XML 25 R7.htm IDEA: XBRL DOCUMENT v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

As an exploration company, we have limited digital operations and our business activity to date has been identifying, acquiring, and exploring mineral properties, and we have not yet adopted formal cybersecurity risk management programs or formal processes for assessing cybersecurity risks. We understand the importance of managing material risks from cybersecurity threats and are committed, as part of our continuing growth, to implementing and maintaining an adequate information security program to manage such risks and safeguard our systems and data.

 

We currently manage our cybersecurity risk through a variety of practices that are applicable to all users of our information technology and information assets, including our employees and contractors. We use a combination of technology, policies, training, and monitoring to promote security awareness and prevent security incidents.

 

We believe we have limited exposure to cyber threats other than emails and project data storage. Financial transactions are enabled through well-stablished financial institutions and accounting and employee information storage are outsourced to an external accounting firm.

 

We have not, as of the date of this prospectus, experienced a cybersecurity threat or incident in the last three years, that materially affected or is reasonably likely to affect our business, results of operations, or financial condition. However, there can be no guarantee that we will not experience such an incident in the future.

 

Our board of directors oversees cybersecurity risk as part of its role of overseeing enterprise-wide risk.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] As an exploration company, we have limited digital operations and our business activity to date has been identifying, acquiring, and exploring mineral properties, and we have not yet adopted formal cybersecurity risk management programs or formal processes for assessing cybersecurity risks. We understand the importance of managing material risks from cybersecurity threats and are committed, as part of our continuing growth, to implementing and maintaining an adequate information security program to manage such risks and safeguard our systems and data.
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] We have not, as of the date of this prospectus, experienced a cybersecurity threat or incident in the last three years, that materially affected or is reasonably likely to affect our business, results of operations, or financial condition. However, there can be no guarantee that we will not experience such an incident in the future.
Cybersecurity Risk Management Processes Integrated [Flag] true