we cannot
guarantee that our cybersecurity safeguards will prevent breaches or breakdowns of our or our third-party service providers’ information technology systems, particularly in the face of continually evolving cybersecurity threats and increasingly
sophisticated threat actors. For more information, see Item 1A Risk Factors, “Our business and operations would suffer in the event of system failures or unplanned
events, including cyber incidents, network security breaches, service interruptions, or data corruption.”
|
| Cybersecurity Risk Board of Directors Oversight [Text Block] |
Governance
The cybersecurity risk management program, including the prevention, detection, mitigation, and remediation of cybersecurity incidents, is led by the
Company’s Chief Operating Officer and VP of Accounting in coordination with the Company’s IT managed service provider. Both of these
individuals have experience in overseeing our cybersecurity and information technology programs and have held similar oversight functions in prior roles. We rely heavily on information technology
consultants for advice and expertise on monitoring evolving industry standards and to monitor our compliance with applicable policies. The VP of Accounting reports on cybersecurity matters to the Company’s Audit Committee at least annually, as well as any time there are material changes to the Company’s systems or operations and material updates are shared at each regular meeting of the full Board.
The VP of Accounting also reports to the Company’s Chief Financial Officer and other members of our senior management as appropriate. These reports may feature an overall assessment of the Company’s compliance with the Company’s cybersecurity policies and include topics such as risk assessment, risk management and control decisions, service
provider arrangements, test results, security incidents and responses, and recommendations for changes and updates to policies and procedures. In addition, the results of any external reviews on our cybersecurity program are reported to senior
management and the Audit Committee.
|
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | The cybersecurity risk management program, including the prevention, detection, mitigation, and remediation of cybersecurity incidents, is led by the Company’s Chief Operating Officer and VP of Accounting in coordination with the Company’s IT managed service provider. |
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | The VP of Accounting reports on cybersecurity matters to the Company’s Audit Committee at least annually, as well as any time there are material changes to the Company’s systems or operations and material updates are shared at each regular meeting of the full Board. |
| Cybersecurity Risk Role of Management [Text Block] | The VP of Accounting also reports to the Company’s Chief Financial Officer and other members of our senior management as appropriate. These reports may feature an overall assessment of the Company’s compliance with the Company’s cybersecurity policies and include topics such as risk assessment, risk management and control decisions, service provider arrangements, test results, security incidents and responses, and recommendations for changes and updates to policies and procedures. In addition, the results of any external reviews on our cybersecurity program are reported to senior management and the Audit Committee. |
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | The cybersecurity risk management program, including the prevention, detection, mitigation, and remediation of cybersecurity incidents, is led by the Company’s Chief Operating Officer and VP of Accounting in coordination with the Company’s IT managed service provider. Both of these individuals have experience in overseeing our cybersecurity and information technology programs and have held similar oversight functions in prior roles. We rely heavily on information technology consultants for advice and expertise on monitoring evolving industry standards and to monitor our compliance with applicable policies. The VP of Accounting reports on cybersecurity matters to the Company’s Audit Committee at least annually, as well as any time there are material changes to the Company’s systems or operations and material updates are shared at each regular meeting of the full Board.The VP of Accounting also reports to the Company’s Chief Financial Officer and other members of our senior management as appropriate. |
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | Both of these individuals have experience in overseeing our cybersecurity and information technology programs and have held similar oversight functions in prior roles. |
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | The VP of Accounting also reports to the Company’s Chief Financial Officer and other members of our senior management as appropriate. These reports may feature an overall assessment of the Company’s compliance with the Company’s cybersecurity policies and include topics such as risk assessment, risk management and control decisions, service provider arrangements, test results, security incidents and responses, and recommendations for changes and updates to policies and procedures. In addition, the results of any external reviews on our cybersecurity program are reported to senior management and the Audit Committee. |
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |