v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes Integrated [Text Block] The cybersecurity process has been integrated into the Company’s overall risk management system and process and is solely internally managed
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Management is responsible for identifying risks that threaten achievement of the control activities stated in the management’s description of the services organizations systems. The risk assessment occurs annually, or as business needs change, and covers identification of risks that could act against the company’s objectives as well as specific risks related to a compromise to the security of data.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] As of the date of this report, we are not aware of any material risks from cybersecurity threats that have materially affected or are reasonably likely to materially affect us, including our business strategy, results of operations or financial condition
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]

Governance

Our Chief Executive Officer and Chief Financial Officer oversee our cybersecurity risk management and mitigation efforts. The board of directors receive prompt and timely information regarding any cybersecurity incidents. Our Audit Committee periodically discusses cybersecurity.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Chief Executive Officer and Chief Financial Officer oversee our cybersecurity risk management and mitigation efforts
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]

Our Chief Executive Officer and Chief Financial Officer oversee our cybersecurity risk management and mitigation efforts. The board of directors receive prompt and timely information regarding any cybersecurity incidents. Our Audit Committee periodically discusses cybersecurity.

Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

The Company has developed and maintained a cybersecurity risk management strategy, consisting of cybersecurity policies, procedures, compliance and awareness programs to mitigate risk and to ensure compliance with security, availability and confidentiality trust principles. The cybersecurity process has been integrated into the Company’s overall risk management system and process and is solely internally managed. Management is responsible for identifying risks that threaten achievement of the control activities stated in the management’s description of the services organizations systems. The risk assessment occurs annually, or as business needs change, and covers identification of risks that could act against the company’s objectives as well as specific risks related to a compromise to the security of data.

The level of each identified risk is determined by considering the impact of the risk itself and the likelihood of the risk materializing and high scoring risks are actioned upon. Risks are analyzed to determine whether the risk meets company risk acceptance criteria to be accepted or whether a mitigation plan will be applied. Mitigation plans include both the individual or department responsible for the plan and may include budget considerations.

As of the date of this report, we are not aware of any material risks from cybersecurity threats that have materially affected or are reasonably likely to materially affect us, including our business strategy, results of operations or financial condition.

Cybersecurity Risk Role of Management [Text Block]

As part of the critical elements of our overall risk management approach, our cybersecurity program is focused on the following key areas:

  Collaborative Approach: The Company has implemented a comprehensive, cross-functional approach to identifying, preventing and mitigating cybersecurity threats and incidents, while also implementing controls and procedures that provide for the prompt escalation of certain cybersecurity incidents so that decisions regarding the public disclosure and reporting of such incidents can be made by management in a timely manner.
  Technical Safeguards: The Company deploys technical safeguards that are designed to protect the Company’s information systems from cybersecurity threats, including firewalls, intrusion prevention and detection systems, anti-malware functionality and access controls, which are evaluated and improved through vulnerability assessments and cybersecurity threat intelligence.
  Incident Response and Recovery Planning: The Company has established and maintains comprehensive incident response and recovery plans that fully address the Company’s response to a cybersecurity incident, and such plans are tested and evaluated on a regular basis.
Cybersecurity Risk Management Processes Integrated [Flag] true