Risk Management Best Practices for Non-Profits

Commercial & Personal Insurance ▪ Employee Benefits ▪ Retirement Plan Services ▪ Wealth Management
Risk Management
Best Practices for
Non-Profits
11311 McCormick Road ▪ Hunt Valley, MD 21031 ▪ www.psafinancial.com ▪ 410.821.7766
Welcome! Important Web Seminar Notes
• You may download a copy of today’s presentation under
•
•
•
•
the Presentation Assets box on the left side of your screen.
Following the presentation we’ll have a Q&A session. We
encourage you to ask text questions throughout the
presentation. Please type your inquiry into the “Ask A
Question box” and click submit.
If you should need any technical assistance during today’s
event, please type your inquiry into the “Ask A Question”
box on the left side of your screen.
If you are disconnected from the webcast, you can log on
again, using the login instructions provided to you.
If you cannot log back on with these instructions, please
call Technical Support at 866.271.7592.
2
To Receive CPE Credit
• Polling question:
- Click on appropriate radio button to answer the polling
question
• Active participation:
- NASBA requires that we monitor your participation
- You must answer 75% of all polling questions offered per hour
to get credit for that hour
• Half credits may be awarded after the first hour, as appropriate
- Your interactions will be tracked through the system
• For groups, the proctor’s polling answers will be tracked
- Your computer connection will be tracked through the system
• You must be connected at least 50 minutes to receive 1 credit
• Each 25 minutes after the first hour is worth ½ credit
3
To Receive Group CPE Credit
• Group participation:
- Groups should download the Group Sign-in sheet from the
Presentation Assets box located on left side of the screen
- The group proctor must be the person logged into the streaming
platform and must answer the CPE polling questions
- Group proctors should enter all participant information and sign off
at the top of the group sign-in sheet
• Include actual time in and time out of all
participants
• Verify active participation of all group members
- Submit via email within 3 days
*Failure to follow this policy will result in NO CPE credit for everyone in the group
4
Commercial & Personal Insurance ▪ Employee Benefits ▪ Retirement Plan Services ▪ Wealth Management
Risk Management
Best Practices for
Non-Profits
11311 McCormick Road ▪ Hunt Valley, MD 21031 ▪ www.psafinancial.com ▪ 410.821.7766
Polling Question #1
Which best describes your organization type:
A. Professional/membership/trade association
B. Charitable organization
C. Social Services (e.g. United Way, Red Cross, Salvation Army, etc.)
D. Health care organization
E. Educational institution
F. Museum/cultural organization
G.Other
6
Today’s presenters
Jeffrey D. Wallop, CIC
Vice President
PSA Insurance & Financial Services
[email protected]
443.798.7379
Lisa Chanzit, FCAS, MAAA, ARM
Senior Actuarial Consultant
Risk & Regulatory Consulting, LLC
[email protected]
855.246.0815
7
Agenda
▪ How cyber liability is increasingly becoming
a threat
▪ The importance of utilizing effective
employee handbooks
▪ Why the need for directors and officers
liability protection
▪ Insuring against financial fraud
8
What is Cyber Liability?
Cyber Liability is the risk posed by conducting
business over the internet, over other networks
or using electronic storage technology.
Two types of breaches
▪ First Party
▪ Third Party
9
First Party VS Third Party
▪ First Party Cyber Liability – occurs when your own
information is breached or compromised.
▪ Third Party Cyber Liability – occurs when customer or
partner information your organization has promised to
keep safe is compromised.
▪ First Party Cyber Liabilities can threaten a company’s
competitiveness, but third party cyber liabilities can
ruin reputations, open the door to expensive law
suits and trigger statutory fines.
10
Breaches
▪ Who? Unauthorized Access by:
– Hackers
– Employees, Faculty, Students
– Outsourced and third party vendors
▪ What? What are they accessing?
–
–
–
–
–
Laptops
Computer networks/wireless networks
PDAs/Cell Phones
Paper Files
Websites
11
Why do I need Cyber Liability?
▪ Cyber Liability exposures are excluded from a General
Liability Policy.
▪ Cyber Liability Policies cover the costs of theft,
destruction or unauthorized use of electronic data
through computer viruses and network intrusions.
12
Private Information
What are the exposures
▪
Credit card information
▪
Social Security numbers
▪
Patient health information, medical claims and records
▪
Date of birth information
▪
Customer user name and passwords
▪
Customer or employee contact information
▪
Financial records and account information
▪
Drivers’ license number
▪
Biometric information
Failure to protect private information from Cyber threats can result in losses to:
▪
Company reputation
▪
Financial loss
▪
Customer satisfaction
▪
Business opportunities
▪
Intellectual properties
▪
Possible litigation
13
How vulnerable is your business?
▪ 77% of employees leave their computers
unattended
▪ 65% of small businesses say their organizations
sensitive information is not encrypted
▪ 56% of employees frequently store sensitive data
on their laptop or mobile device
▪ 62% of small businesses don’t routinely back up
data
*TrendMicro & Ponemon Institute 2012
14
Potential Claims Expenses
▪ Expenses to notify affected parties
▪ Business income and extra expense
▪ Extortion payments
▪ Crisis management expenses
▪ Credit monitoring costs
▪ Negligence
▪ Invasion of customer’s right to privacy
▪ Defense and damages
▪ Media / intellectual property
15
Methods of Attack
▪ Denial of service
▪ Loss of critical infrastructure
▪ Theft of information
▪ Fraud
▪ Corruption of data
▪ Insider exploitation
16
Cyber Liability Risk Management
▪ Segregate and restrict access to sensitive data
▪ Establish user control password protection procedures
▪ Review security/access to network and server
▪ Encryption of private data on database, laptops, mobile
▪ Implement and maintain firewall
▪ Apply intrusion detection software systems
17
Vulnerability of a Not-Profit
▪ Financial constraints
▪ Type and number of records stored
18
Cloud Risk Considerations
▪ Who owns the data once it resides on the cloud?
▪ Does your cloud provider guarantee the security
and privacy of your data?
▪ Will you be alerted if there is a breach of your data
within the cloud?
▪ Will you have the right to investigate the breach?
▪ Who will be responsible for notifying your
customers of a breach incident?
19
Underwriting Issues
▪ Nature of business
▪ Revenues
▪ Total number of records at risk
▪ Types of records at risk
▪ Written policies and procedures
▪ Risk management procedures
▪ Security and protection
▪ Breach/claim history
20
The Employee
Handbook
21
Purpose of Employee Handbooks
▪ Maintains uniformity in the application of policies
and procedures
▪ Legal compliance and protection
▪ Communicate company policies
▪ Useful resource and guideline for managers and
supervisors responsible for resolving employee
complaints
▪ Enhance the credibility of decisions based on
policies
22
Potential Downsides
▪ Guidance demonstrating entity’s failure to
comply with their own internal policies and
procedures
▪ Can reduce flexibility needed to handle issues
as they arise if the policies are not well drafted
▪ Poorly prepared handbooks can result in liability
23
Essential Handbook Policies
▪ Introduction Provisions/Disclaimer
▪ EEO Statement
▪ Sexual Harassment policy
▪ Non-Harassment policy
▪ Problem Solving Procedure
24
Components
Disclaimer
▪ The primary way to minimize the likelihood that a court
will find that handbook provisions amount to an implied
contract is to include an unambiguous prominent
disclaimer, on the first page of the handbook, stating
that the handbook or related documents do not create
any contractual rights, and that the employment
relationship is “At Will.”
▪ At-Will Statement: “Employer or employee may
terminate the employment relationship at any time,
without notice and for any reason.”
25
Components
EEO Statement
▪ Non-discrimination provisions
▪ Summary of protected categories
▪ Reasonable accommodation language
▪ Welcome employee participation in the interactive
process
26
Components
Anti-Harassment Policy
▪ Commitment
▪ Identification
▪ Complaint Procedure
▪ Investigative Procedure
▪ Anti-retaliation
▪ Helps employer avoid liability where employee
fails to utilize these channels
27
Components
Problem Solving Procedures
▪ Importance
▪ Define “Problem”
▪ Procedure
28
Components
Safe Harbor Policy
▪ Classifications of employees
▪ Addressing paycheck mistakes
▪ Exempt status protection
▪ Reporting procedures
29
5 Things That Should Never Appear
in an Employee Handbook
▪ “Permanent”
▪ “We do not pay overtime”
▪ “The name of or reference to”
▪ “And after the third violation”
▪ “Confidentiality is assured”
30
5 Things That Should Never Appear
in an Employee Handbook
“Permanent”
The word “permanent” appears in handbook to distinguish employees who have completed a probationary period.
However, the term should never appear in a handbook because it weakens the important doctrine of “at-will employment.”
The term “regular” is more appropriate.
“We do not pay overtime”
This phrase suggests a non-profit’s intent to violate the wage and hour laws. If a non-exempt employee works overtime he
or she must be paid premium pay.
“Reference to another organization”
It is surprising the number of organizations that copy another organization’s handbook and just substitute in their name.
Policies that are suitable for one non-profit may not be suitable for yours.
“And after the third violation”
Your handbook should not contain overtly prescriptive disciplinary measures. The best handbooks afford management
maximum discretion in determining the discipline that should apply in a given instance. Statements such as “violation of this
policy could result in discipline, up to and including termination” give management the ability to determine the appropriate
measures.
“Confidentiality is assured”
It is never appropriate to provide outright assurances of confidentiality when the nature of the matter may require that
person within the organization be informed of the allegations or status of an investigation. A more appropriate statement
may be “all complaints will be investigated promptly and as confidentiality as possible.”
31
Handbook Receipt
▪ Right to modify without notice
▪ Acknowledgement of receipt and obligation to
read, understand and adhere to policies and
procedures
▪ At-will status/employment contract disclaimer
32
Distributing Handbooks
▪ Provide employees with verbal summary of major
policies and/or change upon distribution
▪ Provide opportunity for employees to ask
questions and voice concerns freely
▪ Always require receipt of handbook be signed and
turned in promptly to managers of HR department
33
What to Say and How to Say It
▪ Be consistent with company culture
▪ Write clearly and concisely
▪ Avoid making promises
▪ Avoid “shall” and “will”
▪ Maximize flexibility using “may” and “usually”
▪ Eliminate reference to management procedures
▪ Comply with applicable local, state and federal
law
34
D&O Insurance
35
Respondents Reporting D & O Claims in
the Past 10 Years
Respondents Reporting D & O Claims in the Past 10 Years
70%
60%
50%
40%
64%
30%
20%
36%
10%
0%
All Respondents
Non Profit Respondents
Source: Towers Watson 2012 Directors and Officers Liability Survey
36
Polling Question #2
What is the most frequent type of D&O claim
faced by non-profit organizations?
A. Fiduciary
B. Donor
C. Employment Practices
D. Regulatory
E. Other
37
Types of D & O Claims in the Past 10
Years
Types of D & O Claims in the Past 10 Years
100%
80%
60%
All Respondents
Non Profit Respondents
40%
20%
0%
Direct Investor
Suit
Derivative
Investor Suit
Employment
Related
Regulatory
Fiduciary
Other
Source: Towers Watson 2012 Directors and Officers Liability Survey
38
Why do Non-Profits need D&O Insurance?
▪ Exposures: Driven by what the organization does
▪ Personal Liability
▪ Duties of Directors (care, loyalty, obedience)
▪ Volunteer Protection
▪ Indemnification
▪ D&O insurance does not replace responsible
governance
39
Claims Overview
▪ Almost triple the number of non-profits reported having
▪
▪
▪
▪
a D&O claim in 2010 (35%) vs. 2008 (13%)
67% of claims filed under non-profits D&O policies were
EPLI related
Significant % of all loss dollars are for defense costs as
opposed to damages/settlement
35% of non-profits have D&O claims – compared to
29% for publicly traded and 26% for privately held
Claimants can be employees, volunteers, donors,
members, competitors, creditors, regulators,
governmental bodies, beneficiaries of service
40
Allegations?
▪ Breach of fiduciary duty
▪ Negligent supervision
▪ Mismanagement of assets
▪ Conflict of interest
▪ Misrepresentation
▪ Tortious interference
41
Who and what are covered?
Covers directors and officers plus…
▪ Employees, volunteers and committee members
▪ Full entity coverage
▪ Includes Employment Practices Liability Coverage
▪ Third party liability extension
42
Policy Overview
▪ Duty to defend
▪ Aggregate limit
▪ Defense costs either inside/outside limit
▪ Exclusions
43
Insuring Claims
▪ Clause 1 or Side A
– Covers insured persons for loss which they are
not indemnified for by their non-profit
▪ Clause 2 or Side B
– Covers loss for which the non-profit is lawfully
permitted or required to indemnify its insured
person
▪ Clause 3 or Entity Coverage
– Covers the non-profit itself
44
What constitutes a loss?
▪ Loss – covered damages, settlements and
defense costs
▪ Typically excludes, taxes, fines, penalties, costs to
comply with injunctive relief, amounts due under
breached contract
▪ Includes front pay, back pay, salary and benefits
components in employment context
45
What is a wrongful act?
A wrongful act means:
▪ Any error, misstatement, misleading statement,
act, omission, neglect, breach of duty or
committed, attempted or allegedly committed or
attempted by an insured person in his or her
insured capacity or by the organization, or
▪ Any other matter claimed against an insured
person solely by reason of his or her serving in an
insured capacity
46
What is a claim?
A claim means:
▪
A written demand for monetary damages or non-monetary relief
▪
A civil proceeding commenced by the service of a complaint or similar
pleading
▪
A criminal proceeding commenced by the return of an indictment, or
▪
A formal civil administrative or civil regulatory proceeding commenced
by the filing of a notice of charges or similar document, or by the entry
of a formal order of investigation or similar document
47
D&O
▪ Importance of reporting claims
▪ Timely reporting
▪ Who chooses counsel can be an issue
48
Endorsements to Consider
▪ Defense outside limit of liability
▪ Outside directorship
▪ Wage and hour
▪ Fiduciary
▪ HIPAA
49
50
Polling Question #3
Only larger nonprofit organizations need to be
concerned about the diversion of funds.
▪ True
▪ False
51
Significant Diversions of Nonprofits’
Assets Since 2008
Significant Diversions of Nonprofits' Assets by Tax Year
450
400
350
300
250
200
150
100
50
0
Tax Year 2008
Tax Year 2009
Tax Year 2010
Tax Year 2011
Source: Analysis of Form 990 Disclosures, as reported in the October 26, 2013 Washington Post
52
Significant Diversions of Nonprofits’
Assets by Organization Type
Significant Diversions of Nonprofits' Assets by
Organization Type
Charitable Organizations
353
664
152
Educational
Organizations
Other
Source: Analysis of Form 990 Disclosures, as reported in the October 26, 2013 Washington Post
53
Significant Diversions of Nonprofits’
Assets by Revenue
Significant Diversions of Nonprofits' Assets by Revenue
400
350
300
250
200
150
100
50
0
$0 or less
$1-$250k
$250k-$500k
$500k-$1mill
$1mill-$10mill
$10mill +
Source: Analysis of Form 990 Disclosures, as reported in the October 26, 2013 Washington Post
54
What is fraud?
▪ Deceit, trickery or breach of confidence,
perpetrated for profit or to gain some unfair or
dishonest advantage
- Dictionary.com
▪ Occupational Fraud: The use of one’s
occupation for personal enrichment through the
deliberate misuse or misapplication of the
employing organization’s resources or assets
- Association of Certified Fraud Examiners
55
Occupational Fraud Elements
▪ Effort to obscure from detection
▪ Violates perpetrator’s fiduciary duties to the
organization
▪ Committed to benefit perpetrator,
organization or both
▪ Costs victim organization assets, revenues
or resources
56
Fraud or Abuse?
▪ Stealing incoming or outgoing cash
▪ Stealing assets
▪ Padding an expense report
▪ Using the non-profit’s equipment for
personal reasons
▪ Using sick leave or personal leave
▪ Spending work hours on personal business
57
Fraud Stats and Facts: Non-Profits
▪ Median duration of fraud for non-profits – 24
months
▪ Lack of balance between funding for stated
mission of the organization and protection
of the organization’s assets
▪ Inordinate emphasis on ineffective controls
58
Fraud Stats and Facts
▪ Estimated to impact 7% of all organization revenues in
U.S. = $99 billion per year
▪ Median duration of fraud is 18-24 months
▪ Only 7% of perpetrators had prior convictions
▪ Fraud was most often committed by accounting staff
or upper management.
- Source: Association of Certified Fraud Examiners
59
Polling Question #4
What is the median cost of a fraud loss for a
nonprofit organization?
A. $58,000
B. $76,000
C. $109,000
D. $157,000
60
Median Losses
▪ Private companies - $278,000
▪ Public companies - $142,000
▪ Non-profits - $109,000
▪ Government Agencies - $100,000
61
Impact/Consequences
▪ Bad PR
▪ Loss of public trust
▪ Increased oversight/scrutiny
▪ Increase of operating costs
▪ Damaged employee morale
▪ Loss/theft of funds and assets
62
Fraud
Triangle
Opportunity
63
Leg 1
“Pressure”
▪ Living beyond one’s means
▪ Financial difficulties
▪ Medical/health issues
▪ Grief/loss
▪ Post-traumatic stress disorder symptoms
▪ Addictions to gambling, alcohol, drugs
▪ Marital/relationship conflicts
▪ Unachievable goals set by self/organization
▪ Societal expectations for status and desires
64
Leg 2
Rationalization
▪ Just “borrowing” and plan to give back
▪ Lack of adequate pay – includes volunteers
▪ Lack of career ladder
▪ Entitlement mentality
▪ Encouragement by “tone at the top”
65
Leg 3
Opportunity
▪ Ease of access to funds and assets
▪ Relaxed control environment
▪ Low emphasis on support functions
▪ Repetitive processes without review/revision
▪ Lack of fear of detection
66
Occupational Fraud
▪ Misappropriation of Assets
– 89% of occupational fraud cases
– Cash – larceny, skimming
– Inventory – misuse, larceny
▪ Corruption (27%) – bribes, conflicts of interest
▪ Fraudulent statements (10%) low frequency, high
severity
- Statistics from ACFE
Note: Total does not equal 100% since some fraud schemes reviewed comprised multiple
classifications
67
Common Fraud Schemes
Misappropriation of assets: incoming funds
▪ Checks and cash
▪ Donated property
▪ May occur prior or after transaction recording
Misappropriation of assets: outgoing funds
▪ Billing fraud
– Phony vendors
– Fraudulent payments (i.e. duplicate payments,
overpayments, check tampering, refunds)
– Conflict of interest/inappropriate vendor selection
▪ Travel and expense fraud
68
Prevention
▪
▪
▪
▪
▪
▪
▪
Code of conduct, ethics policy, fraud policy
Documented policies and procedures for core functions
Employee assistance programs
Background checks for employees
Protect proprietary and confidential information
Fraud hotline
Segregation of duties
– Record the transaction
– Authorize the transaction
– Custody of the transaction
– Execute the transaction
69
Prevention con’t
▪
Required vacation
▪
Rotate responsibilities and cross train
▪
Review key controls
▪
Trust but don’t over delegate
▪
Secure assets and document custody transfer
▪
Management review of financial statements
▪
Background checks
–
–
–
67% of all resumes/applications contain material inaccuracies
Periodically review position requirements and responsibilities to ensure continued relevance
Reasonably verify disclosures
▪
▪
▪
▪
▪
Education
Employment experience
Professional references
Credit background
Criminal background
70
Prevention con’t
▪
Protect vendor and proprietary information (i.e. donors)
▪
Strong board participation and ask difficult questions
▪
Audit committee involvement and external audit assurance
▪
Fraud risk assessment
– Peer organization involvement
– Top down approach and participation
71
Polling Question #5
What is the most common way financial fraud
cases are discovered?
A. Internal Audit
B. External Audit
C. Employee tips
D. By accident
72
Sources of Fraud Detection
▪ Independent (external) audits
▪ Financial management or internal control
▪ Employee tips or complaints
▪ Accident – 19%
▪ Internal Audit – 19%
▪ Customer tip – 9%
▪ Vendor tip – 5%
73
Special Fraud Challenges for Non-profits
▪ Sympathetic thief
▪ Fear of publicity
▪ Resources
74
How do you protect the entity against fraud?
Commercial crime coverage
▪ Employee dishonesty coverage or Fidelity
Bonds
75
Q&A
• It is now time for our Q&A session.
• Click the “Ask a Question” button, type your
question in the open area and click “Ask
Question” to submit.
76
Thank you for attending!
Reminder to obtain CPE credit
▪ Individuals: No further action is required
▪ Proctors on behalf of a group:
– The group proctor should be the same individual who logged in to the web and
teleconference lines
– Submit the group sign-in form within 3 days (available by clicking on the
Presentation Assets section on the left side of your screen)
▪ 1.0 CPE credit hours will be issued to eligible participants within 60 days
▪ NASBA will not issue credit if all criteria is not met, without exceptions
Follow-up materials
▪ The presentation slides and a link to the call recording will be sent to all
participants within a few days of the webinar
77
Today’s presenters
Jeffrey D. Wallop, CIC
Vice President
PSA Insurance & Financial Services
[email protected]
443.798.7379
Lisa Chanzit, FCAS, MAAA, ARM
Senior Actuarial Consultant
Risk & Regulatory Consulting, LLC
[email protected]
855.246.0815
78
PSA Insurance & Financial Services
Jeffrey D. Wallop, CIC
Vice President
[email protected]
443.798.7379
Baltimore Office
11311 McCormick Road
Hunt Valley, MD 21031
Washington, DC Metro Office
2275 Research Blvd., Suite 500
Rockville, MD 20850
79