XML 49 R29.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Legacy relies on information technology infrastructure and architecture, including hardware, cloud computing networks, software, people, and processes to manage protected, confidential, and personally identifiable information. Our business is at risk from, and may be impacted by, cybersecurity threats and incidents, including but not limited to attempts to gain unauthorized access to our systems or data. Similar threats and incidents may impact third parties with which we do business. We have invested and continue to invest in cybersecurity and data protection efforts, including technical, administrative, and organizational safeguards designed to protect our systems and data. However, we acknowledge that a future cybersecurity incident could materially harm our business, operating results, and financial condition.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Legacy relies on information technology infrastructure and architecture, including hardware, cloud computing networks, software, people, and processes to manage protected, confidential, and personally identifiable information.
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] The Company’s Board of Directors is made aware of cybersecurity incidents and threats, as appropriate, pursuant to corporate policy.
Cybersecurity Risk Role of Management [Text Block]

The Company’s cybersecurity efforts are directly overseen by our Director of Information Technology, who reports directly to our Chief Executive Officer. The Company’s Board of Directors is made aware of cybersecurity incidents and threats, as appropriate, pursuant to corporate policy.

Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Director of Information Technology