Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2025 | |||||||||||||||
| Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |||||||||||||||
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Risk
Management and Strategy
We recognize the importance of assessing, identifying, and managing cybersecurity risks. These include operational vulnerabilities, intellectual property theft, fraud, extortion, potential harm to stakeholders, regulatory compliance issues, and associated legal, financial, and reputational consequences.
In partnership with external consultants, we maintain comprehensive information security processes to identify and mitigate material cybersecurity risks. Our protective measures include:
Our assessment to date shows that cybersecurity incidents and vulnerabilities have not materially impacted our business operations, financial performance, or strategic direction.
Our ongoing monitoring and evaluation have not identified any cybersecurity risks that are expected to significantly affect our operational capabilities, financial condition, or business objectives in the foreseeable future. |
||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Flag] | true | ||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Text Block] | We recognize the importance of assessing, identifying, and managing cybersecurity risks. These include operational vulnerabilities, intellectual property theft, fraud, extortion, potential harm to stakeholders, regulatory compliance issues, and associated legal, financial, and reputational consequences. | ||||||||||||||
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | true | ||||||||||||||
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Information
Technology and Cybersecurity Governance
Our corporate IT infrastructure, communication networks, and related systems are essential operational components. These systems manage product development, internal and external communications, accounting functions, data storage, and other critical operations. Our business depends on secure handling of proprietary, confidential, and sensitive data.
Our Chief Financial Officer oversees information security efforts in conjunction with a third-party IT services company and reports material cybersecurity matters to the Chief Executive Officer and Board of Directors. |
||||||||||||||
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our Chief Financial Officer oversees information security efforts in conjunction with a third-party IT services company and reports material cybersecurity matters to the Chief Executive Officer and Board of Directors. | ||||||||||||||
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | We recognize the critical importance of cybersecurity in safeguarding sensitive information, maintaining operational resilience, and protecting stakeholders’ interests. | ||||||||||||||
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Information
Technology and Cybersecurity Governance
Our corporate IT infrastructure, communication networks, and related systems are essential operational components. These systems manage product development, internal and external communications, accounting functions, data storage, and other critical operations. Our business depends on secure handling of proprietary, confidential, and sensitive data.
Our Chief Financial Officer oversees information security efforts in conjunction with a third-party IT services company and reports material cybersecurity matters to the Chief Executive Officer and Board of Directors. |