Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2024 | |||||||||||
Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |||||||||||
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] |
We
are committed to protecting the confidentiality, integrity, and availability of its information systems and the data they contain from
cybersecurity threats. We acknowledge that cybersecurity is a dynamic and evolving area of risk that requires ongoing assessment, management,
and oversight. As we grow in size and revenue, we intend to work with third party companies to assess, identify, manage, and mitigate
material cybersecurity threats, as well as to respond to and recover from cybersecurity incidents, all as necessary. We recognize the importance of maintaining our technology and data systems. Our cybersecurity policies, standards, processes, and practices are integrated across our operational departments.
Cybersecurity Risk Management and Strategy
As one of the elements of our overall risk management program, we focus on the following key areas:
Technical Safeguards: We have commenced to implement technical safeguards, including but not limited to firewalls, anti-malware functionality and access controls.
Outside Consultants: We have identified and, as appropriate and when we have the budget to do so, will utilize outside consultants, including contractors and other third parties, to among other things, conduct regular testing of our networks and systems to identify vulnerabilities through penetration testing, while also measuring and advising on potential improvements to our incident prevention, response, and documentation procedures.
We have not encountered cybersecurity threats or experienced previously cybersecurity incidents that have materially affected or that we believe are reasonably likely to materially affect us, including our business strategy, results of operations or financial condition. |
||||||||||
Cybersecurity Risk Management Processes Integrated [Flag] | true | ||||||||||
Cybersecurity Risk Management Third Party Engaged [Flag] | true | ||||||||||
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true | ||||||||||
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false | ||||||||||
Cybersecurity Risk Board of Directors Oversight [Text Block] |
Board
of Directors OversightOur
Board is aware of the critical nature of managing risks associated with cybersecurity threats. Management works with our Board to establish
oversight mechanisms to ensure effective governance in managing risks associated with cybersecurity threats because we recognize the
significance of these threats to our operational integrity and stakeholder confidence. The Board has delegated to our Audit Committee
the primary responsibility for oversight of cybersecurity risks.
Management’s Role Managing Risk
Our Executive Team plays a primary role in informing the Audit Committee on cybersecurity risks. These individuals monitor activity and potential risks related to the day-to-day operations of the business, including reviewing results of the work of our outside consultants. They will provide briefings to the Audit Committee on a periodic basis regarding cybersecurity matters, including but not limited to the following:
|
||||||||||
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Board has delegated to our Audit Committee the primary responsibility for oversight of cybersecurity risks. | ||||||||||
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | Management works with our Board to establish oversight mechanisms to ensure effective governance in managing risks associated with cybersecurity threats because we recognize the significance of these threats to our operational integrity and stakeholder confidence. | ||||||||||
Cybersecurity Risk Role of Management [Text Block] | Executive Team plays a primary role in informing the Audit Committee on cybersecurity risks | ||||||||||
Cybersecurity Risk Board of Directors Oversight [Text Block] |
Board
of Directors OversightOur
Board is aware of the critical nature of managing risks associated with cybersecurity threats. Management works with our Board to establish
oversight mechanisms to ensure effective governance in managing risks associated with cybersecurity threats because we recognize the
significance of these threats to our operational integrity and stakeholder confidence. The Board has delegated to our Audit Committee
the primary responsibility for oversight of cybersecurity risks.
Management’s Role Managing Risk
Our Executive Team plays a primary role in informing the Audit Committee on cybersecurity risks. These individuals monitor activity and potential risks related to the day-to-day operations of the business, including reviewing results of the work of our outside consultants. They will provide briefings to the Audit Committee on a periodic basis regarding cybersecurity matters, including but not limited to the following:
|