XML 25 R10.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] We have implemented a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information. Our cybersecurity risk management program is an element of and is integrated into our overall enterprise risk management program. Our framework is informed in part by the National Institute of Standards and Technology (NIST) Cybersecurity Framework and International Organization for Standardization 27001 (ISO 27001) Framework, although we have not been audited to, and may not be in compliance with, all technical standards, specifications or requirements under the NIST or ISO 27001 frameworks. Our cybersecurity risk management program includes:
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] We have been, and expect to continue to be, subject to cybersecurity risks and incidents related to our business. To date, such risks and incidents have not materially affected our business strategy, results of operations or financial condition. For more information about the cybersecurity risks we face, see Item 1A – Risk Factors.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Board considers cybersecurity risk as part of its enterprise risk management oversight function. This oversight includes periodic reports from management, including our Vice President of IT, concerning cybersecurity related risks.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Board considers cybersecurity risk as part of its enterprise risk management oversight function. This oversight includes periodic reports from management, including our Vice President of IT, concerning cybersecurity related risks.
Cybersecurity Risk Role of Management [Text Block] Our management team, including our Vice President of IT, is responsible for assessing and managing risks from cybersecurity threats. Our Vice President of IT has extensive information technology and program management experience, including broad experience in corporate and consulting environments across a range of organizations and industries. Where appropriate, she engages external cybersecurity consultants to assist with cybersecurity related matters. Our management team has primary responsibility for our overall cybersecurity risk management program and, under the leadership of our Vice President of IT, supervises both our internal personnel and external cybersecurity consultants. Our program includes efforts to prevent, detect, mitigate, and remediate cybersecurity risks. These efforts employ information from various sources, such as security tools deployed in our IT environment, internal personnel, external security consultants, and governmental sources.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our management team, including our Vice President of IT, is responsible for assessing and managing risks from cybersecurity threats. Our Vice President of IT has extensive information technology and program management experience, including broad experience in corporate and consulting environments across a range of organizations and industries. Where appropriate, she engages external cybersecurity consultants to assist with cybersecurity related matters. Our management team has primary responsibility for our overall cybersecurity risk management program and, under the leadership of our Vice President of IT, supervises both our internal personnel and external cybersecurity consultants. Our program includes efforts to prevent, detect, mitigate, and remediate cybersecurity risks. These efforts employ information from various sources, such as security tools deployed in our IT environment, internal personnel, external security consultants, and governmental sources.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our management team, including our Vice President of IT, is responsible for assessing and managing risks from cybersecurity threats. Our Vice President of IT has extensive information technology and program management experience, including broad experience in corporate and consulting environments across a range of organizations and industries. Where appropriate, she engages external cybersecurity consultants to assist with cybersecurity related matters. Our management team has primary responsibility for our overall cybersecurity risk management program and, under the leadership of our Vice President of IT, supervises both our internal personnel and external cybersecurity consultants. Our program includes efforts to prevent, detect, mitigate, and remediate cybersecurity risks. These efforts employ information from various sources, such as security tools deployed in our IT environment, internal personnel, external security consultants, and governmental sources.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Our management team, including our Vice President of IT, is responsible for assessing and managing risks from cybersecurity threats. Our Vice President of IT has extensive information technology and program management experience, including broad experience in corporate and consulting environments across a range of organizations and industries. Where appropriate, she engages external cybersecurity consultants to assist with cybersecurity related matters. Our management team has primary responsibility for our overall cybersecurity risk management program and, under the leadership of our Vice President of IT, supervises both our internal personnel and external cybersecurity consultants. Our program includes efforts to prevent, detect, mitigate, and remediate cybersecurity risks. These efforts employ information from various sources, such as security tools deployed in our IT environment, internal personnel, external security consultants, and governmental sources.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true