v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Cybersecurity Implementation

We have established a comprehensive cybersecurity risk management program aimed at safeguarding the confidentiality, integrity, and availability of our critical IT systems and data. This involves utilizing various security tools and techniques, such as penetration test and vulnerability scanning programs conducted by the respective outsourced cybersecurity service provider, to proactively identify, investigate, contain and recover from potential vulnerabilities and security incidents.

Our cybersecurity risk management program is built based on the National Institute of Standards and Technology Cybersecurity Framework integrates with our broader enterprise risk management framework, utilizing consistent methodologies and reporting channels across all risk domains. Oversight of this program falls under the purview of our IT team, which ultimately reports to the Audit Committee.

Our cybersecurity risk management program includes:

an Information Security Policy outlining practices for maintaining confidence in our business and safeguarding information;
utilization of internal and external resources for security assessments and audits;
annual external audits and penetration tests for our systems;
mandatory cybersecurity training for all employees and management;
a comprehensive incident response plan for assessing, responding to, and resolving cybersecurity incidents; and
a vendor assessment program to mitigate cybersecurity risks from third-party service providers, including contractual obligations for prompt reporting of security incidents or risks.

As of the date of this report, the Company is not aware of any risks from cybersecurity threats that have materially affected or are reasonably likely to materially affect the Company, including its business strategy, results of operations, or financial condition. However, there can be no assurance that we will not be materially affected by such risks in the future. For information on the cybersecurity threats and risks we face and the potential impacts on the business related thereto, see “Item 3. Key Information—D. Risk Factors—Risks Relating to Our Business and Industry—A data security or privacy breach could damage our reputation and our relationships with our customers or employees, expose us to litigation risk, and adversely affect our business.”

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block]

Our cybersecurity risk management program includes:

an Information Security Policy outlining practices for maintaining confidence in our business and safeguarding information;
utilization of internal and external resources for security assessments and audits;
annual external audits and penetration tests for our systems;
mandatory cybersecurity training for all employees and management;
a comprehensive incident response plan for assessing, responding to, and resolving cybersecurity incidents; and
a vendor assessment program to mitigate cybersecurity risks from third-party service providers, including contractual obligations for prompt reporting of security incidents or risks.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Our board of directors oversees cybersecurity risk and has assigned the Audit Committee to manage our cybersecurity risk management program. The Audit Committee receives regular updates on these programs from management, along with related trends or metrics.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Audit Committee
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] The Audit Committee receives regular updates on these programs from management, along with related trends or metrics.
Cybersecurity Risk Role of Management [Text Block] Our Deputy Chief Technology Officer provides regular updates on program status, key issues, priorities, and challenges to the Audit Committee. Our Deputy Chief Technology Officer has extensive experience in the areas of information security and cybersecurity risk management, who is supported by a team of experienced information systems security professionals specializing in network security, application security, data protection, and incident response. Additionally, management informs our board of directors about significant cybersecurity incidents, while also providing briefings on program components and important risk or compliance matters
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our Deputy Chief Technology Officer
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our Deputy Chief Technology Officer has extensive experience in the areas of information security and cybersecurity risk management, who is supported by a team of experienced information systems security professionals specializing in network security, application security, data protection, and incident response.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] Our Deputy Chief Technology Officer provides regular updates on program status, key issues, priorities, and challenges to the Audit Committee.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true