Annual report [Section 13 and 15(d), not S-K Item 405]

Cybersecurity Risk Management and Strategy Disclosure

v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
We maintain robust cybersecurity protocols designed to identify, assess, manage, mitigate, and respond to cybersecurity threats. The Audit Committee of the Board of Directors oversees management’s adherence to, and implementation of, the cybersecurity protocols and receives periodic updates on the Company’s cybersecurity risks. Our cybersecurity protocols and related processes are integrated into our overall enterprise risk management (ERM) process. We use the COSO Framework as a framework for our Cybersecurity Policy.
Third parties also play a role in our cybersecurity. We engage third-party services to evaluate our security controls. Such evaluations include testing both the design and operational effectiveness of security controls. We also have processes to oversee and identify cybersecurity threats associated with our use of third-party service providers. Prior to engaging a third-party service provider, we carefully evaluate their cybersecurity reputation and track record, industry reports, and any potential information that they would have access to in the course of their work with us.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]
We maintain robust cybersecurity protocols designed to identify, assess, manage, mitigate, and respond to cybersecurity threats. The Audit Committee of the Board of Directors oversees management’s adherence to, and implementation of, the cybersecurity protocols and receives periodic updates on the Company’s cybersecurity risks. Our cybersecurity protocols and related processes are integrated into our overall enterprise risk management (ERM) process. We use the COSO Framework as a framework for our Cybersecurity Policy.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] As of December 31, 2024, no risks from cybersecurity threats, including as a result of cybersecurity incidents we have experienced in the past, have materially affected or are reasonably likely to materially affect the Company, including its business strategy, results of operations, or financial condition.Our Board of Directors is involved in the design, implementation, and evaluation of our cybersecurity protocols. Particularly, our Audit Committee receives regular and frequent reports on the existence of cybersecurity threats, and works with management to devise appropriate measures to mitigate risks.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our Board of Directors is involved in the design, implementation, and evaluation of our cybersecurity protocols. Particularly, our Audit Committee receives regular and frequent reports on the existence of cybersecurity threats, and works with management to devise appropriate measures to mitigate risks.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block]
Our Board of Directors is involved in the design, implementation, and evaluation of our cybersecurity protocols. Particularly, our Audit Committee receives regular and frequent reports on the existence of cybersecurity threats, and works with management to devise appropriate measures to mitigate risks.

Staying Updated with Cybersecurity

The Company goes through a quarterly systems penetration test, using an independent third-party vendor, that finds new possible vulnerabilities in the system with recommendations to mitigate each vulnerability. With those recommendations, we schedule those fixes via our development team to resolve the vulnerabilities as soon as possible.
Cybersecurity Risk Role of Management [Text Block]
Our Board of Directors is involved in the design, implementation, and evaluation of our cybersecurity protocols. Particularly, our Audit Committee receives regular and frequent reports on the existence of cybersecurity threats, and works with management to devise appropriate measures to mitigate risks.

Staying Updated with Cybersecurity

The Company goes through a quarterly systems penetration test, using an independent third-party vendor, that finds new possible vulnerabilities in the system with recommendations to mitigate each vulnerability. With those recommendations, we schedule those fixes via our development team to resolve the vulnerabilities as soon as possible.

Mitigation, System Recovery, Redundancy and Continuity

As a process of mitigation, redundancy, and recovery, we keep multiple temporal copies of our databases and code base in multiple places, both on cloud and offline. We have a completed automated system deploy, which allows us to ‘revive’ our entire systems, via code (using a concept of infrastructure as code) in any cloud (or even physical servers) of our choice.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our Board of Directors is involved in the design, implementation, and evaluation of our cybersecurity protocols. Particularly, our Audit Committee receives regular and frequent reports on the existence of cybersecurity threats, and works with management to devise appropriate measures to mitigate risks.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our Board of Directors is involved in the design, implementation, and evaluation of our cybersecurity protocols. Particularly, our Audit Committee receives regular and frequent reports on the existence of cybersecurity threats, and works with management to devise appropriate measures to mitigate risks.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] As of December 31, 2024, no risks from cybersecurity threats, including as a result of cybersecurity incidents we have experienced in the past, have materially affected or are reasonably likely to materially affect the Company, including its business strategy, results of operations, or financial condition.Our Board of Directors is involved in the design, implementation, and evaluation of our cybersecurity protocols. Particularly, our Audit Committee receives regular and frequent reports on the existence of cybersecurity threats, and works with management to devise appropriate measures to mitigate risks.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true