Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2024 | ||||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management, Strategy, and Governance [Abstract] | ||||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] |
Risk
Management and StrategyWe
are committed to protecting information and the underlying information systems involved in the functionality of our products and the
operation of our business. We assess, identify, and manage material risks from cybersecurity threats through various processes and procedures,
including:
Although we are still in the process of developing a formal incident response plan, our team is trained and had practical experience to cover all phases of the incident management process, including identification, containment, eradication, recovery, and post-incident analysis. Significant cybersecurity incidents are elevated within the hierarchy of management and assessed by a cross-functional, executive management-level team, which is responsible for making the necessary strategic decisions, prioritizing actions that can minimize the impact of the cybersecurity incidents on us and our customers, and determining the materiality of such incidents.
In the past we were subject to attempts to compromise our information technology systems, and, like all information technology systems, our systems are potentially vulnerable to damage, unauthorized access, or interruption from a variety of sources. As of the date of this annual report on Form 10-K, we are not aware of any such attacks that have materially affected, or are reasonably likely to materially affect, us, including our business strategy, results of operations, or financial condition, but we cannot provide assurance that they will not be materially affected in the future by such risks or any future material incidents. In addition, our third-party service providers and other partners face similar cybersecurity threats, and although we assess these third parties’ cybersecurity controls through a cybersecurity assessment, which may include a cybersecurity questionnaire depending on our risk evaluation, and include security and privacy addendums to our contracts where applicable, a cybersecurity incident any of these entities could materially adversely affect our business and results of operations. For more information on our cybersecurity-related risks, please see “Risks Related to Information Technology and Intellectual Property” in “Part I. Item 1A. Risk Factors” of this annual report on Form 10-K. |
|||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management Processes Integrated [Flag] | true | |||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management Processes Integrated [Text Block] | We are committed to protecting information and the underlying information systems involved in the functionality of our products and the operation of our business. We assess, identify, and manage material risks from cybersecurity threats through various processes and procedures | |||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management Third Party Engaged [Flag] | true | |||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false | |||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Board of Directors Oversight [Text Block] |
Corporate
GovernanceCybersecurity
Risks Oversight by the Members of our Board
The Audit Committee has oversight responsibility for risks and incidents relating to cybersecurity threats as a part of its overall risk oversight responsibilities. Such responsibility includes compliance with disclosure requirements, cooperation with law enforcement, and analyzing the related effects on financial and other risks, and it reports any findings and recommendations, as appropriate, to the full board for consideration. The Audit Committee receives annual reports on our cybersecurity risks from management. In addition, management updates the Audit Committee, as necessary, regarding any material cybersecurity incidents, as well as any incidents with lesser impact potential.
Cybersecurity Risks Oversight by our Management
Our management team, including our Chief Information Security Officer (“CISO”), is responsible for addressing, assessing, and managing our material risks from cybersecurity threats. Our CISO supervises both our internal cybersecurity personnel and our retained external cybersecurity consultants (when applicable). Our management team’s experience includes demonstrated expertise in cybersecurity, mobile and data devices, and smartphone software. Our management team supervises efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include briefings from internal security personnel; threat intelligence, and other information obtained from governmental, public, or private sources, including external consultants engaged by us; and alerts and reports produced by security tools deployed in the information technology environment. |
|||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Audit Committee receives annual reports on our cybersecurity risks from management. In addition, management updates the Audit Committee, as necessary, regarding any material cybersecurity incidents, as well as any incidents with lesser impact potential. | |||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Audit Committee has oversight responsibility for risks and incidents relating to cybersecurity threats as a part of its overall risk oversight responsibilities. Such responsibility includes compliance with disclosure requirements, cooperation with law enforcement, and analyzing the related effects on financial and other risks, and it reports any findings and recommendations, as appropriate, to the full board for consideration. | |||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Role of Management [Text Block] | Our management team, including our Chief Information Security Officer (“CISO”), is responsible for addressing, assessing, and managing our material risks from cybersecurity threats. Our CISO supervises both our internal cybersecurity personnel and our retained external cybersecurity consultants (when applicable). Our management team’s experience includes demonstrated expertise in cybersecurity, mobile and data devices, and smartphone software. Our management team supervises efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include briefings from internal security personnel; threat intelligence, and other information obtained from governmental, public, or private sources, including external consultants engaged by us; and alerts and reports produced by security tools deployed in the information technology environment. | |||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true | |||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | management team, including our Chief Information Security Officer (“CISO”), is responsible for addressing, assessing, and managing our material risks from cybersecurity threats | |||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true | |||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | Our CISO supervises both our internal cybersecurity personnel and our retained external cybersecurity consultants (when applicable). Our management team’s experience includes demonstrated expertise in cybersecurity, mobile and data devices, and smartphone software. | |||||||||||||||||||||||||||||||||||||||
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Our management team supervises efforts to prevent, detect, mitigate, and remediate cybersecurity risks and incidents through various means, which may include briefings from internal security personnel; threat intelligence, and other information obtained from governmental, public, or private sources, including external consultants engaged by us; and alerts and reports produced by security tools deployed in the information technology environment. |