XML 35 R10.htm IDEA: XBRL DOCUMENT v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]  We have implemented protocols to protect against cybersecurity threats and prevent unauthorized access to sensitive data. We conduct regular assessment of the Company’s cybersecurity risks and vulnerabilities, by identifying potential threats, assessing the likelihood and potential impact of cyberattacks. We also conduct ongoing evaluation of the industry trends and regulatory environments to ensure we are in full compliance with applicable cybersecurity laws and regulations in all jurisdictions where we operate. We have set in place an efficient risk mitigation and control and incident response protocols to identify potential risks, detect, effectively respond to, and recover from cybersecurity breaches.

 

Overall, we believe that we have established a robust framework to protect against cybersecurity threats, mitigate risks, preserve customer trust and reputation, and support the sustainable growth of our Company.

 
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true