Risk Management and Strategy |
12 Months Ended |
---|---|
Dec. 31, 2024 | |
Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |
Risk Management and Strategy |
Risk Management and Strategy
We have implemented a cybersecurity process that is designed to assess, identify, manage and govern material risks from cybersecurity threats and requires a firewall for outside connections. We operate a closed server in a locked room and regularly examine cybersecurity threats that could compromise our information system’s security or data and otherwise maintain our cybersecurity policies and procedures in accordance with industry standard control frameworks and applicable regulations, laws, and standards.
We regularly check and improve our security measures and educate our employees about such measures with the help of our information technology (IT) team. Key personnel are made aware of our cybersecurity process through trainings.
We do not engage third party professionals or disclose our internal security measures to private parties.
We have never experienced a cybersecurity incident that was determined to be material, although, like many technology-dependent companies operating in the current environment, we have experienced cybersecurity incidents in the past. For additional information regarding whether any risks from cybersecurity threats are reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition, please see the section titled “Risk Factors.” |