XML 58 R40.htm IDEA: XBRL DOCUMENT v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Our business involves the collection, storage, transmission, and processing of confidential and sensitive
information, and our operations depend on information technology systems, communications networks, and
technology applications, including those operated by third-party service providers. Accordingly, we face
cybersecurity threats on an ongoing basis. As of the date of this 2025 Form 10-K, we are not aware of any
cybersecurity incidents or threats that have materially affected or are reasonably likely to materially affect the
Company, including its business strategy, results of operations, financial condition, and cash flows.
We have implemented, and continue to develop, various information security processes and controls designed to
identify, assess, and manage material risks from cybersecurity threats, including a written cyber incident response
plan and vulnerability management procedures. Our technical and operational safeguards include vulnerability and
risk assessments, network security and access controls, encryption of certain data, and employee cybersecurity
awareness training. Our cybersecurity program references the National Institute of Standards and Technology
cybersecurity framework (“NIST”) in developing and maintaining our cybersecurity practices. The Company is in
the process of establishing an enterprise risk management framework, and cybersecurity risk is expected to be
incorporated into that framework as it continues to develop.
We work with third parties to assist us in our cybersecurity efforts. We maintain a vendor management process
designed to evaluate cybersecurity considerations associated with third-party service providers that access our
systems or data. Depending on the nature of the services provided and the sensitivity of the information involved,
this process may include reviewing the service provider’s cybersecurity controls and risk management practices.
Cybersecurity risk management is coordinated through management and is overseen by the Board as described
below.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] We have implemented, and continue to develop, various information security processes and controls designed to
identify, assess, and manage material risks from cybersecurity threats, including a written cyber incident response
plan and vulnerability management procedures. Our technical and operational safeguards include vulnerability and
risk assessments, network security and access controls, encryption of certain data, and employee cybersecurity
awareness training. Our cybersecurity program references the National Institute of Standards and Technology
cybersecurity framework (“NIST”) in developing and maintaining our cybersecurity practices. The Company is in
the process of establishing an enterprise risk management framework, and cybersecurity risk is expected to be
incorporated into that framework as it continues to develop.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Our Board of Directors has ultimate oversight responsibility for the Company’s strategy and risk management,
including material risks related to cybersecurity incidents and threats. The Audit Committee of the Board of
Directors (the “Audit Committee”) assists the Board in fulfilling its oversight responsibilities with respect to
cybersecurity and information technology risks.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] This Cyber Committee is responsible for evaluating cybersecurity incidents and determining materiality for disclosure purposes, in coordination with appropriate members of senior management and legal counsel.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Management provides the Audit Committee and the Board with periodic updates regarding cybersecurity risks
and the Company’s cybersecurity program. In the event of a significant cybersecurity incident, management’s
processes are designed to provide timely escalation to the Audit Committee and the Board outside of the regular
reporting cycle.
Cybersecurity Risk Role of Management [Text Block] Our executive officers are responsible for addressing and providing guidance to management to allow the
Company to address and mitigate material risks we face, including cybersecurity risks. Among other things,
management is responsible for hiring appropriate personnel, designing and implementing cybersecurity-related
processes, communicating priorities to relevant personnel, assessing cybersecurity incidents as they arise, and
assessing and managing material risks from cybersecurity threats.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Among members of management, cybersecurity matters are overseen by our Chief Data Officer, who reports to
our Chief Executive Officer, and has significant experience in information technology. The Company has
established a formal, management-level committee (the “Cyber Committee”) with a written charter to assist the
Company in ensuring that cybersecurity incidents are assessed, evaluated, escalated, and disclosed in a timely,
accurate, compliant, and coordinated manner in accordance with applicable regulatory requirements. The Cyber
Committee initially consists of the Chief Data Officer, General Counsel, Chief Financial Officer & Chief
Accounting Officer, and other members of management as determined by the Cyber Committee
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] The Cyber
Committee initially consists of the Chief Data Officer, General Counsel, Chief Financial Officer & Chief
Accounting Officer, and other members of management as determined by the Cyber Committee
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Management provides the Audit Committee and the Board with periodic updates regarding cybersecurity risks
and the Company’s cybersecurity program. In the event of a significant cybersecurity incident, management’s
processes are designed to provide timely escalation to the Audit Committee and the Board outside of the regular
reporting cycle.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true