v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Cybersecurity is a critical component of our operational integrity and strategic planning. Recognizing the evolving nature of cyber threats, we are committed to implementing robust cybersecurity measures to safeguard our digital assets, protect stakeholder interests, and ensure continuity of our operations.

Cybersecurity Risk Management Processes

Our approach to managing cybersecurity risks is proactive and comprehensive. We employ a range of methods to assess, identify and manage the risk of potential cybersecurity threats, including regular security audits, utilization of a third party service provider for security measures over our virtual environment, threat intelligence monitoring, and vulnerability assessments. We assess risks associated with third-party providers as part of our overall cybersecurity risk management framework by reviewing system and organization controls reports, when available, and other independent reports. We also generally require third parties to, among other things, maintain security controls to protect our confidential information and to promptly notify us of material breaches that may impact our data. Our risk management framework is designed to mitigate potential cybersecurity risks through a blend of technological safeguards, employee training programs, and incident response protocols. We devote resources to maintain and regularly update our systems and processes that are designed to protect the security of our computer systems, software, networks and other technology assets against attempts by unauthorized parties to obtain access to confidential information, destroy data, disrupt or degrade service, sabotage systems or cause other damage, and we have implemented certain review and approval procedures internally and with our banks; and have implemented system-wide changes.

Cybersecurity Strategy and Investment

Our cybersecurity strategy is integral to our broader risk management policy. We invest in state-of-the-art cybersecurity technologies and infrastructure to enhance our defensive capabilities and have a dedicated system of internal controls in place to prevent, monitor and remediate cyber risks including any risks from utilization of third party service providers. Additionally, we allocate resources for ongoing staff training and awareness programs to foster a culture of cybersecurity mindfulness across the organization and maintain dedicated channels of communication with our third party service provider monitoring our virtual environment to facilitate timely cyber incident identification and remediation. Our strategic investments in cybersecurity are tailored to address the unique challenges and risks pertinent to our industry and operational scope.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Our cybersecurity strategy is integral to our broader risk management policy.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] The governance of our cybersecurity efforts is overseen by the Audit Committee, which includes individuals with experience in technology and cybersecurity. The board regularly reviews and guides our cybersecurity policies and practices. Management plays a critical role in implementing these policies and in the day-to-day management of cybersecurity risks. They are empowered with the maintenance, communication and enforcement of cybersecurity policies and employ proactive measures to improve cybersecurity through review of various third party cyber tools for potential implementation. Our Head of IT and Chief Financial Officer ("CFO") are responsible for overseeing the implementation of cybersecurity strategies and ensuring compliance with regulatory standards. In addition to our in-house expertise, our independent external auditors and our outsourced internal audit team, regularly test and asses our cybersecurity controls. Any cyber incidents that occur are escalated to the CFO to facilitate resolution. Any incident determined to be material is discussed with the Audit Committee and communicated to our internal and external auditors as well as our third party virtual environment service provider, when relevant.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The governance of our cybersecurity efforts is overseen by the Audit Committee, which includes individuals with experience in technology and cybersecurity.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The governance of our cybersecurity efforts is overseen by the Audit Committee, which includes individuals with experience in technology and cybersecurity. The board regularly reviews and guides our cybersecurity policies and practices. Management plays a critical role in implementing these policies and in the day-to-day management of cybersecurity risks. They are empowered with the maintenance, communication and enforcement of cybersecurity policies and employ proactive measures to improve cybersecurity through review of various third party cyber tools for potential implementation. Our Head of IT and Chief Financial Officer ("CFO") are responsible for overseeing the implementation of cybersecurity strategies and ensuring compliance with regulatory standards. In addition to our in-house expertise, our independent external auditors and our outsourced internal audit team, regularly test and asses our cybersecurity controls. Any cyber incidents that occur are escalated to the CFO to facilitate resolution. Any incident determined to be material is discussed with the Audit Committee and communicated to our internal and external auditors as well as our third party virtual environment service provider, when relevant.
Cybersecurity Risk Role of Management [Text Block] Our approach to managing cybersecurity risks is proactive and comprehensive. We employ a range of methods to assess, identify and manage the risk of potential cybersecurity threats, including regular security audits, utilization of a third party service provider for security measures over our virtual environment, threat intelligence monitoring, and vulnerability assessments. We assess risks associated with third-party providers as part of our overall cybersecurity risk management framework by reviewing system and organization controls reports, when available, and other independent reports. We also generally require third parties to, among other things, maintain security controls to protect our confidential information and to promptly notify us of material breaches that may impact our data. Our risk management framework is designed to mitigate potential cybersecurity risks through a blend of technological safeguards, employee training programs, and incident response protocols. We devote resources to maintain and regularly update our systems and processes that are designed to protect the security of our computer systems, software, networks and other technology assets against attempts by unauthorized parties to obtain access to confidential information, destroy data, disrupt or degrade service, sabotage systems or cause other damage, and we have implemented certain review and approval procedures internally and with our banks; and have implemented system-wide changes.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] The governance of our cybersecurity efforts is overseen by the Audit Committee, which includes individuals with experience in technology and cybersecurity. The board regularly reviews and guides our cybersecurity policies and practices. Management plays a critical role in implementing these policies and in the day-to-day management of cybersecurity risks. They are empowered with the maintenance, communication and enforcement of cybersecurity policies and employ proactive measures to improve cybersecurity through review of various third party cyber tools for potential implementation. Our Head of IT and Chief Financial Officer ("CFO") are responsible for overseeing the implementation of cybersecurity strategies and ensuring compliance with regulatory standards. In addition to our in-house expertise, our independent external auditors and our outsourced internal audit team, regularly test and asses our cybersecurity controls.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] The governance of our cybersecurity efforts is overseen by the Audit Committee, which includes individuals with experience in technology and cybersecurity.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Any cyber incidents that occur are escalated to the CFO to facilitate resolution. Any incident determined to be material is discussed with the Audit Committee and communicated to our internal and external auditors as well as our third party virtual environment service provider, when relevant.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true