Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2025 | |||||||||||||||
| Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |||||||||||||||
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Item
1C. Cybersecurity Since our formation, we have been primarily focused on research and development activities and pursuing FDA approval of our planned products, and only recently commenced building our commercial team and focusing on the commercialization of LIBERTY®. We have 42 full-time employees and 1 hourly employee, of which 24 are based in the United States and 19 are based in Israel, and currently use third-party vendors and service providers for certain product development and regulatory approval activities. We use a third-party sub-contractor to manage all Information Technology (IT) issues, including protection against, detection, and response to cyberattacks. The measures that are taken to ensure proper protection include:
Additionally, we believe that our third-party vendors and service providers have their own respective cybersecurity protocols which our management believes to be adequate for protecting any of the Company’s data that might be in their possession from time to time; however, having such protocols is not necessarily a condition for us using or not using the services of any such vendors or providers.
Our IT service provider assesses and manages cybersecurity risks on our behalf, who provides updates and proposals as appropriate, and who reports to our Chief Technology Officer and General Manager, who does not have specific cybersecurity expertise. The Company has an Information Technology Policy that, among other things, governs and provides for cybersecurity policies and processes, including to define safety measures to protect the Company’s confidentiality, integrity and availability of data and other intellectual property, as well as to define the manner in which information is stored, saved and routed in the Company’s network. Additionally, the Board and management believe cybersecurity represents an important component of the Company’s overall approach to risk management and oversight, especially as the Company has commenced commercialization of its first product.
Historically, cybersecurity threats have not materially affected the Company, including its business strategy, results of operations or financial condition, while it was focused on pursuing FDA approval and had pre-commercial operations. The Company is not aware of any material security breach to date. Accordingly, the Company has not incurred any material expenses over the last two years relating to information security breaches. The Company is considering how its evolving business operations could result in a greater risk of a cybersecurity incident, and potential responses and actions to take as a result. The occurrence of cyber-incidents, or a deficiency in our cybersecurity or in those of any of our third-party service providers could negatively impact our business by causing a disruption to our operations, a compromise or corruption of our confidential information and systems, or damage to our business relationships or reputation, all of which could negatively impact our business and results of operations. There can be no assurance that the Company’s third-party vendors’ and service providers’ cybersecurity risk management processes, including their policies, controls or procedures, will be fully implemented, complied with or effective in protecting the Company’s systems and information. |
||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Flag] | true | ||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Text Block] | We have 42 full-time employees and 1 hourly employee, of which 24 are based in the United States and 19 are based in Israel, and currently use third-party vendors and service providers for certain product development and regulatory approval activities | ||||||||||||||
| Cybersecurity Risk Management Third Party Engaged [Flag] | true | ||||||||||||||
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false | ||||||||||||||
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Our IT service provider assesses and manages cybersecurity risks on our behalf, who provides updates and proposals as appropriate, and who reports to our Chief Technology Officer and General Manager, who does not have specific cybersecurity expertise. The Company has an Information Technology Policy that, among other things, governs and provides for cybersecurity policies and processes, including to define safety measures to protect the Company’s confidentiality, integrity and availability of data and other intellectual property, as well as to define the manner in which information is stored, saved and routed in the Company’s network. Additionally, the Board and management believe cybersecurity represents an important component of the Company’s overall approach to risk management and oversight, especially as the Company has commenced commercialization of its first product. |