The Handbook
Standard 3: Conflicts of Interest
the standard firms must identify and manage conflicts of interest this includes systematic processes to identify all material conflicts affecting clients and the firm; code of ethics with personal trading policies, conduct standards, and enforcement mechanisms; and clear disclosure framework for material conflicts that cannot be avoided or mitigated firms must provide regular training and awareness programs for all personnel on conflicts identification and management and maintain monitoring and enforcement mechanisms with documented procedures for violations introduction conflicts of interest in digital asset management are inherent features of the ecosystem the interconnected nature of blockchain technology creates conflicts not typically found in traditional finance examples include investment teams holding tokens personally while managing institutional portfolios, employees contributing to protocols in which the fund invests, service providers with multiple conflicting business lines, and the flow of material non public information through both traditional channels and crypto native platforms like discord and telegram generic conflict policies designed for traditional hedge funds often do not adequately address the complexities of digital assets standard three emphasizes that firms should establish systematic frameworks to identify conflicts across all activities these frameworks should manage conflicts through appropriate controls rather than relying solely on prohibitions transparency about material conflicts is essential to maintain fiduciary trust this involves moving beyond generic policies to address specific challenges related to digital assets effective conflict management requires continuous monitoring, rather than annual reviews, enforcement that applies uniformly regardless of seniority, and transparent communication with clients about how conflicts are managed in practice, not just in policy upholding this standard involves creating processes that naturally surface conflicts instead of hiding them management strategies should be calibrated to the severity of conflicts, with systematic documentation to demonstrate actual compliance in some cases, conflicts are so severe that activities must be eliminated entirely to uphold fiduciary duties firms that attempt to maintain activities incompatible with fiduciary obligations risk creating conflicts that cannot be mitigated, which clients and institutional investors are unlikely to accept, regardless of mitigation efforts 3 1 conflict identification & management framework an effective conflicts framework begins with clear understanding of the landscape digital asset managers face three primary conflict categories, each requiring sophisticated management approaches investment conflicts arise when different strategies or positions create competing interests—holding the same token in both venture and liquid portfolios creates allocation conflicts when new investment opportunities emerge personal conflicts emerge from individual activities within the crypto ecosystem—most professionals in this space hold tokens personally and participate in protocol governance structural conflicts embed themselves in the ecosystem's developing infrastructure—service providers often operate multiple conflicting business lines simultaneously conflict identification requires systematic processes rather than relying on self reporting alone quarterly attestations from all employees disclosing personal holdings, outside activities, and protocol involvement provide baseline documentation on chain monitoring using blockchain analytics verifies disclosed wallets and identifies undisclosed activity regular review of service provider relationships assesses whether counterparties' business evolution creates new conflicts investment committee procedures require disclosure of personal interests before position discussions these systematic processes surface conflicts that individuals might rationalize as immaterial or overlook entirely 3 1 1 the conflict response strategy once identified, conflicts require management strategies tailored to their nature and severity the appropriate response depends on whether transparency alone provides sufficient protection, whether the conflict affects specific decisions requiring recusal, whether systematic separation prevents problematic interactions, or whether the conflict proves unmanageable requiring prohibition applying prohibition universally eliminates legitimate activities unnecessarily; applying disclosure alone to severe conflicts creates fiduciary breaches disclosure baseline response for manageable conflicts where transparency provides sufficient protection portfolio managers sitting on non profit industry association boards create potential conflicts manageable through disclosure to investors and the board disclosure requires clarity—vague statements about 'industry involvement' prove insufficient specific activities, compensation, time commitments, and potential conflicts require explicit documentation in form adv and investor communications recusal effective strategy for managing conflicts affecting specific decisions investment committee members discussing protocols where they previously contributed should recuse from voting and exit during deliberations recusal requires documentation—meeting minutes must record when individuals recuse and why patterns of frequent recusal signal that the underlying activity creates systematic conflicts requiring reassessment of whether the activity remains compatible with fiduciary obligations separation for systematic conflicts, structural barriers prevent problematic interactions firms managing both venture and liquid strategies should implement information barriers preventing venture deal flow from reaching liquid portfolio managers before public announcement physical separation, separate reporting structures, restricted system access, and documented communication protocols create effective barriers barriers require enforcement—logs showing information sharing between separated teams reveal ineffective implementation prohibition reserved for unmanageable conflicts where activities cannot coexist with fiduciary duties trading against client interests, front running fund trades, accepting undisclosed compensation from protocols the fund invests in, or using confidential fund information for personal benefit require absolute prohibition prohibition means termination for violations—enforcement inconsistency destroys policy credibility activities requiring prohibition but deemed strategically valuable create existential conflicts—firms cannot simultaneously maintain fiduciary standards and engage in conflicted activities table 1 conflict response overview true 116,226 88208616780042,318 1179138321996 left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type practitioner insight in conflict management, the core challenge is often not policy absence but incomplete identification of digital asset specific conflicts traditional conflict frameworks may miss novel situations protocol token holdings that benefit from fund activity, defi governance participation affecting holdings, validator relationships influencing execution, and equity stakes in service providers best practice is developing a digital asset specific conflict inventory that supplements traditional categories this should be reviewed periodically as the business evolves—new strategies, protocols, or service relationships may introduce conflicts not previously considered effective conflict management requires first acknowledging that conflicts exist; firms should document both identified conflicts and the controls applied to each 3 2 personal trading & employee conduct most professionals involved in digital assets hold tokens personally implementing policies that ban all personal investments could reduce the talent pool, as expertise in digital asset management often develops through personal participation in cryptocurrency markets and protocols a better approach involves establishing systematic controls that allow appropriate personal investing while avoiding conflicts with fiduciary duties effective personal trading policies should include pre clearance procedures, designated holding periods, blackout periods, and thorough monitoring these measures help balance employee participation with investor protection, ensuring responsible management of personal investments in digital assets 3 2 1 pre clearance and monitoring pre clearance procedures establish essential controls requiring employees to obtain approval before engaging in personal trading activities these controls are designed to protect the integrity of the investment process while maintaining operational efficiency systems should require approval within defined timeframes to prevent front running and avoid unnecessary delays that could interfere with legitimate personal investing activity investment managers operating in digital asset markets should implement these controls to ensure regulatory compliance and uphold fiduciary responsibilities clear and consistently applied pre clearance processes promote transparency, accountability, and the overall integrity of the investment management framework the pre clearance framework should include the following core requirements universal coverage require pre clearance for all personal digital asset trades regardless of employee role, title, or seniority apply controls uniformly across the organization prohibit exemptions for senior management absent explicit board approval holding periods impose minimum holding requirements to discourage short term speculative trading and reduce market timing advantages require a minimum 30 day holding period for all employees apply extended holding periods (e g , 90 days) for investment team members or employees with access to portfolio decision making restricted lists and blackout periods prohibit trading in digital assets held by firm managed funds, included on internal research or watch lists, or subject to pending fund transactions enforce blackout periods before and after anticipated fund activity to prevent front running and information misuse defi activity disclosure extend pre clearance requirements beyond spot token transactions to include staking, liquidity provision, yield farming, protocol governance participation, airdrops, and nft trading require heightened review and explicit approval for complex or multi step defi interactions timely processing require compliance to approve or deny standard pre clearance requests within a defined timeframe (e g , 24 hours) maintain pre clearance requirements during periods of heightened market volatility design procedures to accommodate the 24/7 nature of digital asset markets without weakening control standards clear pre clearance rules, combined with consistent enforcement and timely review, are essential to preventing conflicts of interest and preserving trust in the firm’s investment and compliance framework on chain monitoring implementation blockchain transparency allows for detailed monitoring that is not possible with traditional finance investment managers should use blockchain analytics tools to continuously observe all employee wallets that are publicly disclosed monitoring systems should identify activities such as trades involving restricted tokens, transactions that occur before fund activity, links to undisclosed wallets, use of mixing services, and decentralized finance activities that have not been pre approved monthly reconciliation processes compare on chain activities with pre clearance approvals to detect any unauthorized trading this approach helps ensure compliance and enhances oversight in digital asset management, aligning with fiduciary standards and regulatory expectations 3 2 2 attestation and enforcement effective monitoring requires supplementing automated surveillance systems with employee attestations and systematic testing attestations compel conscious acknowledgment of policy obligations and create formal documentary evidence of employee awareness, accountability, and compliance the attestation and enforcement framework should include the following components quarterly certification require all employees to certify on a quarterly basis that they have complied with the firm’s personal trading policies confirm that all digital asset wallets and accounts have been fully disclosed attest that pre clearance was obtained for all personal trades affirm that no undisclosed conflicts of interest exist annual audit and testing conduct an annual compliance led audit of personal trading activity sample employee trades to verify adherence to pre clearance requirements, holding period rules, and restricted list prohibitions use both internal records and independent verification sources where appropriate new wallet disclosure require employees to disclose newly created wallets or accounts within a defined timeframe (e g , 10 days of creation) treat failure to disclose wallets identified through on chain analysis or forensic review as a policy violation enforcement and escalation apply violations consistently and proportionately based on severity issue written warnings for minor infractions (e g , late pre clearance submissions) impose financial penalties for moderate violations (e g , holding period breaches) enforce termination or equivalent disciplinary action for serious violations, including trading restricted assets, maintaining undisclosed wallets, front running, or misuse of material non public information consistent attestation, rigorous testing, and clearly defined enforcement consequences are essential to maintaining the credibility, deterrent effect, and regulatory defensibility of the firm’s compliance framework practitioner insight personal trading violations in digital assets often involve complex defi activities rather than simple token purchases an employee might properly pre clear a token acquisition but fail to disclose subsequently staking it, providing liquidity, or participating in governance—each creating distinct conflict implications that traditional pre clearance systems may not capture best practice is extending monitoring beyond exchange accounts to include wallet addresses and on chain activity employees should disclose all wallets, and compliance should have capability to monitor blockchain activity—either through internal tools or third party blockchain analytics providers comprehensive monitoring demonstrates that policies are enforced consistently, not just documented 3 3 outside activity management professionals involved in digital assets actively engage in the wider industry by contributing to open source projects, speaking at conferences, advising protocols, and participating in governance these activities add valuable expertise and help establish industry presence however, such involvement can lead to conflicts of interest that require careful management complete bans on outside activities could prevent beneficial industry engagement, while unmanaged participation might result in breaches of fiduciary duties effective management of outside activities involves implementing a process for prior approval, which includes evaluating potential conflicts, and ongoing monitoring as activities develop this approach helps maintain integrity and compliance within the organization, supporting responsible participation in the digital asset ecosystem 3 3 1 pre approval and boundaries all outside business activities must receive prior written approval from compliance to identify, assess, and mitigate potential conflicts of interest the review should evaluate both the current characteristics of the activity and the likelihood that the activity could evolve into a conflict over time the compliance review should assess the following dimensions nature of the activity determine whether the activity is passive or active in nature distinguish between passive investments and active advisory, governance, or consulting roles evaluate open source or community contributions versus compensated engagements differentiate educational activities (e g , conference speaking) from ongoing protocol or company involvement time commitment and interference risk evaluate the expected time commitment, including weekly hours and peak demands assess whether the activity could interfere with the individual’s primary employment responsibilities consider whether outside obligations could conflict with firm priorities during periods of market stress or heightened workload compensation and incentive alignment review the form and structure of compensation, including cash payments, token grants, equity interests, or governance rights assess vesting schedules, lockups, and transfer restrictions evaluate whether compensation creates incentives that could conflict with the firm’s investment positions or fiduciary obligations to clients competitive and investment overlap assess whether the activity competes with the firm’s business, investment strategies, or client interests evaluate advisory or governance roles involving protocols, issuers, or companies in which the firm or its clients hold positions consider relationships with entities competing for similar investment opportunities information access and confidentiality risk evaluate whether the activity provides access to material non public information or confidential data assess potential insider trading, misuse of information, or confidentiality risks review external confidentiality obligations for conflicts with the firm’s fiduciary and compliance requirements ongoing monitoring and re approval require annual re approval and continuous oversight of approved activities reassess whether the scope, compensation, or influence of an activity has changed over time evaluate whether initially permissible activities—such as open source protocol contributions—have evolved into compensated advisory roles or governance token grants that create misaligned incentives clear boundaries and periodic reassessment are essential to prevent conflicts from developing incrementally and to ensure continued alignment with fiduciary responsibilities practitioner insight related party failures typically occur when affiliate transactions lack arm’s length pricing validation or independent approval routing trades through affiliated venues, using affiliated administrators, or investing in affiliated protocol launches creates conflicts requiring specific controls beyond standard investment procedures best practice is establishing a related party transaction policy requiring identification of all affiliated entities, disclosure of any contemplated transaction, independent pricing validation, and approval by personnel not involved in the affiliated relationship (typically a committee or board) documentation should capture the analysis supporting why the transaction serves client interests despite the affiliation 3 4 information barriers and confidentiality information is investment management's lifeblood and countless conflicts' source in digital assets, information flows through both traditional channels and crypto native platforms like discord, telegram, and governance forums material non public information (mnpi) controls designed for traditional securities prove insufficient for digital asset complexity—protocol governance discussions, smart contract vulnerabilities, and validator network changes create mnpi absent from traditional finance 3 4 1 defining and controlling mnpi digital asset mnpi includes traditional categories plus crypto specific information material non public information exists when information is not publicly available, information would affect a reasonable investor's decision, and information was obtained through confidential relationships or sources digital asset specific mnpi includes knowledge of upcoming protocol upgrades, forks, or major releases before public announcement information about undisclosed security vulnerabilities in protocols or smart contracts governance vote results before public disclosure or voting conclusion major partnership announcements, token listings, or protocol integrations before public release validator set changes, network hard forks, or consensus mechanism updates before implementation material treasury transactions, token burns, or supply changes before execution 3 4 2 implementing information barriers effective information barriers require physical, technological, and procedural separation physical separation places teams in different locations or segregated areas system access restrictions prevent information sharing through shared drives or communication platforms documented communication protocols establish when cross barrier communication is permitted and how it must be documented physical separation different office locations, floors, or secured areas with access controls separate conference rooms and common areas system access separate file servers, restricted document access, segregated email distribution lists monitoring logs showing access attempts and successful access communication protocols formal procedures for permitted cross barrier communication legal or compliance approval required documentation of all barrier crossings with rationale monitoring regular audit of system access logs, email communication between separated teams, and physical access records testing barrier effectiveness annually 3 5 vendor and counterparty conflicts conflicts among service providers in digital assets are more common than in traditional finance because of ecosystem consolidation limited infrastructure means that the same entities often offer multiple services, such as exchanges running market making operations, custodians providing prime brokerage, and data providers trading for their own accounts these structural conflicts require thorough due diligence and continuous monitoring relying solely on contractual protections is insufficient; ongoing oversight is essential to manage potential conflicts effectively 3 5 1 due diligence and mitigation a formal vendor conflict assessment must move beyond "check the box" exercises to analyze the following five pillars business line overlap identify whether a provider operates competing services, such as an exchange with an affiliated market maker or a custodian that also provides lending the goal is to map where the provider's profit motives may diverge from the client's interests information access & ethics it is critical to determine what sensitive client data the provider can access—specifically trading patterns, position data, or strategy details the assessment must evaluate the risk of this information being leveraged by the provider’s own proprietary trading desks or conflicting business units incentive structures analyze the provider's compensation model to identify misaligned incentives this includes evaluating the impact of payment for order flow (pfof), lending fees, or trading profits that may encourage the provider to prioritize their own revenue over client execution quality mitigation & control measures verify the strength of the provider’s internal safeguards fiduciaries should look for established information barriers ("chinese walls") between units, independent oversight of conflicted activities, and formal disclosure and consent procedures alternatives analysis finally, the fiduciary must assess the broader market to determine if less conflicted alternatives exist this involves weighing the cost and operational impact of switching against whether the severity of a current conflict justifies a change in service provider allocator due diligence considerations institutional allocators assess conflicts of interest by examining evidence of enforcement rather than relying solely on policy quality they differentiate between firms where conflicts are identified systematically and those where conflicts are hidden until discovered externally firms claiming to have no conflicts may either lack effective monitoring or have cultures that discourage disclosure when firms cannot provide specific examples of conflicts along with documented resolutions or cannot produce complete monitoring records, it indicates that conflicts management functions more as an aspiration than as an operational control framework and enforcement walk through your conflict of interest policy from identification through resolution—what constitutes a conflict, who evaluates it, what management strategies are available, and how are decisions documented? describe a recent conflict that was identified and managed—what triggered identification, how was it evaluated, what management approach was selected, and how is ongoing compliance monitored? has any employee been disciplined for conflicts violations in the past two years? if yes, describe violation and disciplinary action if no, explain detection methodology how many conflicts were identified in the past year and what were the primary categories? personal trading and outside activities how do you monitor personal trading including defi activities, staking, liquidity provision, and governance participation—not just centralized exchange transactions? what blockchain analytics tools verify employee compliance? walk through your pre clearance process—what requires pre clearance, who approves, and what is typical turnaround time? what is your policy on outside business activities? provide specific examples of activities approved and denied with rationale how do you monitor approved outside activities on an ongoing basis? specific conflict management how do you handle venture versus liquid strategy conflicts when holding same token with asymmetric information? what happens when employees contribute to protocols the fund invests in? how do you manage service provider conflicts? walk through a restricted list addition culture and enforcement what disciplinary actions were taken for violations? how do you train on conflicts? what anonymous reporting mechanisms exist? how does senior management model ethical behavior? documentary evidence requirements complete code of ethics and conflicts policies conflicts register (redacted) for past 12 months showing conflicts, management approach, and resolution personal trading pre clearance records (redacted) showing request volume and approval patterns outside business activity log with approvals, denials, and ongoing monitoring violation log with investigation summaries and disciplinary actions training records and employee attestations common pitfalls and remediation policies enforced selectively by seniority junior staff follow pre clearance and disclosure requirements; senior personnel receive informal waivers or aren't questioned inconsistent enforcement destroys policy credibility and creates legal exposure remediation apply identical procedures regardless of seniority—same pre clearance requirements, same documentation, same consequences for violations maintain logs demonstrating consistent enforcement across all levels policies documented but not operational well crafted procedures exist in the compliance manual but don't reflect actual practice—no training conducted, no monitoring performed, no violations ever identified remediation test policy adherence through regular sampling and review if testing never finds exceptions or issues, either the policy perfectly matches behavior (unlikely) or testing isn't rigorous enough personal trading policy ignores defi activity pre clearance covers token purchases but not staking, liquidity provision, yield farming, or governance voting—each creating distinct conflict implications that traditional policies miss remediation expand personal trading coverage to all on chain activity staking, lp positions, protocol governance, airdrops, and wallet interactions with defi protocols require wallet disclosure and implement on chain monitoring information barriers cover email but not actual communication formal systems are monitored while sensitive discussions happen on telegram, signal, discord, or personal devices—rendering barriers ineffective remediation extend information barrier policies to all communication channels prohibit business discussion on unmonitored platforms train staff on what channels are permitted and consequences of circumvention service provider conflicts unexamined vendors selected for capability and cost without assessing whether their other relationships create conflicts—administrator also serving competitors, custodian with affiliated trading desk, counsel representing adverse parties remediation include conflict assessment in vendor due diligence require disclosure of relationships that could compromise independence or create information leakage document assessment and any mitigating controls key controls & documentation true 165,165,165,166 left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type