Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2025 | ||||||||||||||||||||||||||||||||||||||||||||||
| Cybersecurity Risk Management, Strategy, and Governance [Abstract] | ||||||||||||||||||||||||||||||||||||||||||||||
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Risk
Management and Strategy We have established policies and processes for assessing, identifying, and managing material risk from cybersecurity threats, and we have integrated these processes into our overall risk management program. We assess material risks from cybersecurity threats, including any potential unauthorized occurrence on or conducted through our information systems that may result in adverse effects on the confidentiality, integrity, or availability of our information systems or any information residing therein.
As a small company our IT systems and assets are limited mainly to accounting and administrative systems and email communications, all of which are cloud based. Our cybersecurity risk management program to protect these assets and systems includes:
We have not identified any risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected or are reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition.
|
|||||||||||||||||||||||||||||||||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Flag] | true | |||||||||||||||||||||||||||||||||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Text Block] | We have established policies and processes for assessing, identifying, and managing material risk from cybersecurity threats, and we have integrated these processes into our overall risk management program. We assess material risks from cybersecurity threats, including any potential unauthorized occurrence on or conducted through our information systems that may result in adverse effects on the confidentiality, integrity, or availability of our information systems or any information residing therein. | |||||||||||||||||||||||||||||||||||||||||||||
| Cybersecurity Risk Management Third Party Engaged [Flag] | true | |||||||||||||||||||||||||||||||||||||||||||||
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false | |||||||||||||||||||||||||||||||||||||||||||||
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Governance
Our Board comprises our management team and considers cybersecurity risk as part of its risk oversight function.
Our management team is responsible for assessing and managing our material risks from cybersecurity threats. Our President has overall oversight and with our Chief Financial Officer oversees our external information security professionals who have primary responsibility for our overall cybersecurity risk management program and supervises our internal personnel on these matters.
Our management team oversees efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include threat briefings from internal personnel and external service providers, as well as alerts and reports produced by security tools deployed in the information technology environment.
|
|||||||||||||||||||||||||||||||||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true | |||||||||||||||||||||||||||||||||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | Our management team is responsible for assessing and managing our material risks from cybersecurity threats. Our President has overall oversight and with our Chief Financial Officer oversees our external information security professionals who have primary responsibility for our overall cybersecurity risk management program and supervises our internal personnel on these matters. | |||||||||||||||||||||||||||||||||||||||||||||
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Our management team oversees efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include threat briefings from internal personnel and external service providers, as well as alerts and reports produced by security tools deployed in the information technology environment. |