XML 25 R9.htm IDEA: XBRL DOCUMENT v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Risk Management and Strategy

Our information systems consist of computer systems used by the Company’s Chief Executive Officer and Chief Financial Officer. They actively monitor our threat environment for cybersecurity threats using various methods, including automated detection tools, scans of the threat environment, investigations of potential threats they discover or that are reported to them, and reports and services that identify threats. They monitor our information systems for vulnerabilities using internal and third-party penetration testing, intelligence feeds, and vulnerability databases.

Company’s computer systems involve the use of third-party technology or service providers, or vendors, such as hosting platforms, open-source software, and application providers. Employees are provided specific guidance to mitigate the risk of a cybersecurity attack. This guidance includes safeguards over confidential data, being aware of suspicious emails, choosing passwords, protection of Company issued and use of personal devices, managing large data transfers. Employees are directed to immediately contact the Chief Executive Officer if they encounter any suspicious activity.

If a cybersecurity risk is identified, Company’s policy is to use vendors to assist the Company to identify, assess, and manage material risks from cybersecurity threats to corporate systems, which consulting firms may include consulting firms, external legal counsel, incident response vendors, auditors, monitoring technology, and cybersecurity data providers.

The Company’s Chairman of the Board of Directors is tasked with reporting on cybersecurity measures and issues to the entire board of directors. In the event of a cybersecurity incident, Company policy is for the Company Chairman of the Board of Directors to report the cybersecurity incident to the Company’s Board of Directors and take remedial actions to mitigate and remediate cybersecurity incidents.

As of and for the year ended December 31, 2024, there have been no cybersecurity incidents that have materially affected the Company’s business strategy, results of operations, or financial condition.

Cybersecurity Risk Management Processes Integrated [Text Block] They actively monitor our threat environment for cybersecurity threats using various methods, including automated detection tools, scans of the threat environment, investigations of potential threats they discover or that are reported to them, and reports and services that identify threats.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] As of and for the year ended December 31, 2024, there have been no cybersecurity incidents that have materially affected the Company’s business strategy, results of operations, or financial condition.
Cybersecurity Risk Board of Directors Oversight [Text Block] The Company’s Chairman of the Board of Directors is tasked with reporting on cybersecurity measures and issues to the entire board of directors. In the event of a cybersecurity incident, Company policy is for the Company Chairman of the Board of Directors to report the cybersecurity incident to the Company’s Board of Directors and take remedial actions to mitigate and remediate cybersecurity incidents.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Company policy is for the Company Chairman of the Board of Directors to report the cybersecurity incident to the Company’s Board of Directors and take remedial actions to mitigate and remediate cybersecurity incidents.
Cybersecurity Risk Role of Management [Text Block] If a cybersecurity risk is identified, Company’s policy is to use vendors to assist the Company to identify, assess, and manage material risks from cybersecurity threats to corporate systems, which consulting firms may include consulting firms, external legal counsel, incident response vendors, auditors, monitoring technology, and cybersecurity data providers.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Employees are directed to immediately contact the Chief Executive Officer if they encounter any suspicious activity.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true