XML 25 R11.htm IDEA: XBRL DOCUMENT v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Risk Management and Strategy

   

The Company understands the importance of preventing, assessing, identifying, and managing material risks associated with cybersecurity threats. Cybersecurity processes to assess, identify and manage risks from cybersecurity threats have been incorporated as a part of the Company’s overall risk assessment process. These risks include, among other things: operational risks, intellectual property theft, fraud, extortion, harm to employees (of which we currently have none) or customers (of which we currently have none) and violation of data privacy or security laws.

 

The Company's cybersecurity environment is led by its Chief Executive Officer, who in addition to cybersecurity matters, oversees the Company's IT infrastructure and is responsible for monitoring and managing the security of the Company's corporate network and enterprise systems, including technical controls, and safety protocols and responding to security threats. Our Chief Executive Officer reports to the Board of Directors, and the full Board of Directors is responsible for oversight of risks from cybersecurity threats.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Cybersecurity processes to assess, identify and manage risks from cybersecurity threats have been incorporated as a part of the Company’s overall risk assessment process.
Cybersecurity Risk Management Third Party Engaged [Flag] false
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] We describe whether and how risks from identified cybersecurity threats, including as a result of any previous cybersecurity incidents, have materially affected or are reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition, under the heading
Cybersecurity Risk Board of Directors Oversight [Text Block] The Company's cybersecurity environment is led by its Chief Executive Officer, who in addition to cybersecurity matters, oversees the Company's IT infrastructure and is responsible for monitoring and managing the security of the Company's corporate network and enterprise systems, including technical controls, and safety protocols and responding to security threats. Our Chief Executive Officer reports to the Board of Directors, and the full Board of Directors is responsible for oversight of risks from cybersecurity threats.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] the full Board of Directors is responsible for oversight of risks from cybersecurity threats.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Chief Executive Officer reports to the Board of Directors
Cybersecurity Risk Role of Management [Text Block] The Company's cybersecurity environment is led by its Chief Executive Officer, who in addition to cybersecurity matters, oversees the Company's IT infrastructure and is responsible for monitoring and managing the security of the Company's corporate network and enterprise systems, including technical controls, and safety protocols and responding to security threats.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] oversees the Company's IT infrastructure and is responsible for monitoring and managing the security of the Company's corporate network and enterprise systems, including technical controls, and safety protocols