Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] |
Overview We recognize the critical importance of maintaining the safety and security of our information technology systems and data and maintain a cybersecurity risk management program as a part of our overall risk management strategy that is focused on identifying, assessing and managing cybersecurity risks. Board Oversight of Cyber Risk The Audit Committee of our Board of Directors oversees our policies and procedures with respect to risk management, including our management of risks from cybersecurity threats. Cybersecurity Risk Management and Strategy We rely on information technology systems and data processing so that we and our service providers, collaborators, consultants, contractors or partners can operate to collect, process, transmit and store electronic information in our day-to-day operations. Our internal computer systems and data processing along with those of our third-party vendors, consultants, collaborators, contractors or partners may be vulnerable to risks from cybersecurity threats. In 2025, we adopted an IT Business Continuity and Disaster Recovery Plan, and we are currently in the process of developing additional cybersecurity policies and procedures as we continually work to enhance and evolve our program in light of the constantly evolving threats to our environment. Our MSP assists us with our technology, infrastructure and risk management through the deployment of a number of security controls and tools, including, but not limited to, endpoint protection tools, phishing protection and access controls. We also take steps to limit third-party vendors’ access to our systems, and we are in the process of developing additional vendor risk management procedures. Program highlights include:
However, like other companies in our industry, we and our third-party vendors may, from time to time, experience threats and security incidents that could affect our information or systems. Governance Related to Cybersecurity Risks we have also formed an IT Steering Committee, whose members include employees with relevant experience, representatives from our management team and MSP, as well as our vCIO, to review our cybersecurity program initiatives and related program metrics. Our IT Steering Committee provides cybersecurity updates and reports to our Audit Committee at each quarterly meeting or more frequently as needed. |
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | In 2025, we adopted an IT Business Continuity and Disaster Recovery Plan, and we are currently in the process of developing additional cybersecurity policies and procedures as we continually work to enhance and evolve our program in light of the constantly evolving threats to our environment. |
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] | However, like other companies in our industry, we and our third-party vendors may, from time to time, experience threats and security incidents that could affect our information or systems. |
| Cybersecurity Risk Board of Directors Oversight [Text Block] |
Board Oversight of Cyber Risk The Audit Committee of our Board of Directors oversees our policies and procedures with respect to risk management, including our management of risks from cybersecurity threats. |
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | In addition to the services provided by our MSP, we have also formed an IT Steering Committee, whose members include representatives from our management team as well as our MSP, to review our cybersecurity program initiatives and related program metrics. |
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] |
we have also formed an IT Steering Committee, whose members include employees with relevant experience, representatives from our management team and MSP, as well as our vCIO, to review our cybersecurity program initiatives and related program metrics. Our IT Steering Committee provides cybersecurity updates and reports to our Audit Committee at each quarterly meeting or more frequently as needed. |
| Cybersecurity Risk Role of Management [Text Block] | we have also formed an IT Steering Committee, whose members include employees with relevant experience, representatives from our management team and MSP, as well as our vCIO, to review our cybersecurity program initiatives and related program metrics. Our IT Steering Committee provides cybersecurity updates and reports to our Audit Committee at each quarterly meeting or more frequently as needed. |
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | |
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Our IT Steering Committee provides cybersecurity updates and reports to our Audit Committee at each quarterly meeting or more frequently as needed. |
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |