Investment risk refers to the potential for negative performance of invested assets, whether onchain or traditional. Given the volatile nature of alternative assets, including cryptocurrencies and other onchain assets, price fluctuations (Assets Under Management [AUM] changes) are anticipated and must be planned for accordingly. This document categorizes investment risk into two main areas: traditional asset investment risk and onchain asset investment risk. Effective management of these risks is essential for maintaining financial stability, ensuring regulatory compliance, and upholding the trust of our stakeholders and donors.
Endaoment recognizes the inherent volatility and risk associated with various asset classes. We are committed to actively managing and mitigating these investment risks through a comprehensive strategy that includes conducting market research, employing diversified investment approaches, and utilizing risk assessment tools to monitor and adjust portfolio exposure as necessary. Our goal is to balance the pursuit of growth with the need for risk control, ensuring that investment decisions align with the financial objectives and risk tolerance of our Board of Directors as outlined in our Investment Policy. Regular financial reviews and adjustments will be made in response to evolving market conditions and investment performance. Compliance with this policy is mandatory for all employees, contractors, board members, and representatives acting on behalf of Endaoment.
Maintain a comprehensive inventory of all invested assets, categorizing them based on their sensitivity, volatility, and potential impact on the organization.
Market and Threat Analysis
Conduct regular market research and threat analyses to identify and evaluate potential risks associated with different asset classes, including both traditional and onchain assets.
Employ a diversified investment approach to spread risk across various asset classes and investment vehicles, minimizing the impact of poor performance in any single area.
Blockchain as Single Source of Truth
Utilize blockchain technology as the definitive source of truth for all financial activities and balances, ensuring transparency and immutability of investment records.
Regular Data Reconciliation
Conduct regular reconciliation of onchain and offchain financial data to identify and address discrepancies promptly, ensuring alignment and accuracy in financial reporting.
Access Control Measures
Implement strict access controls to financial systems, ensuring that only authorized personnel can perform sensitive financial operations.
If the Board or both the CEO and COO agree that an invested asset is overly volatile, the following actions will be taken:
Lock the specific portfolio in question through the cap system (set to 0).
Inform donors of the closed portfolio.
Force exit all positions from the portfolio into affiliated funds.
Smart Contract Diligence
All onchain investment portfolios must have their underlying assets and/or protocols reviewed via independent third-party technical smart contract audits. All audits must be reviewed and approved before engagement.
Yearly Third-Party Financial Audit
Conduct comprehensive financial audits annually by a third-party entity (e.g., Singer Lewak) and the Chief Operating Officer (COO). Updated audit documents must be publicly available on the Endaoment Docs page.
KYC Processing
Implement documented policies and procedures for customer identification (including name, date of birth, address, and identification number), customer due diligence, and enhanced due diligence when necessary.
Multisignature Wallet Use
Regularly confirm the integrity and operational security of all multisignature wallets used by staff on a monthly basis.
Transaction Monitoring
Regularly audit incoming transactions to identify any suspicious patterns or activities that may indicate fraudulent behavior.
Transaction Review Process
Establish documented policies and procedures for reviewing and approving transactions, ensuring both internal and external compliance requirements are met.
Access Removal Procedures
Implement documented policies and procedures for promptly removing access rights of employees or contractors who no longer require access to financial systems.
Ensure that critical financial procedures and systems have segregated duties to prevent any single individual from having full control over any process without oversight.
Approval Processes
Maintain segregated claim diligence and approval processes to uphold checks and balances.