XML 22 R9.htm IDEA: XBRL DOCUMENT v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2023
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] We have processes in place for assessing, identifying, and managing material risks from cybersecurity threats. Our risk management activities are overseen by senior management and are integrated into our overall enterprise risk management framework. As part of this process, management identifies and assesses internal and external cybersecurity risks and the potential impact of such risks on our business.We utilize external information technology consultants to provide technical support for our systems and to advise on security matters. Risks associated with third-party service providers who have access to our data are evaluated during the vendor selection process.

 

To date, we have not experienced any cybersecurity incidents that have materially affected our business strategy, results of operations, or financial condition. However, we face a variety of cybersecurity threats that are reasonably likely to materially affect our company in the future, which are further described in “Item 1A. Risk Factors.”

 

Cybersecurity Governance

 

1. Board of Directors’ Oversight

 

Our Board of Directors is responsible for the oversight of risks from cybersecurity threats. As the Company does not have a separately constituted audit committee, the entire Board of Directors fulfills this function. The Board receives reports from management on an as-needed basis regarding information technology and security matters, allowing it to monitor the Company’s risk management processes.

 

2. Management’s Role

 

Our senior management is responsible for the day-to-day assessment and management of our cybersecurity risks. This function is led by our Chief Executive Officer and Chief Financial Officer, who have overall responsibility for the Company’s risk management.

 

While our executive officers are not cybersecurity experts, they have extensive experience in business management and corporate governance. For specific technical expertise, management leverages and consults with our external information technology consultants to advise on threat identification, prevention, and other cybersecurity matters. In the event of a cybersecurity incident, management would be responsible for implementing response procedures and reporting the matter to the Board of Directors.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true