v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Risk Management and Strategy

 

We recognize the importance of assessing, identifying, and managing cybersecurity risks. These include operational vulnerabilities, intellectual property theft, fraud, extortion, potential harm to stakeholders, regulatory compliance issues, and associated legal, financial, and reputational consequences.

 

In partnership with external consultants, we maintain comprehensive information security processes to identify and mitigate material cybersecurity risks. Our protective measures include:

 

Technical, physical, and organizational safeguards
Disaster recovery and business continuity planning
Data encryption and network security controls
Access restrictions and physical security measures
Comprehensive asset management
Continuous systems monitoring
Employee security training

 

Our assessment to date shows that cybersecurity incidents and vulnerabilities have not materially impacted our business operations, financial performance, or strategic direction.

 

Our ongoing monitoring and evaluation have not identified any cybersecurity risks that are expected to significantly affect our operational capabilities, financial condition, or business objectives in the foreseeable future.

 
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] We recognize the importance of assessing, identifying, and managing cybersecurity risks. These include operational vulnerabilities, intellectual property theft, fraud, extortion, potential harm to stakeholders, regulatory compliance issues, and associated legal, financial, and reputational consequences.
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] true
Cybersecurity Risk Board of Directors Oversight [Text Block] Information Technology and Cybersecurity Governance

 

Our corporate IT infrastructure, communication networks, and related systems are essential operational components. These systems manage product development, internal and external communications, accounting functions, data storage, and other critical operations. Our business depends on secure handling of proprietary, confidential, and sensitive data.

 

Our Chief Financial Officer oversees information security efforts in conjunction with a third-party IT services company and reports material cybersecurity matters to the Chief Executive Officer and Board of Directors.

 
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Chief Financial Officer oversees information security efforts in conjunction with a third-party IT services company and reports material cybersecurity matters to the Chief Executive Officer and Board of Directors.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] We recognize the critical importance of cybersecurity in safeguarding sensitive information, maintaining operational resilience, and protecting stakeholders’ interests.
Cybersecurity Risk Board of Directors Oversight [Text Block] Information Technology and Cybersecurity Governance

 

Our corporate IT infrastructure, communication networks, and related systems are essential operational components. These systems manage product development, internal and external communications, accounting functions, data storage, and other critical operations. Our business depends on secure handling of proprietary, confidential, and sensitive data.

 

Our Chief Financial Officer oversees information security efforts in conjunction with a third-party IT services company and reports material cybersecurity matters to the Chief Executive Officer and Board of Directors.