XML 28 R10.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management, Strategy, and Governance
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Item 1C. Cybersecurity.

Cybersecurity Risk Management and Strategy

We have developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information.

We designed and assess our program based on the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF).

Our cybersecurity risk management program is integrated into our overall risk management program, and shares common methodologies, reporting channels and governance processes that apply across the risk management program to other legal, compliance, strategic, operational, and financial risk areas.

We leverage the support of third-party information technology and security providers, including for periodic security testing, as part of our risk management process, designed to identify, assess, and manage cybersecurity risks. We maintain an incident response and notification plan designed to assist us in identifying, responding to, and recovering from cybersecurity incidents, and we have a process to assess the security practices of certain third-party vendors. We have also engaged a third-party with specialized expertise in cybersecurity to conduct an audit, which resulted in no notable findings, and reported the results to the Audit Committee.

We, like other companies in our industry, face a number of cybersecurity risks in connection with our business. Although such risks have not materially affected us, including our business strategy, results of operations or financial condition, to date, we and/or our vendors have, from time to time, experienced threats to, or security incidents, related to our data and systems or that had the potential to otherwise impact our business.

Cybersecurity Governance

Our Board considers cybersecurity risk as part of its risk oversight function and has delegated to the Audit Committee (the “Committee”) oversight of cybersecurity risks, including oversight of management’s implementation of our cybersecurity risk management program.

The Committee receives periodic reports from management on our cybersecurity risks. In addition, management updates the Committee, as necessary, regarding any significant cybersecurity incidents.

The Committee reports to the full Board regarding its activities, including those related to cybersecurity. The full Board also periodically receives briefings from management on our cyber risk management program. Board members receive presentations on cybersecurity topics from our management team as part of the Board’s continuing education on topics that impact public companies.

Our management team, with the assistance of the Company’s third-party information technology providers, is responsible for assessing and managing our material risks from cybersecurity threats. Internal personnel, including our Senior Vice President, Finance, have primary responsibility for our overall cybersecurity risk management program and supervise both our internal cybersecurity personnel and our retained external cybersecurity consultants. Members of our senior management do not have direct cybersecurity expertise obtained through certifications, but their experience managing the Company, which includes consulting and coordinating as necessary with third-party information technology and cybersecurity experts, enables them to assess and manage material risks from cybersecurity threats.

Our management team stays informed about and monitors efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include: briefings from internal security personnel; threat intelligence and other information obtained from governmental, public or private sources; and alerts and reports produced by security tools deployed in our IT environment.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]

Our cybersecurity risk management program is integrated into our overall risk management program, and shares common methodologies, reporting channels and governance processes that apply across the risk management program to other legal, compliance, strategic, operational, and financial risk areas.

Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]

Our Board considers cybersecurity risk as part of its risk oversight function and has delegated to the Audit Committee (the “Committee”) oversight of cybersecurity risks, including oversight of management’s implementation of our cybersecurity risk management program.

The Committee receives periodic reports from management on our cybersecurity risks. In addition, management updates the Committee, as necessary, regarding any significant cybersecurity incidents.

The Committee reports to the full Board regarding its activities, including those related to cybersecurity. The full Board also periodically receives briefings from management on our cyber risk management program. Board members receive presentations on cybersecurity topics from our management team as part of the Board’s continuing education on topics that impact public companies.

Our management team, with the assistance of the Company’s third-party information technology providers, is responsible for assessing and managing our material risks from cybersecurity threats. Internal personnel, including our Senior Vice President, Finance, have primary responsibility for our overall cybersecurity risk management program and supervise both our internal cybersecurity personnel and our retained external cybersecurity consultants. Members of our senior management do not have direct cybersecurity expertise obtained through certifications, but their experience managing the Company, which includes consulting and coordinating as necessary with third-party information technology and cybersecurity experts, enables them to assess and manage material risks from cybersecurity threats.

Our management team stays informed about and monitors efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include: briefings from internal security personnel; threat intelligence and other information obtained from governmental, public or private sources; and alerts and reports produced by security tools deployed in our IT environment.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] the Audit Committee (the “Committee”) oversight of cybersecurity risks, including oversight of management’s implementation of our cybersecurity risk management program.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]

The Committee receives periodic reports from management on our cybersecurity risks. In addition, management updates the Committee, as necessary, regarding any significant cybersecurity incidents.

Cybersecurity Risk Role of Management [Text Block]

The Committee reports to the full Board regarding its activities, including those related to cybersecurity. The full Board also periodically receives briefings from management on our cyber risk management program. Board members receive presentations on cybersecurity topics from our management team as part of the Board’s continuing education on topics that impact public companies.

Our management team, with the assistance of the Company’s third-party information technology providers, is responsible for assessing and managing our material risks from cybersecurity threats. Internal personnel, including our Senior Vice President, Finance, have primary responsibility for our overall cybersecurity risk management program and supervise both our internal cybersecurity personnel and our retained external cybersecurity consultants. Members of our senior management do not have direct cybersecurity expertise obtained through certifications, but their experience managing the Company, which includes consulting and coordinating as necessary with third-party information technology and cybersecurity experts, enables them to assess and manage material risks from cybersecurity threats.

Our management team stays informed about and monitors efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include: briefings from internal security personnel; threat intelligence and other information obtained from governmental, public or private sources; and alerts and reports produced by security tools deployed in our IT environment.

Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block]

The Committee reports to the full Board regarding its activities, including those related to cybersecurity. The full Board also periodically receives briefings from management on our cyber risk management program. Board members receive presentations on cybersecurity topics from our management team as part of the Board’s continuing education on topics that impact public companies.

Cybersecurity Risk Management Expertise of Management Responsible [Text Block]

Our management team, with the assistance of the Company’s third-party information technology providers, is responsible for assessing and managing our material risks from cybersecurity threats. Internal personnel, including our Senior Vice President, Finance, have primary responsibility for our overall cybersecurity risk management program and supervise both our internal cybersecurity personnel and our retained external cybersecurity consultants. Members of our senior management do not have direct cybersecurity expertise obtained through certifications, but their experience managing the Company, which includes consulting and coordinating as necessary with third-party information technology and cybersecurity experts, enables them to assess and manage material risks from cybersecurity threats.

Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]

Our management team stays informed about and monitors efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include: briefings from internal security personnel; threat intelligence and other information obtained from governmental, public or private sources; and alerts and reports produced by security tools deployed in our IT environment.

Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true