XML 37 R22.htm IDEA: XBRL DOCUMENT v3.25.4
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
We have a cross-departmental approach to addressing cybersecurity risk, including input from our board of directors. The board of directors, Audit Committee, and senior management devote what we believe are appropriate resources to cybersecurity and risk management processes to adapt to the changing cybersecurity landscape and respond to emerging threats in a timely and effective manner. Our cybersecurity risk management protocols are comprised of software programs including antivirus protection, end-point threat detection, remote access controls, and multifactor authentication. In addition, we have a set of Company-wide policies and procedures concerning cybersecurity matters, which include an employee handbook as well as other policies that directly or indirectly relate to cybersecurity, such as policies related to incident response, confidential information and the use of internet, social media, email and wireless devices.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
Our Director of Operations is responsible for developing and implementing our information security program and reporting on cybersecurity matters to the board of directors. Nuwellis leverages third-party IT service provider and specifically their cybersecurity expertise.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block]
Our Director of Operations is responsible for developing and implementing our information security program and reporting on cybersecurity matters to the board of directors. Nuwellis leverages third-party IT service provider and specifically their cybersecurity expertise.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block]
Our Director of Operations is responsible for developing and implementing our information security program and reporting on cybersecurity matters to the board of directors. Nuwellis leverages third-party IT service provider and specifically their cybersecurity expertise.
Cybersecurity Risk Board of Directors Oversight [Text Block]
Our Director of Operations is responsible for developing and implementing our information security program and reporting on cybersecurity matters to the board of directors. Nuwellis leverages third-party IT service provider and specifically their cybersecurity expertise.
All employees are required to complete cybersecurity training as part of the onboarding process and ongoing training both online and in-person. The IT department assigns position specific security level encryption to manage information security.
Cybersecurity Risk Role of Management [Text Block]
We have continued to expand investments in IT security, including the software programs and policies mentioned above. We regularly test defenses by performing simulations and drills at both a technical level (including through penetration tests) and by reviewing our operational policies and procedures with third-party experts. At the management level, our IT security team regularly monitors alerts and meets to discuss threat levels, trends and remediation.] In addition to assessing our own cybersecurity preparedness, we also consider and evaluate cybersecurity risks associated with use of third-party service providers.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee and the full board of directors periodically participate in discussions with management and among themselves regarding cybersecurity risks.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The Audit Committee and the full board of directors periodically participate in discussions with management and among themselves regarding cybersecurity risks. As of 2024 the Audit Committee performs an annual review of the Company’s cybersecurity program, which includes discussion of management’s actions to identify and detect threats, as well as planned actions in the event of a response or recovery situation.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block]
The Audit Committee and the full board of directors periodically participate in discussions with management and among themselves regarding cybersecurity risks. As of 2024 the Audit Committee performs an annual review of the Company’s cybersecurity program, which includes discussion of management’s actions to identify and detect threats, as well as planned actions in the event of a response or recovery situation. The Audit Committee’s annual review also includes review of recent enhancements to the Company’s defenses and management’s progress on its cybersecurity strategic roadmap.
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block]
We face a number of cybersecurity risks in connection with our business. Although such risks have not materially affected us, including our business strategy, results of operations or financial condition, to date, we have, from time to time, experienced threats to and breaches of our data and systems, including malware and computer virus attacks. Such occurrences could negatively impact our business strategy, reputation and results of operations.
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true