TABLE OF CONTENTS RESOURCES LAST PAGE VIEWED HELPLINE 18 We protect what’s ours Our promise To take good care of what’s ours. What are some examples of assets? Our process There are a few di昀昀erent types we should protect, including, for example: When thinking of our Company assets, our buildings may come to mind 昀椀rst, but they cover much more than that. From the chair you may be sitting in right + Physical assets, such as buildings, company vehicles and now to the laptop you use every day – our assets include every single thing we o昀昀ice furniture. own or use to do business, and it’s our job to protect them. + Technology assets, such as phones, computers and o昀昀ice We handle physical assets with care. We work to protect physical assets equipment. + Financial assets, such as cash and bank accounts. from damage, loss, misuse and the昀琀. And we only borrow, lend, sell or give away items if we have authorization to do so. + Informational assets, such as emails and corporate records. We secure all electronics. We take the appropriate measures to keep our + Intellectual property such as logos and trademarks. technology assets safe, such as: + Following Company guidelines + Protecting user IDs and passwords + Never opening suspicious emails + Never installing unauthorized so昀琀ware LEARN MORE We secure data. In a world where our business is becoming more data-driven Prologis Employee Handbook and data analytics drive value, we want to make sure we preserve our rights to keep what data is ours, and obtain the appropriate permissions to collect data Prologis Global Policy on Proper Use of Company Assets that impacts our buildings. Prologis Global Policy Regarding Privacy and Con昀椀dential Information We use common sense. Prologis has a responsibility to monitor Company Prologis Acceptable Use of Information and Technology Policy systems and devices (such as computers and phones) for certain content Prologis Global Policy on Protection of Company Data & Information to protect coworkers and customers. For this reason, although occasional personal emails or phone calls are permitted, it’s important to remember that anything we write, download, store or transmit on Company equipment may be monitored or reviewed in accordance with applicable laws. Code of Ethics and Business Conduct Ethics Helpline

Code of Ethics & Business Conduct - Page 18 Code of Ethics & Business Conduct Page 17 Page 19