v3.26.1
Cybersecurity Risk Management, Strategy, and Governance
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

ITEM 1C. CYBERSECURITY

Risk Management and Strategy

We maintain standard procedures to help assess, identify and manage material risk posed by cybersecurity threats and regularly evaluate how we can integrate these procedures into our overall risk management processes. For example, we require that all of our employees who have access to our internal network complete formal cybersecurity training upon hire and on a periodic basis, including training on phishing, malware, and other cybersecurity risks. We also continuously evaluate our information technology systems and our practices that relate to our information technology systems. To date, we have not engaged any assessors, consultants, auditors or other third parties in connection with these efforts but may elect to do so in the future.

To the extent we identify areas in our information systems that need improvement, we seek to timely implement and monitor such improvements. While we believe that we have taken appropriate security measures to protect our data and information technology systems, and have been informed by our third-party vendors that they have as well, there can be no assurance that our efforts will prevent breakdowns or breaches in our systems, or those of our third-party vendors, that could materially adversely affect our business and financial condition. For additional information regarding whether risks from cybersecurity threats are reasonably likely to materially affect us, see Item 1A, “Risk Factors — Security threats to our information technology infrastructure and/or our physical buildings could expose us to liability and damage our reputation and business” in this Report.

Governance

One of the functions of our Audit Committee is to identify principal risks related to our company and ensure implementation of appropriate systems to manage these risks, including risks from cybersecurity threats. Our Audit Committee works with members of our management to identify and manage these risks, including cybersecurity risks. We currently outsource a qualified Information Technology Administrator who reports to our Chief Executive Officer. This consultant has over 25 years of experience with cybersecurity, information technology development and deployment and information technology risk assessment and management, including information security management. Our Information Technology Administrator regularly monitors our information technology systems and monitors the prevention, detection, mitigation and remediation of cybersecurity incidents in consultation with our Chief Executive Officer. To the extent necessary, our Chief Executive Officer reports such risks to our Board of Directors.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]

We maintain standard procedures to help assess, identify and manage material risk posed by cybersecurity threats and regularly evaluate how we can integrate these procedures into our overall risk management processes. For example, we require that all of our employees who have access to our internal network complete formal cybersecurity training upon hire and on a periodic basis, including training on phishing, malware, and other cybersecurity risks. We also continuously evaluate our information technology systems and our practices that relate to our information technology systems. To date, we have not engaged any assessors, consultants, auditors or other third parties in connection with these efforts but may elect to do so in the future.

Cybersecurity Risk Management Third Party Engaged [Flag] false
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]

Governance

One of the functions of our Audit Committee is to identify principal risks related to our company and ensure implementation of appropriate systems to manage these risks, including risks from cybersecurity threats. Our Audit Committee works with members of our management to identify and manage these risks, including cybersecurity risks. We currently outsource a qualified Information Technology Administrator who reports to our Chief Executive Officer. This consultant has over 25 years of experience with cybersecurity, information technology development and deployment and information technology risk assessment and management, including information security management. Our Information Technology Administrator regularly monitors our information technology systems and monitors the prevention, detection, mitigation and remediation of cybersecurity incidents in consultation with our Chief Executive Officer. To the extent necessary, our Chief Executive Officer reports such risks to our Board of Directors.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] One of the functions of our Audit Committee is to identify principal risks related to our company and ensure implementation of appropriate systems to manage these risks, including risks from cybersecurity threats.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Audit Committee works with members of our management to identify and manage these risks, including cybersecurity risks.
Cybersecurity Risk Role of Management [Text Block]

One of the functions of our Audit Committee is to identify principal risks related to our company and ensure implementation of appropriate systems to manage these risks, including risks from cybersecurity threats. Our Audit Committee works with members of our management to identify and manage these risks, including cybersecurity risks. We currently outsource a qualified Information Technology Administrator who reports to our Chief Executive Officer. This consultant has over 25 years of experience with cybersecurity, information technology development and deployment and information technology risk assessment and management, including information security management. Our Information Technology Administrator regularly monitors our information technology systems and monitors the prevention, detection, mitigation and remediation of cybersecurity incidents in consultation with our Chief Executive Officer. To the extent necessary, our Chief Executive Officer reports such risks to our Board of Directors.

Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] One of the functions of our Audit Committee is to identify principal risks related to our company and ensure implementation of appropriate systems to manage these risks, including risks from cybersecurity threats. Our Audit Committee works with members of our management to identify and manage these risks, including cybersecurity risks. We currently outsource a qualified Information Technology Administrator who reports to our Chief Executive Officer.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] This consultant has over 25 years of experience with cybersecurity, information technology development and deployment and information technology risk assessment and management, including information security management.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Our Information Technology Administrator regularly monitors our information technology systems and monitors the prevention, detection, mitigation and remediation of cybersecurity incidents in consultation with our Chief Executive Officer.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true