Annual report [Section 13 and 15(d), not S-K Item 405]

Risk Management and Strategy

v3.25.0.1
Risk Management and Strategy
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Risk Management and Strategy

 

Risk Management and Strategy

 

We have implemented a cybersecurity process that is designed to assess, identify, manage and govern material risks from cybersecurity threats and requires a firewall for outside connections. We operate a closed server in a locked room and regularly examine cybersecurity threats that could compromise our information system’s security or data and otherwise maintain our cybersecurity policies and procedures in accordance with industry standard control frameworks and applicable regulations, laws, and standards.

 

We regularly check and improve our security measures and educate our employees about such measures with the help of our information technology (IT) team. Key personnel are made aware of our cybersecurity process through trainings.

 

We do not engage third party professionals or disclose our internal security measures to private parties.

 

We have never experienced a cybersecurity incident that was determined to be material, although, like many technology-dependent companies operating in the current environment, we have experienced cybersecurity incidents in the past.  For additional information regarding whether any risks from cybersecurity threats are reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition, please see the section titled “Risk Factors.