XML 40 R23.htm IDEA: XBRL DOCUMENT v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
We maintain standard procedures to help assess, identify and manage material risk posed by cybersecurity threats and regularly evaluate how we can integrate these procedures into our overall risk management processes. For example, we require that all of our employees who have access to our internal network complete formal cybersecurity training upon hire and on a periodic basis, including training on phishing, malware, and other cybersecurity risks. We also continuously evaluate our information technology systems and our practices that relate to our information technology systems. To date, we have not engaged any formal assessment or cyber security auditors or other third parties in connection with these efforts but may elect to do so in the future.
To the extent we identify areas in our information systems that need improvement, we seek to timely implement and monitor such improvements. While we believe that we have taken appropriate security measures to protect our data and information technology systems, and have been informed by our third-party vendors that they have as well, there can be no assurance that our efforts will prevent breakdowns or breaches in our systems, or those of our third-party vendors, that could materially adversely affect our business and financial condition. For additional information regarding whether risks from cybersecurity threats are reasonably likely to materially affect the Company, including our business strategy, results of operations, or financial condition, see Item 1A, “Risk Factors,” in this Annual Report on Form 10-K.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] We maintain standard procedures to help assess, identify and manage material risk posed by cybersecurity threats and regularly evaluate how we can integrate these procedures into our overall risk management processes. For example, we require that all of our employees who have access to our internal network complete formal cybersecurity training upon hire and on a periodic basis, including training on phishing, malware, and other cybersecurity risks.
Cybersecurity Risk Management Third Party Engaged [Flag] false
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Our IT consultant regularly monitors our information technology systems and monitors the prevention, detection, mitigation and remediation of cybersecurity incidents in consultation with our Chief Executive Officer. Our Chief
Executive Officer periodically reports information regarding our cybersecurity program to our Board, which has overall responsibility for risk oversight. In addition, our management is responsible for alerting our Board of any material cybersecurity incidents.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] We currently engage a qualified IT consultant who reports to our Chief Executive Officer.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
We currently engage a qualified IT consultant who reports to our Chief Executive Officer. This consultant has over 30 years of experience with cybersecurity, information technology development and deployment and information technology risk assessment and management, including information security management.
Our IT consultant regularly monitors our information technology systems and monitors the prevention, detection, mitigation and remediation of cybersecurity incidents in consultation with our Chief Executive Officer. Our Chief
Executive Officer periodically reports information regarding our cybersecurity program to our Board, which has overall responsibility for risk oversight. In addition, our management is responsible for alerting our Board of any material cybersecurity incidents.
Cybersecurity Risk Role of Management [Text Block]
We currently engage a qualified IT consultant who reports to our Chief Executive Officer. This consultant has over 30 years of experience with cybersecurity, information technology development and deployment and information technology risk assessment and management, including information security management.
Our IT consultant regularly monitors our information technology systems and monitors the prevention, detection, mitigation and remediation of cybersecurity incidents in consultation with our Chief Executive Officer. Our Chief
Executive Officer periodically reports information regarding our cybersecurity program to our Board, which has overall responsibility for risk oversight. In addition, our management is responsible for alerting our Board of any material cybersecurity incidents.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] We currently engage a qualified IT consultant who reports to our Chief Executive Officer.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] This consultant has over 30 years of experience with cybersecurity, information technology development and deployment and information technology risk assessment and management, including information security management.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]
We currently engage a qualified IT consultant who reports to our Chief Executive Officer. This consultant has over 30 years of experience with cybersecurity, information technology development and deployment and information technology risk assessment and management, including information security management.
Our IT consultant regularly monitors our information technology systems and monitors the prevention, detection, mitigation and remediation of cybersecurity incidents in consultation with our Chief Executive Officer. Our Chief
Executive Officer periodically reports information regarding our cybersecurity program to our Board, which has overall responsibility for risk oversight. In addition, our management is responsible for alerting our Board of any material cybersecurity incidents.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true