Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2024 | ||||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management, Strategy, and Governance [Abstract] | ||||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] |
Cybersecurity
is an important aspect of our business operations, and we are committed to protecting our systems, data, and the information of our clients
and stakeholders. We recognize that cybersecurity threats are constantly evolving and that maintaining robust security measures is an
ongoing process. Below is an overview of our cybersecurity risk management and the measures we have in place:
While we believe that our current cybersecurity measures are robust, we recognize that the cybersecurity landscape is constantly evolving, and we remain vigilant in monitoring and adapting our practices to address emerging threats. We are committed to maintaining the confidentiality, integrity, and availability of our systems and data and to protecting the interests of our clients and stakeholders. |
|||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management Processes Integrated [Flag] | true | |||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management Processes Integrated [Text Block] | While we believe that our current cybersecurity measures are robust, we recognize that the cybersecurity landscape is constantly evolving, and we remain vigilant in monitoring and adapting our practices to address emerging threats. We are committed to maintaining the confidentiality, integrity, and availability of our systems and data and to protecting the interests of our clients and stakeholders. | |||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true | |||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Board of Directors Oversight [Text Block] | Our Board of Directors and senior management are actively involved in overseeing our cybersecurity policies and practices and managing those responsible for coordinating and implementing cybersecurity initiatives across the organization. | |||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | Board of Directors and senior management are actively involved in overseeing our cybersecurity policies | |||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | We conduct risk assessments to identify potential cybersecurity threats and vulnerabilities. This includes evaluating the likelihood and potential impact of various threats, such as data breaches, malware attacks, and insider threats. Based on these risk assessments, we develop and implement risk management strategies to mitigate identified risks. |