XML 28 R11.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] We have developed and maintain a cybersecurity risk management program that focuses primarily on securing and safeguarding computer systems, networks, cloud services, business applications, and data and that is integrated in our overall risk management strategy and framework. We have implemented protocols to protect against cyber threats and ensure the containment and security of sensitive business data, including ongoing security reviews of critical systems, continuous monitoring of event data, and employee training programs, which processes are aligned with our overall business and operational goals and strategies. Our risk assessment occurs on an ongoing basis and covers identification of risks that could act against the company’s objectives as well as specific risks related to a compromise to the security of data.We engage a third-party to provide operational support for cybersecurity risks. This forms a critical part of our risk management strategy, facilitating effective management and mitigation of risks, and ensuring adherence to applicable regulatory and industry standards.

 

Overall, we believe that we have established a robust framework for confidentiality, integrity, and availability of information, adhering to relevant security standards, practices, and compliance requirements. In addition, we maintain insurance to help protect against risks associated with cybersecurity threats. As of the date of this report, we do not believe that any risks from cybersecurity threats have materially affected, or are reasonably likely to materially affect, us, including our business strategy, results of operations, or financial condition. However, despite our efforts, we cannot eliminate all risks from cybersecurity threats, or provide assurances that we have not experienced an undetected cybersecurity incident. For more information about these risks, please see “Item 1.A – Risk Factors – Risks Related to Our Business Operations – Our business and operations would suffer in the event of computer system failures, cyber-attacks or deficiencies in our cyber-security.” in this Form 10-K.

 
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Board of Directors Oversight [Text Block] Our board of directors provides oversight of our cybersecurity program and helps guide our strategy for managing cybersecurity risks in the context of our overall risk management system. Our cybersecurity program is managed by our Executive Vice President of Finance and Regional Manager, our internal IT team and our external Chief Information Security Officer (“CISO”) whose is responsible for leading enterprise-wide cybersecurity strategy, protocols, framework, standards and processes. The Executive Vice President of Finance and Regional Manager reports to our board of directors, as well as our Chief Executive Officer and Chief Financial Officer and other members of senior management as appropriate.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our cybersecurity program is managed by our Executive Vice President of Finance and Regional Manager, our internal IT team and our external Chief Information Security Officer (“CISO”) whose is responsible for leading enterprise-wide cybersecurity strategy, protocols, framework, standards and processes
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] board of directors provides oversight of our cybersecurity program and helps guide our strategy for managing cybersecurity risks in the context of our overall risk management system