Annual report [Section 13 and 15(d), not S-K Item 405]

Cybersecurity Risk Management and Strategy Disclosure

v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Risk Management

 

We maintain infrastructure, systems, policies, and procedures designed to proactively and reactively address cybersecurity risks, including circumstances that may arise in connection with an unexpected cybersecurity incident. These processes are intended to assess, identify, and manage material risks from cybersecurity threats that could affect our information systems, data, and operations.

 

Our internal procedures provide for the ongoing evaluation and enhancement of our security controls and practices in response to evolving cybersecurity risks, technological developments, and applicable regulatory requirements. Cybersecurity risk management is integrated into our broader enterprise risk management and internal controls framework and is considered as part of our overall approach to operational and financial risk oversight.

 

We maintain cybersecurity and data privacy policies designed to address applicable data protection and privacy requirements and to support our ability to prevent, detect, respond to, mitigate, and recover from cybersecurity incidents. These policies are supported by tools embedded in IT infrastructure, internal monitoring, access control practices, employee awareness measures, and incident response procedures intended to protect our systems and information assets.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] We maintain cybersecurity and data privacy policies designed to address applicable data protection and privacy requirements and to support our ability to prevent, detect, respond to, mitigate, and recover from cybersecurity incidents. These policies are supported by tools embedded in IT infrastructure, internal monitoring, access control practices, employee awareness measures, and incident response procedures intended to protect our systems and information assets.
Cybersecurity Risk Board of Directors Oversight [Text Block]

Governance

 

Oversight of cybersecurity and information security matters, including the management and assessment of risks arising from cybersecurity threats, resides with the Audit Committee of the Board of Directors (the “Audit Committee”). The Audit Committee is responsible for overseeing the Company’s information security governance framework and periodically reviews the adequacy and effectiveness of the Company’s cybersecurity policies, practices, and internal controls designed to address information security risks.

 

Management is responsible for the day-to-day oversight and implementation of the Company’s cybersecurity program. Our cybersecurity and information security efforts are managed by a team of information technology professionals responsible for monitoring systems, identifying potential threats, and supporting the Company’s incident response and risk mitigation processes.

 

Management provides regular updates to the Audit Committee regarding the Company’s cybersecurity posture, including identified risks, mitigation activities, and any significant developments relating to cybersecurity threats or incidents. These updates include reports from our Chief Technology Officer, who has been designated by the Board to serve in the role of Chief Information Security Officer and is responsible for coordinating the Company’s cybersecurity strategy, policies, and procedures.

 

Management maintains a regular reporting cadence with the Audit Committee to ensure the Board remains informed regarding cybersecurity risk management, ongoing security initiatives, and any changes to the Company’s cybersecurity practices. This governance structure is intended to support transparency and oversight of cybersecurity risk management across the organization.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Oversight of cybersecurity and information security matters, including the management and assessment of risks arising from cybersecurity threats, resides with the Audit Committee of the Board of Directors (the “Audit Committee”).
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] The Audit Committee is responsible for overseeing the Company’s information security governance framework and periodically reviews the adequacy and effectiveness of the Company’s cybersecurity policies, practices, and internal controls designed to address information security risks.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Management provides regular updates to the Audit Committee regarding the Company’s cybersecurity posture, including identified risks, mitigation activities, and any significant developments relating to cybersecurity threats or incidents. These updates include reports from our Chief Technology Officer, who has been designated by the Board to serve in the role of Chief Information Security Officer and is responsible for coordinating the Company’s cybersecurity strategy, policies, and procedures.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true