v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Aspire is committed to ensuring the highest standards of cybersecurity to protect our systems, networks, and data from cyber threats. We recognize the critical importance of safeguarding sensitive information and maintaining the trust of our customers, partners, and stakeholders. 

Our cybersecurity strategy is built on a foundation of proactive risk management, continuous monitoring, and adherence to industry best practices. We employ a multi-layered approach which leverages technologies to defend against evolving cyber threats.

 

We have made significant investments in modernizing, streamlining, and simplifying our technology footprint to both enhance customer experience and strengthen our internal security controls.

 

From time-to-time, we may engage third-party consultants, legal advisors, and audit firms to evaluate and test the Company’s risk management systems and assess and remediate certain potential cybersecurity incidents, as appropriate. We prioritize the integrity of our data access controls to prevent unauthorized access, data breaches, and malicious activities. We regularly assess and enhance our cybersecurity posture through comprehensive risk assessments, security audits, and vulnerability assessments.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Governance 

Cybersecurity is a shared responsibility requiring collaboration and cooperation across all levels of our organization.

 

Aspire recognizes that cybersecurity is not solely a technology issue but also a people and process issue. We invest in ongoing employee training and awareness programs to empower our staff to recognize and respond to potential security threats effectively.

 

In the event of a cybersecurity incident, we have established incident response plans and protocols to minimize the impact and facilitate swift recovery. The Company’s Audit Committee oversees cybersecurity risk. The Audit Committee is promptly notified by Information Technology leadership of any potentially serious incidents including details and recommendations on the detection, mitigation, and remediation of the same. During the calendar year 2025, there have been no known reported cybersecurity incidents that have materially affected our operations or financial results.

 

We believe in transparency and open communication, promptly informing affected parties and relevant authorities as required by law. Together, we remain vigilant, adaptive, and resilient in the face of evolving cyber threats, safeguarding the trust and confidence of those we serve.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Company’s Audit Committee oversees cybersecurity risk
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee is promptly notified by Information Technology leadership of any potentially serious incidents including details and recommendations on the detection, mitigation, and remediation of the same