XML 44 R28.htm IDEA: XBRL DOCUMENT v3.25.4
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Cybersecurity Risk Management and Strategy
The operation of our businesses is dependent on the secure functioning of our computer infrastructure, digital information systems, and third-party hosted services. We use these systems to maintain sensitive business and customer data, operate record-keeping and accounting functions, process business transactions, and for other key aspects of our business.
We rely on our information technology (“IT”) department, management, and third-party service providers to identify, assess, and manage cybersecurity threats and risks, including those associated with artificial intelligence. Our information security program utilizes various security tools and strategies, including risk assessments, incident detection and response, vulnerability management, disaster recovery and business continuity plans, internal controls within our accounting and financial reporting functions, encryption of data, network security controls, access controls, physical security, and systems monitoring. We also work with third parties that assist us to identify, assess, and manage cybersecurity risks, including professional services firms, consulting firms, and threat intelligence service providers. These assessments encompass evaluations of both the design and operational effectiveness of our security measures and consider the evolution of different cybersecurity threats, including through artificial intelligence.
Our cybersecurity risk management is integrated into our overall risk management system. Our IT department works closely with our management and other relevant teams to regularly assess and identify possible material risks from cybersecurity threats, including, but not limited to, financial, operations, reputational and regulatory impact to the Company, as well as impacts on our employees and customers. The Company maintains an Incident Response Plan designed to detect, respond to and mitigate cybersecurity incidents. The Incident Response Plan is administered by a designated Cybersecurity Incident Response Team (“CIRT”), comprised of information technology leadership and designated systems administrators with defined roles and responsibilities for preparation, detection, containment, recovery and post-incident analysis. Under this plan, cybersecurity incidents are assessed based on defined severity levels and significant risk findings are escalated to executive leadership, including the Executive Leadership Team (“ELT”), based on the nature and severity of the incident. Following resolution, incidents are formally documented and reviewed, including post-incident analysis and “lessons learned,” to enhance the Company’s cybersecurity posture.
Our business strategy, results of operations, and financial condition have not been materially affected by risks from cybersecurity threats, including as a result of previously identified cybersecurity incidents, but we cannot provide assurance that they will not be materially affected in the future by such risks or any future material incidents. For more information on our cybersecurity-related risks, see “Risk Factors – We face risks related to our information technology systems, and potential cyber-attacks and security breaches.”
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Our cybersecurity risk management is integrated into our overall risk management system.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Cybersecurity Governance
Our management team oversees cybersecurity risk management processes and their implementation. Our information security program is coordinated by our IT department, led by our Executive Vice President of Enterprise Solutions, who has 30 years of industry experience in IT, with responsibility for enterprise security, and cyber risk management including serving in similar roles leading and overseeing cybersecurity programs at other public companies. Supporting team members have relevant educational and industry experience, including holding similar technology positions at other companies.

Management, in coordination with our IT department, is responsible for hiring appropriate personnel, helping to integrate cybersecurity risk considerations into the Company’s overall risk management strategy, and communicating key priorities to relevant personnel. Management is responsible for approving budgets, approving cybersecurity processes, and reviewing cybersecurity assessments and other cybersecurity-related matters.
Material cybersecurity incidents are escalated to executive leadership in accordance with the Company’s incident response procedures and, where appropriate, to the Board of Directors. Our Board of Directors oversees the Company’s risk management framework, including oversight of material cybersecurity risks, and receives information regarding such risks as appropriate in connection with its enterprise risk management responsibilities.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Board of Directors oversees the Company’s risk management framework, including oversight of material cybersecurity risks, and receives information regarding such risks as appropriate in connection with its enterprise risk management responsibilities.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
Management, in coordination with our IT department, is responsible for hiring appropriate personnel, helping to integrate cybersecurity risk considerations into the Company’s overall risk management strategy, and communicating key priorities to relevant personnel. Management is responsible for approving budgets, approving cybersecurity processes, and reviewing cybersecurity assessments and other cybersecurity-related matters.
Material cybersecurity incidents are escalated to executive leadership in accordance with the Company’s incident response procedures and, where appropriate, to the Board of Directors.
Cybersecurity Risk Role of Management [Text Block] Our management team oversees cybersecurity risk management processes and their implementation.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our information security program is coordinated by our IT department, led by our Executive Vice President of Enterprise Solutions
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our information security program is coordinated by our IT department, led by our Executive Vice President of Enterprise Solutions, who has 30 years of industry experience in IT, with responsibility for enterprise security, and cyber risk management including serving in similar roles leading and overseeing cybersecurity programs at other public companies. Supporting team members have relevant educational and industry experience, including holding similar technology positions at other companies.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]
Material cybersecurity incidents are escalated to executive leadership in accordance with the Company’s incident response procedures and, where appropriate, to the Board of Directors. Our Board of Directors oversees the Company’s risk management framework, including oversight of material cybersecurity risks, and receives information regarding such risks as appropriate in connection with its enterprise risk management responsibilities.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true