v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Item 1C. Cybersecurity Risk Management.


Overview


We recognize the critical importance of maintaining the safety and security of our information technology systems and data and maintain a cybersecurity risk management program as a part of our overall risk management strategy that is focused on identifying, assessing and managing cybersecurity risks. We engage a Managed Services Provider (“MSP”), with a highly experienced and responsive staff including a virtual Chief Information Officer (“vCIO”), to assist us with the identification, monitoring and management of risks from cybersecurity threats. They assist us with our technology, infrastructure and risk management through the deployment of a number of security controls and tools. We also take steps to limit third-party vendors’ access to our systems, and we are in the process of developing additional vendor risk management procedures.


Board Oversight of Cyber Risk


The Audit Committee of our Board of Directors oversees our policies and procedures with respect to risk management, including our management of risks from cybersecurity threats. The Audit Committee administers this cybersecurity risk oversight function through the receipt and review of reports from the management team and the vCIO on the Company’s information technology systems and the status of the cybersecurity risk management tools.


Cybersecurity Risk Management and Strategy


We rely on information technology systems and data processing so that we and our service providers, collaborators, consultants, contractors or partners can operate to collect, process, transmit and store electronic information in our day-to-day operations. Our internal computer systems and data processing along with those of our third-party vendors, consultants, collaborators, contractors or partners may be vulnerable to risks from cybersecurity threats. To help manage these risks, we convene a monthly IT Steering Committee and engage and rely on external experts, including an Information Technology MSP. In 2025, we adopted an IT Business Continuity and Disaster Recovery Plan, and we are currently in the process of developing additional cybersecurity policies and procedures as we continually work to enhance and evolve our program in light of the constantly evolving threats to our environment.


Our MSP assists us with our technology, infrastructure and risk management through the deployment of a number of security controls and tools, including, but not limited to, endpoint protection tools, phishing protection and access controls. We also take steps to limit third-party vendors’ access to our systems, and we are in the process of developing additional vendor risk management procedures.


Program highlights include:

  • Aligning with various government and industry standards such as the National Institute of Standards and Technology (“NIST”) Cybersecurity Framework and others,
  • Conducting ongoing security awareness training to keep employees informed of threats and how to spot them,
  • Evaluating the cybersecurity policies of third-party vendors and service providers,
  • Implementing redundant systems for mission critical operations,
  • Developing and implementing Business Continuity/Disaster Recovery plans and procedures, and
  • Incorporating robust protective and mitigating security measures


To date, we have not identified any cybersecurity incidents or threats that have materially affected us or are reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition. However, like other companies in our industry, we and our third-party vendors may, from time to time, experience threats and security incidents that could affect our information or systems.


Governance Related to Cybersecurity Risks


In addition to the services provided by our MSP, we have also formed an IT Steering Committee, whose members include employees with relevant experience, representatives from our management team and MSP, as well as our vCIO, to review our cybersecurity program initiatives and related program metrics. Our IT Steering Committee provides cybersecurity updates and reports to our Audit Committee at each quarterly meeting or more frequently as needed.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] To help manage these risks, we convene a monthly IT Steering Committee and engage and rely on external experts, including an Information Technology MSP. In 2025, we adopted an IT Business Continuity and Disaster Recovery Plan, and we are currently in the process of developing additional cybersecurity policies and procedures as we continually work to enhance and evolve our program in light of the constantly evolving threats to our environment.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] To date, we have not identified any cybersecurity incidents or threats that have materially affected us or are reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition. However, like other companies in our industry, we and our third-party vendors may, from time to time, experience threats and security incidents that could affect our information or systems.
Cybersecurity Risk Board of Directors Oversight [Text Block]

Board Oversight of Cyber Risk


The Audit Committee of our Board of Directors oversees our policies and procedures with respect to risk management, including our management of risks from cybersecurity threats. The Audit Committee administers this cybersecurity risk oversight function through the receipt and review of reports from the management team and the vCIO on the Company’s information technology systems and the status of the cybersecurity risk management tools.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] In addition to the services provided by our MSP, we have also formed an IT Steering Committee, whose members include representatives from our management team as well as our MSP, to review our cybersecurity program initiatives and related program metrics.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]

In addition to the services provided by our MSP, we have also formed an IT Steering Committee, whose members include employees with relevant experience, representatives from our management team and MSP, as well as our vCIO, to review our cybersecurity program initiatives and related program metrics. Our IT Steering Committee provides cybersecurity updates and reports to our Audit Committee at each quarterly meeting or more frequently as needed.

Cybersecurity Risk Role of Management [Text Block] we have also formed an IT Steering Committee, whose members include employees with relevant experience, representatives from our management team and MSP, as well as our vCIO, to review our cybersecurity program initiatives and related program metrics. Our IT Steering Committee provides cybersecurity updates and reports to our Audit Committee at each quarterly meeting or more frequently as needed.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] The Audit Committee administers this cybersecurity risk oversight function through the receipt and review of reports from the management team and the vCIO on the Company’s information technology systems and the status of the cybersecurity risk management tools.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Our IT Steering Committee provides cybersecurity updates and reports to our Audit Committee at each quarterly meeting or more frequently as needed.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true