v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Cybersecurity Risk Management and Strategy

 

Our Board and senior management recognize the critical importance of maintaining the trust and confidence of our clients, patients, business partners and employees. We recognize the importance of assessing, identifying, and managing material risks associated with cybersecurity threats, as that term is defined in Item 106(a) of Regulation S-K. These risks include operational risks, intellectual property or trade secret theft, improper disclosure of confidential information, fraud, extortion, harm to employees or third parties with which we do business, and violation of data privacy or security laws. Our management, led by our Chief Executive Officer, is actively involved in oversight of our risk management efforts, and cybersecurity represents an important component of the Company’s overall approach to enterprise risk management (“ERM”). Our cybersecurity processes and practices are fully integrated into the Company’s ERM efforts. In general, we seek to address cybersecurity risks through a cross-functional approach that is focused on preserving the confidentiality, integrity and availability of the information that we collect and store by identifying, preventing and mitigating cybersecurity threats. In addition, we continue to monitor and assess cybersecurity risks to our business, including risks arising from our third-party service providers, and we may expend additional resources to enhance our cybersecurity risk management program as the threat landscape evolves.

 

As one of the critical elements of our overall ERM approach, our cybersecurity efforts are focused on the following key areas:

 

  Collaborative Approach: We have implemented and continue to develop a cross-functional approach to identifying, preventing and mitigating cybersecurity threats and incidents, while also implementing controls and procedures that provide for the prompt escalation of certain cybersecurity incidents so that decisions regarding the public disclosure and reporting of such incidents can be made by management in a timely manner.
     
  Technical Safeguards: We deploy and continue to implement technical safeguards that are designed to protect our information systems from cybersecurity threats, including multifactor authentication, intrusion prevention and detection systems, anti-malware functionality and access controls, which are evaluated and improved through vulnerability assessments and cybersecurity threat intelligence.

 

We expect to leverage third-party service providers to conduct evaluations of our security controls, independent audits or consulting on best practices to address new challenges , including periodic reviews of cybersecurity threats and related controls, such as reviews of periodic penetration tests conducted by independent third parties. We have processes and continue to develop processes to manage the cybersecurity risks associated with our use of third-party service providers. This includes proactive monitoring of third party’s configurations, risk questionnaires for new technology vendors, and other processes to minimize risks associated with our third-party providers.

 

While we have experienced cybersecurity incidents in the past in the normal course of business and expect to continue to experience such incidents or threats from time to time, to date, none have had a material adverse effect on our business, financial condition, results of operations or cash flows.

 
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Board of Directors Oversight [Text Block] Cybersecurity Governance

 

Cybersecurity is an important part of our risk management processes and an area of focus for our Board and management. Our Board is responsible for the oversight of risks from cybersecurity threats and receives updates from management at least annually, including representatives from our IT, finance, and legal departments regarding matters of cybersecurity. These updates include existing and new cybersecurity risks, status on how management is addressing and/or mitigating those risks, cybersecurity and data privacy incidents (if any) and status on key information security initiatives. Our board members also engage in ad hoc conversations with management on cybersecurity-related news events and updates to our cybersecurity risk management and strategy programs.

 

Our day-to-day cybersecurity risk management and strategy processes are overseen by our management team including representatives from our IT, finance, and legal departments. Such individuals have prior work experience in various roles involving IT security, auditing, compliance, data protection, privacy, risk management, systems, and programming. These individuals are informed about and monitor the prevention, mitigation, detection, and remediation of cybersecurity incidents through their management of, and participation in, our cybersecurity risk management and strategy processes, and report to the audit committee on any appropriate items. For purposes of Item 1C, a “cybersecurity incident” means an unauthorized occurrence, or a series of related unauthorized occurrences, on or conducted through our information systems that jeopardizes the confidentiality, integrity, or availability of our information systems or any information residing therein.

 
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] our risk management processes and an area of focus for our Board and management. Our Board is responsible for the oversight of risks from cybersecurity threats and receives updates from management at least annually, including representatives from our IT, finance, and legal departments regarding matters of cybersecurity.
Cybersecurity Risk Board of Directors Oversight [Text Block] Cybersecurity Governance

 

Cybersecurity is an important part of our risk management processes and an area of focus for our Board and management. Our Board is responsible for the oversight of risks from cybersecurity threats and receives updates from management at least annually, including representatives from our IT, finance, and legal departments regarding matters of cybersecurity. These updates include existing and new cybersecurity risks, status on how management is addressing and/or mitigating those risks, cybersecurity and data privacy incidents (if any) and status on key information security initiatives. Our board members also engage in ad hoc conversations with management on cybersecurity-related news events and updates to our cybersecurity risk management and strategy programs.

 

Our day-to-day cybersecurity risk management and strategy processes are overseen by our management team including representatives from our IT, finance, and legal departments. Such individuals have prior work experience in various roles involving IT security, auditing, compliance, data protection, privacy, risk management, systems, and programming. These individuals are informed about and monitor the prevention, mitigation, detection, and remediation of cybersecurity incidents through their management of, and participation in, our cybersecurity risk management and strategy processes, and report to the audit committee on any appropriate items. For purposes of Item 1C, a “cybersecurity incident” means an unauthorized occurrence, or a series of related unauthorized occurrences, on or conducted through our information systems that jeopardizes the confidentiality, integrity, or availability of our information systems or any information residing therein.