XML 44 R27.htm IDEA: XBRL DOCUMENT v3.25.4
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Risk Management and Strategy
The Company recognizes the importance of developing, implementing and maintaining cybersecurity measures to better safeguard our information systems and protect the confidentiality, integrity and availability of our data.

Managing Material Risks and Integrated Overall Risk Management

The Company has integrated cybersecurity into our broader risk management framework. Our risk management team works closely with our IT department to evaluate and address cybersecurity risks in alignment with our business objectives and operational needs. The Company requires the Board and employees to complete cybersecurity training related to the physical security of assets, data privacy and other information security policies and procedures.

Engage Third Parties on Risk Management

Recognizing the complexity and evolving nature of cybersecurity threats, the Company engages with a range of external experts, including cybersecurity consultants in evaluating and testing our risk management systems. Our collaboration with these third parties includes regular audits, threat assessments, penetration tests and consultation on security enhancements.

Oversee Third-Party Risk
Because we are aware of the risks associated with third-party vendors, service providers and business partners, we have implemented processes to oversee and manage these risks. We conduct initial risk assessments of third-party providers before engagement. These assessments include due diligence reviews of third parties that have access to our networks, confidential information and information systems in order to assess the risks from cybersecurity threats. This approach is designed to mitigate risks related to data breaches or other security incidents originating from third parties.

Risks from Cybersecurity Threats

As of February 24, 2026, we were not aware of any cybersecurity threats or incidents that have materially affected or are reasonably likely to materially affect the Company, including our business strategy, results of operations or financial standing. However, there can be no assurance that our cybersecurity processes will prevent or mitigate cybersecurity incidents or threats and that our efforts will always be successful. For further discussion regarding our cybersecurity risks, see “Risk Factors—General Risk Factors—A cyber incident could occur and result in information theft, data corruption, operational disruption or financial loss.”
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
The Company has integrated cybersecurity into our broader risk management framework. Our risk management team works closely with our IT department to evaluate and address cybersecurity risks in alignment with our business objectives and operational needs. The Company requires the Board and employees to complete cybersecurity training related to the physical security of assets, data privacy and other information security policies and procedures.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
The Board has oversight of cybersecurity risks and, specifically, the Audit Committee of the Board is charged with the oversight of the Company’s guidelines and policies to govern the process by which risk assessment and risk management are undertaken by management, including with respect to cybersecurity risks. Our Board is composed of members with diverse expertise, including risk management, technology and finance, which experience provides them with the skills needed to oversee cybersecurity risks effectively.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Board has oversight of cybersecurity risks and, specifically, the Audit Committee of the Board is charged with the oversight of the Company’s guidelines and policies to govern the process by which risk assessment and risk management are undertaken by management, including with respect to cybersecurity risks.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
Reporting to the Board

The Senior Vice President of Information Technology regularly informs the Chief Executive Officer and Chief Legal Officer of all aspects related to cybersecurity risks and incidents. This ensures that the highest levels of management are kept abreast of the cybersecurity posture and potential risks facing the Company. Furthermore, significant cybersecurity matters and
strategic risk management decisions are escalated to the Board, ensuring the Board has comprehensive oversight and can provide guidance on critical cybersecurity issues.

Monitor Cybersecurity Incidents

The Senior Vice President of Information Technology monitors the latest developments in cybersecurity, including potential threats and innovative risk management techniques. The Senior Vice President of Information Technology implements and oversees processes for the regular monitoring of our information systems. This includes the deployment of advanced security measures and regular system audits to identify potential vulnerabilities. In the event of a cybersecurity incident, the Senior Vice President of Information Technology is equipped with an incident response plan. This plan includes immediate actions to mitigate the impact and long-term strategies for remediation and prevention of future incidents.
Cybersecurity Risk Role of Management [Text Block]
The Company’s IT Committee, which includes senior executives and other members of management, meets regularly to monitor and discuss cybersecurity issues. The Senior Vice President of Information Technology, the Executive Vice President and Chief Financial Officer (“CFO”) and the Co-President, Chief Legal Officer and Head of M&A (“CLO”) play a pivotal role in informing the Board on cybersecurity risks. They provide comprehensive briefings to the Board on a regular basis, with a minimum frequency of once per year. These briefings encompass a broad range of topics, including:
current cybersecurity landscape and emerging threats;
status of ongoing cybersecurity initiatives and strategies;
incident reports and learnings from any cybersecurity events; and
compliance with regulatory requirements and industry standards.
In addition to our scheduled meetings, the Board, Senior Vice President of Information Technology, CFO and CLO maintain an ongoing dialogue regarding emerging or potential cybersecurity risks. Together, they receive updates on significant developments in the cybersecurity domain, ensuring the Board’s oversight is proactive and responsive. The Board actively participates in strategic decisions related to cybersecurity, offering guidance and approval for major initiatives. This involvement ensures that cybersecurity considerations are integrated into the broader strategic objectives of the Company.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block]
Primary responsibility for assessing, monitoring and managing our cybersecurity risks rests with the Senior Vice President of Information Technology. With over 35 years of experience in the information technology field, he brings a wealth of expertise to his role. His in-depth knowledge and experience are instrumental in developing and executing our cybersecurity strategies. Our Senior Vice President of Information Technology tests our compliance with standards, remediates known risks and leads our employee training program.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block]
Primary responsibility for assessing, monitoring and managing our cybersecurity risks rests with the Senior Vice President of Information Technology. With over 35 years of experience in the information technology field, he brings a wealth of expertise to his role. His in-depth knowledge and experience are instrumental in developing and executing our cybersecurity strategies. Our Senior Vice President of Information Technology tests our compliance with standards, remediates known risks and leads our employee training program.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]
The Senior Vice President of Information Technology regularly informs the Chief Executive Officer and Chief Legal Officer of all aspects related to cybersecurity risks and incidents. This ensures that the highest levels of management are kept abreast of the cybersecurity posture and potential risks facing the Company. Furthermore, significant cybersecurity matters and
strategic risk management decisions are escalated to the Board, ensuring the Board has comprehensive oversight and can provide guidance on critical cybersecurity issues.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true