XML 29 R10.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Cybersecurity

 

The Trust, through its service providers, has processes in place to assess, identify and manage material risks from cybersecurity threats. The Trust’s business is dependent on the communications and information systems of the Trustee, the Sponsor, the Custodian and other third-party service providers. The Trustee is responsible for day-to-day administration of the Trust and has implemented a cybersecurity program that applies to the Trustee and its business, including the administration of the Trust.

 

Cybersecurity Program Overview

 

The Trustee has instituted a cybersecurity program designed to identify, assess and mitigate cyber risks applicable to the administration by the Trustee of the Trust. The cyber risk management program involves risk assessments, implementation of security measures and ongoing monitoring of systems and networks, including networks on which the Trust relies. The Trustee actively monitors the current threat landscape to seek to identify material risks arising from new and evolving cybersecurity threats, including material risks faced by the Trust.

 

The Trust relies on the Trustee, the Sponsor and the Custodian to engage external experts, including cybersecurity assessors, risk management and information technology professionals, attorneys, consultants and auditors to evaluate cybersecurity measures and risk management processes, including those applicable to the Trust.

 

 

Assessment of Cybersecurity Risk

 

The potential impact of risks from cybersecurity threats to the Trust are assessed by the Trustee, the Sponsor, the Custodian and third-party service providers on an ongoing basis, and how such risks could materially affect the Trust’s objective, operational results and financial condition are regularly evaluated. During the reporting period, the Trustee has not identified any risks from cybersecurity threats, including as a result of previous cybersecurity incidents, that the Trustee believes have materially affected, or are reasonably likely to materially affect, the Trust, including its objective, operational results and financial condition.

Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] During the reporting period, the Trustee has not identified any risks from cybersecurity threats, including as a result of previous cybersecurity incidents, that the Trustee believes have materially affected, or are reasonably likely to materially affect, the Trust, including its objective, operational results and financial condition.
Cybersecurity Risk Board of Directors Oversight [Text Block]

Board Oversight of Cybersecurity Risks

 

The Trust has no board of trustees and is administered by the Trustee pursuant to the Trust Agreement. Accordingly, the Trust relies on the Trustee, the Sponsor and the Custodian for oversight of cybersecurity risks applicable to the Trust.

 

Management’s Role in Cybersecurity Risk Management

 

The Trust has no officers or employees and is administered by the Trustee pursuant to the Trust Agreement. Accordingly, the Trust relies on the Trustee, the Sponsor and the Custodian for management of cybersecurity risks applicable to the Trust.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Trust has no board of trustees and is administered by the Trustee pursuant to the Trust Agreement. Accordingly, the Trust relies on the Trustee, the Sponsor and the Custodian for oversight of cybersecurity risks applicable to the Trust.
Cybersecurity Risk Role of Management [Text Block] The Trust has no officers or employees and is administered by the Trustee pursuant to the Trust Agreement. Accordingly, the Trust relies on the Trustee, the Sponsor and the Custodian for management of cybersecurity risks applicable to the Trust.