Annual report [Section 13 and 15(d), not S-K Item 405]

Cybersecurity Risk Managment, Stratergy and Governance

v3.25.1
Cybersecurity Risk Managment, Stratergy and Governance
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

ITEM 1C. CYBERSECURITY

 

Risk Management and Strategy

 

We periodically assess risks from cybersecurity threats; monitor our information systems for potential vulnerabilities; and test those systems pursuant to our cybersecurity processes, and practices as part of our overall risk management program. To protect our information systems from cybersecurity threats, we use various security tools that are designed to help identify, escalate, investigate, resolve, and recover from security incidents in a timely manner. Our senior management, in consultation with our third-party information technology, or IT, vendor assesses risks based on probability and potential impact to our business and information systems and processes. Any identified risks that are considered high are monitored and tracked as part of our overall risk management program overseen by our board of directors.

We collaborate with our third-party IT vendor to assess the effectiveness of our cybersecurity prevention and response systems and processes and have not had a need to utilize cybersecurity assessors, consultants or other external cybersecurity experts to assist in the identification, verification, and validation of cybersecurity risks or to support any necessary mitigation plans.

Neither cybersecurity incidents nor cybersecurity threats have materially affected our company, including our business strategy, results of operations, or financial condition. We are not aware of any cybersecurity threats that are reasonably likely to materially affect our company. Refer to the risk factor captioned “Our business and operations may be adversely affected by information technology (“IT”) system failures or cybersecurity or data breaches” in Part I, Item 1A. "Risk Factors" for additional description of cybersecurity risks and potential related impacts on our Company.

Governance

 

Our board of directors oversees our risk management process, including as it pertains to cybersecurity risks.

 

We take a risk-based approach to cybersecurity and have implemented cybersecurity policies and measures in collaboration with our IT vendor that are designed to address cybersecurity threats and incidents. Our IT vendor with oversight from our Chief Executive Officer, Mr. Lee, is currently responsible for the establishment and maintenance of our cybersecurity program, as well as the assessment and management of cybersecurity risks. Our IT vendor has over 25 years of

experience in information security and possesses the requisite expertise and experience expected of such an individual given our company’s risk profile.

Mr. Lee provides periodic updates on any cybersecurity incidents and threats to our Board of Directors and to the Audit Committee of our board of directors as such incidents may arise.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] We periodically assess risks from cybersecurity threats; monitor our information systems for potential vulnerabilities; and test those systems pursuant to our cybersecurity processes, and practices as part of our overall risk management program. To protect our information systems from cybersecurity threats, we use various security tools that are designed to help identify, escalate, investigate, resolve, and recover from security incidents in a timely manner.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] Neither cybersecurity incidents nor cybersecurity threats have materially affected our company, including our business strategy, results of operations, or financial condition. We are not aware of any cybersecurity threats that are reasonably likely to materially affect our company.
Cybersecurity Risk Board of Directors Oversight [Text Block]

Our board of directors oversees our risk management process, including as it pertains to cybersecurity risks.

 

We take a risk-based approach to cybersecurity and have implemented cybersecurity policies and measures in collaboration with our IT vendor that are designed to address cybersecurity threats and incidents. Our IT vendor with oversight from our Chief Executive Officer, Mr. Lee, is currently responsible for the establishment and maintenance of our cybersecurity program, as well as the assessment and management of cybersecurity risks. Our IT vendor has over 25 years of

experience in information security and possesses the requisite expertise and experience expected of such an individual given our company’s risk profile.

Mr. Lee provides periodic updates on any cybersecurity incidents and threats to our Board of Directors and to the Audit Committee of our board of directors as such incidents may arise.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our board of directors oversees our risk management process, including as it pertains to cybersecurity risks.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] , is currently responsible for the establishment and maintenance of our cybersecurity program, as well as the assessment and management of cybersecurity risks
Cybersecurity Risk Role of Management [Text Block]

We take a risk-based approach to cybersecurity and have implemented cybersecurity policies and measures in collaboration with our IT vendor that are designed to address cybersecurity threats and incidents. Our IT vendor with oversight from our Chief Executive Officer, Mr. Lee, is currently responsible for the establishment and maintenance of our cybersecurity program, as well as the assessment and management of cybersecurity risks. Our IT vendor has over 25 years of

experience in information security and possesses the requisite expertise and experience expected of such an individual given our company’s risk profile.

Mr. Lee provides periodic updates on any cybersecurity incidents and threats to our Board of Directors and to the Audit Committee of our board of directors as such incidents may arise.

Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] We take a risk-based approach to cybersecurity and have implemented cybersecurity policies and measures in collaboration with our IT vendor that are designed to address cybersecurity threats and incidents.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our IT vendor has over 25 years of

experience in information security and possesses the requisite expertise and experience expected of such an individual given our company’s risk profile.

Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]

Mr. Lee provides periodic updates on any cybersecurity incidents and threats to our Board of Directors and to the Audit Committee of our board of directors as such incidents may arise.

Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true