XML 28 R12.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management, Strategy and Governance
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

ITEM 1C. Cybersecurity

The Company takes cybersecurity threats seriously, including regular reassessment of cybersecurity risks both internally and with third parties and updates to the Board of Directors at least annually. The Company's information security management system is based upon the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF). Among other best practices, the company uses multi-factor authentication wherever possible, maintains current versions of firewalls and security software, performs regular cybersecurity training and email phishing campaigns for employees, uses third parties to perform intrusion testing, and maintains disaster recovery and incident response plans, which include retainer contracts for third party cybersecurity response specialists. The Company employs a combination of active and passive methods to monitor for new or developing cybersecurity risks.

The Board regularly receives reports and training from management and third parties on cybersecurity matters, as part of our overall enterprise risk management program. Management is responsible for developing cybersecurity programs, including as may be required by applicable law or regulation. Company IT personnel have the appropriate expertise in IT and cybersecurity, which generally has been gained from a combination of education, including relevant degrees and/or certifications, and prior work experience. Company cybersecurity personnel monitor the prevention, detection, mitigation and remediation of cybersecurity incidents as part of the cybersecurity programs described above. Incidents, if any, are escalated to management and the Board according to the Company’s incident response policy. There have been no material cybersecurity incidents in the periods presented.

Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Role of Management [Text Block] The Board regularly receives reports and training from management and third parties on cybersecurity matters, as part of our overall enterprise risk management program. Management is responsible for developing cybersecurity programs, including as may be required by applicable law or regulation.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] The Company takes cybersecurity threats seriously, including regular reassessment of cybersecurity risks both internally and with third parties and updates to the Board of Directors at least annually.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Management is responsible for developing cybersecurity programs, including as may be required by applicable law or regulation. Company IT personnel have the appropriate expertise in IT and cybersecurity, which generally has been gained from a combination of education, including relevant degrees and/or certifications, and prior work experience. Company cybersecurity personnel monitor the prevention, detection, mitigation and remediation of cybersecurity incidents as part of the cybersecurity programs described above.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true