XML 23 R10.htm IDEA: XBRL DOCUMENT v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Risk Management and StrategyIn an effort to protect our business against cybersecurity threats, we have implemented a cybersecurity risk management program that is integrated with our internal risk management processes and designed to identify and protect against cyber threats as well as to respond to and recover from cyber incidents, as applicable. Our cybersecurity risk management program is informed by industry standards, such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework, and is supported by periodic internal and external information security assessments and testing.We have also established incident response policies and procedures, overseen by our Chief Financial Officer, to review and classify cybersecurity incidents and to define roles and responsibilities for response and remediation in the event of a cyber incident.

 

In addition, we collaborate with third-party advisory firms to periodically review and evaluate our security measures, which informs our ongoing strategy and execution of our cybersecurity program. We also leverage third-party providers to augment our internal security resources, including to support our ongoing monitoring and threat detection capabilities. We have a process to evaluate certain critical third-party providers before engagement as well as periodically thereafter, which may include a review of available audit reports, security documentation, operating controls, and industry reputation, as well as contractual requirements, as appropriate.

 

We have not identified any cybersecurity incidents or threats that have materially affected us or are reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition; however, like other companies in our industry, we and our third-party vendors have from time to time experienced threats and security incidents that could affect our information or systems. For more information, please see our Risk Factors.

 
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] we have implemented a cybersecurity risk management program that is integrated with our internal risk management processes and designed to identify and protect against cyber threats as well as to respond to and recover from cyber incidents, as applicable
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false