XML 30 R11.htm IDEA: XBRL DOCUMENT v3.25.0.1
Cybersecurity
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity

Cybersecurity

 

The Trust, through its service providers, has processes in place to assess, identify and manage material risks from cybersecurity threats. The Trust’s business is dependent on the communications and information systems of the Trustee, the Sponsor, the Custodian and other third-party service providers. The Trustee is responsible for day-to-day administration of the Trust and has implemented a cybersecurity program that applies to the Trustee and its business, including the administration of the Trust.

 

Cybersecurity Program Overview

 

The Trustee has instituted a cybersecurity program designed to identify, assess and mitigate cyber risks applicable to the administration by the Trustee of the Trust. The cyber risk management program involves risk assessments, implementation of security measures and ongoing monitoring of systems and networks, including networks on which the Trust relies. The Trustee actively monitors the current threat landscape to seek to identify material risks arising from new and evolving cybersecurity threats, including material risks faced by the Trust.

 

The Trust relies on the Trustee, the Sponsor and the Custodian to engage external experts, including cybersecurity assessors, risk management and information technology professionals, attorneys, consultants and auditors to evaluate cybersecurity measures and risk management processes, including those applicable to the Trust.

 

 

Assessment of Cybersecurity Risk

 

The potential impact of risks from cybersecurity threats to the Trust are assessed by the Trustee, the Sponsor, the Custodian and third-party service providers on an ongoing basis, and how such risks could materially affect the Trust’s objective, operational results and financial condition are regularly evaluated. During the reporting period, the Trustee has not identified any risks from cybersecurity threats, including as a result of previous cybersecurity incidents, that the Trustee believes have materially affected, or are reasonably likely to materially affect, the Trust, including its objective, operational results and financial condition.