Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | The Company’s Cybersecurity Risk Management Approach The Company utilizes and relies on CIM Group for its IT and IT administration. CIM Group’s cybersecurity strategy prioritizes detection, analysis and response to known, anticipated or unexpected threats, effective management of security risks and resiliency against incidents. CIM Group’s cybersecurity risk management policies and procedures include, among other things: enterprise-wide hardware and software management and security controls; employee training; security assessments; penetration testing; security audits and ongoing risk assessments; due diligence on, and monitoring and oversight of, key third-party providers; vulnerability management; and management oversight to assess, identify and manage material risks from cybersecurity threats. CIM Group’s controls leverage the National Institute of Standards and Technology Cyber Security Framework. CIM Group also utilizes industry and government associations, the results from regular internal and third-party audits and other similar resources to inform its cybersecurity processes and to allocate resources. In addition, all CIM Group employees receive mandatory training on cybersecurity matters upon hiring and annually thereafter, periodic training and information updates that address new cybersecurity threats and trends, and quarterly “phishing” and social engineering testing to evaluate the effectiveness of the cybersecurity training program and raise employee awareness of cybersecurity threats. In 2025, we did not identify any cybersecurity threats that have materially affected or are reasonably likely to materially affect our business strategy, results of operations, or financial condition. However, despite our efforts, we cannot eliminate all risks from cybersecurity threats, or provide assurances that we have not experienced undetected cybersecurity incidents. For further discussion of cybersecurity risks, see “Item 1A. Risk Factors—Risk Related to Our Company - Cybersecurity risks and cyber incidents may adversely affect our business in the event we or our manager, our transfer agent or any other party that provides us with essential services experiences cyber incidents.”
|
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | The Company utilizes and relies on CIM Group for its IT and IT administration. CIM Group’s cybersecurity strategy prioritizes detection, analysis and response to known, anticipated or unexpected threats, effective management of security risks and resiliency against incidents. CIM Group’s cybersecurity risk management policies and procedures include, among other things: enterprise-wide hardware and software management and security controls; employee training; security assessments; penetration testing; security audits and ongoing risk assessments; due diligence on, and monitoring and oversight of, key third-party providers; vulnerability management; and management oversight to assess, identify and manage material risks from cybersecurity threats. CIM Group’s controls leverage the National Institute of Standards and Technology Cyber Security Framework. CIM Group also utilizes industry and government associations, the results from regular internal and third-party audits and other similar resources to inform its cybersecurity processes and to allocate resources.
|
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Board of Directors Oversight of Cybersecurity Risk Management The audit committee of our Board has oversight of our cybersecurity risks. The audit committee receives quarterly updates from CIM Group, including one or more representatives from the Committees, with respect to the effectiveness of its cyber readiness and cybersecurity program. This oversight includes briefing and a report by CIM Group’s Head of Transformation or CIM Head of Enterprise Technology, as well as a discussion of any cybersecurity breaches detected by CIM Group and a summary of, among other things, the current cybersecurity threat landscape, defensibility measures implemented by CIM Group, the health of CIM Group’s information security system, effectiveness of CIM Group’s cybersecurity controls and recoverability and business continuity testing. Pursuant to the Company’s cybersecurity policy, the audit committee will be promptly notified of any material cybersecurity incident required to be disclosed under Item 1.05 of Form 8-K and shall oversee the Company’s response to such matter.
|
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | audit committee |
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Committees conduct both regular quarterly and as-needed meetings throughout the year during which members of the CIM Group’s IT department provide updates and report on meaningful cybersecurity risks, threats, incidents and vulnerabilities in accordance with their respective reporting frameworks, as well as related priorities, mitigation and remediation activities, financial and employee resource levels, regulatory compliance, technology trends and third-party provider risks. |
| Cybersecurity Risk Role of Management [Text Block] | CIM Group’s internal processes require escalation of material cybersecurity risks to its management and its Cybersecurity Committee (the “Committee”) for evaluation. The Committee consists of CIM Group’s Head of Enterprise Technology, CIM Group’s Chief Compliance Officer (the “CCO”), CIM Group’s Head of Transformation as well as representatives from CIM Group’s operations, technology, and compliance departments as needed. The Committee is responsible for CIM Group’s cybersecurity policy and overseeing the activities of CIM Group’s cybersecurity practices, including assessing CIM Group’s risks and controls. |
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | CIM Group’s internal processes require escalation of material cybersecurity risks to its management and its Cybersecurity Committee (the “Committee”) for evaluation. The Committee consists of CIM Group’s Head of Enterprise Technology, CIM Group’s Chief Compliance Officer (the “CCO”), CIM Group’s Head of Transformation as well as representatives from CIM Group’s operations, technology, and compliance departments as needed. The Committee is responsible for CIM Group’s cybersecurity policy and overseeing the activities of CIM Group’s cybersecurity practices, including assessing CIM Group’s risks and controls. |
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | The Committee is chaired by CIM’s Head of Enterprise Technology and collectively the group has more than 30 years’ experience in the fields of information technology, cybersecurity and adjacent roles, including serving on cybersecurity advisory councils. In addition, members of the Committee have relevant industry experience in enterprise risk management and compliance. The Committee has established a Cybersecurity Subcommittee (the “Subcommittee”, and together with the Committee, the “Committees”). The Subcommittee consists of, among others, the Head of Enterprise Technology, the CCO, the chief financial officers of the public companies that are subject to the SEC’s cybersecurity rule adopted in 2023 and are managed by CIM Group, including our Chief Financial Officer. The Subcommittee is tasked with assisting CIM Group-managed public companies (that are subject to the SEC’s cybersecurity rule adopted in 2023), including us, in complying with such cybersecurity rule.
|
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | The Committees conduct both regular quarterly and as-needed meetings throughout the year during which members of the CIM Group’s IT department provide updates and report on meaningful cybersecurity risks, threats, incidents and vulnerabilities in accordance with their respective reporting frameworks, as well as related priorities, mitigation and remediation activities, financial and employee resource levels, regulatory compliance, technology trends and third-party provider risks. |
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |