v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] We have processes in place to assess, identify, and manage material risks from cybersecurity threats. Our business is dependent on the communications and information systems of the Adviser and other third-party service providers. The Adviser manages the our day-to-day operations and has implemented a cybersecurity program that applies to us and our operations.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] We have processes in place to assess, identify, and manage material risks from cybersecurity threats. Our business is dependent on the communications and information systems of the Adviser and other third-party service providers. The Adviser manages the our day-to-day operations and has implemented a cybersecurity program that applies to us and our operations.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Our Board would be made aware of any material risks associated with cybersecurity threats. Our Board currently receives periodic updates from our CCO regarding the overall state of the Adviser’s cybersecurity program, information on the current threat landscape, and risks from cybersecurity threats and cybersecurity incidents impacting us.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block]
The Adviser has instituted a cybersecurity program, overseen by the Adviser's Chief Compliance Officer ("CCO"), which is designed to assess, identify, and manage material cyber risks applicable to us. The cyber risk management program involves risk assessments, identification of sensitive information assets (“Critical Information”), implementation of security measures, and ongoing monitoring of systems and networks, including networks on which we rely on. The Adviser actively monitors the current threat landscape in an effort to identify material risks arising from new and evolving cybersecurity threats, including material risks faced by us.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
The Adviser has instituted a cybersecurity program, overseen by the Adviser's Chief Compliance Officer ("CCO"), which is designed to assess, identify, and manage material cyber risks applicable to us. The cyber risk management program involves risk assessments, identification of sensitive information assets (“Critical Information”), implementation of security measures, and ongoing monitoring of systems and networks, including networks on which we rely on. The Adviser actively monitors the current threat landscape in an effort to identify material risks arising from new and evolving cybersecurity threats, including material risks faced by us.
We rely on the Adviser to engage external experts, including cybersecurity consultants, to evaluate cybersecurity measures and risk management processes, and depends on and engages various third parties, including suppliers, vendors, and service providers. The Adviser conducts ongoing due diligence of its significant service providers to determine whether the cybersecurity programs of service providers include, among other things, procedures and safeguards designed to ensure the protection of Critical Information.
Our Board would be made aware of any material risks associated with cybersecurity threats. Our Board currently receives periodic updates from our CCO regarding the overall state of the Adviser’s cybersecurity program, information on the current threat landscape, and risks from cybersecurity threats and cybersecurity incidents impacting us.
Cybersecurity Risk Role of Management [Text Block]
Our management team, including our CCO, is responsible for assessing and managing material risks from cybersecurity threats. Our CCO, in managing such risks relating to cybersecurity threats, relies on the assistance provided by the Adviser.
Our management team is informed about and monitors the prevention, detection, mitigation, and remediation of material cybersecurity incidents impacting us, including through the receipt of notifications from service providers and reliance on communications with legal, information technology, and/or compliance personnel of the Adviser.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block]
Our management team, including our CCO, is responsible for assessing and managing material risks from cybersecurity threats. Our CCO, in managing such risks relating to cybersecurity threats, relies on the assistance provided by the Adviser.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our management team is informed about and monitors the prevention, detection, mitigation, and remediation of material cybersecurity incidents impacting us, including through the receipt of notifications from service providers and reliance on communications with legal, information technology, and/or compliance personnel of the Adviser.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Our management team is informed about and monitors the prevention, detection, mitigation, and remediation of material cybersecurity incidents impacting us, including through the receipt of notifications from service providers and reliance on communications with legal, information technology, and/or compliance personnel of the Adviser
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true