Annual report [Section 13 and 15(d), not S-K Item 405]

Cybersecurity Risk Management and Strategy Disclosure

v3.25.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] We have not experienced a material cybersecurity incident that has jeopardized the confidentiality, integrity, or availability of information systems or information residing in such information systems as defined under 17 C.F.R. § 229.106(a). If such an incident were to occur, we would work expeditiously to mitigate our damages as soon as such an incident is detected by implementing our risk management and cybersecurity plan in concert with our established cybersecurity response team. A cybersecurity incident would be reported to the Company’s Chairman of the Board and our general counsel, who would determine whether such incident or event was material. If such an incident or event is material, it would be reported to our Board of Directors and Audit Committee and the material aspects of the incident would be reported on Form 8-K.

 

The Company maintains cybersecurity risk management, disaster readiness, and business continuity protocols to anticipate potential threats and mitigate the probability of cybersecurity risks by establishing alerts, preemptive measures, and cybersecurity responses. We have set up information technology risk management alert programs that are routinely received and reviewed by management and our information technology professionals. We have implemented protocols and procedures to protect the privacy, safety, and security of our data and information technology. We routinely assess our cybersecurity risk while working in consultation with our information technology professionals. In addition to alerts, our information technology professionals provide risk management monitoring and support along with twenty-four-hour dedicated support for the Company. They possess expertise across multiple industries, including support of Department of Defense contractors in the United States. The Company does not share confidential information with outside third parties unless required by law or necessary for compliance purposes. In such instances, the Company utilizes encryption methods to protect confidential information. The Company ensures that such information is given to such third parties in a responsible manner that would not disclose such confidential information to unintended recipients. Due to the nature of the Company’s operations, the instance of the Company’s receipt of confidential information is minimal, infrequent, and immaterial.

 
Cybersecurity Risk Management Processes Integrated [Flag] false
Cybersecurity Risk Management Third Party Engaged [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Management oversees our cybersecurity risk and our disaster recovery and business continuity plan in order to consider, mitigate, and plan for the preemption of cybersecurity risks that may arise. Our assistant corporate secretary was formerly responsible for information technology, risk management, and cybersecurity at an Am Law 100 law firm
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] A cybersecurity incident would be reported to the Company’s Chairman of the Board and our general counsel, who would determine whether such incident or event was material. If such an incident or event is material, it would be reported to our Board of Directors and Audit Committee and the material aspects of the incident would be reported on Form 8-K.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true