Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
---|---|
Dec. 31, 2024 | |
Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] |
We have developed and maintain a cybersecurity risk management program, consisting of cybersecurity policies, procedures, compliance and awareness programs to mitigate risk and to ensure compliance with security, availability and confidentiality trust principles. The cybersecurity process has been integrated into our overall risk management system and process, and is solely internally managed. Management is responsible for identifying risks that threaten achievement of the control activities stated in the management’s description of the services organizations systems. Management has implemented a process for identifying relevant risks that could affect the organization’s ability to provide secure and reliable service to its users. The risk assessment occurs annually, or as business needs change, and covers identification of risks that could act against the Company’s objectives as well as specific risks related to a compromise to the security of data. See “Item 3.D — Risk Factors — Risks Related to Our Business Operations— Our business and operations would suffer in the event of computer system failures or security breaches.” The level of each identified risk is determined by considering the impact of the risk itself and the likelihood of the risk materializing and high scoring risks are actioned upon. Risks are analyzed to determine whether the risk meets Company risk acceptance criteria to be accepted or whether a mitigation plan will be applied. Mitigation plans include both the individual or department responsible for the plan and may include budget considerations. The oversight of cybersecurity threats is undertaken by our information technology manager, supported by our management and external professional consultants. Our management is responsible for cybersecurity oversight and monitoring risk. As of the date of this report, we have not, to our knowledge, experienced any material IT system failures or any material cybersecurity attacks, and we are not aware of any material risks from cybersecurity threats that have materially affected or are reasonably likely to materially affect us, including our business strategy, results of operations or financial condition. |
Cybersecurity Risk Management Processes Integrated [Text Block] | The cybersecurity process has been integrated into our overall risk management system and process, and is solely internally managed. |
Cybersecurity Risk Management Processes Integrated [Flag] | true |
Cybersecurity Risk Role of Management [Text Block] | Management is responsible for identifying risks that threaten achievement of the control activities stated in the management’s description of the services organizations systems. |
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | Management has implemented a process for identifying relevant risks that could affect the organization’s ability to provide secure and reliable service to its users. |
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] |
The oversight of cybersecurity threats is undertaken by our information technology manager, supported by our management and external professional consultants. Our management is responsible for cybersecurity oversight and monitoring risk. |
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our management is responsible for cybersecurity oversight and monitoring risk. |
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] |
As of the date of this report, we have not, to our knowledge, experienced any material IT system failures or any material cybersecurity attacks, and we are not aware of any material risks from cybersecurity threats that have materially affected or are reasonably likely to materially affect us, including our business strategy, results of operations or financial condition. |
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |