Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | As part of our ordinary business operations, we collect and store information necessary for our operations, as well as data from our customers, employees, and business partners. We recognize that our networks and systems face evolving cybersecurity risks, which could materially impact our business if not effectively managed. Cybersecurity is an integral part of our enterprise risk management program. Material cybersecurity risks are identified, assessed, and prioritized alongside financial, operational, and strategic risks. Findings from risk assessments, audits, and testing are incorporated into enterprise risk reporting, and remediation plans are aligned with our overall risk management approach. The Audit Committee of the Board oversees cybersecurity risk and receives regular updates from senior managment on material risks and mitigation efforts. Senior management, including our Chief Technology Officer, Chief Financial Officer, General Counsel, and Senior Vice President of IT and Infrastructure, is responsible for managing material cybersecurity risks. These individuals have relevant experience overseeing technology systems, information security programs, risk management, regulatory compliance, and incident response, gained through their roles in technology leadership, financial oversight, legal and regulatory compliance, and IT infrastructure management. Our risk management process includes periodic assessments of cybersecurity risks that evaluate both the likelihood and potential impact of threats, as well as internal audits, testing, and independent third-party reviews. The company also conducts employee training and simulated phishing exercises to strengthen awareness and preparedness, and it maintains defined escalation procedures to ensure that cybersecurity incidents or significant findings are promptly reported to senior management and, when appropriate, to the Board or Audit Committee. These processes are reviewed and updated regularly to address emerging threats, regulatory changes, and evolving business operations. Although we have not experienced any material cybersecurity incidents to date, future cyber-attacks could materially affect the Company, including loss of customer trust, employee departures, reputational harm, remediation costs, business disruption, or potential litigation or regulatory exposure. Compliance with evolving cybersecurity standards may also increase operational costs.
|
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | As part of our ordinary business operations, we collect and store information necessary for our operations, as well as data from our customers, employees, and business partners. We recognize that our networks and systems face evolving cybersecurity risks, which could materially impact our business if not effectively managed |
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Board of Directors Oversight [Text Block] | The Audit Committee of the Board oversees cybersecurity risk and receives regular updates from senior managment on material risks and mitigation efforts. |
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Audit Committee of the Board oversees cybersecurity risk and receives regular updates from senior managment on material risks and mitigation efforts. |
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | The company also conducts employee training and simulated phishing exercises to strengthen awareness and preparedness, and it maintains defined escalation procedures to ensure that cybersecurity incidents or significant findings are promptly reported to senior management and, when appropriate, to the Board or Audit Committee. |
| Cybersecurity Risk Role of Management [Text Block] | Senior management, including our Chief Technology Officer, Chief Financial Officer, General Counsel, and Senior Vice President of IT and Infrastructure, is responsible for managing material cybersecurity risks. These individuals have relevant experience overseeing technology systems, information security programs, risk management, regulatory compliance, and incident response, gained through their roles in technology leadership, financial oversight, legal and regulatory compliance, and IT infrastructure management. |
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | Senior management, including our Chief Technology Officer, Chief Financial Officer, General Counsel, and Senior Vice President of IT and Infrastructure, is responsible for managing material cybersecurity risks. These individuals have relevant experience overseeing technology systems, information security programs, risk management, regulatory compliance, and incident response, gained through their roles in technology leadership, financial oversight, legal and regulatory compliance, and IT infrastructure management. |
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | These individuals have relevant experience overseeing technology systems, information security programs, risk management, regulatory compliance, and incident response, gained through their roles in technology leadership, financial oversight, legal and regulatory compliance, and IT infrastructure management. |
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | The company also conducts employee training and simulated phishing exercises to strengthen awareness and preparedness, and it maintains defined escalation procedures to ensure that cybersecurity incidents or significant findings are promptly reported to senior management and, when appropriate, to the Board or Audit Committee. |
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |