Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2025 | ||||||||||||||||
| Cybersecurity Risk Management, Strategy, and Governance [Abstract] | ||||||||||||||||
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] |
ITEM 1C. CYBERSECURITY Risk We aim to deploy a cyber-risk management program which is intended to assist in assessing, identifying, and managing material risks from cybersecurity threats to our data and information systems. The Company currently manages its cybersecurity risk through a variety of practices that are applicable to all users of our information technology and information assets, including our officers and directors, contractors, and vendors. The Company uses a combination of technology and monitoring to promote security awareness and prevent security incidents, including network and passwords protocols, third party firewalls, and antivirus protections.
We rely on third-party cloud infrastructure provided by Amazon Web Services (“AWS”) to host our online shopping platform and related systems. Under AWS’s shared responsibility model, AWS is responsible for the security of the underlying cloud infrastructure, while we are responsible for securing our applications, data, and access controls within that environment.
We have implemented a cybersecurity program designed to identify, assess, and manage cybersecurity risks. This program includes:
We periodically assess our systems for potential vulnerabilities and implement remediation measures as appropriate. Our cybersecurity program is integrated into our broader risk management processes and is overseen by management.
Management is responsible for cybersecurity oversight, including the evaluation of risks and the effectiveness of related controls. As our business evolves, we expect to continue enhancing our cybersecurity capabilities, processes, and governance structures. Our Board of Directors performs an annual review of our cybersecurity program, including management’s actions to identify and detect threats.
We rely on third-party providers, including AWS, for critical infrastructure and services. While we consider the security measures of these providers, their systems and controls are outside of our direct control and may expose us to additional risks.
We have not experienced any material cybersecurity incidents or identified any material cybersecurity threats that have affected or are reasonably likely to materially affect us, our business strategy, results of operations or financial condition.
Cybersecurity threats are continually evolving, and despite our efforts, we cannot guarantee that our systems will be fully protected from all potential vulnerabilities or incidents. |
|||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Flag] | true | |||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Text Block] | The Company currently manages its cybersecurity risk through a variety of practices that are applicable to all users of our information technology and information assets, including our officers and directors, contractors, and vendors. | |||||||||||||||
| Cybersecurity Risk Management Third Party Engaged [Flag] | true | |||||||||||||||
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true | |||||||||||||||
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false | |||||||||||||||
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] | We have not experienced any material cybersecurity incidents or identified any material cybersecurity threats that have affected or are reasonably likely to materially affect us, our business strategy, results of operations or financial condition. | |||||||||||||||
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our Board of Directors performs an annual review of our cybersecurity program, including management’s actions to identify and detect threats. | |||||||||||||||
| Cybersecurity Risk Role of Management [Text Block] | We periodically assess our systems for potential vulnerabilities and implement remediation measures as appropriate. Our cybersecurity program is integrated into our broader risk management processes and is overseen by management. | |||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true | |||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | Management is responsible for cybersecurity oversight, including the evaluation of risks and the effectiveness of related controls. |