XML 54 R36.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
We maintain a cybersecurity program that is reasonably designed to protect our information, and that of our customers, against cybersecurity threats that could have material adverse effects on the integrity and effectiveness of our information systems.
The Audit Committee of our Board of Directors oversees the Company’s enterprise risk management process, including the management of risks arising from cybersecurity threats. The Audit Committee typically reviews the measures implemented by the Company to identify and mitigate these risks on a quarterly basis. As part of such reviews, the Audit Committee receives reports and presentations from the Company’s Chief Information Officer (CIO) that address a wide range of topics, including recent developments, evolving standards, oversight of third-party vendors, and technological trends related to cybersecurity. The full Board of Directors often attends these presentations. Additionally, at least once each year the CIO briefs the Audit Committee on the results of an independent third-party assessment of the Company’s cybersecurity and the Company’s Information Technology (“IT”) incident response and recovery plan.
At the management level, our cybersecurity strategy is managed by the CIO. The CIO’s extensive experience in technology and risk management, including prior work experience in cybersecurity, complemented by other members of our IT department and third-party vendors, form the backbone of our cybersecurity capability. Our cybersecurity program is based on
recognized best practices and standards for cybersecurity and IT, including the National Institute of Standards and Technology Cybersecurity Framework. Cybersecurity incidents that meet established reporting thresholds are escalated within the Company to the CIO and the Company’s executive leadership team and, where appropriate, reported to Audit Committee and Board of Directors.
Cybersecurity threats and related incidents have not had a material impact on the company to date, but future cybersecurity incidents could have a material effect on our business, financial condition, and results of operations. Moreover, cybersecurity insurance may not be available on commercially reasonable terms. While we have not experienced any material cybersecurity incidents, there can be no guarantee that we will not be the subject of future successful attacks. Additional information on cybersecurity risks we face can be found in Part I, Item 1A. — Risk Factors.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
We maintain a cybersecurity program that is reasonably designed to protect our information, and that of our customers, against cybersecurity threats that could have material adverse effects on the integrity and effectiveness of our information systems.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Our cybersecurity program is based on
recognized best practices and standards for cybersecurity and IT, including the National Institute of Standards and Technology Cybersecurity Framework. Cybersecurity incidents that meet established reporting thresholds are escalated within the Company to the CIO and the Company’s executive leadership team and, where appropriate, reported to Audit Committee and Board of Directors.
Cybersecurity threats and related incidents have not had a material impact on the company to date, but future cybersecurity incidents could have a material effect on our business, financial condition, and results of operations. Moreover, cybersecurity insurance may not be available on commercially reasonable terms. While we have not experienced any material cybersecurity incidents, there can be no guarantee that we will not be the subject of future successful attacks. Additional information on cybersecurity risks we face can be found in Part I, Item 1A. — Risk Factors.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Cybersecurity incidents that meet established reporting thresholds are escalated within the Company to the CIO and the Company’s executive leadership team and, where appropriate, reported to Audit Committee and Board of Directors.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] As part of such reviews, the Audit Committee receives reports and presentations from the Company’s Chief Information Officer (CIO) that address a wide range of topics, including recent developments, evolving standards, oversight of third-party vendors, and technological trends related to cybersecurity.
Cybersecurity Risk Role of Management [Text Block]
At the management level, our cybersecurity strategy is managed by the CIO. The CIO’s extensive experience in technology and risk management, including prior work experience in cybersecurity, complemented by other members of our IT department and third-party vendors, form the backbone of our cybersecurity capability. Our cybersecurity program is based on
recognized best practices and standards for cybersecurity and IT, including the National Institute of Standards and Technology Cybersecurity Framework. Cybersecurity incidents that meet established reporting thresholds are escalated within the Company to the CIO and the Company’s executive leadership team and, where appropriate, reported to Audit Committee and Board of Directors.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] The Audit Committee of our Board of Directors oversees the Company’s enterprise risk management process, including the management of risks arising from cybersecurity threats. The Audit Committee typically reviews the measures implemented by the Company to identify and mitigate these risks on a quarterly basis. As part of such reviews, the Audit Committee receives reports and presentations from the Company’s Chief Information Officer (CIO) that address a wide range of topics, including recent developments, evolving standards, oversight of third-party vendors, and technological trends related to cybersecurity. The full Board of Directors often attends these presentations. Additionally, at least once each year the CIO briefs the Audit Committee on the results of an independent third-party assessment of the Company’s cybersecurity and the Company’s Information Technology (“IT”) incident response and recovery plan.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Chief Information Officer (CIO) that address a wide range of topics, including recent developments, evolving standards, oversight of third-party vendors, and technological trends related to cybersecurity.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Additionally, at least once each year the CIO briefs the Audit Committee on the results of an independent third-party assessment of the Company’s cybersecurity and the Company’s Information Technology (“IT”) incident response and recovery plan.
At the management level, our cybersecurity strategy is managed by the CIO. The CIO’s extensive experience in technology and risk management, including prior work experience in cybersecurity, complemented by other members of our IT department and third-party vendors, form the backbone of our cybersecurity capability. Our cybersecurity program is based on
recognized best practices and standards for cybersecurity and IT, including the National Institute of Standards and Technology Cybersecurity Framework. Cybersecurity incidents that meet established reporting thresholds are escalated within the Company to the CIO and the Company’s executive leadership team and, where appropriate, reported to Audit Committee and Board of Directors.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true