Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | The Company relies on Ashford Inc. and the Company’s managers to protect the electronic assets of the Company. Their programs consist of various processes designed to ensure that the Company and its electronic assets are shielded from cyber events that may compromise the Company’s ability to successfully execute its business on a day-to-day basis. These processes cover areas such as, but not limited to, risk management, access control, anti-virus management, electronic communication, risk/security reporting, incident response planning and business continuity planning. The information technology department of Remington Hospitality (“IT Department”), which includes a cybersecurity department (“IT Security Department”), is responsible for implementing processes and coordinating with the Human Resources Department to align training and onboarding efforts of Ashford Inc. and Remington Hospitality employees handling the Company’s electronic assets. Remington Hospitality’s IT Security Department carries out risk management primarily by outsourcing risks to those companies and agencies that specialize in handling such risks and that have the appropriate resources to do so. Additionally, Remington Hospitality’s IT Department assesses and improves the Company’s cybersecurity risk management processes on an annual basis by: (i) engaging consultants to complete a benchmarking evaluation to compare its cybersecurity posture against peers; and (ii) engaging a cybersecurity risk readiness and response company to conduct vulnerability and penetration testing, which produces a report that specifies any possible risk area and devices. Such report is presented to the IT Department for analysis and for the purpose of developing subsequent action plans to remediate any vulnerabilities. As of the date of this report, we are not aware of any material risks from cybersecurity threats that have materially affected or are reasonably likely to materially affect the Company, including our business strategy, results of operations, or financial conditions, except as otherwise noted.
|
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | Their programs consist of various processes designed to ensure that the Company and its electronic assets are shielded from cyber events that may compromise the Company’s ability to successfully execute its business on a day-to-day basis. |
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Board of Directors Oversight [Text Block] | The Audit Committee of the board of directors is then briefed each quarter on the occurrence of any cybersecurity incidents. |
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Audit Committee of the board of directors is then briefed each quarter on the occurrence of any cybersecurity incidents. |
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Audit Committee of the board of directors is then briefed each quarter on the occurrence of any cybersecurity incidents. |
| Cybersecurity Risk Role of Management [Text Block] | Management, provided by Ashford Inc., is ultimately responsible for assessing and managing the Company’s cybersecurity risk. |
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | Management, provided by Ashford Inc., is ultimately responsible for assessing and managing the Company’s cybersecurity risk. The information security program is overseen by the Executive Vice President of Asset Management for Ashford Inc. and the Executive Vice President of Technology for Remington Hospitality. A Cyber Incident Response Team comprised of Ashford Inc. and Remington Hospitality employees meets monthly to review incidents that have occurred and/or impacted the Company’s electronic assets. |
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | The information security program is overseen by the Executive Vice President of Asset Management for Ashford Inc. and the Executive Vice President of Technology for Remington Hospitality. |
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | A Cyber Incident Response Team comprised of Ashford Inc. and Remington Hospitality employees meets monthly to review incidents that have occurred and/or impacted the Company’s electronic assets. The Executive Vice President of Technology of Remington Hospitality reviews weekly reports that contain an overview of the activity in the department, any United States Computer Emergency Readiness Team alerts processed and all findings from the preventative maintenance tools. The Executive Vice President of Technology provides such report to the Executive Vice President of Asset Management on a quarterly basis. |
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |