v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Risk Management and Strategy

We recognize the critical importance of developing, implementing, and maintaining robust cybersecurity measures to maintain the security, confidentiality, integrity, and availability of our business systems and confidential information, including personal information and intellectual property. Our cybersecurity program includes systems and processes for assessing, identifying and managing material risks from cybersecurity threats and include maintenance and monitoring of information security policies aligned with Information Technology controls; user and employee awareness of cyber policies and practices; information systems

configuration management; infrastructure security systems; and cyber threat operations with continuous monitoring and threat hunting. This program includes processes to oversee and identify material risks from cybersecurity threats associated with our use of third party service providers. We also engage a range of third party experts in connection with various security implementation, and maintenance activities related to our cybersecurity program.

Our cybersecurity program is integrated into our overall risk management systems, business continuity and incident response plan. As part of our overall risk management program, we maintain an insurance portfolio with comprehensive cyber coverage. Our Director of Information Technology consults with third - party security advisors and provides input to each of these programs to ensure that material risks from cybersecurity threats are appropriately assessed, identified, and managed.

As of the date of this report, there have been no cybersecurity threats that have materially affected or are reasonably likely to materially affect our business, operations, or financial condition.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]

Our cybersecurity program is integrated into our overall risk management systems, business continuity and incident response plan. As part of our overall risk management program, we maintain an insurance portfolio with comprehensive cyber coverage. Our Director of Information Technology consults with third - party security advisors and provides input to each of these programs to ensure that material risks from cybersecurity threats are appropriately assessed, identified, and managed.

Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]

Governance

While our audit committee has oversight responsibility for risk management generally, the Director of Information Technology is specifically responsible for overseeing our cybersecurity program to ensure that cybersecurity risks are identified, assessed, managed, and monitored. Our Director of Information Technology provides periodic updates to senior management in this regard and covers the state of our cybersecurity program to information asset protection, core security and endpoint security, and cyber threat operations. These updates include descriptions of cybersecurity incidents of interest, including those associated with our third - party service providers. The board of directors will be informed promptly of material risks from cybersecurity threats.

We strive to create a culture of cybersecurity resilience and awareness and believe that cybersecurity is the responsibility of every employee and contractor. At the same time, primary responsibility for assessing, monitoring, and managing our cybersecurity risks lies with our Director of Information Technology.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] audit committee
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Director of Information Technology provides periodic updates to senior management in this regard and covers the state of our cybersecurity program to information asset protection, core security and endpoint security, and cyber threat operations
Cybersecurity Risk Role of Management [Text Block]

While our audit committee has oversight responsibility for risk management generally, the Director of Information Technology is specifically responsible for overseeing our cybersecurity program to ensure that cybersecurity risks are identified, assessed, managed, and monitored. Our Director of Information Technology provides periodic updates to senior management in this regard and covers the state of our cybersecurity program to information asset protection, core security and endpoint security, and cyber threat operations. These updates include descriptions of cybersecurity incidents of interest, including those associated with our third - party service providers. The board of directors will be informed promptly of material risks from cybersecurity threats.

Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] the Director of Information Technology
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Our Director of Information Technology provides periodic updates to senior management in this regard and covers the state of our cybersecurity program to information asset protection, core security and endpoint security, and cyber threat operations. These updates include descriptions of cybersecurity incidents of interest, including those associated with our third - party service providers. The board of directors will be informed promptly of material risks from cybersecurity threats
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true