XML 180 R32.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Risk Management and Strategy

The Company understands the importance of preventing, assessing, identifying, and managing material risks associated with cybersecurity threats. Cybersecurity processes to assess, identify and manage risks from cybersecurity threats have been incorporated as a part of the Company’s overall risk assessment process. On a regular basis we implement into our operations these cybersecurity processes, technologies, and controls to assess, identify, and manage material risks. Specifically, we engage third-party cybersecurity firms to assist with network and endpoint monitoring, cloud system monitoring, and assessment of our incident response procedures, risk identification and assessment of material cybersecurity threats.

To manage our material risks from cybersecurity threats and to protect against, detect, and prepare to respond to cybersecurity incidents, we undertake the below listed activities:

Monitor security and information events on a real-time basis to respond to threats as they occur;
Monitor emerging data protection laws and implement changes to our processes to comply;
Conduct annual cybersecurity management and incident training for employees involved in our systems and processes that handle sensitive data;
Update key employees regularly on phishing email and other cybersecurity risks;
Employ artificial intelligence assisted cybersecurity monitoring capabilities; and
Complete regular updates to key software and infrastructure.

Management has not identified any specific risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, that have materially affected or are reasonably likely to materially affect the Company, including its business strategy, results of operations or financial condition. See “Item 1A. Risk Factors, Our business could be negatively impacted by security threats, including cybersecurity threats, and other disruptions.” above for more information. While we continually work to safeguard the information systems we use, and the proprietary, confidential and personal information residing therein, and mitigate potential risks, there can be no assurance that such actions will be sufficient to prevent cybersecurity incidents or mitigate all potential risks to such systems, networks and data or those of our third-party providers.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]

To manage our material risks from cybersecurity threats and to protect against, detect, and prepare to respond to cybersecurity incidents, we undertake the below listed activities:

Monitor security and information events on a real-time basis to respond to threats as they occur;
Monitor emerging data protection laws and implement changes to our processes to comply;
Conduct annual cybersecurity management and incident training for employees involved in our systems and processes that handle sensitive data;
Update key employees regularly on phishing email and other cybersecurity risks;
Employ artificial intelligence assisted cybersecurity monitoring capabilities; and
Complete regular updates to key software and infrastructure.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]

Governance

Our Audit Committee of the Board of Directors is responsible for oversight of our risk assessment, risk management, disaster recovery procedures and cybersecurity risks. The Audit Committee periodically receives an overview of our cybersecurity threat risk management and strategy processes, including potential impact on the Company, the efforts of management to manage the risks that are identified, and our disaster recovery preparations. Members of the Board of Directors regularly engage in discussions with management on cybersecurity-related news events and discuss any updates to our cybersecurity risk management and strategy programs.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Audit Committee
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee periodically receives an overview of our cybersecurity threat risk management and strategy processes, including potential impact on the Company, the efforts of management to manage the risks that are identified, and our disaster recovery preparations
Cybersecurity Risk Role of Management [Text Block]

Our cybersecurity risk management and strategy processes, which are discussed in greater detail above, are led by our Vice President Finance. The Vice President Finance is informed about and monitors the prevention, mitigation, detection, and remediation of cybersecurity incidents through their management of the cybersecurity risk management and strategy processes described above, including our incident response plan. Together with the General Counsel, information technology staff and outside consultants that comprise our cybersecurity management team, we collectively possess significant experience in evaluating, managing, and mitigating security and other risks, including cybersecurity risks.

Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Vice President Finance
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The Vice President Finance is informed about and monitors the prevention, mitigation, detection, and remediation of cybersecurity incidents through their management of the cybersecurity risk management and strategy processes described above, including our incident response plan.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true