v3.26.1
Cybersecurity Risk Management, Strategy and Governance
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

We regularly assess cybersecurity risks to our systems, applications and infrastructure; are in the process of building our capabilities to monitor our information systems for potential vulnerabilities; and implement controls pursuant to our cybersecurity policies, processes and practices. To protect our information systems from cybersecurity threats, we use various security tools that are designed to help identify, escalate, investigate, resolve and recover from security incidents in a timely manner. We also engage third-party cybersecurity specialists with experience in cybersecurity risk assessment, information systems evaluation and technology risk management, to assist with monitoring our information systems, identifying potential vulnerabilities and supporting our incident response capabilities.

Cybersecurity threats, including those resulting from any previous cybersecurity incidents, have not materially affected our Company, including our business strategy, results of operations, or financial condition. However, we face certain ongoing risks from cybersecurity threats that, if realized, may be reasonably likely to materially affect our operations and, therefore, our results of operations and/or financial condition.

For more information about these risks, refer to the risk factor captioned “Cyber-attacks or a failure in our information technology and data security infrastructure could adversely affect our business and operations.” in Part I, Item 1A. “Risk Factors.”

Governance

Our board of directors oversees our risk management process, including as it pertains to cybersecurity risks, directly and through its committees. The Audit Committee of the board of directors oversees our risk management program, which focuses on the most significant risks to our business, including oversight of information technology, cybersecurity and data privacy risks. Audit Committee meetings include discussions of specific risk areas throughout the year, including, among others, those relating to cybersecurity threats. The Audit Committee reviews our cybersecurity risk profile with management on a periodic basis using key performance and/or risk indicators. These key performance indicators are metrics and measurements designed to assess the effectiveness of our cybersecurity program in the prevention, detection, mitigation and remediation of cybersecurity incidents.

We take a risk-based approach to cybersecurity and have implemented cybersecurity policies throughout our operations that are designed to address cybersecurity threats and risks incidents. Management is responsible for the establishment of our cybersecurity environment, as well as the assessment and management of cybersecurity risks. Management provides regular updates on our cybersecurity risk profile to the Audit Committee of our board of directors.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]

We regularly assess cybersecurity risks to our systems, applications and infrastructure; are in the process of building our capabilities to monitor our information systems for potential vulnerabilities; and implement controls pursuant to our cybersecurity policies, processes and practices. To protect our information systems from cybersecurity threats, we use various security tools that are designed to help identify, escalate, investigate, resolve and recover from security incidents in a timely manner. We also engage third-party cybersecurity specialists with experience in cybersecurity risk assessment, information systems evaluation and technology risk management, to assist with monitoring our information systems, identifying potential vulnerabilities and supporting our incident response capabilities.

Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]

Governance

Our board of directors oversees our risk management process, including as it pertains to cybersecurity risks, directly and through its committees. The Audit Committee of the board of directors oversees our risk management program, which focuses on the most significant risks to our business, including oversight of information technology, cybersecurity and data privacy risks. Audit Committee meetings include discussions of specific risk areas throughout the year, including, among others, those relating to cybersecurity threats. The Audit Committee reviews our cybersecurity risk profile with management on a periodic basis using key performance and/or risk indicators. These key performance indicators are metrics and measurements designed to assess the effectiveness of our cybersecurity program in the prevention, detection, mitigation and remediation of cybersecurity incidents.

We take a risk-based approach to cybersecurity and have implemented cybersecurity policies throughout our operations that are designed to address cybersecurity threats and risks incidents. Management is responsible for the establishment of our cybersecurity environment, as well as the assessment and management of cybersecurity risks. Management provides regular updates on our cybersecurity risk profile to the Audit Committee of our board of directors.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee of the board of directors oversees our risk management program, which focuses on the most significant risks to our business, including oversight of information technology, cybersecurity and data privacy risks.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Audit Committee meetings include discussions of specific risk areas throughout the year, including, among others, those relating to cybersecurity threats. The Audit Committee reviews our cybersecurity risk profile with management on a periodic basis using key performance and/or risk indicators. These key performance indicators are metrics and measurements designed to assess the effectiveness of our cybersecurity program in the prevention, detection, mitigation and remediation of cybersecurity incidents.
Cybersecurity Risk Role of Management [Text Block] Management provides regular updates on our cybersecurity risk profile to the Audit Committee of our board of directors.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Management is responsible for the establishment of our cybersecurity environment, as well as the assessment and management of cybersecurity risks. Management provides regular updates on our cybersecurity risk profile to the Audit Committee of our board of directors.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] specialists with experience in cybersecurity risk assessment
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Our Chief Financial Officer is responsible for overseeing the assessment and management of cybersecurity risks,
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true