Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2025 | ||||||||||||||||||||||
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | ||||||||||||||||||||||
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | The Company maintains cyber risk management designed to preserve the security of our data and technology infrastructure. On an annual basis we conduct assessments to identify cyber risks and have developed plans on how to address any such risks for remediation of vulnerabilities. Risk management and strategy We design and implement risk management strategies for identification and management of material risks rising from cybersecurity threats and alerts. Our method involves a systematic evaluation of all potential threats reported and discovered, vulnerabilities, and their possible impacts on the Company’s operations, data, and systems health. Our cybersecurity risk management strategy includes:
Management and Board Oversight Our management is responsible for the oversight and administration of cyber security protocols. Our management team relies on our third-party providers on administrating cybersecurity assessments to identify, manage, mitigate, and respond to cybersecurity threats. Management updates the Board as necessary, regarding any significant cybersecurity occurrences. |
|||||||||||||||||||||
| Cybersecurity Risk Role of Management [Text Block] | Risk management and strategy We design and implement risk management strategies for identification and management of material risks rising from cybersecurity threats and alerts. Our method involves a systematic evaluation of all potential threats reported and discovered, vulnerabilities, and their possible impacts on the Company’s operations, data, and systems health. Our cybersecurity risk management strategy includes:
|
|||||||||||||||||||||
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Management and Board Oversight Our management is responsible for the oversight and administration of cyber security protocols. Our management team relies on our third-party providers on administrating cybersecurity assessments to identify, manage, mitigate, and respond to cybersecurity threats. Management updates the Board as necessary, regarding any significant cybersecurity occurrences. |
|||||||||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | Our management is responsible for the oversight and administration of cyber security protocols. | |||||||||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true | |||||||||||||||||||||
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true | |||||||||||||||||||||
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |