v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] ITEM 1C. CYBERSECURITYTo date, we have not experienced any cybersecurity incidents that materially affected our business strategy, results of operations or financial condition. The Company recognizes the critical importance of cybersecurity in safeguarding sensitive information, maintaining operational resilience, and protecting stakeholders’ interests.

 

The Company is in the process of establishing a cybersecurity policy which will implement protocols to evaluate, recognize, and address significant risks, including those posed by cybersecurity threats. This policy will be designed to establish a comprehensive framework for identifying, assessing, mitigating, and responding to cybersecurity risks across the organization and will encompass the utilization of standard traffic monitoring tools, educating personnel to identify and report abnormal activities, and partnering with reputable service providers capable of upholding security standards equivalent to or exceeding our own.

 

We anticipate that these measures will be seamlessly integrated into our broader operational risk management framework aimed at minimizing exposure to unnecessary risks across our operations. For cybersecurity, we intend to collaborate with expert consultants and third-party service providers to implement industry-standard strategies aimed at identifying and mitigating potential threats or vulnerabilities within our systems. Additionally, it is anticipated that our policy will have a comprehensive cyber crisis response plan to manage high severity security incidents, ensuring efficient coordination across the organization.

 

To date, cybersecurity threats have not materially impacted our operations; however, given the escalating sophistication of cyber threats, our preventive measures may not always suffice. We may be unable to anticipate all security breaches, including those stemming from third-party misuse of AI technologies and the potential challenges in implementing timely preventive measures. Please refer to Item 1A: Risk Factors for information relating to cyber attack-related risks.

 

We anticipate that our Chief Financial Officer will be responsible for overseeing our information security programs, including cybersecurity initiatives, and will be integrated into our Cybersecurity Incident response process. We also anticipate that our Audit Committee will oversees cybersecurity risk management activities, supported by Company management, the board of directors, and external consultants.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] We anticipate that these measures will be seamlessly integrated into our broader operational risk management framework aimed at minimizing exposure to unnecessary risks across our operations. For cybersecurity, we intend to collaborate with expert consultants and third-party service providers to implement industry-standard strategies aimed at identifying and mitigating potential threats or vulnerabilities within our systems. Additionally, it is anticipated that our policy will have a comprehensive cyber crisis response plan to manage high severity security incidents, ensuring efficient coordination across the organization.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false