Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2024 | |
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | We have developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information. Our cybersecurity risk management program includes a cybersecurity incident response plan. We design and assess our program based on the International Organization for Standardization (“ISO”) 27001 requirements. This does not imply that we meet any particular technical standards, specifications, or requirements, only that we use the ISO 27001 requirements as a guide to help us identify, assess, and manage cybersecurity risks relevant to our business. Our cybersecurity risk management program is integrated into our overall enterprise risk management program, and shares common methodologies, reporting channels and governance processes that apply across the enterprise risk management program to other legal, compliance, strategic, operational, and financial risk areas. Our cybersecurity risk management program includes: •risk assessments designed to help identify material cybersecurity risks to our critical systems, information, products, services, and our broader enterprise IT environment; •a dedicated information security team principally responsible for managing (1) our cybersecurity risk assessment processes, (2) our security controls, and (3) our response to cybersecurity incidents; •the use of external service providers, where appropriate, to assess, test or otherwise assist with aspects of our security controls; •cybersecurity awareness training of our employees, incident response personnel, and senior management; •a cybersecurity incident response plan that includes procedures for responding to cybersecurity incidents; and •a third-party risk management process for service providers, suppliers, and vendors. We have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected us, including our operations, business strategy, financial condition, or results of operations. We face risks from cybersecurity threats that, if realized, are reasonably likely to materially affect us, including our operations, business strategy, financial condition, or results of operations. See Part I, Item 1A. “Risk Factors—Risks Relating to Our Business and Industry – Security breaches of our IT Systems, improper or unauthorized access to or disclosure of our Confidential Information, other hacking and social engineering or phishing attacks on our IT Systems or service, or other cyber incidents could disrupt our services or compromise Confidential Information related to our business and expose us to liability, which could harm our reputation and materially adversely affect our business.”.
|
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | We have developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information. Our cybersecurity risk management program includes a cybersecurity incident response plan. We design and assess our program based on the International Organization for Standardization (“ISO”) 27001 requirements. This does not imply that we meet any particular technical standards, specifications, or requirements, only that we use the ISO 27001 requirements as a guide to help us identify, assess, and manage cybersecurity risks relevant to our business. Our cybersecurity risk management program is integrated into our overall enterprise risk management program, and shares common methodologies, reporting channels and governance processes that apply across the enterprise risk management program to other legal, compliance, strategic, operational, and financial risk areas.
|
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Our Board has ultimate oversight of cybersecurity risk and is assisted by its Audit Committee (the "Committee"), which regularly reviews our cybersecurity program with management and reports to the Board. Cybersecurity reviews by the Committee generally occur quarterly or more frequently as determined to be necessary or advisable. Committee members also receive presentations on cybersecurity topics and trends from our Information Security Management Leader, internal cybersecurity staff or external experts as part of the Committee's continuing education on topics that impact public companies. Our management team oversees our cybersecurity risk management through our Information Security Management System Governance Council, which is chaired by our Information Security Management Leader and includes our Chief Technology Officer, Chief Engineering Officer, and General Counsel, along with employee subject matter experts in law, privacy, engineering, and cybersecurity. This Governance Council also includes the leader of our dedicated Information Security Team, who has over six years of specific cybersecurity experience, manages the day-to-day activities needed to prevent, detect, and mitigate cybersecurity incidents, and reports to senior management through the Governance Council. Our management team supervises efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include briefings from internal security personnel; threat intelligence and other information obtained from governmental, public or private sources, including external consultants engaged by us; and alerts and reports produced by security tools deployed in the IT environment.
|
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our Board has ultimate oversight of cybersecurity risk and is assisted by its Audit Committee (the "Committee"), which regularly reviews our cybersecurity program with management and reports to the Board. |
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | Committee members also receive presentations on cybersecurity topics and trends from our Information Security Management Leader, internal cybersecurity staff or external experts as part of the Committee's continuing education on topics that impact public companies. |
| Cybersecurity Risk Role of Management [Text Block] | Our management team oversees our cybersecurity risk management through our Information Security Management System Governance Council, which is chaired by our Information Security Management Leader and includes our Chief Technology Officer, Chief Engineering Officer, and General Counsel, along with employee subject matter experts in law, privacy, engineering, and cybersecurity. This Governance Council also includes the leader of our dedicated Information Security Team, who has over six years of specific cybersecurity experience, manages the day-to-day activities needed to prevent, detect, and mitigate cybersecurity incidents, and reports to senior management through the Governance Council. Our management team supervises efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include briefings from internal security personnel; threat intelligence and other information obtained from governmental, public or private sources, including external consultants engaged by us; and alerts and reports produced by security tools deployed in the IT environment.
|
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | Our management team oversees our cybersecurity risk management through our Information Security Management System Governance Council, which is chaired by our Information Security Management Leader and includes our Chief Technology Officer, Chief Engineering Officer, and General Counsel, along with employee subject matter experts in law, privacy, engineering, and cybersecurity. |
| Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | This Governance Council also includes the leader of our dedicated Information Security Team, who has over six years of specific cybersecurity experience, manages the day-to-day activities needed to prevent, detect, and mitigate cybersecurity incidents, and reports to senior management through the Governance Council. |
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Our management team supervises efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include briefings from internal security personnel; threat intelligence and other information obtained from governmental, public or private sources, including external consultants engaged by us; and alerts and reports produced by security tools deployed in the IT environment.
|
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |