HOCHTIEF
ESRS disclosure: ESRS ESRS 2 \ DR BP-2
Tags Tree
- Has your organization deviated from the medium- or long-term time horizons as defined by ESRS 1, section 6.4 for reporting purposes? If so, provide a detailed description of your definitions of medium- or long-term time horizons.
-
Question Id: BP-2_01
IROs: G1-NI2 Time horizon: short-, medium- and long-term
Report Date: 4Q2024Relevance: 20%
- Provide a detailed explanation for any deviations from the medium- or long-term time horizons as defined by ESRS 1, section 6.4, "Definition of short-, medium-, and long-term," in your reporting practices.
-
Question Id: BP-2_02
IROs: G1-NI2 Time horizon: short-, medium- and long-term
Report Date: 4Q2024Relevance: 20%
- Identify the metrics that incorporate upstream and/or downstream value chain data estimated using indirect sources, such as sector-average data or other proxies.
-
Question Id: BP-2_03
HOCHTIEF procures considerable volumes of materials such as concrete, steel, and timber as well as services such as those of craft trades—corresponding to 74 % of Group work done—and places strong emphasis on responsibility and fair play in procurement processes.
Report Date: 4Q2024Relevance: 30%
- Provide a detailed description of the basis for preparation when metrics incorporate upstream and/or downstream value chain data estimated using indirect sources, including sector-average data or other proxies.
-
Question Id: BP-2_04
HOCHTIEF has implemented a comprehensive, multi-level risk management process in procurement. This is designed to identify social and environmental sustainability risks and/or violations at an early stage and to mitigate these through suitable prevention and remedial measures—such as targeted training—in dialogue with the respective business partner.
Report Date: 4Q2024Relevance: 30%
- Provide a detailed description of the resulting level of accuracy for metrics that incorporate upstream and/or downstream value chain data estimated using indirect sources, including sector-average data or other proxies.
-
Question Id: BP-2_05
The outcomes of the individual risk management steps are included in our supplier and subcontractor selection process.
Report Date: 4Q2024Relevance: 20%
- Provide a detailed description of the planned actions your company intends to implement to enhance the accuracy of metrics that incorporate value chain data estimated using indirect sources, such as sector-average data or other proxies, in accordance with ESRS 1 chapter 5 on Value Chain.
-
Question Id: BP-2_06
HOCHTIEF aims to work primarily with local suppliers and subcontractors based in the vicinity of our project sites. In this way, we seek to ensure short transportation distances and strengthen local economies.
Report Date: 4Q2024Relevance: 30%
- Has the undertaking relied on any European standards approved by the European Standardisation System (ISO/IEC or CEN/CENELEC standards) for sustainability reporting purposes, and to what extent have the data and processes used been verified by an external assurance provider to conform to these standards?
-
Question Id: BP-2_18
During implementation of its policies/actions, HOCHTIEF takes into account the requirements of ISO 27001 and thus of a structured information security management system (ISMS).
Report Date: 4Q2024Relevance: 50%
- Has your company, with an average of fewer than 750 employees during the financial year, opted to omit information as per Appendix C of ESRS 1 regarding ESRS E4, ESRS S1, ESRS S2, ESRS S3, or ESRS S4? If so, confirm whether these sustainability topics have been deemed material following your materiality assessment. For each topic identified as material, provide a concise description of any time-bound targets established, the progress made towards these targets, and specify if the targets related to biodiversity and ecosystems are grounded in conclusive scientific evidence.
-
Question Id: BP-2_24
Following on from the annual reporting of our Scope 1 and 2 as well as selected Scope 3 emissions (3.1 Purchased products and services, 3.5 Waste generated in operations, and 3.6 Business travel) and publication of the first TCFD paper, we devised and rolled out the HOCHTIEF Sustainability Plan 2025 Group-wide in 2022. In this plan, alongside targets for all ESG dimensions, we notably formulated our climate targets and consolidated our Group-wide commitment to climate neutrality (net zero) by 2045. The reduction targets are science-based, align with the 1.5 degree target under the Paris Climate Agreement and the requirements of the Science Based Targets initiative (SBTi), and have been formally adopted by the HOCHTIEF Executive Board. Our climate change mitigation strategy and the associated transition plan are based on these commitments and the additional milestones set in 2023 for 2030.
Report Date: 4Q2024Relevance: 30%
- Has your organization utilized the phase-in provisions as outlined in Appendix C of ESRS 1, specifically regarding the omission of information required by ESRS E4, ESRS S1, ESRS S2, ESRS S3, or ESRS S4, due to not exceeding an average of 750 employees on the balance sheet date during the financial year? If so, confirm whether the sustainability topics covered by these standards have been assessed as material through your materiality assessment. For each topic deemed material, provide a concise description of the policies your organization has implemented in relation to these matters.
-
Question Id: BP-2_25
Cybersecurity is part of our IT strategy and is embedded in our IT Directive by way of the Information Security Policy. The policy approach is likewise publicly documented in our information security guidelines. These frameworks have been approved by the Executive Board of HOCHTIEF Aktiengesellschaft. They are mandatory throughout the Group and their implementation is binding for all HOCHTIEF companies. During implementation of its policies/actions, HOCHTIEF takes into account the requirements of ISO 27001 and thus of a structured information security management system (ISMS). The policies and actions are continuously fine-tuned in consultation with the relevant stakeholders (such as our own workforce, business partners, and clients). To this end, positions, committees (such as the IT Steering Committee), and processes (such as for exception requests and concept approval requests) have been established to ensure that all requirements (relating, for example, to operations, investment spending, or information security) are addressed in a structured manner, taking the material impacts into account.
Report Date: 4Q2024Relevance: 20%
- Has your company, which employs fewer than 750 individuals on average during the financial year, opted to omit information as permitted by the phase-in provisions of Appendix C of ESRS 1? If so, have you conducted a materiality assessment to determine whether the sustainability topics outlined in ESRS E4, ESRS S1, ESRS S2, ESRS S3, and ESRS S4 are material to your operations? For each topic deemed material, provide a concise description of the actions undertaken to identify, monitor, prevent, mitigate, remediate, or terminate actual or potential adverse impacts associated with these sustainability matters, along with the outcomes of such actions.
-
Question Id: BP-2_26
We focus on prevention to counteract risks. The first line of defense at HOCHTIEF is security by design. This means the use of technical measures where the implementation process ensures a safe working environment on the basis of system design or configuration. Where recourse is made to organizational measures, these are subject to structured, documented procedures backed up with checks and balances. The measures are flanked by technical analysis systems.
Employee training on cybersecurity is also geared to common and current threats.
Lessons learned from emerging developments are continuously incorporated into security objectives and/or the Information Security Policy.
Initiatives implemented throughout the Group in the reporting year to protect against cybersecurity risks include the following:
- Structured requirements management processes including the management of information security risks (check list, involvement of specified departments, risk assessment, etc.)
- Internal phishing campaign to identify specific action such as a need for employee training
- Automated and manual penetration tests to detect security vulnerability in Internet-facing systems
- Mandatory training for all employees on general information security topics, plus ad-hoc information in the form of newsletters and intranet articles on current threats
- Continuous automated detection of vulnerabilities in Internet-facing systems, with reporting to support structured response processes
- Patch management on the basis of structured technical and organizational processes
- Attack detection and tracking solutions in operation
- Attack surface minimization by using technical measures for global blocking of entry points
- Use of technical means to minimize access to recognized and permitted systems or identities (for example, conditional access or MFA)
- Assessment of cybersecurity risks extended to include business-critical suppliers and business partners
- Structured reporting of business-critical security incidents
Report Date: 4Q2024Relevance: 30%