XML 36 R12.htm IDEA: XBRL DOCUMENT v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] We recognize the importance of assessing, identifying, and managing cybersecurity risks. These include operational vulnerabilities, intellectual property theft, fraud, extortion, potential harm to stakeholders, regulatory compliance issues, and associated legal, financial, and reputational consequences.

 

In partnership with external consultants, we maintain comprehensive information security processes to identify and mitigate material cybersecurity risks. Our protective measures include:

 

Technical, physical, and organizational safeguards
Disaster recovery and business continuity planning
Data encryption and network security controls
Access restrictions and physical security measures
Comprehensive asset management
Continuous systems monitoring
Employee security training

 

Our assessment to date shows that cybersecurity incidents and vulnerabilities have not materially impacted our business operations, financial performance, or strategic direction.

 

Our ongoing monitoring and evaluation have not identified any cybersecurity risks that are expected to significantly affect our operational capabilities, financial condition, or business objectives in the foreseeable future.

 
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] recognize the importance of assessing, identifying, and managing cybersecurity risks. These include operational vulnerabilities, intellectual property theft, fraud, extortion, potential harm to stakeholders, regulatory compliance issues, and associated legal, financial, and reputational consequences
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] true
Cybersecurity Risk Board of Directors Oversight [Text Block] Our corporate IT infrastructure, communication networks, and related systems are essential operational components. These systems manage product development, internal and external communications, accounting functions, data storage, and other critical operations. Our business depends on secure handling of proprietary, confidential, and sensitive data.

 

Our Chief Financial Officer oversees information security efforts in conjunction with a third-party IT services company and reports material cybersecurity matters to the Chief Executive Officer and Board of Directors.

 
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Chief Financial Officer oversees information security efforts in conjunction with a third-party IT services company and reports material cybersecurity matters to the Chief Executive Officer and Board of Directors
Cybersecurity Risk Board of Directors Oversight [Text Block] Our corporate IT infrastructure, communication networks, and related systems are essential operational components. These systems manage product development, internal and external communications, accounting functions, data storage, and other critical operations. Our business depends on secure handling of proprietary, confidential, and sensitive data.

 

Our Chief Financial Officer oversees information security efforts in conjunction with a third-party IT services company and reports material cybersecurity matters to the Chief Executive Officer and Board of Directors.