Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Risk Management We maintain a comprehensive cybersecurity program designed to protect both customer data and our proprietary information. Our cybersecurity framework is governed by our Board of Managers and driven by a dedicated Information Security Officer, ensuring that all processes comply with regulatory requirements and industry best practices. This framework is documented in our Cybersecurity Policy and Information Security Program Policy, which outlines the risk management, preventive, detective, and corrective controls we have implemented across the organization. Our approach begins with regular, in-depth risk assessments that identify both inherent and residual cybersecurity risks. Utilizing standards such as the National Institute of Standards and Technology Cybersecurity Framework, Federal Financial Institutions Examinations Council guidance, and the foundational safeguards outlined in CIS Controls v8, we continuously monitor, evaluate, and update our security controls. These assessments allow us to effectively manage vulnerabilities across our Company assets and software, ensuring that only authorized and securely configured systems are connected to our network. In addition to proactive risk identification, our cybersecurity process includes a robust incident response capability. We maintain detailed procedures for detecting, containing, and remediating cyber threats, which are regularly tested through internal audits and third-party assessments. This ensures that should an incident occur; our team can swiftly activate the Incident Response Plan to minimize potential impacts and restore secure operations. We extend our cybersecurity diligence to third-party service providers and require periodic employee training. All external partners are required to adhere to our cybersecurity standards, and our employees receive ongoing training to stay current with emerging threats and best practices. This comprehensive, layered approach not only safeguards critical data but also reinforces our commitment to continuous improvement and compliance with statutory and regulatory requirements. |
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | We maintain a comprehensive cybersecurity program designed to protect both customer data and our proprietary information. Our cybersecurity framework is governed by our Board of Managers and driven by a dedicated Information Security Officer, ensuring that all processes comply with regulatory requirements and industry best practices. This framework is documented in our Cybersecurity Policy and Information Security Program Policy, which outlines the risk management, preventive, detective, and corrective controls we have implemented across the organization. |
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Governance Our Board of Managers retains supervisory oversight responsibility for enterprise risk management and cybersecurity risks. The primary responsibility for maintaining an information security has been assigned to an Information Security Officer (“ISO”). The ISO works with the Audit Committee to address information security risks found by each business segment. Our ISO conducts an annual risk assessment report and submits the report to the Audit Committee for its review. The Audit Committee meets with Company management, the ISO and external auditors to review the Company’s risk management processes and enterprise-wide risks found by the Company. The scope of this review is intended to address cybersecurity governance risks and related controls and identify any deficiencies that could adversely affect the Company’s ability to record, process and report financial data. As of the date of this Report on Form 10-K, there have been no cybersecurity incidents we believe have had a material effect on our operations, business, results of operations or financial condition. |
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | Board of Managers |
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | The ISO works with the Audit Committee to address information security risks found by each business segment.Our ISO conducts an annual risk assessment report and submits the report to the Audit Committee for its review.The Audit Committee meets with Company management, the ISO and external auditors to review the Company’s risk management processes and enterprise-wide risks found by the Company. The scope of this review is intended to address cybersecurity governance risks and related controls and identify any deficiencies that could adversely affect the Company’s ability to record, process and report financial data. |
| Cybersecurity Risk Role of Management [Text Block] | The primary responsibility for maintaining an information security has been assigned to an Information Security Officer (“ISO”). The ISO works with the Audit Committee to address information security risks found by each business segment. Our ISO conducts an annual risk assessment report and submits the report to the Audit Committee for its review. |
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | The primary responsibility for maintaining an information security has been assigned to an Information Security Officer (“ISO”). The ISO works with the Audit Committee to address information security risks found by each business segment. |
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | The Audit Committee meets with Company management, the ISO and external auditors to review the Company’s risk management processes and enterprise-wide risks found by the Company. |
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |