Topic 5: Ethics Application
Core Concepts Summary (80/20 Principle) exam-focus
The most critical concepts that account for 80% of exam questions:
- Violation Identification: Recognizing when conduct violates specific Standards
- Material Information: Understanding what constitutes material nonpublic information (Standard II(A))
- Fiduciary Duty: Client interests must always come first (Standard III(A)) fiduciary
- Disclosure Requirements: When and what must be disclosed to clients
- Independence & Objectivity: Avoiding and managing conflicts of interest
- Supervisory Responsibilities: Reasonable efforts to detect and prevent violations
- Priority of Transactions: Client trades before personal trades (Standard VI(B))
- Record Retention: Maintaining appropriate documentation
Learning Objective 1: Evaluate Practices, Policies, and Conduct
Core Concept
Evaluating practices requires systematic analysis of facts against each potentially applicable Standard, considering context, intent, and impact on stakeholders. This topic is where the theoretical framework from Topic 1 (the Identify-Consider-Decide-Reflect framework) and the specific rules from Topic 3 come together in applied scenarios.
Evaluation Framework
This five-step process mirrors the ethical decision-making framework but is specifically tuned for identifying violations:
Step-by-Step Analysis:
- Identify the Facts: What exactly happened?
- Determine Stakeholders: Who is affected?
- Apply Relevant Standards: Which Standards might apply?
- Assess Violations: Did the conduct violate any Standards?
- Consider Alternatives: What should have been done?
Key Evaluation Principles
Material Information Test:
- Would a reasonable investor want to know?
- Could it affect investment decisions?
- Does it impact value or risk?
Conflict of Interest Test:
- Does personal benefit exist?
- Are client interests compromised?
- Is independence threatened?
Disclosure Adequacy Test:
- Is disclosure clear and prominent?
- Does it cover all material aspects?
- Can clients make informed decisions?
Practical Examples
Example 1: Overheard Information
Scenario: Analyst overhears merger discussion at restaurant
Analysis:
- Information: Material and nonpublic
- Source: Overheard (not insider)
- Action: Trading on information
- Violation: Standard II(A) - Material Nonpublic Information
- Proper Conduct: Cannot trade, must wait for public disclosure
Example 2: Client Referral Program
Scenario: Adviser gives gift cards for client referrals
Analysis:
- Arrangement: Compensation for referrals
- Disclosure: Not provided to prospects
- Violation: Standard VI(C) - Referral Fees
- Proper Conduct: Must disclose referral compensation
DeFi Application
Smart Contract Audit Disclosure: defi-application
Traditional: Must disclose material risks
DeFi Equivalent:
- Unaudited contracts = material risk
- Audit limitations must be disclosed
- Known vulnerabilities require disclosure
- Protocol dependencies need explanation
DAO Voting Conflicts:
Evaluation Framework:
- Personal token holdings = potential conflict
- Voting on proposals affecting holdings
- Must disclose positions
- Consider recusal if material conflict
Learning Objective 2: Explain Violations and Proper Conduct
Core Concept
Understanding not just whether conduct violates Standards, but why it violates them and what constitutes proper alternative conduct is the key skill tested in the Ethics section. The exam rarely asks you to identify an obvious violation; instead, it presents nuanced scenarios where the correct answer depends on understanding the purpose behind each Standard.
Common Violation Patterns
Misrepresentation Violations (violating Standard I(C)) standard-I include guaranteeing volatile returns, omitting material information, plagiarizing research, and misstating credentials. The proper alternatives are: provide realistic expectations, fully disclose risks, attribute all sources, and use credentials accurately.
Independence Violations (violating Standard I(B)) standard-I include accepting gifts from issuers, making political donations to secure business, and allowing investment banking relationships to influence research. The proper alternatives are: decline or limit gifts per firm policy, avoid quid pro quo donations, and maintain strict research independence through information barriers.
Case Study Analysis Framework
Structure for Analyzing Cases:
- Facts: Summarize key information
- Standards: Identify applicable Standards
- Analysis: Explain the violation
- Alternatives: Describe proper conduct
- Prevention: Suggest policies to avoid
Practical Examples
Case: The Departing Employee
Facts: Portfolio manager downloading client list before resignation
Standards: IV(A) - Loyalty to Employer
Analysis: Client list is employer property
Violation: Taking confidential information
Proper Conduct: Leave without employer data
Prevention: Exit procedures and IT controls
Case: The Favorable Allocation
Facts: Manager allocating IPO shares to largest clients
Standards: III(B) - Fair Dealing
Analysis: Systematic disadvantage to smaller clients
Violation: Unfair allocation practice
Proper Conduct: Pro-rata or rotation system
Prevention: Written allocation policies
DeFi Application
MEV and Fair Dealing: defi-application
Traditional: Fair execution for all clients
DeFi Challenge: MEV extractors front-running on [[Uniswap]]
Analysis:
- Using MEV against own users violates fair dealing
- Must implement MEV protection
- Disclose MEV risks to users
- Consider private mempools or batching
Standard-by-Standard Application Guide
This section provides a quick-reference mapping of common violations to each Standard, along with DeFi-specific contexts. Use this alongside the detailed guidance in Topic 3.
STANDARD I: PROFESSIONALISM standard-I
I(A) Knowledge of the Law compliance
Common Violations:
- Ignoring AML requirements
- Violating securities regulations
- Failing to report violations
Key Applications:
Scenario: Bank overcharging SWIFT fees
Violation: Misappropriation through false billing
Proper: Charge actual costs only
Scenario: Signing client documents with permission
Violation: Forgery regardless of consent
Proper: Obtain genuine signatures
DeFi Context:
- Compliance with evolving crypto regulations
- KYC/AML for DeFi protocols
- Cross-border regulatory requirements
I(B) Independence and Objectivity
Common Violations:
- Accepting expensive gifts
- Research for banking business
- Political donations for allocations
Key Applications:
Scenario: Hedge fund donating to politician overseeing pensions
Violation: Attempting to influence allocations
Proper: Avoid donations creating conflicts
Scenario: Analyst accepting issuer-paid travel
Violation: Independence compromised
Proper: Firm pays or decline travel
DeFi Context:
- Token incentives affecting recommendations
- Protocol partnerships influencing analysis
- Yield farming conflicts with client advice
I(C) Misrepresentation
Common Violations:
- Guaranteeing returns
- Plagiarizing research
- Omitting material facts
- Misstatting performance
Key Applications:
Scenario: Promising recovery of penalty losses
Violation: Cannot guarantee volatile returns
Proper: Explain risks and potential outcomes
Scenario: Not disclosing key personnel departure
Violation: Material omission
Proper: Immediate disclosure of changes
DeFi Context:
- APY sustainability disclosures
- Smart contract risk representation
- Audit status accuracy
- TVL calculation methodology
I(D) Misconduct
Common Violations:
- Fraud or deception
- Theft or dishonesty
- Actions harming reputation
Key Applications:
Scenario: Environmental protest arrest
No Violation: Personal beliefs don't reflect on profession
Proper: Maintain professional standards at work
Scenario: Misusing error account for client benefit
Violation: Fraudulent conduct regardless of intent
Proper: Follow error correction procedures
DeFi Context:
- Exploiting protocol vulnerabilities
- Manipulating governance votes
- Wash trading for volume
STANDARD II: INTEGRITY OF CAPITAL MARKETS standard-II
II(A) Material Nonpublic Information exam-focus
Common Violations:
- Trading on insider information
- Tipping others
- Mosaic theory misuse
Key Applications:
Scenario: Overhearing acquisition at tournament
Violation: Trading on overheard material information
Proper: Cannot trade until public
Scenario: CFO selective disclosure to analysts
Violation: Providing material nonpublic information
Proper: Public disclosure required
DeFi Context:
- Advance knowledge of protocol changes
- Unannounced partnership information
- Exploit discovery before disclosure
II(B) Market Manipulation
Common Violations:
- Artificial price movements
- False trading volumes
- Misleading information
Key Applications:
Scenario: False shareholder data for listing
Violation: Information-based manipulation
Proper: Provide accurate information only
Scenario: Coordinated buying to support price
Violation: Transaction-based manipulation
Proper: Let market determine prices
DeFi Context:
- Wash trading on DEXs like Uniswap
- Flash loan attacks via Aave
- Governance token manipulation in MakerDAO-style DAOs
- Chainlink oracle price manipulation
STANDARD III: DUTIES TO CLIENTS standard-III fiduciary
III(A) Loyalty, Prudence, and Care
Common Violations:
- Prioritizing personal interests
- Inadequate care
- Breaching fiduciary duty
Key Applications:
Scenario: Policy limiting liability to clients
Violation: Cannot contract away ethical duties
Proper: Maintain full fiduciary responsibilities
Scenario: Liquidating positions per margin agreement
No Violation: Following agreed procedures
Proper: Clear policies and execution
DeFi Context:
- Yield chasing without due diligence on Aave or Compound
- Recommending unaudited protocols
- Ignoring smart contract risks
III(B) Fair Dealing
Common Violations:
- Selective disclosure
- Preferential treatment
- Unfair allocations
Key Applications:
Scenario: Tiered research services for fees
No Violation: If available to all with disclosure
Proper: Ensure no unfair disadvantage
Scenario: IPO allocation to largest clients only
Violation: Systematic disadvantage to others
Proper: Fair allocation system
DeFi Context:
- Whitelist advantages
- Early access programs
- MEV protection disparities
III(C) Suitability
Common Violations:
- Inappropriate recommendations
- Ignoring constraints
- Inadequate analysis
Key Applications:
Scenario: 85% allocation to leveraged fund
Violation: Excessive concentration for conservative
Proper: Match risk to client profile
Scenario: Accepting client SMSF preference without analysis
Violation: Failed suitability determination
Proper: Thorough needs analysis
DeFi Context:
- DeFi complexity vs client sophistication
- Gas fee impact on small accounts
- Impermanent loss understanding
III(D) Performance Presentation
Common Violations:
- Cherry-picking results
- Misleading time periods
- Inadequate disclosures
Key Applications:
Scenario: Using pre-fund track record
Violation: Misleading performance attribution
Proper: Clear disclosure of data source
Scenario: Excluding poor performers
Violation: Survivorship bias
Proper: Include all relevant accounts
DeFi Context:
- Yield farming APY presentation
- Impermanent loss inclusion
- Gas cost impact disclosure
III(E) Preservation of Confidentiality
Common Violations:
- Improper information sharing
- Inadequate data security
- Unauthorized disclosures
Key Applications:
Scenario: Data breach from personal server
Violation: Failed to protect client information
Proper: Adequate security measures
Scenario: Sharing client details with spouse
Violation: Unauthorized disclosure
Proper: Maintain strict confidentiality
DeFi Context:
- On-chain privacy considerations
- Wallet address confidentiality
- Transaction history protection
STANDARD IV: DUTIES TO EMPLOYERS standard-IV
IV(A) Loyalty
Common Violations:
- Competing with employer
- Taking confidential information
- Disparaging employer
Key Applications:
Scenario: Downloading client list before leaving
Violation: Taking employer property
Proper: Leave without employer data
Scenario: Whistleblowing on illegal practices
No Violation: Protecting clients/market integrity
Proper: Report through appropriate channels
DeFi Context:
- Protocol forking ethics
- Team token vesting obligations
- Competitive protocol development
IV(B) Additional Compensation
Common Violations:
- Hidden compensation
- Undisclosed arrangements
- Conflicts of interest
Key Applications:
Scenario: Bonuses from covered companies
Violation Without Disclosure: Hidden compensation
Proper: Written consent from employer
Scenario: Board fees from client companies
Requires: Full disclosure and consent
Proper: Transparent arrangements
DeFi Context:
- Token airdrops from protocols
- Yield farming while employed
- Bug bounty participation
IV(C) Responsibilities of Supervisors
Common Violations:
- Inadequate supervision
- Ignoring violations
- Poor compliance systems
Key Applications:
Scenario: Remote work without oversight
Violation: Failed to establish compliance
Proper: Adequate monitoring systems
Scenario: Son supervising father
Violation: Cannot exercise proper authority
Proper: Decline if unable to supervise
DeFi Context:
- Overseeing DeFi trading desks
- Smart contract deployment reviews
- Protocol interaction monitoring
STANDARD V: INVESTMENT ANALYSIS standard-V
V(A) Diligence and Reasonable Basis
Common Violations:
- Insufficient research
- Relying on false information
- Inadequate verification
Key Applications:
Scenario: Using unverified third-party research
Violation: Failed independent verification
Proper: Conduct due diligence on sources
Scenario: Recommending without analysis
Violation: No reasonable basis
Proper: Thorough research required
DeFi Context:
- Smart contract code review
- Protocol economic analysis
- Risk assessment frameworks
V(B) Communication with Clients
Common Violations:
- Incomplete risk disclosure
- Unclear recommendations
- Missing methodology changes
Key Applications:
Scenario: Changing rating methodology silently
Violation: Failed to disclose material change
Proper: Communicate process changes
Scenario: Using technical jargon excessively
Violation: Unclear communication
Proper: Appropriate level for audience
DeFi Context:
- Explaining DeFi risks clearly
- Protocol mechanism disclosure
- Yield source transparency
V(C) Record Retention
Common Violations:
- Inadequate documentation
- Delayed updates
- Missing records
Key Applications:
Scenario: Updating records "when convenient"
Violation: Untimely record keeping
Proper: Prompt and regular updates
Scenario: No documentation of recommendations
Violation: Failed retention requirements
Proper: Maintain complete records
DeFi Context:
- Transaction history preservation
- Recommendation documentation
- On-chain interaction records
STANDARD VI: CONFLICTS OF INTEREST standard-VI
VI(A) Disclosure of Conflicts
Common Violations:
- Hidden conflicts
- Inadequate disclosure
- Misleading representations
Key Applications:
Scenario: Subadviser payments based on assets
Violation Without Disclosure: Hidden conflict
Proper: Full disclosure of arrangements
Scenario: Personal holdings in recommendations
Requires: Disclosure of positions
Proper: Transparent conflict management
DeFi Context:
- Token holdings disclosure
- Protocol relationships
- Yield farming positions
VI(B) Priority of Transactions
Common Violations:
- Front-running clients
- Favorable personal allocations
- Information advantages
Key Applications:
Scenario: Personal trades before client orders
Violation: Improper transaction priority
Proper: Clients trade first
Scenario: Allocating profits to personal accounts
Violation: Systematic self-dealing
Proper: Fair allocation policies
DeFi Context:
- MEV extraction ethics
- Personal vs client DeFi positions
- Information timing advantages
VI(C) Referral Fees
Common Violations:
- Undisclosed referral payments
- Hidden compensation
- Misleading about relationships
Key Applications:
Scenario: Gift cards for client referrals
Violation: Undisclosed referral compensation
Proper: Full disclosure to prospects
Scenario: Kickbacks from service providers
Violation: Hidden fee arrangements
Proper: Transparent fee disclosure
DeFi Context:
- Protocol referral programs
- Affiliate link disclosure
- Rebate arrangements
STANDARD VII: RESPONSIBILITIES AS FINANCE MEMBER standard-VII
VII(A) Conduct in Finance Certifications
Common Violations:
- Exam content disclosure
- Cheating or assistance
- Violating testing policies
Key Applications:
Scenario: Asking about specific exam questions
Violation: Soliciting exam content
Proper: General difficulty discussion only
Scenario: Sharing exam materials
Violation: Compromising exam integrity
Proper: Maintain confidentiality
VII(B) Reference to Finance
Common Violations:
- Misusing designation
- Incorrect attribution
- Lapsed membership usage
Key Applications:
Scenario: Using Finance with lapsed membership
Violation: Misrepresentation of status
Proper: Maintain active membership
Scenario: "Finance CertificationI Candidate" after failing
Violation: Not enrolled for next exam
Proper: Accurate status representation
Comprehensive Case Analysis Framework
Case Analysis Template
1. Initial Assessment
- Identify key parties
- Note relationships
- Flag potential issues
2. Standard-by-Standard Review
- Check each relevant Standard
- Apply specific tests
- Document violations
3. Violation Determination
- Clear violation?
- Gray area requiring judgment?
- No violation but poor practice?
4. Proper Conduct Identification
- What should have been done?
- Policy improvements needed?
- Preventive measures?
Complex Case Example
The Multi-Standard Violation Case case-study
Facts: Investment manager discovers accounting fraud at portfolio company through insider friend, trades on information, allocates profits to preferred clients, and doesn’t document the analysis.
Standards Violated:
- II(A): Trading on material nonpublic information
- III(B): Unfair dealing in allocation
- V(A): No reasonable basis (insider info)
- V(C): Failed record retention
- VI(B): Improper transaction priority
Proper Conduct:
- Cannot trade on inside information
- Report fraud through proper channels
- Fair allocation policies
- Document all decisions
- Client interests first
Practice Problems
Basic Level
-
An analyst overhears merger news at a conference. Can they trade? Answer: No - violates Standard II(A), material nonpublic information
-
A manager charges clients more than actual costs for services. Violation? Answer: Yes - violates Standard I(A), misappropriation
-
True/False: Civil disobedience arrests always violate Standard I(D) Answer: False - personal beliefs don’t necessarily reflect on professional competence
Intermediate Level
-
A supervisor’s son becomes CCO and must supervise his father. Issues?
- Standard violated: IV(C) - Responsibilities of Supervisors
- Problem: Cannot properly exercise authority
- Solution: Decline role or restructure reporting
-
An adviser gives premium research to higher-fee clients. Acceptable?
- Answer: Yes, if:
- Available to all clients
- Properly disclosed
- No unfair disadvantage
- Answer: Yes, if:
Advanced Level
-
Complex Scenario Analysis
A portfolio manager:
- Learns of acquisition from board member spouse
- Buys target company shares for all accounts
- Allocates most shares to largest clients
- Tells assistant to buy for personal account
- Documents trades as “value opportunity”
Identify all violations:
- II(A): Material nonpublic information
- III(B): Unfair allocation
- IV(C): Failed supervision (assistant trading)
- V(A): No reasonable basis
- V(C): False documentation
-
DeFi Application Case
A DeFi strategist:
- Discovers exploit in protocol
- Withdraws client funds first
- Withdraws personal funds
- Posts about exploit on Twitter
- Shorts protocol token
Analysis:
- Proper: Protecting client funds (III(A))
- Proper: Public disclosure after client protection
- Violation: Personal benefit from information (VI(B))
- Violation: Potential market manipulation (II(B))
DeFi-Specific Ethics Applications defi-application
Smart Contract Interactions
Ethical Considerations:
- Audit status disclosure
- Known vulnerability handling
- Upgrade risk communication
- Composability risk disclosure
Case: The Unaudited Protocol case-study
Scenario: Recommending high-yield unaudited protocol
Standards: III(A), V(A)
Analysis: Must disclose risks, conduct due diligence
Proper: Full risk disclosure, appropriate clients only
Governance Participation
DAO governance ethics mirror the corporate governance challenges studied in the Corporate Issuers section, with additional complexity from pseudonymity and token-weighted voting.
Ethical Framework:
- Voting in client interests
- Conflict disclosure
- Proposal analysis diligence
- Vote delegation ethics
Case: The Conflicted Vote case-study
Scenario: Voting on proposal benefiting personal holdings
Standards: VI(A), III(A)
Analysis: Conflict between personal and client interests
Proper: Disclose conflict, potentially abstain
MEV and Fair Execution
Ethical Standards:
- Fair transaction ordering
- MEV protection duties
- Execution quality
- Cost disclosure
Case: The MEV Opportunity case-study
Scenario: Using MEV bots against own clients
Standards: III(A), III(B)
Analysis: Extracting value from clients
Proper: Protect clients from MEV, fair execution
Yield Presentation
Yield presentation in DeFi directly parallels the performance presentation requirements of Standard III(D) and GIPS.
Accurate Representation:
- Sustainable vs promotional APYs
- Risk-adjusted returns
- Historical volatility
- Fee impact disclosure
Case: The Unsustainable APY case-study
Scenario: Advertising 1000% APY without context
Standards: I(C), III(D)
Analysis: Misleading performance presentation
Proper: Disclose sustainability, actual returns
Common Pitfalls & Exam Tips exam-focus
Frequent Exam Mistakes
The following five mistakes cost candidates the most points. Internalizing these distinctions is essential:
-
Assuming intent matters for violations — A violation occurs regardless of good intentions. The Standards are about conduct, not motive. Even well-meaning actions can violate the Code and Standards.
-
Thinking disclosure cures all conflicts — The 2023 revision to Standard VI(A) emphasizes that avoidance is preferred. Some conflicts cannot simply be disclosed away.
-
Believing personal trades are private — Standard VI(B) requires that client and employer transactions take priority. Family accounts are treated as personal.
-
Missing multiple Standard violations — One action often violates several Standards simultaneously. Always check for additional violations after finding the first.
-
Ignoring supervisory responsibilities — Under Standard IV(C), supervisors are responsible for reasonable efforts to detect and prevent violations, even if they did not personally commit them.
Key Exam Strategies
Violation Identification:
- Read fact pattern carefully
- Identify all parties and relationships
- Check each potentially relevant Standard
- Don’t stop at first violation found
Answer Selection Tips:
- “Most likely” means clearest violation
- “Least likely” means weakest connection
- “Best practice” exceeds minimum requirements
- “Required” means mandatory under Standards
High-Yield Topics
Most Tested Violations:
- Material nonpublic information
- Misrepresentation
- Fair dealing
- Suitability
- Conflicts of interest
- Priority of transactions
- Supervisory responsibilities
Common Fact Patterns:
- Overhearing information
- Selective disclosure
- IPO allocations
- Research independence
- Referral arrangements
- Performance presentation
- Departing employees
Key Takeaways
Essential Application Principles
- Client First: Always prioritize client interests
- Full Disclosure: When in doubt, disclose
- Independence: Maintain objectivity
- Fair Dealing: Treat all clients fairly
- Reasonable Basis: Thorough analysis required
- Documentation: Maintain complete records
- Supervision: Reasonable efforts to prevent violations
Violation Recognition Framework
Quick Assessment Questions:
- Who benefits from this action?
- Are client interests compromised?
- Is information material and nonpublic?
- Has full disclosure been made?
- Is there a reasonable basis?
- Are records being maintained?
Best Practices Beyond Requirements
- Err on side of caution
- Document decision rationale
- Seek compliance guidance
- Maintain ethical culture
- Regular training updates
- Clear policies and procedures
- Effective supervision systems
Cross-References & Additional Resources
Related Finance Topics
- Code of Ethics (Topic 2)
- Standards of Professional Conduct (Topic 3)
- GIPS Standards (Topic 4)
- Fiduciary Duty and Portfolio Management
- Corporate Governance
- Behavioral Biases — understanding the psychological drivers behind ethical failures
Key Resources
- Standards of Practice Handbook
- Ethics case studies database
- Finance guidance
- Disciplinary sanctions database
- Ethics adjustment policy
DeFi Ethics Resources
- DeFi Safety ratings
- Smart contract audit standards
- DAO governance best practices
- MEV ethics discussions
- Protocol security frameworks
Review Checklist
Core Understanding
- Can identify Standard violations in scenarios
- Understand proper conduct alternatives
- Know disclosure requirements
- Recognize conflicts of interest
- Understand priority of transactions
Application Skills
- Can analyze complex fact patterns
- Can identify multiple violations
- Can explain why conduct violates Standards
- Can describe proper alternatives
- Can apply to DeFi contexts
Exam Readiness
- Memorized key violation types
- Practice with case studies
- Understand evaluation framework
- Ready for scenario questions
- Know common fact patterns
Advanced Application
- Can handle gray areas
- Understand judgment calls
- Apply to emerging situations
- Integrate multiple Standards
- Develop compliance solutions