XML 39 R22.htm IDEA: XBRL DOCUMENT v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Risk Management and Strategy

We employ a cybersecurity program which we believe is appropriate for the potential of cybersecurity threats faced by us and is built upon a set of policies, procedures and standards supported by training and education. Our information systems employ local and cloud storage and recovery services from various third parties. We have established processes to assess, identify, and manage risks from cybersecurity threats as part of our broader enterprise-wide risk management system and processes and engaged third-party consultants to assess and gather threat intelligence and cyber risk trends and conduct assessments and testing of our cybersecurity procedures and protections, which is overseen by our Board of Directors through our Audit Committee, along with our executive management.

Our cybersecurity program focuses on all areas of our business, including cloud-based environments, devices used by employees and contractors, facilities, networks, applications, vendors, disaster recovery, business continuity and controls and safeguards enabled through business processes and tools. We continuously monitor for unauthorized access to our information technology systems and identify potential security threats through various automated detection solutions. To protect the security of our information infrastructure and protect our systems and information from unauthorized access, we draw on the knowledge and insights of an external information technology consultant who acts as our primary IT administrator and employ an array of third-party tools and technologies.

As of the date of this Annual Report, we have not encountered any risks from cybersecurity threats that have materially affected or are reasonably likely to materially affect the Company, including its business strategy, results of operations, or financial condition. For more information on our cybersecurity related risks, see “General Risks Factors” included elsewhere in this Annual Report on Form 10-K.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
We employ a cybersecurity program which we believe is appropriate for the potential of cybersecurity threats faced by us and is built upon a set of policies, procedures and standards supported by training and education. Our information systems employ local and cloud storage and recovery services from various third parties. We have established processes to assess, identify, and manage risks from cybersecurity threats as part of our broader enterprise-wide risk management system and processes and engaged third-party consultants to assess and gather threat intelligence and cyber risk trends and conduct assessments and testing of our cybersecurity procedures and protections, which is overseen by our Board of Directors through our Audit Committee, along with our executive management.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] we have not encountered any risks from cybersecurity threats that have materially affected or are reasonably likely to materially affect the Company, including its business strategy, results of operations, or financial condition.
Cybersecurity Risk Board of Directors Oversight [Text Block]


Governance and Role of Management and the Board


Our Chief Operating Officer leads our cybersecurity program and reports, with respect to cybersecurity incidents, to the Company’s Chief Financial Officer. Our Chief Financial Officer reports directly to the Board of Directors and the Audit Committee, which is the principal committee charged with the Board’s risk management oversight, including cybersecurity risks. The Chief Financial Officer or Chief Operating Officer briefs the Board and Audit Committee on the effectiveness of our cybersecurity program quarterly. The Chief Operating Officer oversees the operation of our cybersecurity program and has over 20 years of executive experience overseeing risk management and internal controls. The Chief Financial Officer is informed about and monitors the prevention, detection, mitigation, and remediation of cybersecurity incidents through the Financial Officer’s oversight of the Company’s information technology function and supervision of the Company’s IT administrator. We have not experienced any cybersecurity threats or incidents that have had a material impact on our business to date.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] the Board of Directors and the Audit Committee, which is the principal committee charged with the Board’s risk management oversight, including cybersecurity risks.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Audit Committee, which is the principal committee charged with the Board’s risk management oversight, including cybersecurity risks. The Chief Financial Officer or Chief Operating Officer briefs the Board and Audit Committee on the effectiveness of our cybersecurity program quarterly. The Chief Operating Officer oversees the operation of our cybersecurity program and has over 20 years of executive experience overseeing risk management and internal controls. The Chief Financial Officer is informed about and monitors the prevention, detection, mitigation, and remediation of cybersecurity incidents through the Financial Officer’s oversight of the Company’s information technology function and supervision of the Company’s IT administrator.
Cybersecurity Risk Role of Management [Text Block] Our Chief Financial Officer reports directly to the Board of Directors and the Audit Committee, which is the principal committee charged with the Board’s risk management oversight, including cybersecurity risks. The Chief Financial Officer or Chief Operating Officer briefs the Board and Audit Committee on the effectiveness of our cybersecurity program quarterly. The Chief Operating Officer oversees the operation of our cybersecurity program and has over 20 years of executive experience overseeing risk management and internal controls. The Chief Financial Officer is informed about and monitors the prevention, detection, mitigation, and remediation of cybersecurity incidents through the Financial Officer’s oversight of the Company’s information technology function and supervision of the Company’s IT administrator.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our Chief Operating Officer leads our cybersecurity program and reports, with respect to cybersecurity incidents, to the Company’s Chief Financial Officer. Our Chief Financial Officer reports directly to the Board of Directors and the Audit Committee, which is the principal committee charged with the Board’s risk management oversight, including cybersecurity risks.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] The Chief Operating Officer oversees the operation of our cybersecurity program and has over 20 years of executive experience overseeing risk management and internal controls.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Our Chief Financial Officer reports directly to the Board of Directors and the Audit Committee, which is the principal committee charged with the Board’s risk management oversight, including cybersecurity risks. The Chief Financial Officer or Chief Operating Officer briefs the Board and Audit Committee on the effectiveness of our cybersecurity program quarterly. The Chief Operating Officer oversees the operation of our cybersecurity program and has over 20 years of executive experience overseeing risk management and internal controls. The Chief Financial Officer is informed about and monitors the prevention, detection, mitigation, and remediation of cybersecurity incidents through the Financial Officer’s oversight of the Company’s information technology function and supervision of the Company’s IT administrator.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true