v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Cybersecurity Risk Management and Strategy

 

We have developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information.

 

We have implemented a number of security measures designed to protect its systems and data, including firewalls, antivirus and malware detection tools, patches, log monitors, routine back-ups, system audits, system hardening, penetration testing and privileged access session management. In addition, we have continued its efforts to migrate its platforms to cloud-based computing, which is designed to further strengthen its security posture. We also hired a information technology manager to oversee and identify any risks from cybersecurity threats associated with our use of third-party service providers.

 

Our cybersecurity risk management program is integrated into our overall enterprise risk management program and shares common methodologies, reporting channels, and governance processes that apply across the enterprise risk management program to other legal, compliance, strategic, operational, and financial risk areas.

   

Our cybersecurity risk management program includes the following:

 

 

·

risk assessments designed to help identify material cybersecurity risks to our critical systems, information, products, services, and our broader enterprise IT environment;

 

 

 

 

·

a security team led and supervised by our information technology manager, which is principally responsible for managing (1) our cybersecurity risk assessment processes, (2) our security controls, and (3) our response to cybersecurity incidents;

 

 

 

 

·

the use of external service providers, where appropriate, to assess, test, or otherwise assist with aspects of our security control, as well as processes to oversee and identify any cybersecurity risks associated with our use of third-party service providers;

 

 

 

 

·

cybersecurity awareness training of our employees, incident response personnel, and senior management; and

 

 

 

 

·

a cybersecurity incident response plan that includes procedures for responding to cybersecurity incidents.

 

There can be no assurance that our cybersecurity risk management program and processes, including our policies, controls or procedures, will be fully implemented, complied with or effective in protecting our systems and information.

Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false