XML 24 R8.htm IDEA: XBRL DOCUMENT v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

4.

Notes Payable Related Parties

 

On May 10, 2024, we issued 10% Original Issue Discount Promissory Notes (the “Notes”) with an aggregate principal amount of $150,000 to members of our Board of Directors and senior management, in exchange for gross cash proceeds to us of $135,000. The Notes were unsecured, bore interest at a rate of 15% per annum, and matured upon of the earlier of (i) six months from the issue date or (ii) three days following the date the Company completes an offering of its common stock with gross proceeds of not less than $5 million (a “Qualified Financing Event”). On August 22, 2024, following the successful completion of a Qualified Financing Event, we repaid the aggregate principal amount of the Notes in full, together with accrued interest. Total interest expense recorded during 2024 was $21,375, consisting of $15,000 of debt discount amortization and $6,375 of accrued interest.

 

 

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Management is responsible for the implementation of risk management strategies and for the operational oversight of company-wide cybersecurity strategy, policy, and standards to assess and prepare us to address cybersecurity risks. We have evolving processes for assessing, identifying and managing cybersecurity risks, which are built into our information technology function and are designed to help protect our information assets and operations from cyber threats, protect employee and corporate information from unauthorized access or attack, as well as secure our networks and systems. Such processes include physical, procedural and technical safeguards, response plans, and routine review of our policies and procedures to identify risks and refine our practices. The Company’s information technology function (including cybersecurity) is centralized under the Chief Financial Officer, who has over three decades of business leadership experience including oversight of information technology functions. We also engage independent third parties to assess and implement our cybersecurity procedures and enhance our oversight.
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] The NGC receives periodic updates from management regarding cybersecurity matters and is notified between such updates regarding any significant new cybersecurity threats or incidents. We do not believe that there are currently any known risks from cybersecurity threats that are reasonably likely to materially affect us or our business strategy, results of operations or financial condition.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Risk oversight and management is a key role for the Board and its committees. The Board is responsible for identifying and understanding the Company’s principal risks and ensuring that appropriate systems are implemented to monitor, manage and mitigate those risks. The committees of the Board have oversight over risks within their respective mandates.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Management is responsible for the implementation of risk management strategies and for the operational oversight of company-wide cybersecurity strategy, policy, and standards to assess and prepare us to address cybersecurity risks. We have evolving processes for assessing, identifying and managing cybersecurity risks, which are built into our information technology function and are designed to help protect our information assets and operations from cyber threats, protect employee and corporate information from unauthorized access or attack, as well as secure our networks and systems. Such processes include physical, procedural and technical safeguards, response plans, and routine review of our policies and procedures to identify risks and refine our practices. The Company’s information technology function (including cybersecurity) is centralized under the Chief Financial Officer, who has over three decades of business leadership experience including oversight of information technology functions. We also engage independent third parties to assess and implement our cybersecurity procedures and enhance our oversight.
Cybersecurity Risk Role of Management [Text Block] Management is responsible for the implementation of risk management strategies and for the operational oversight of company-wide cybersecurity strategy, policy, and standards to assess and prepare us to address cybersecurity risks. We have evolving processes for assessing, identifying and managing cybersecurity risks, which are built into our information technology function and are designed to help protect our information assets and operations from cyber threats, protect employee and corporate information from unauthorized access or attack, as well as secure our networks and systems. Such processes include physical, procedural and technical safeguards, response plans, and routine review of our policies and procedures to identify risks and refine our practices. The Company’s information technology function (including cybersecurity) is centralized under the Chief Financial Officer, who has over three decades of business leadership experience including oversight of information technology functions. We also engage independent third parties to assess and implement our cybersecurity procedures and enhance our oversight.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Management is responsible for the implementation of risk management strategies and for the operational oversight of company-wide cybersecurity strategy, policy, and standards to assess and prepare us to address cybersecurity risks. We have evolving processes for assessing, identifying and managing cybersecurity risks, which are built into our information technology function and are designed to help protect our information assets and operations from cyber threats, protect employee and corporate information from unauthorized access or attack, as well as secure our networks and systems. Such processes include physical, procedural and technical safeguards, response plans, and routine review of our policies and procedures to identify risks and refine our practices. The Company’s information technology function (including cybersecurity) is centralized under the Chief Financial Officer, who has over three decades of business leadership experience including oversight of information technology functions. We also engage independent third parties to assess and implement our cybersecurity procedures and enhance our oversight.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Management is responsible for the implementation of risk management strategies and for the operational oversight of company-wide cybersecurity strategy, policy, and standards to assess and prepare us to address cybersecurity risks. We have evolving processes for assessing, identifying and managing cybersecurity risks, which are built into our information technology function and are designed to help protect our information assets and operations from cyber threats, protect employee and corporate information from unauthorized access or attack, as well as secure our networks and systems. Such processes include physical, procedural and technical safeguards, response plans, and routine review of our policies and procedures to identify risks and refine our practices. The Company’s information technology function (including cybersecurity) is centralized under the Chief Financial Officer, who has over three decades of business leadership experience including oversight of information technology functions. We also engage independent third parties to assess and implement our cybersecurity procedures and enhance our oversight.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The NGC receives periodic updates from management regarding cybersecurity matters and is notified between such updates regarding any significant new cybersecurity threats or incidents. We do not believe that there are currently any known risks from cybersecurity threats that are reasonably likely to materially affect us or our business strategy, results of operations or financial condition.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true