XML 39 R11.htm IDEA: XBRL DOCUMENT v3.25.4
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

We recognize the importance of safeguarding the security of our computer systems, software, networks, and other technology assets. We have implemented and maintain a security risk management program that is designed to preserve the confidentiality, integrity, and continued availability of information under our ownership or care with the aim to continually improve security features in order to keep pace with the evolving cyber threat landscape.

 

We face a number of cybersecurity risks in connection with our business and recognize the growing threat within the general marketplace and our industry. Although such risks have not materially affected us, including our business strategy, results of operations or financial condition, to date, we and our vendors have, from time to time, experienced threats to and breaches of our data and systems. For more information about the cybersecurity risks we face, see the section titled “Risk Factors — Risks Related to Information Technology and Data Privacy”.

 

Risk Management and Strategy

 

We have implemented internal controls including regular risk assessments designed to address financial, operational and information technology (including cybersecurity) risks and controls across our organization. These assessments are overseen by our Head of IT and Chief Accounting Officer. We implement cybersecurity controls and procedures designed to address cyber risks and threats, supported by third-party technologies and security advisors and providers. We also provide cybersecurity awareness training to our employees during the onboarding process and periodically thereafter. In addition, we engage external third-party information security consultants to periodically conduct information security testing and assessments, and to evaluate our overarching information security program and specific incident response procedures. We also maintain a Cyber Incident Response Plan, which is overseen by our Head of IT and is designed to coordinate our response to information security incidents. Finally, we hold and maintain third-party insurance coverage for cybersecurity risks commensurate with industry standards for a company of our size and stage.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] We recognize the importance of safeguarding the security of our computer systems, software, networks, and other technology assets. We have implemented and maintain a security risk management program that is designed to preserve the confidentiality, integrity, and continued availability of information under our ownership or care with the aim to continually improve security features in order to keep pace with the evolving cyber threat landscape.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] true
Cybersecurity Risk Board of Directors Oversight [Text Block]

Cybersecurity Oversight

 

The Head of IT is responsible for implementing and maintaining the information security program. The Head of IT role is currently held by an individual who has more than 20 years of professional IT management experience and maintains a Global Information Assurance Certification. The Head of IT reports to our Chief Accounting Officer, who together are responsible for coordinating information security risk assessments and overseeing periodic testing of our cybersecurity controls. Our Chief Accounting Officer meets with the audit committee of our board of directors periodically for the audit committee to provide guidance on the prioritization of the risk remediation and ongoing implementation of cybersecurity improvements across our organization. We also engage an external auditing firm with information security expertise to conduct regular auditing, testing, and review of our information technology risks, processes, and operations.

 

Management also generally provides quarterly updates to the audit committee on cybersecurity and other information technology risks. We have implemented a process for the Head of IT and the Chief Accounting Officer to receive incident reports and report quarterly (and, if applicable, in the event of a cybersecurity incident), to our internal disclosure committee and the audit committee, as appropriate. Management presents to the entire board of directors on an annual basis, including any key findings identified in our cybersecurity assessments.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Head of IT is responsible for implementing and maintaining the information security program. The Head of IT role is currently held by an individual who has more than 20 years of professional IT management experience and maintains a Global Information Assurance Certification. The Head of IT reports to our Chief Accounting Officer, who together are responsible for coordinating information security risk assessments and overseeing periodic testing of our cybersecurity controls. Our Chief Accounting Officer meets with the audit committee of our board of directors periodically for the audit committee to provide guidance on the prioritization of the risk remediation and ongoing implementation of cybersecurity improvements across our organization. We also engage an external auditing firm with information security expertise to conduct regular auditing, testing, and review of our information technology risks, processes, and operations.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The Head of IT is responsible for implementing and maintaining the information security program. The Head of IT role is currently held by an individual who has more than 20 years of professional IT management experience and maintains a Global Information Assurance Certification. The Head of IT reports to our Chief Accounting Officer, who together are responsible for coordinating information security risk assessments and overseeing periodic testing of our cybersecurity controls. Our Chief Accounting Officer meets with the audit committee of our board of directors periodically for the audit committee to provide guidance on the prioritization of the risk remediation and ongoing implementation of cybersecurity improvements across our organization. We also engage an external auditing firm with information security expertise to conduct regular auditing, testing, and review of our information technology risks, processes, and operations.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] The Head of IT is responsible for implementing and maintaining the information security program. The Head of IT role is currently held by an individual who has more than 20 years of professional IT management experience and maintains a Global Information Assurance Certification. The Head of IT reports to our Chief Accounting Officer, who together are responsible for coordinating information security risk assessments and overseeing periodic testing of our cybersecurity controls. Our Chief Accounting Officer meets with the audit committee of our board of directors periodically for the audit committee to provide guidance on the prioritization of the risk remediation and ongoing implementation of cybersecurity improvements across our organization. We also engage an external auditing firm with information security expertise to conduct regular auditing, testing, and review of our information technology risks, processes, and operations.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] The Head of IT is responsible for implementing and maintaining the information security program. The Head of IT role is currently held by an individual who has more than 20 years of professional IT management experience and maintains a Global Information Assurance Certification. The Head of IT reports to our Chief Accounting Officer, who together are responsible for coordinating information security risk assessments and overseeing periodic testing of our cybersecurity controls. Our Chief Accounting Officer meets with the audit committee of our board of directors periodically for the audit committee to provide guidance on the prioritization of the risk remediation and ongoing implementation of cybersecurity improvements across our organization. We also engage an external auditing firm with information security expertise to conduct regular auditing, testing, and review of our information technology risks, processes, and operations.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true