XML 24 R9.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Risk Management and Strategy 

Securing our business information, intellectual property, customer and employee data, and technology systems is essential for the continuity of our business, meeting applicable regulatory requirements and maintaining the trust of our stockholders. Cybersecurity is an important and integral part of our enterprise risk management function that identifies, monitors and mitigates business, operational and legal risks.

 

To help protect us from a major cybersecurity incident that could have a material impact on operations or our financial results, we have implemented policies, programs and controls, including technology investments that focus on cybersecurity incident prevention, identification and mitigation. The steps we take to reduce our vulnerability to cyberattacks and to mitigate impacts from cybersecurity incidents include, but are not limited to: annual penetration testing by a third party vendor, cloud and agent based security scanning that runs continuously, establishing information security policies and standards, implementing information protection processes and technologies, monitoring our information technology systems for cybersecurity threats, assessing cybersecurity risk profiles of key third-parties, and implementing cybersecurity training. In addition, we annually purchase a cybersecurity risk insurance policy that would help defray the costs associated with a covered cybersecurity incident if it occurred.

 
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Cybersecurity is an important and integral part of our enterprise risk management function that identifies, monitors and mitigates business, operational and legal risks.
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] To help protect us from a major cybersecurity incident that could have a material impact on operations or our financial results, we have implemented policies, programs and controls, including technology investments that focus on cybersecurity incident prevention, identification and mitigation.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Board of Directors is actively engaged in overseeing and reviewing our strategic direction and objectives, taking into account, among other considerations, our risk profile and related exposures, including oversight of risks from cybersecurity threats.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] As part of this oversight, the Company established a Cybersecurity Steering Committee consisting of certain members of our senior management team and a Board representative, that meets quarterly and updates the Board periodically, and at least annually, on our cybersecurity program, including with respect to particular cybersecurity threats, cybersecurity incidents, new developments in our risk profile, the status of projects to strengthen our cybersecurity systems, assessments of our cybersecurity program, and the emerging threat landscape.
Cybersecurity Risk Role of Management [Text Block] Management has the responsibility to manage risk and bring to the Board’s attention any material near-term and long-term risks to the Company, including risks from cybersecurity threats. We actively engage with key vendors and industry participants and monitor new developments in global cybersecurity concerns as part of our continuing efforts to evaluate and enhance the effectiveness of our cybersecurity policies and procedures. Our Cybersecurity Steering Committee has developed a standard operating procedure that outlines specific steps to identify, mitigate and report on any cybersecurity-related incidents that may be discovered.
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our Cybersecurity Steering Committee has developed a standard operating procedure that outlines specific steps to identify, mitigate and report on any cybersecurity-related incidents that may be discovered.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] We actively engage with key vendors and industry participants and monitor new developments in global cybersecurity concerns as part of our continuing efforts to evaluate and enhance the effectiveness of our cybersecurity policies and procedures.