XML 25 R9.htm IDEA: XBRL DOCUMENT v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] We have implemented various processes designed to identify, assess and manage material risks from cybersecurity threats to our information networks, third-party hosted services, communications systems, hardware and software (collectively, our “Systems”), and our data and our clients’ data (together, “Data”).Our cybersecurity risk management efforts leverage the National Institute of Standards and Technology (NIST) cybersecurity framework, that also aligns with the SP800-53 r5 Information Security controls framework. Our cybersecurity personnel identify and assess risks using various methods and security tools designed to help prevent, identify, protect, detect, escalate, respond, and recover from identified vulnerabilities and security incidents in a timely manner. We maintain various technical, physical, and organizational measures, in the form of policies, standards, processes, and technical capabilities, designed to manage and mitigate material risks from cybersecurity threats to our Systems and Data, including, among other things, risk and threat assessment, internal reporting, annual and ongoing cybersecurity awareness training for employees, mechanisms to detect and monitor unusual network activity, as well as threat detection, containment, incident response and backup recovery tools. We conduct tests of our cybersecurity program on a regular basis that are designed to identify our cybersecurity risks. We use third-party security service providers and cybersecurity consultants to assist us from time to time to identify, assess, and manage material risks from cybersecurity threats and review our cybersecurity program. The results of such reviews are reported to certain members of our senior management, who evaluate material risks from cybersecurity threats against our overall business objectives and report to our board of directors, which evaluates our overall enterprise risk. Within our senior management, our Chief Financial Officer and Chief Technology Officer (CTO) review our cybersecurity program at least quarterly. Our CTO is one of our founders and has been in technology since 1996. One of our board members has been employed with a cyber security company. We use third-party service providers to perform a variety of functions throughout our business, such as Amazon Web Services, Expedient (Columbus, OH), and Corespace (Dallas, TX). Depending on the nature of the services provided, certain providers are subject to cybersecurity risk assessments at the time of onboarding. We also use various inputs to assess the risk of our third-party service providers, including information supplied by them. While we have not, as of the date of this Annual Report on Form 10-K, experienced a cybersecurity incident that resulted in a material adverse impact to our business or operations, there can be no guarantee that we will not experience such an incident in the future. For a description of the risks from cybersecurity threats that may materially affect the Company and how they may do so, please see “Risk Factors” included in Part I, Item 1A of this Annual Report on Form 10-K, including “Legal and Regulatory Risks” and “General Risks.”
Cybersecurity Risk Management Processes Integrated [Text Block] We maintain various technical, physical, and organizational measures, in the form of policies, standards, processes, and technical capabilities, designed to manage and mitigate material risks from cybersecurity threats to our Systems and Data, including, among other things, risk and threat assessment, internal reporting, annual and ongoing cybersecurity awareness training for employees, mechanisms to detect and monitor unusual network activity, as well as threat detection, containment, incident response and backup recovery tools.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] For a description of the risks from cybersecurity threats that may materially affect the Company
Cybersecurity Risk Board of Directors Oversight [Text Block] The results of such reviews are reported to certain members of our senior management, who evaluate material risks from cybersecurity threats against our overall business objectives and report to our board of directors, which evaluates our overall enterprise risk.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Within our senior management, our Chief Financial Officer and Chief Technology Officer (CTO) review our cybersecurity program at least quarterly. Our CTO is one of our founders and has been in technology since 1996. One of our board members has been employed with a cyber security company.