XML 51 R34.htm IDEA: XBRL DOCUMENT v3.25.4
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Risk Management and Strategy
We maintain an Information Security Program that includes policies and processes intended to address cybersecurity related risks. The program is designed to support the identification, assessment, mitigation, and monitoring of cybersecurity threats that could affect our information systems and data. The program draws on elements of the National Institute of Standards and Technology (“NIST”) Cybersecurity Framework and various regulatory and industry standards, including PCI DSS, SOX, GDPR, and CCPA, among others; however, we do not represent that our program meets any specific standard or that our controls align with all aspects of any such framework.
Oversight of our Information Security Program is provided by our Information Security Team, with executive oversight from our Chief Technology Officer (“CTO”), and support from our Governance, Risk, and Compliance (“GRC”) Team. Our cybersecurity risk management processes are integrated into our broader enterprise risk management activities, and are considered in connection with operational, financial, and strategic decision-making.
Key components of our cybersecurity risk management activities include, but are not limited to, the following:
Risk and Control Reviews: We conduct periodic reviews of cybersecurity risks and evaluate our controls based on internal assessments and, where appropriate, guidance from applicable frameworks and external advisors. These assessments help inform our prioritization of cybersecurity risk mitigation within our broader enterprise risk management processes.
Detection and Incident Response: We maintain processes intended to detect, investigate, escalate, and respond to cybersecurity incidents. These processes are guided by our Incident Response Plan, which outlines procedures for handling cybersecurity incidents.
Vendor Oversight: Certain vendors and service providers undergo reviews intended to evaluate their security practices, which may include requesting third-party security reports or other documentation. We depend on these third parties to maintain appropriate security measures, and no assurance can be provided that their controls will be adequate or effective.
Technology and Cloud Environment: We implement controls applicable to our use of cloud-based and hosted environments. Responsibilities vary based on contractual and technical arrangements with third-party providers.
Use of Artificial Intelligence: Implementation of artificial intelligence technologies within our business operations is subject to review by designated internal teams, including our Information Security, GRC, AI, and Legal teams.
Program Evaluation: We periodically assess certain aspects of our Information Security Program through internal activities and engagements with external advisors, which may include vulnerability assessments, penetration testing, or other exercises. We also engage external auditors to conduct an annual PCI DSS assessment of our cardholder environment.
External Advisors: We engage external advisors, where appropriate, to assess, test or otherwise assist with aspects of our security processes.
Like many companies, we are subject to ongoing attempts to access, disrupt, or misuse our systems and data. Our controls and processes are intended to reduce the likelihood and impact of cybersecurity incidents, but no cybersecurity program is capable of eliminating all risks, and future incidents could materially affect us.
We have not identified risks from known cybersecurity threats, including prior cybersecurity incidents, that have materially affected us. However, cybersecurity threats continue to evolve, and such threats, if realized, could materially affect our business, operations, or financial condition.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
We maintain an Information Security Program that includes policies and processes intended to address cybersecurity related risks. The program is designed to support the identification, assessment, mitigation, and monitoring of cybersecurity threats that could affect our information systems and data. The program draws on elements of the National Institute of Standards and Technology (“NIST”) Cybersecurity Framework and various regulatory and industry standards, including PCI DSS, SOX, GDPR, and CCPA, among others; however, we do not represent that our program meets any specific standard or that our controls align with all aspects of any such framework.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Cybersecurity Governance
The Board of Directors oversees our enterprise risk management processes, which include risks associated with cybersecurity. The Audit Committee assists the Board in this oversight.
Our CTO and leaders within our Information Security and GRC teams, are responsible for assessing and managing cybersecurity risk on a day-to-day basis. Our Information Security and GRC teams report to our CTO, who has over 25 years of experience in the technology sector, including more than two decades leading and managing engineering organizations. Supporting our CTO is a cybersecurity leadership team with more than 20 years of combined experience across the technology, consulting, and financial services industries. Collectively, our CTO and cybersecurity team has deep expertise in security engineering, offensive security and threat mitigation, information technology operations, governance, risk management, and regulatory compliance. Our cybersecurity leadership team possesses advanced formal education and industry-recognized credentials in cybersecurity, information technology, and risk management. They are responsible for overseeing our enterprise-wide cybersecurity strategy, risk assessment and remediation efforts, incident response, and compliance programs, and have experience building and leading high-performing teams designed to safeguard complex technology environments against evolving cyber threats.
Management remains informed and provides oversight for our ongoing cybersecurity efforts through targeted cybersecurity briefings, participation in strategic business reviews that address technology and cybersecurity risk considerations, and other incident-focused reviews with leaders of our cybersecurity team. Through these structured engagements, management oversees initiatives designed to continuously enhance the effectiveness of our overall cyber-security program by preventing, detecting, mitigating, and remediating cybersecurity threats.
Management provides updates to the Audit Committee and the Board on cybersecurity matters, as management deems appropriate, including the nature of developments in the threat environment and other relevant factors.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Board of Directors oversees our enterprise risk management processes, which include risks associated with cybersecurity. The Audit Committee assists the Board in this oversight.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
Management provides updates to the Audit Committee and the Board on cybersecurity matters, as management deems appropriate, including the nature of developments in the threat environment and other relevant factors.
Cybersecurity Risk Role of Management [Text Block]
Our CTO and leaders within our Information Security and GRC teams, are responsible for assessing and managing cybersecurity risk on a day-to-day basis. Our Information Security and GRC teams report to our CTO, who has over 25 years of experience in the technology sector, including more than two decades leading and managing engineering organizations. Supporting our CTO is a cybersecurity leadership team with more than 20 years of combined experience across the technology, consulting, and financial services industries. Collectively, our CTO and cybersecurity team has deep expertise in security engineering, offensive security and threat mitigation, information technology operations, governance, risk management, and regulatory compliance. Our cybersecurity leadership team possesses advanced formal education and industry-recognized credentials in cybersecurity, information technology, and risk management. They are responsible for overseeing our enterprise-wide cybersecurity strategy, risk assessment and remediation efforts, incident response, and compliance programs, and have experience building and leading high-performing teams designed to safeguard complex technology environments against evolving cyber threats.
Management remains informed and provides oversight for our ongoing cybersecurity efforts through targeted cybersecurity briefings, participation in strategic business reviews that address technology and cybersecurity risk considerations, and other incident-focused reviews with leaders of our cybersecurity team. Through these structured engagements, management oversees initiatives designed to continuously enhance the effectiveness of our overall cyber-security program by preventing, detecting, mitigating, and remediating cybersecurity threats.
Management provides updates to the Audit Committee and the Board on cybersecurity matters, as management deems appropriate, including the nature of developments in the threat environment and other relevant factors.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block]
Our CTO and leaders within our Information Security and GRC teams, are responsible for assessing and managing cybersecurity risk on a day-to-day basis. Our Information Security and GRC teams report to our CTO, who has over 25 years of experience in the technology sector, including more than two decades leading and managing engineering organizations. Supporting our CTO is a cybersecurity leadership team with more than 20 years of combined experience across the technology, consulting, and financial services industries. Collectively, our CTO and cybersecurity team has deep expertise in security engineering, offensive security and threat mitigation, information technology operations, governance, risk management, and regulatory compliance. Our cybersecurity leadership team possesses advanced formal education and industry-recognized credentials in cybersecurity, information technology, and risk management. They are responsible for overseeing our enterprise-wide cybersecurity strategy, risk assessment and remediation efforts, incident response, and compliance programs, and have experience building and leading high-performing teams designed to safeguard complex technology environments against evolving cyber threats.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our Information Security and GRC teams report to our CTO, who has over 25 years of experience in the technology sector, including more than two decades leading and managing engineering organizations. Supporting our CTO is a cybersecurity leadership team with more than 20 years of combined experience across the technology, consulting, and financial services industries. Collectively, our CTO and cybersecurity team has deep expertise in security engineering, offensive security and threat mitigation, information technology operations, governance, risk management, and regulatory compliance. Our cybersecurity leadership team possesses advanced formal education and industry-recognized credentials in cybersecurity, information technology, and risk management.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]
Management provides updates to the Audit Committee and the Board on cybersecurity matters, as management deems appropriate, including the nature of developments in the threat environment and other relevant factors.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true