Item 1C. Cybersecurity. |
2 Months Ended | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2025 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Item 1C. Cybersecurity. | Item 1C. Cybersecurity.
Overview
The Sponsor has adopted an organizational wide cybersecurity program. The program is administered by the Head of IT of the Sponsor (the “Head of IT”). The Sponsor’s objective, in the development and implementation of this comprehensive cybersecurity program, is to create effective administrative, technical, and physical safeguards for the protection of personal information of the organization and its clients.
Program Details
The Sponsor has designated the Head of IT to implement and maintain the cybersecurity program. The Head of IT may delegate any of the Head of IT’s responsibilities to appropriate designees as long as the Head of IT remains primarily responsible for compliance oversight and administration. The Head of IT is responsible for:
Identification of Risks and Cybersecurity Governance
To combat internal risks to the security, confidentiality, and/or integrity of any electronic records containing personal information, and evaluating and improving, where necessary, the effectiveness of the current safeguards for limiting such risks, the Sponsor has identified the following risks that are present to its business as well as procedures to help mitigate those risks:
Internal Threats
External Threats
Risks Associated with Remote Client Access and Funds Transfer Requests
Currently, the Sponsor does not provide its clients with online account access nor does process funds transfer requests. If the firm’s business changes to allow for remote client access and funds transfer requests, the Sponsor will update the cybersecurity program accordingly by identifying the potential risks involved and implementing the appropriate safeguards to protect the client’s personal information.
Risks Associated with Vendors and Other Third Parties
The Sponsor periodically conducts risk assessments with vendors and other third parties that have access to the Firm’s networks, customer data, and other sensitive information.
Detection of Unauthorized Activity
Employees who believe their terminal or computer systems have been subjected to unauthorized activity, or has otherwise been improperly accessed or used, are required to report the situation to the Head of IT immediately to determine the course of action.
The Sponsor takes the issue of security seriously. Firm employees who use the technology and information resources of the firm must be aware that they can be disciplined if they violate this policy. Upon violation of this policy, an employee may be subject to discipline up to and including discharge. The specific discipline imposed will be determined by a case-by-case basis, taking into consideration the nature and severity of the violation of the cybersecurity program, prior violations of the policy committed by the individual, state and federal laws and all other relevant information.
In a case where the accused person is not a firm employee, the matter shall be submitted to the Head of IT. The Head of IT may refer the information to law enforcement agencies and/or prosecutors for consideration as to whether criminal charges should be filed against the alleged violator(s).
Updates to the Cybersecurity Program
The Head of IT reviews the cybersecurity program on a periodic basis and updates the program based on changes in the firm’s business, effectiveness of the safeguards, and any additional risk factors that become present. The Head of IT will inform management of the results of the reviews and any recommendations for improved security arising out of the reviews.
Furthermore, if an incident occurs that is determined to be in violation of the cybersecurity program, there shall be an immediate mandatory post-incident review of events and actions taken, if any, with a view to determining whether any changes in our security practices are required to improve the security of personal information for which the Firm is responsible. |