Annual report [Section 13 and 15(d), not S-K Item 405]

Cybersecurity Risk Management and Strategy Disclosure

v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Risk management and strategy

We have developed and maintain a cybersecurity risk management program that focuses primarily on securing and safeguarding computer systems, networks, cloud services, business applications, and data and that is integrated in our overall risk management strategy and framework. We have implemented protocols to protect against cyber threats and ensure the containment and security of sensitive business data, including ongoing security reviews of critical systems, continuous monitoring of event data, and employee training programs, which processes are aligned with our overall business and operational goals and strategies. Our risk assessment occurs on an ongoing basis and covers identification of risks that could act against the company’s objectives as well as specific risks related to a compromise to the security of data.

We engage a third-party to provide operational support for cybersecurity risks. This forms a critical part of our risk management strategy, facilitating effective management and mitigation of risks, and ensuring adherence to applicable regulatory and industry standards.

Overall, we believe that we have established a robust framework for confidentiality, integrity, and availability of information, adhering to relevant security standards, practices, and compliance requirements. In addition, we maintain insurance to help protect against risks associated with cybersecurity threats. As of the date of this report, we do not believe that any risks from cybersecurity threats have materially affected, or are reasonably likely to materially affect, us, including our business strategy, results of operations, or financial condition. However, despite our efforts, we cannot eliminate all risks from cybersecurity threats, or provide assurances that we have not experienced an undetected cybersecurity incident. For more information about these risks, please see “Item 1.A – Risk Factors – Risks Related to Our Business Operations – If our internal company cyber-security measures are breached or fail and unauthorized access is obtained to our IT environment, we may incur significant losses of data, which we may not be able to recover and may experience a delay in our ability to conduct our day-to-day business” in this Annual Report.

Cybersecurity Risk Management Processes Integrated [Text Block] We have developed and maintain a cybersecurity risk management program that focuses primarily on securing and safeguarding computer systems, networks, cloud services, business applications, and data and that is integrated in our overall risk management strategy and framework.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] As of the date of this report, we do not believe that any risks from cybersecurity threats have materially affected, or are reasonably likely to materially affect, us, including our business strategy, results of operations, or financial condition.
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]

Governance

Our board of directors provides oversight of our cybersecurity program and helps guide our strategy for managing cybersecurity risks in the context of our overall risk management system. Our cybersecurity program is managed by our Deputy Chief Executive Officer and Chief Financial Officer and our external IT team, who are responsible for leading enterprise-wide cybersecurity execution, protocols, framework, standards and processes. Our Deputy Chief Executive Officer and Chief Financial Officer has extensive operational responsibility for IT, of more than seven years, and he manages our external IT team,

The Deputy Chief Executive Officer and Chief Financial Officer reports to our board of directors, as well as our Chief Executive Officer and other members of senior management as appropriate.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our board of directors provides oversight of our cybersecurity program and helps guide our strategy for managing cybersecurity risks in the context of our overall risk management system.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Our board of directors provides oversight of our cybersecurity program and helps guide our strategy for managing cybersecurity risks in the context of our overall risk management system.
Cybersecurity Risk Role of Management [Text Block] Our board of directors provides oversight of our cybersecurity program and helps guide our strategy for managing cybersecurity risks in the context of our overall risk management system. Our cybersecurity program is managed by our Deputy Chief Executive Officer and Chief Financial Officer and our external IT team, who are responsible for leading enterprise-wide cybersecurity execution, protocols, framework, standards and processes. Our Deputy Chief Executive Officer and Chief Financial Officer has extensive operational responsibility for IT, of more than seven years, and he manages our external IT team
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our cybersecurity program is managed by our Deputy Chief Executive Officer and Chief Financial Officer and our external IT team, who are responsible for leading enterprise-wide cybersecurity execution, protocols, framework, standards and processes
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our Deputy Chief Executive Officer and Chief Financial Officer has extensive operational responsibility for IT, of more than seven years, and he manages our external IT team