v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Cybersecurity risk assessment is ingrained in the intelligent design, planning and implementation of the general partner’s infrastructure and operating procedures. The general partner’s cybersecurity practices utilize compliant software and technologies which allow for strict management and review of systems, software and user activity and access.

The general partner’s management team periodically reviews, assesses and prioritizes the risks associated with the use of its information technology systems and establishes the operating processes required to complete the named activity and the technical implementation that is required to enable the safe and successful execution of the business processes. The Risk Manager provides updates and summary reports concerning any cyber-related incidents or changes to the policies and practices concerning the prevention, detection, mitigation and remediation of cybersecurity incidents on a monthly basis to the general partner’s senior management and its Investment Committee.

The general partner’s cybersecurity program operates continuously and is reviewed monthly, or more frequently, if needed. Employee training on the program is conducted quarterly. The program is updated as required and is formally reviewed annually. Employees attest to their understanding of the program annually.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]

Cybersecurity risk assessment is ingrained in the intelligent design, planning and implementation of the general partner’s infrastructure and operating procedures. The general partner’s cybersecurity practices utilize compliant software and technologies which allow for strict management and review of systems, software and user activity and access.

Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]

The general partner has a program in place that assesses, identifies, monitors and mitigates risks from cybersecurity threats. The general partner maintains regularly tested business continuity and disaster recovery plans. At least annually, the general partner completes an external audit of its Information Systems Security Program (ISSP) manuals and procedures to evaluate the company’s cybersecurity risks. The general partner conducts periodic external network vulnerability tests to identify and remediate weaknesses in its network design. The general partner has a 20 year partnership with an external Managed Services Provider (MSP), enlisting network engineers and security partners for regular review of system infrastructure, management and monitoring of all critical information systems and long-range planning to evaluate and implement latest technologies and practices. The general partner’s senior management meets internally and with its MSP’s experts to review and evaluate cybersecurity trends, relevant global incidents and strategic implementation of tools and technologies to seek to mitigate physical, system and operational cybersecurity risks.

The general partner employs industry standard best practices, including regular cybersecurity awareness training with its employees, operating current network security protocols and cybersecurity defense software, and providing only as-needed access to systems and operating workflows.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] general partner’s senior management and its Investment Committee
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] At least annually, the general partner completes an external audit of its Information Systems Security Program (ISSP) manuals and procedures to evaluate the company’s cybersecurity risks. The general partner conducts periodic external network vulnerability tests to identify and remediate weaknesses in its network design. The general partner has a 20 year partnership with an external Managed Services Provider (MSP), enlisting network engineers and security partners for regular review of system infrastructure, management and monitoring of all critical information systems and long-range planning to evaluate and implement latest technologies and practices. The general partner’s senior management meets internally and with its MSP’s experts to review and evaluate cybersecurity trends, relevant global incidents and strategic implementation of tools and technologies to seek to mitigate physical, system and operational cybersecurity risks.
Cybersecurity Risk Role of Management [Text Block]

The general partner has a program in place that assesses, identifies, monitors and mitigates risks from cybersecurity threats. The general partner maintains regularly tested business continuity and disaster recovery plans. At least annually, the general partner completes an external audit of its Information Systems Security Program (ISSP) manuals and procedures to evaluate the company’s cybersecurity risks. The general partner conducts periodic external network vulnerability tests to identify and remediate weaknesses in its network design. The general partner has a 20 year partnership with an external Managed Services Provider (MSP), enlisting network engineers and security partners for regular review of system infrastructure, management and monitoring of all critical information systems and long-range planning to evaluate and implement latest technologies and practices. The general partner’s senior management meets internally and with its MSP’s experts to review and evaluate cybersecurity trends, relevant global incidents and strategic implementation of tools and technologies to seek to mitigate physical, system and operational cybersecurity risks.

Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Risk Manager
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]

The general partner’s management team periodically reviews, assesses and prioritizes the risks associated with the use of its information technology systems and establishes the operating processes required to complete the named activity and the technical implementation that is required to enable the safe and successful execution of the business processes. The Risk Manager provides updates and summary reports concerning any cyber-related incidents or changes to the policies and practices concerning the prevention, detection, mitigation and remediation of cybersecurity incidents on a monthly basis to the general partner’s senior management and its Investment Committee.

Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true