XML 23 R9.htm IDEA: XBRL DOCUMENT v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Risk Management and StrategyWe recognize the critical importance of developing, implementing, and maintaining robust cybersecurity measures to safeguard our information systems and protect the confidentiality, integrity, and availability of our data. We primarily rely on expert third-party managed IT service providers to protect our IT systems from cybersecurity threats. Managing Material Risks & Integrated Overall Risk Management

 

As one of the critical elements of our overall risk management program, our cybersecurity program is focused on the following key areas:

 

  Technical Safeguards: We deploy technical safeguards that are designed to protect our information systems from cybersecurity threats, including firewalls, anti-malware software, and monitoring software agents that are installed on our devices.
     
  Third-Party Management: Our financial data and primary operational systems are hosted off-site in virtual cloud environments which get periodically backed up and can be restored in the event of a cybersecurity incident. Our music subscription service is managed by our content provider, Stingray Group, who processes payments, and our e-commerce website payment processing is handled by Shopify. We do not store sensitive customer credit card data within our IT systems.
     
  Risk Management: We have strategically integrated cybersecurity risk management into our broader risk management framework to promote a company-wide culture of cybersecurity risk management. This integration ensures that cybersecurity considerations are an integral part of our decision-making processes at every level. Our management team works closely with our third-party IT service provider to continuously evaluate and address cybersecurity risks in alignment with our business objectives and operational needs.

 

Oversee Third-Party Risk

 

We conduct annual assessments of the SOC reports of our providers because we are aware of the risks associated with third-party service providers. This approach is designed to mitigate risks related to data breaches or other security incidents originating from third parties.

 

Risks from Cybersecurity Threats

 

As of the date of this report, there have been no cybersecurity incidents that have materially affected our results of operations or financial condition.

 
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false