Annual report [Section 13 and 15(d), not S-K Item 405]

Cybersecurity Risk Management and Strategy Disclosure

v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management Strategy And Governance [Abstract]  
Cybersecurity Risk Management Processes For Assessing Identifying And Managing Threats [Text Block]

Risk Management and Strategy

We recognize the importance of assessing, identifying, and managing risks to the security, confidentiality, integrity, and availability of our business systems and confidential information, including personal information and intellectual property. We have developed a cybersecurity risk management program in accordance with our risk profile and business. Leveraging the support of a third-party information technology provider, our cybersecurity risk management program includes cybersecurity awareness training for employees and periodic systems monitoring and vulnerability scanning.

We have not identified cybersecurity incidents or threats that have materially affected us or are reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition. However, like other companies in our industry, we and our third-party vendors may from time to time experience threats that could affect our information or systems. For more information, please see the section entitled “Risk Factors” in this Annual Report on Form 10-K.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] We recognize the importance of assessing, identifying, and managing risks to the security, confidentiality, integrity, and availability of our business systems and confidential information, including personal information and intellectual property. We have developed a cybersecurity risk management program in accordance with our risk profile and business.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected Or Reasonably Likely To Materially Affect Registrant [Flag] false
Cybersecurity Risk Board Of Directors Oversight [Text Block]

The Board exercises oversight of risks from cybersecurity threats primarily through its Audit Committee. Our Vice President, Finance, with input of other members of Company management and the Company’s information technology provider, periodically makes presentations to the Audit Committee on the Company’s enterprise risk management program, which may address cybersecurity risks and related cyber strategy, as applicable.

Cybersecurity Risk Board Committee Or Subcommittee Responsible For Oversight [Text Block] Audit Committee
Cybersecurity Risk Process For Informing Board Committee Or Subcommittee Responsible For Oversight [Text Block] Our Vice President, Finance, with input of other members of Company management and the Company’s information technology provider, periodically makes presentations to the Audit Committee on the Company’s enterprise risk management program, which may address cybersecurity risks and related cyber strategy, as applicable.
Cybersecurity Risk Role Of Management [Text Block]

Governance Related to Cybersecurity Risks

Our Vice President, Finance and Chief Executive Officer, with the assistance of the Company’s third-party information technology provider, are responsible for the strategic leadership and direction of the Company’s cybersecurity program.

Cybersecurity Risk Management Positions Or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions Or Committees Responsible [Text Block] Vice President, Finance and Chief Executive Officer
Cybersecurity Risk Process For Informing Management Or Committees Responsible [Text Block] Our Vice President, Finance, with input of other members of Company management and the Company’s information technology provider, periodically makes presentations to the Audit Committee on the Company’s enterprise risk management program, which may address cybersecurity risks and related cyber strategy, as applicable.