Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Our business involves the collection, storage, transmission, and processing of confidential and sensitive information, and our operations depend on information technology systems, communications networks, and technology applications, including those operated by third-party service providers. Accordingly, we face cybersecurity threats on an ongoing basis. As of the date of this 2025 Form 10-K, we are not aware of any cybersecurity incidents or threats that have materially affected or are reasonably likely to materially affect the Company, including its business strategy, results of operations, financial condition, and cash flows. We have implemented, and continue to develop, various information security processes and controls designed to identify, assess, and manage material risks from cybersecurity threats, including a written cyber incident response plan and vulnerability management procedures. Our technical and operational safeguards include vulnerability and risk assessments, network security and access controls, encryption of certain data, and employee cybersecurity awareness training. Our cybersecurity program references the National Institute of Standards and Technology cybersecurity framework (“NIST”) in developing and maintaining our cybersecurity practices. The Company is in the process of establishing an enterprise risk management framework, and cybersecurity risk is expected to be incorporated into that framework as it continues to develop. We work with third parties to assist us in our cybersecurity efforts. We maintain a vendor management process designed to evaluate cybersecurity considerations associated with third-party service providers that access our systems or data. Depending on the nature of the services provided and the sensitivity of the information involved, this process may include reviewing the service provider’s cybersecurity controls and risk management practices. Cybersecurity risk management is coordinated through management and is overseen by the Board as described below.
|
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | We have implemented, and continue to develop, various information security processes and controls designed to identify, assess, and manage material risks from cybersecurity threats, including a written cyber incident response plan and vulnerability management procedures. Our technical and operational safeguards include vulnerability and risk assessments, network security and access controls, encryption of certain data, and employee cybersecurity awareness training. Our cybersecurity program references the National Institute of Standards and Technology cybersecurity framework (“NIST”) in developing and maintaining our cybersecurity practices. The Company is in the process of establishing an enterprise risk management framework, and cybersecurity risk is expected to be incorporated into that framework as it continues to develop.
|
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Our Board of Directors has ultimate oversight responsibility for the Company’s strategy and risk management, including material risks related to cybersecurity incidents and threats. The Audit Committee of the Board of Directors (the “Audit Committee”) assists the Board in fulfilling its oversight responsibilities with respect to cybersecurity and information technology risks.
|
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | This Cyber Committee is responsible for evaluating cybersecurity incidents and determining materiality for disclosure purposes, in coordination with appropriate members of senior management and legal counsel. |
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | Management provides the Audit Committee and the Board with periodic updates regarding cybersecurity risks and the Company’s cybersecurity program. In the event of a significant cybersecurity incident, management’s processes are designed to provide timely escalation to the Audit Committee and the Board outside of the regular reporting cycle.
|
| Cybersecurity Risk Role of Management [Text Block] | Our executive officers are responsible for addressing and providing guidance to management to allow the Company to address and mitigate material risks we face, including cybersecurity risks. Among other things, management is responsible for hiring appropriate personnel, designing and implementing cybersecurity-related processes, communicating priorities to relevant personnel, assessing cybersecurity incidents as they arise, and assessing and managing material risks from cybersecurity threats.
|
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | Among members of management, cybersecurity matters are overseen by our Chief Data Officer, who reports to our Chief Executive Officer, and has significant experience in information technology. The Company has established a formal, management-level committee (the “Cyber Committee”) with a written charter to assist the Company in ensuring that cybersecurity incidents are assessed, evaluated, escalated, and disclosed in a timely, accurate, compliant, and coordinated manner in accordance with applicable regulatory requirements. The Cyber Committee initially consists of the Chief Data Officer, General Counsel, Chief Financial Officer & Chief Accounting Officer, and other members of management as determined by the Cyber Committee
|
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | The Cyber Committee initially consists of the Chief Data Officer, General Counsel, Chief Financial Officer & Chief Accounting Officer, and other members of management as determined by the Cyber Committee
|
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Management provides the Audit Committee and the Board with periodic updates regarding cybersecurity risks and the Company’s cybersecurity program. In the event of a significant cybersecurity incident, management’s processes are designed to provide timely escalation to the Audit Committee and the Board outside of the regular reporting cycle.
|
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |