Trex 2024 Sustainability Report

2024 SUSTAINABILITY REPORT

INTRODUCTION

PRODUCTS

ENVIRONMENT

PEOPLE

LEADERSHIP

37

ONE COLOR SPRUCE

ONE COLOR BLACK

ONE COLOR

LOGO USAGE

Climate change and the associated legal or regulatory responses may have a long-term adverse impact on our business energy and fuel sourcing strategy and cost.

Cyberattacks and other security breaches could compromise our proprietary and confidential information which could harm our business and reputation.

Mitigation

Mitigation

We operate a continuous improvement approach to environmental management, aligning our manufacturing practices with ISO 14001 which includes our energy use and associated carbon footprint. When we invest in new facilities and upgrade existing sites, we take the opportunity to install the best available technology designed to maximize energy and water efficiency. Trex is committed to complying with all relevant climate regulations and does not incur additional cost through voluntary purchase of ‘green’ power or certificates.

Our proactive measures to reduce the risk of a cybersecurity incident include engaging a third party to monitor information systems security events and test our systems to identify gaps.

Impact

Impact

We conduct system vulnerability scanning deploying critical patches where needed.

There is increasing concern that a gradual increase in global average temperatures due to increased concentration of carbon dioxide and other greenhouse gases in the atmosphere could cause significant changes in weather patterns and an increase in the frequency, duration, and severity of natural disasters. Compliance with newly enacted laws and regulations could impact operational and compliance burdens which may negatively impact our financial condition and results of operations.

While we have certain safeguards in place to reduce the risk of and detect cyber-attacks, our information technology networks and infrastructure may be vulnerable to unpermitted access by hackers or other breaches, or employee error or malfeasance. Any such compromise of our data security and access to, or public disclosure or loss of, confidential business or proprietary information could disrupt our operations, damage our reputation, provide our competitors with valuable information, and subject us to additional costs, which could adversely affect our business.

We assess risks from third party partner organizations to identify and mitigate risks from vendors, suppliers, and other business partners. We provide training for our employees annually on information security best practices and compliance requirements and test employees’ awareness through phishing campaigns. Our incident response preparation involves tabletop exercises to assess the company’s preparedness and identify areas for improvement. In addition, we maintain cybersecurity insurance to protect against risks related to cyberattacks and other security breaches.

Made with FlippingBook - Online magazine maker