XML 41 R27.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
We have established procedures to assess, identify, and manage material risks from cybersecurity threats and have integrated those procedures into our overall risk management systems and processes.
We have implemented a written information security program ("WISP") to create administrative, technical and physical safeguards at KVH for the protection of confidential information of KVH and its employees and customers and other third parties. The WISP sets forth our procedures for evaluating our electronic and physical methods of collecting, storing, accessing, using, transmitting, and protecting confidential information, including personal information, as defined by federal and state law. We have utilized the National Institute of Standards and Technology’s Cybersecurity Framework (NIST CSF) as a baseline for the WISP procedures in addition to General Data Protection Regulation (GDPR) standards. In addition to our data privacy policy, the WISP policy defines how sensitive and private data is protected. Under our procedures, we perform an annual risk assessment to identify and prioritize key cybersecurity risks, and we update this assessment when we receive information about material new cybersecurity risks. Once we identify material cybersecurity risks, we seek to identify and implement prevention measures. Current prevention measures include, among other things, to the extent we determine to be appropriate for our information systems in light of our financial, personnel and other resources, restricted physical access, restricted systems access, multi-factor authentication, software solutions such as intrusion detection systems, anti-virus, anti-malware, email filtering and quarantining programs, routine system maintenance and updates, backup and recovery systems, routine employee cybersecurity training and testing, and quarterly internal audits. The measures we take may be inadequate to protect us from cybersecurity risks. See “Item 1A. Risk Factors – Risks related to our dependence on third parties and third-party technology – Cybersecurity breaches could disrupt our operations, expose us to liability, damage our reputation, and require us to incur significant costs or otherwise adversely affect our financial results.”

We obtain cybersecurity threat intelligence information from law enforcement reports and our cybersecurity operations providers and communicate this information to relevant stakeholders within the organization. We employ third-party cybersecurity operations providers to monitor cybersecurity events and provide rapid responses to any critical events. In addition, we employ contractual provisions to require our third-party information service providers to implement and maintain appropriate security measures over the information we entrust to them. Because of the relatively small size of our information technology workforce, we have limited internal cybersecurity expertise and monitoring capabilities; accordingly, we seek to augment our internal capabilities by engaging larger, well-known third-party service providers with significantly greater cybersecurity capabilities than we possess. Because we rely on their greater expertise, our ability to identify and remediate weaknesses or vulnerabilities in the services they provide is limited. We have not engaged third parties to assess our cybersecurity defenses or to audit our cybersecurity program, nor have we conducted direct or indirect technical evaluations of the information systems that our third-party service providers use.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
We have established procedures to assess, identify, and manage material risks from cybersecurity threats and have integrated those procedures into our overall risk management systems and processes.
We have implemented a written information security program ("WISP") to create administrative, technical and physical safeguards at KVH for the protection of confidential information of KVH and its employees and customers and other third parties.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Our Information Security Officer (“ISO”) is responsible for implementing, supervising and maintaining the WISP, including the implementation of prevention measures. The ISO reports directly to the VP Network Systems/Services Engineering, who is also our Chief Information Security Officer (“CISO”). The CISO establishes the company-wide system security plan and defines the parameters of users’ access privileges. The CISO has over 30 years in the network, security systems engineering fields and has been with KVH for 15 years. Before KVH, the CISO worked in the telecom and ISP spaces covering transport, design and implementations. In these roles, the CISO was responsible for all network-oriented security and developed in-depth experience on core security platforms. At KVH, the CISO has been lead on security as a service for customer implementations.

We have also implemented an Incident Response Plan (“IRP”), which provides a set of guidelines on the appropriate responsive actions to take in the event of a cybersecurity incident, depending on the particular facts and circumstances of the incident.

The audit committee assists the Board of Directors in overseeing our cybersecurity program. Both the Board of Directors and the audit committee receive regular reports regarding material cybersecurity developments. In the case of a security incident, the ISO will report the incident directly to the Chief Executive Officer, Chief Financial Officer, CISO and Senior Vice President, General Counsel & Compliance Officer. The breach will then be communicated to the audit committee dependent on the materiality of the incident.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The audit committee assists the Board of Directors in overseeing our cybersecurity program. Both the Board of Directors and the audit committee receive regular reports regarding material cybersecurity developments. In the case of a security incident, the ISO will report the incident directly to the Chief Executive Officer, Chief Financial Officer, CISO and Senior Vice President, General Counsel & Compliance Officer. The breach will then be communicated to the audit committee dependent on the materiality of the incident
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
The audit committee assists the Board of Directors in overseeing our cybersecurity program. Both the Board of Directors and the audit committee receive regular reports regarding material cybersecurity developments. In the case of a security incident, the ISO will report the incident directly to the Chief Executive Officer, Chief Financial Officer, CISO and Senior Vice President, General Counsel & Compliance Officer. The breach will then be communicated to the audit committee dependent on the materiality of the incident.
Cybersecurity Risk Role of Management [Text Block]
Our Information Security Officer (“ISO”) is responsible for implementing, supervising and maintaining the WISP, including the implementation of prevention measures. The ISO reports directly to the VP Network Systems/Services Engineering, who is also our Chief Information Security Officer (“CISO”). The CISO establishes the company-wide system security plan and defines the parameters of users’ access privileges. The CISO has over 30 years in the network, security systems engineering fields and has been with KVH for 15 years. Before KVH, the CISO worked in the telecom and ISP spaces covering transport, design and implementations. In these roles, the CISO was responsible for all network-oriented security and developed in-depth experience on core security platforms. At KVH, the CISO has been lead on security as a service for customer implementations.

We have also implemented an Incident Response Plan (“IRP”), which provides a set of guidelines on the appropriate responsive actions to take in the event of a cybersecurity incident, depending on the particular facts and circumstances of the incident.

The audit committee assists the Board of Directors in overseeing our cybersecurity program. Both the Board of Directors and the audit committee receive regular reports regarding material cybersecurity developments. In the case of a security incident, the ISO will report the incident directly to the Chief Executive Officer, Chief Financial Officer, CISO and Senior Vice President, General Counsel & Compliance Officer. The breach will then be communicated to the audit committee dependent on the materiality of the incident.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block]
Our Information Security Officer (“ISO”) is responsible for implementing, supervising and maintaining the WISP, including the implementation of prevention measures. The ISO reports directly to the VP Network Systems/Services Engineering, who is also our Chief Information Security Officer (“CISO”). The CISO establishes the company-wide system security plan and defines the parameters of users’ access privileges. The CISO has over 30 years in the network, security systems engineering fields and has been with KVH for 15 years. Before KVH, the CISO worked in the telecom and ISP spaces covering transport, design and implementations. In these roles, the CISO was responsible for all network-oriented security and developed in-depth experience on core security platforms. At KVH, the CISO has been lead on security as a service for customer implementations.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block]
Our Information Security Officer (“ISO”) is responsible for implementing, supervising and maintaining the WISP, including the implementation of prevention measures. The ISO reports directly to the VP Network Systems/Services Engineering, who is also our Chief Information Security Officer (“CISO”). The CISO establishes the company-wide system security plan and defines the parameters of users’ access privileges. The CISO has over 30 years in the network, security systems engineering fields and has been with KVH for 15 years. Before KVH, the CISO worked in the telecom and ISP spaces covering transport, design and implementations. In these roles, the CISO was responsible for all network-oriented security and developed in-depth experience on core security platforms. At KVH, the CISO has been lead on security as a service for customer implementations.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]
Our Information Security Officer (“ISO”) is responsible for implementing, supervising and maintaining the WISP, including the implementation of prevention measures. The ISO reports directly to the VP Network Systems/Services Engineering, who is also our Chief Information Security Officer (“CISO”). The CISO establishes the company-wide system security plan and defines the parameters of users’ access privileges. The CISO has over 30 years in the network, security systems engineering fields and has been with KVH for 15 years. Before KVH, the CISO worked in the telecom and ISP spaces covering transport, design and implementations. In these roles, the CISO was responsible for all network-oriented security and developed in-depth experience on core security platforms. At KVH, the CISO has been lead on security as a service for customer implementations.

We have also implemented an Incident Response Plan (“IRP”), which provides a set of guidelines on the appropriate responsive actions to take in the event of a cybersecurity incident, depending on the particular facts and circumstances of the incident.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true