XML 52 R31.htm IDEA: XBRL DOCUMENT v3.25.4
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
We depend on information systems and related technologies for internal purposes, including secure data storage, processing, and transmission, as well as in our interactions with our business associates, customers, and suppliers. We also rely on third-party business associates, with whom we may share data and services, to defend their digital technologies and services against attack.
Managing Material Risks & Integrated Overall Risk Management
We have integrated cybersecurity risk management into our broader risk management framework to promote a company-wide culture of cyber risk awareness. We depend on various controls, policies, procedures and programs (“Risk Controls”) to manage our risks, including risks associated with our information systems. Risks Assessment and Risk Controls are included as part of our annual enterprise risk management (“ERM”) program. Our risk controls include our administrative, physical, and technical controls (“Cyber Risk Controls”). We are dependent on our Cyber Risk Controls to protect our information systems and the data that resides on or is transmitted through them. The Cyber Risk Controls are in many cases integrated with our other Risk Controls in an attempt to maximize their effectiveness.
Engaging Third Parties on Risk Management
We collaborate with our clients, vendors and other third parties to develop information systems and protect against cybersecurity threats. We engage third-party security experts for risk assessments and program enhancements.

Managing Third Party Risk
There are risks associated with the use of vendors, service providers and other third parties that provide information system services to us, process information on our behalf, or have access to our information. We evaluate third-party service providers’ cybersecurity posture and seek to mitigate risk through contractual safeguards, monitoring, and incident response plans.
Risks from Cybersecurity Incidents
While we have experienced and will likely continue to experience varying degrees of cyber incidents in the normal conduct of our business, including attacks resulting from phishing emails and malware infections, those incidents have not materially affected the Company’s business strategy, results of operations, or financial condition. There can be no assurance that the systems we have designed to prevent or limit the effects of cyber incidents or attacks will be sufficient to prevent or detect future material consequences arising from incidents or attacks, or to avoid a material adverse impact on our systems after
such incidents or attacks do occur. However, the Company does not currently anticipate that risks from cybersecurity threats are reasonably likely to materially affect the Company, including its business strategy, results of operations, or financial condition.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
We depend on information systems and related technologies for internal purposes, including secure data storage, processing, and transmission, as well as in our interactions with our business associates, customers, and suppliers. We also rely on third-party business associates, with whom we may share data and services, to defend their digital technologies and services against attack.
Managing Material Risks & Integrated Overall Risk Management
We have integrated cybersecurity risk management into our broader risk management framework to promote a company-wide culture of cyber risk awareness. We depend on various controls, policies, procedures and programs (“Risk Controls”) to manage our risks, including risks associated with our information systems. Risks Assessment and Risk Controls are included as part of our annual enterprise risk management (“ERM”) program. Our risk controls include our administrative, physical, and technical controls (“Cyber Risk Controls”). We are dependent on our Cyber Risk Controls to protect our information systems and the data that resides on or is transmitted through them. The Cyber Risk Controls are in many cases integrated with our other Risk Controls in an attempt to maximize their effectiveness.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Board of Director Oversight
Our Audit Committee is responsible for oversight of our programs and procedures related to cybersecurity risk. Management provides periodic reports to the Audit Committee on cybersecurity risk. The Audit Committee reports significant findings from these reports to the full Board of Directors.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block]
Our IT Director of Cybersecurity and Networking meets regularly with members of our executive team to discuss and review risks related to cybersecurity. The reviews may include evaluations of risks and incidents identified by third-party providers retained to review our cyber risk as well as cybersecurity threat scenario planning. Identified risks related to cybersecurity threats may also be analyzed as part of our ERM process.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
Our Information Technology ("IT") Director of Cybersecurity and Networking has direct responsibility for assessing, monitoring and managing risks related to cybersecurity threats in conjunction with the Senior Vice President of IT and Chief Information Officer. Third party experts and/or consultants are retained to help identify, assess and monitor cybersecurity incidents and related risks. Our IT Director of Cybersecurity and Networking has been in that position with the Company since 2019 and, including prior experience, has significant experience in managing IT infrastructure, architecture and security. Our Senior Vice President of IT and Chief Information Officer joined the Company in 2025. Over his extensive career, he has developed substantial expertise in enterprise resource planning, infrastructure, applications, IT architecture and cyber security, including experience in areas closely aligned with the Company’s operations.

Monitoring Cybersecurity Risks and Incidents
Our IT Director of Cybersecurity and Networking meets regularly with members of our executive team to discuss and review risks related to cybersecurity. The reviews may include evaluations of risks and incidents identified by third-party providers retained to review our cyber risk as well as cybersecurity threat scenario planning. Identified risks related to cybersecurity threats may also be analyzed as part of our ERM process.
Cybersecurity Risk Role of Management [Text Block]
Our Information Technology ("IT") Director of Cybersecurity and Networking has direct responsibility for assessing, monitoring and managing risks related to cybersecurity threats in conjunction with the Senior Vice President of IT and Chief Information Officer. Third party experts and/or consultants are retained to help identify, assess and monitor cybersecurity incidents and related risks. Our IT Director of Cybersecurity and Networking has been in that position with the Company since 2019 and, including prior experience, has significant experience in managing IT infrastructure, architecture and security. Our Senior Vice President of IT and Chief Information Officer joined the Company in 2025. Over his extensive career, he has developed substantial expertise in enterprise resource planning, infrastructure, applications, IT architecture and cyber security, including experience in areas closely aligned with the Company’s operations.

Monitoring Cybersecurity Risks and Incidents
Our IT Director of Cybersecurity and Networking meets regularly with members of our executive team to discuss and review risks related to cybersecurity. The reviews may include evaluations of risks and incidents identified by third-party providers retained to review our cyber risk as well as cybersecurity threat scenario planning. Identified risks related to cybersecurity threats may also be analyzed as part of our ERM process.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our Information Technology ("IT") Director of Cybersecurity and Networking has direct responsibility for assessing, monitoring and managing risks related to cybersecurity threats in conjunction with the Senior Vice President of IT and Chief Information Officer. Third party experts and/or consultants are retained to help identify, assess and monitor cybersecurity incidents and related risks.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block]
Our Information Technology ("IT") Director of Cybersecurity and Networking has direct responsibility for assessing, monitoring and managing risks related to cybersecurity threats in conjunction with the Senior Vice President of IT and Chief Information Officer. Third party experts and/or consultants are retained to help identify, assess and monitor cybersecurity incidents and related risks. Our IT Director of Cybersecurity and Networking has been in that position with the Company since 2019 and, including prior experience, has significant experience in managing IT infrastructure, architecture and security. Our Senior Vice President of IT and Chief Information Officer joined the Company in 2025. Over his extensive career, he has developed substantial expertise in enterprise resource planning, infrastructure, applications, IT architecture and cyber security, including experience in areas closely aligned with the Company’s operations.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]
Our Information Technology ("IT") Director of Cybersecurity and Networking has direct responsibility for assessing, monitoring and managing risks related to cybersecurity threats in conjunction with the Senior Vice President of IT and Chief Information Officer. Third party experts and/or consultants are retained to help identify, assess and monitor cybersecurity incidents and related risks. Our IT Director of Cybersecurity and Networking has been in that position with the Company since 2019 and, including prior experience, has significant experience in managing IT infrastructure, architecture and security. Our Senior Vice President of IT and Chief Information Officer joined the Company in 2025. Over his extensive career, he has developed substantial expertise in enterprise resource planning, infrastructure, applications, IT architecture and cyber security, including experience in areas closely aligned with the Company’s operations.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true