XML 61 R27.htm IDEA: XBRL DOCUMENT v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Risk Management and Strategy

Our cybersecurity strategy prioritizes detection, analysis and response to known, anticipated or unexpected threats, effective management of security risks, and resiliency against incidents. Our cybersecurity risk management processes include assessing and monitoring security controls, monitoring systems, tools and related services provided by third-party providers, and management oversight to assess, identify and manage material risks from cybersecurity threats.

In 2025, we established a dedicated internal leadership role by hiring a Managing Director of Information Technology to oversee the security and maintenance of our digital assets and infrastructure. The Managing Director of Information Technology is responsible for coordinating cybersecurity risk management activities across the Company, including oversight of third-party service providers engaged to support cybersecurity functions.

We implement risk-based controls to protect our information, the information of our customers, suppliers, and other third parties, our information systems, our business operations, and our products. We maintain security programs that include physical and technical safeguards. We monitor cybersecurity vulnerabilities and potential attacks, and we evaluate the potential operational and financial effects

of any threat and of cybersecurity countermeasures made to defend against such threats, including consideration of the potential materiality of such threats to our business, results of operations, or financial condition.

We continue to integrate our cyber practices into our enterprise risk management practices, which is overseen by our Board of Directors. In addition, we assess the risks from cybersecurity threats, periodically engage third-party tools to assist us in enhancing and monitoring our cybersecurity risks, including tools designed to detect and mitigate phishing and suspicious email activity, and regularly back up company information.

We have experienced cybersecurity incidents, primarily related to phishing emails, and may in the future experience, whether directly or indirectly, cybersecurity incidents. While prior incidents have not materially affected our business strategy, results of operations, or financial condition, there is no guarantee that a future cyber incident would not materially affect our business strategy, results of operations, or financial condition. See risks related to cybersecurity and business disruptions in “Risk Factors” in this Form 10-K.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]

Our cybersecurity strategy prioritizes detection, analysis and response to known, anticipated or unexpected threats, effective management of security risks, and resiliency against incidents. Our cybersecurity risk management processes include assessing and monitoring security controls, monitoring systems, tools and related services provided by third-party providers, and management oversight to assess, identify and manage material risks from cybersecurity threats.

In 2025, we established a dedicated internal leadership role by hiring a Managing Director of Information Technology to oversee the security and maintenance of our digital assets and infrastructure. The Managing Director of Information Technology is responsible for coordinating cybersecurity risk management activities across the Company, including oversight of third-party service providers engaged to support cybersecurity functions.

We implement risk-based controls to protect our information, the information of our customers, suppliers, and other third parties, our information systems, our business operations, and our products. We maintain security programs that include physical and technical safeguards. We monitor cybersecurity vulnerabilities and potential attacks, and we evaluate the potential operational and financial effects

of any threat and of cybersecurity countermeasures made to defend against such threats, including consideration of the potential materiality of such threats to our business, results of operations, or financial condition.

Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]

Governance

Our Board of Directors is responsible for risk oversight, including oversight of risks related to cybersecurity. Our chief executive officer and chief financial officer, with input from and participation by, as appropriate, our Managing Director of Information Technology, provide presentations to the Board of Directors regarding cybersecurity risks, incidents, and risk management practices periodically and as circumstances warrant.

In the event of a potentially material cybersecurity event, the Chairman of the Board is notified and briefed, and a meeting of the full Board of Directors would be convened, as appropriate, to review the incident, management’s response, and any required disclosures.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Board of Directors
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Our chief executive officer and chief financial officer, with input from and participation by, as appropriate, our Managing Director of Information Technology, provide presentations to the Board of Directors regarding cybersecurity risks, incidents, and risk management practices periodically and as circumstances warrant.
Cybersecurity Risk Role of Management [Text Block]

Management, including the Managing Director of Information Technology discuss information technology needs and activity and assess and manage material cybersecurity risks and the Company’s practices for the prevention, detection, mitigation, and remediation of cybersecurity incidents, as necessary and appropriate. The Managing Director of Information Technology reports to executive management and is responsible for day-to-day oversight of the Company’s cybersecurity risk management processes, including coordination with third-party service providers.

Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Managing Director of Information Technology
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our Managing Director of Information Technology has approximately 20 years of experience in information technology leadership roles, including serving as Director of IT at four previous companies. Our CEO and CFO have managed information technology departments during their careers. Our CFO was trained as an auditor and an information technology auditor at the public accounting firm of Ernst & Young LLP and audited internal controls, including IT controls, of public companies, information technology departments, and third-party information technology service providers for approximately 12 years.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]

Management, including the Managing Director of Information Technology discuss information technology needs and activity and assess and manage material cybersecurity risks and the Company’s practices for the prevention, detection, mitigation, and remediation of cybersecurity incidents, as necessary and appropriate. The Managing Director of Information Technology reports to executive management and is responsible for day-to-day oversight of the Company’s cybersecurity risk management processes, including coordination with third-party service providers.

Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true