Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2025 | ||||||||||||||||
| Cybersecurity Risk Management, Strategy, and Governance [Abstract] | ||||||||||||||||
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] |
Overall, our approach to cybersecurity risk management includes the following key elements:
We continue to invest in our cybersecurity systems and to enhance our internal controls and
processes. Our business strategy, results of operations and financial condition have not been materially affected by risks from cybersecurity threats, including as a result of previously identified cybersecurity incidents, but we cannot provide assurance that they will not be materially affected
in the future by such risks or any future material incidents. While we have dedicated appropriate resources to identifying, assessing, and managing material risks from cybersecurity threats, our efforts may not be adequate, may fail to accurately
assess the severity of an incident, may not be sufficient to prevent or limit harm, or may fail to sufficiently remediate an incident in a timely fashion, any of which could harm our business, reputation, results of operations and financial
condition. For more information certain risks associated with cybersecurity, see “Item 3.D. Risk Factors— Risks Relating to Our Company —A cyber-attack could materially disrupt our business.”
|
|||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Flag] | true | |||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Text Block] | Our cybersecurity risk management strategy prioritizes detection, analysis and response to known, anticipated or unexpected threats; effective management of security risks; and resiliency against incidents. With the ever-changing cybersecurity landscape and continual emergence of new cybersecurity threats, our board of directors and senior management team ensure that adequate resources are devoted to cybersecurity risk management and the technologies, processes and people that support it. We implement risk-based controls to protect our information, the information of our customers, suppliers, and other third parties, our information systems, our business operations, and our vessels. | |||||||||||||||
| Cybersecurity Risk Management Third Party Engaged [Flag] | true | |||||||||||||||
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true | |||||||||||||||
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false | |||||||||||||||
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] | Our business strategy, results of operations and financial condition have not been materially affected by risks from cybersecurity threats, including as a result of previously identified cybersecurity incidents, but we cannot provide assurance that they will not be materially affected in the future by such risks or any future material incidents. While we have dedicated appropriate resources to identifying, assessing, and managing material risks from cybersecurity threats, our efforts may not be adequate, may fail to accurately assess the severity of an incident, may not be sufficient to prevent or limit harm, or may fail to sufficiently remediate an incident in a timely fashion, any of which could harm our business, reputation, results of operations and financial condition. For more information certain risks associated with cybersecurity, see “Item 3.D. Risk Factors— Risks Relating to Our Company —A cyber-attack could materially disrupt our business.” | |||||||||||||||
| Cybersecurity Risk Board of Directors Oversight [Text Block] |
We believe that cybersecurity is fundamental in our operations and, as such, we are
committed to maintaining robust governance and oversight of cybersecurity risks and to implementing comprehensive processes and procedures for identifying, assessing, and managing material risks from cybersecurity threats as part of our broader risk management system and processes. Our cybersecurity risk management strategy prioritizes
detection, analysis and response to known, anticipated or unexpected threats; effective management of security risks; and resiliency against incidents. With the ever-changing cybersecurity landscape and continual emergence of new cybersecurity
threats, our board of directors and senior management team ensure that adequate resources are devoted to cybersecurity risk management and the technologies, processes and people that support it. We implement risk-based controls to protect our
information, the information of our customers, suppliers, and other third parties, our information systems, our business operations, and our vessels.
As part of our cybersecurity risk management system, our information and technology
management team is comprised of a senior IT professional, leading an appropriately staffed information and technology department, having extensive experience and expertise on all information and technology matters, including cybersecurity. To this end, our information and technology management team tracks and logs privacy and security incidents across our Company, our vessels, our customers, suppliers and other third-party service providers to remediate and resolve any such incidents. Significant incidents are reviewed regularly by our
information and technology management team to determine whether further escalation is appropriate. We also engage annually third parties, such as specialized assessors, consultants, as well as our internal audit department, to audit our information
security systems, whose findings are reported to our senior management team. Any identified incident assessed as potentially being or potentially becoming material is immediately escalated for further assessment, and then reported to our senior management team who is responsible to assess its overall materiality in due time and decide whether further reference to our board of directors is necessary.
We further consult with outside counsel as appropriate, including on materiality analysis and disclosure requirements, and our senior management, in cooperation, if required, with our board of directors, makes the final materiality determinations
and disclosure and other compliance decisions.
As we do not have a dedicated board committee solely focused on cybersecurity, our senior management team has oversight responsibility for risks and incidents relating to cybersecurity threats, including compliance with disclosure
requirements, cooperation with law enforcement, and related effects on financial and other risks, and it reports any material findings and recommendations, as appropriate, to our board of directors for consideration.
|
|||||||||||||||
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] |
As we do not have a dedicated board committee solely focused on cybersecurity, our senior management team has oversight responsibility for risks and incidents relating to cybersecurity threats, including compliance with disclosure
requirements, cooperation with law enforcement, and related effects on financial and other risks, and it reports any material findings and recommendations, as appropriate, to our board of directors for consideration.
|
|||||||||||||||
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] |
As we do not have a dedicated board committee solely focused on cybersecurity, our senior management team has oversight responsibility for risks and incidents relating to cybersecurity threats, including compliance with disclosure
requirements, cooperation with law enforcement, and related effects on financial and other risks, and it reports any material findings and recommendations, as appropriate, to our board of directors for consideration.
|
|||||||||||||||
| Cybersecurity Risk Role of Management [Text Block] |
As part of our cybersecurity risk management system, our information and technology
management team is comprised of a senior IT professional, leading an appropriately staffed information and technology department, having extensive experience and expertise on all information and technology matters, including cybersecurity. To this end, our information and technology management team tracks and logs privacy and security incidents across our Company, our vessels, our customers, suppliers and other third-party service providers to remediate and resolve any such incidents. Significant incidents are reviewed regularly by our
information and technology management team to determine whether further escalation is appropriate. We also engage annually third parties, such as specialized assessors, consultants, as well as our internal audit department, to audit our information
security systems, whose findings are reported to our senior management team. Any identified incident assessed as potentially being or potentially becoming material is immediately escalated for further assessment, and then reported to our senior management team who is responsible to assess its overall materiality in due time and decide whether further reference to our board of directors is necessary.
We further consult with outside counsel as appropriate, including on materiality analysis and disclosure requirements, and our senior management, in cooperation, if required, with our board of directors, makes the final materiality determinations
and disclosure and other compliance decisions.
|
|||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true | |||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] |
As we do not have a dedicated board committee solely focused on cybersecurity, our senior management team has oversight responsibility for risks and incidents relating to cybersecurity threats, including compliance with disclosure
requirements, cooperation with law enforcement, and related effects on financial and other risks, and it reports any material findings and recommendations, as appropriate, to our board of directors for consideration.
|
|||||||||||||||
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | As part of our cybersecurity risk management system, our information and technology management team is comprised of a senior IT professional, leading an appropriately staffed information and technology department, having extensive experience and expertise on all information and technology matters, including cybersecurity. | |||||||||||||||
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] |
Overall, our approach to cybersecurity risk management includes the following key elements:
|
|||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |