XML 26 R11.htm IDEA: XBRL DOCUMENT v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Risk oversight and management is a key role for the Board and its committees. The Board is responsible for identifying and understanding the Company’s principal risks and ensuring that appropriate systems are implemented to monitor, manage and mitigate those risks. The committees of the Board have oversight over risks within their respective mandates.

 

Oversight of cybersecurity is integrated into the responsibilities of the Board. The Nominating and Governance Committee (NGC) has been assigned oversight of cybersecurity matters, particularly as they relate to financial risk and controls, integrity of financial data and public disclosures, and security of overall digital data.

 

Management is responsible for the implementation of risk management strategies and for the operational oversight of company-wide cybersecurity strategy, policy, and standards to assess and prepare us to address cybersecurity risks. We have evolving processes for assessing, identifying and managing cybersecurity risks, which are built into our information technology function and are designed to help protect our information assets and operations from cyber threats, protect employee and corporate information from unauthorized access or attack, as well as secure our networks and systems. Such processes include physical, procedural and technical safeguards, response plans, and routine review of our policies and procedures to identify risks and refine our practices. The Company’s information technology function (including cybersecurity) is centralized under the Chief Financial Officer, who has over three decades of business leadership experience including oversight of information technology functions. We also engage independent third parties to assess and implement our cybersecurity procedures and enhance our oversight.

 

The NGC receives periodic updates from management regarding cybersecurity matters and is notified between such updates regarding any significant new cybersecurity threats or incidents. We do not believe that there are currently any known risks from cybersecurity threats that are reasonably likely to materially affect us or our business strategy, results of operations or financial condition.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Risk oversight and management is a key role for the Board and its committees. The Board is responsible for identifying and understanding the Company’s principal risks and ensuring that appropriate systems are implemented to monitor, manage and mitigate those risks. The committees of the Board have oversight over risks within their respective mandates.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] The NGC receives periodic updates from management regarding cybersecurity matters and is notified between such updates regarding any significant new cybersecurity threats or incidents. We do not believe that there are currently any known risks from cybersecurity threats that are reasonably likely to materially affect us or our business strategy, results of operations or financial condition.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Oversight of cybersecurity is integrated into the responsibilities of the Board. The Nominating and Governance Committee (NGC) has been assigned oversight of cybersecurity matters, particularly as they relate to financial risk and controls, integrity of financial data and public disclosures, and security of overall digital data.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Management is responsible for the implementation of risk management strategies and for the operational oversight of company-wide cybersecurity strategy, policy, and standards to assess and prepare us to address cybersecurity risks. We have evolving processes for assessing, identifying and managing cybersecurity risks, which are built into our information technology function and are designed to help protect our information assets and operations from cyber threats, protect employee and corporate information from unauthorized access or attack, as well as secure our networks and systems. Such processes include physical, procedural and technical safeguards, response plans, and routine review of our policies and procedures to identify risks and refine our practices. The Company’s information technology function (including cybersecurity) is centralized under the Chief Financial Officer, who has over three decades of business leadership experience including oversight of information technology functions. We also engage independent third parties to assess and implement our cybersecurity procedures and enhance our oversight.
Cybersecurity Risk Role of Management [Text Block] Management is responsible for the implementation of risk management strategies and for the operational oversight of company-wide cybersecurity strategy, policy, and standards to assess and prepare us to address cybersecurity risks. We have evolving processes for assessing, identifying and managing cybersecurity risks, which are built into our information technology function and are designed to help protect our information assets and operations from cyber threats, protect employee and corporate information from unauthorized access or attack, as well as secure our networks and systems. Such processes include physical, procedural and technical safeguards, response plans, and routine review of our policies and procedures to identify risks and refine our practices. The Company’s information technology function (including cybersecurity) is centralized under the Chief Financial Officer, who has over three decades of business leadership experience including oversight of information technology functions. We also engage independent third parties to assess and implement our cybersecurity procedures and enhance our oversight.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Management is responsible for the implementation of risk management strategies and for the operational oversight of company-wide cybersecurity strategy, policy, and standards to assess and prepare us to address cybersecurity risks. We have evolving processes for assessing, identifying and managing cybersecurity risks, which are built into our information technology function and are designed to help protect our information assets and operations from cyber threats, protect employee and corporate information from unauthorized access or attack, as well as secure our networks and systems. Such processes include physical, procedural and technical safeguards, response plans, and routine review of our policies and procedures to identify risks and refine our practices. The Company’s information technology function (including cybersecurity) is centralized under the Chief Financial Officer, who has over three decades of business leadership experience including oversight of information technology functions. We also engage independent third parties to assess and implement our cybersecurity procedures and enhance our oversight.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Management is responsible for the implementation of risk management strategies and for the operational oversight of company-wide cybersecurity strategy, policy, and standards to assess and prepare us to address cybersecurity risks. We have evolving processes for assessing, identifying and managing cybersecurity risks, which are built into our information technology function and are designed to help protect our information assets and operations from cyber threats, protect employee and corporate information from unauthorized access or attack, as well as secure our networks and systems. Such processes include physical, procedural and technical safeguards, response plans, and routine review of our policies and procedures to identify risks and refine our practices. The Company’s information technology function (including cybersecurity) is centralized under the Chief Financial Officer, who has over three decades of business leadership experience including oversight of information technology functions. We also engage independent third parties to assess and implement our cybersecurity procedures and enhance our oversight.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Management is responsible for the implementation of risk management strategies and for the operational oversight of company-wide cybersecurity strategy, policy, and standards to assess and prepare us to address cybersecurity risks. We have evolving processes for assessing, identifying and managing cybersecurity risks, which are built into our information technology function and are designed to help protect our information assets and operations from cyber threats, protect employee and corporate information from unauthorized access or attack, as well as secure our networks and systems. Such processes include physical, procedural and technical safeguards, response plans, and routine review of our policies and procedures to identify risks and refine our practices. The Company’s information technology function (including cybersecurity) is centralized under the Chief Financial Officer, who has over three decades of business leadership experience including oversight of information technology functions. We also engage independent third parties to assess and implement our cybersecurity procedures and enhance our oversight.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true