<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Risk Management Archives - CAMICO</title>
	<atom:link href="https://snoopy.camico.com/blog/category/risk-management/feed/" rel="self" type="application/rss+xml" />
	<link>https://snoopy.camico.com/blog/category/risk-management/</link>
	<description>Insurance for CPAs, by CPA&#039;s</description>
	<lastBuildDate>Tue, 26 Aug 2025 19:16:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://snoopy.camico.com/wp-content/uploads/2022/04/camfav-150x150.png</url>
	<title>Risk Management Archives - CAMICO</title>
	<link>https://snoopy.camico.com/blog/category/risk-management/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Be Prepared: The Quality Management Standards Are Coming</title>
		<link>https://snoopy.camico.com/blog/be-prepared-the-quality-management-standards-are-coming/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=be-prepared-the-quality-management-standards-are-coming</link>
		
		<dc:creator><![CDATA[Amber]]></dc:creator>
		<pubDate>Tue, 26 Aug 2025 19:15:55 +0000</pubDate>
				<category><![CDATA[CPA]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://www.camico.com/?p=13331</guid>

					<description><![CDATA[<p>By Duncan B. Will, CPA/ABV/CFF, CFE The AICPA’s Statements on Quality Management Standards’ (“SQMS”) December 15, 2025, effective date is fast approaching, and few firms are prepared. Since the SQMS were issued in June 2022, the AICPA has produced a plethora of related content. This article is not intended as a treatise on the SQMS. ... <a title="Be Prepared: The Quality Management Standards Are Coming" class="read-more" href="https://snoopy.camico.com/blog/be-prepared-the-quality-management-standards-are-coming/" aria-label="Read more about Be Prepared: The Quality Management Standards Are Coming">Read more</a></p>
<p>The post <a href="https://snoopy.camico.com/blog/be-prepared-the-quality-management-standards-are-coming/">Be Prepared: The Quality Management Standards Are Coming</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="13331" class="elementor elementor-13331" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-e15b054 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="e15b054" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf8ae6d" data-id="cf8ae6d" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-3f89eb5 elementor-widget elementor-widget-text-editor" data-id="3f89eb5" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p style="text-align: center;">By Duncan B. Will, CPA/ABV/CFF, CFE</p><p>The AICPA’s Statements on Quality Management Standards’ (“SQMS”) <strong>December 15, 2025</strong>, effective date is fast approaching, and few firms are prepared. Since the SQMS were issued in June 2022, the AICPA has produced a plethora of related content. This article is not intended as a treatise on the SQMS. Instead, this article is an extremely brief overview of the SQMS, and shares risk management tips intended to motivate you to make progress on modifying your firm’s system of quality management to be compliant with the SQMS.</p><p><strong>Overview</strong></p><p>The SQMS represent a significant overhaul of the<strong> quality control </strong>framework for CPA firms, shifting from a <strong>rules-based</strong> to a <strong>risk-based quality management</strong> framework. These standards are designed to ensure that firms establish, implement, and maintain effective systems of quality management tailored to their unique circumstances and engagements.</p><p>The items listed and in the image, below, are components of the new SQMS, initially introduced when the International Auditing and Assurance Standards Board rolled out their quality management standards. Three components are elements of the extant quality control standards (“QCS”); three are renamed and expanded/updated elements of the (soon to be replaced) QCS; and the new components are the two COSO components not addressed in the extant QCS.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-f054ef6 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="f054ef6" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-901a610" data-id="901a610" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-a460fe8 elementor-widget elementor-widget-image" data-id="a460fe8" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img fetchpriority="high" decoding="async" width="768" height="352" src="https://snoopy.camico.com/wp-content/uploads/2025/06/QM-photo-768x352.jpg" class="attachment-medium_large size-medium_large wp-image-13337" alt="" srcset="https://snoopy.camico.com/wp-content/uploads/2025/06/QM-photo-768x352.jpg 768w, https://snoopy.camico.com/wp-content/uploads/2025/06/QM-photo-300x138.jpg 300w, https://snoopy.camico.com/wp-content/uploads/2025/06/QM-photo-1024x470.jpg 1024w, https://snoopy.camico.com/wp-content/uploads/2025/06/QM-photo.jpg 1144w" sizes="(max-width: 768px) 100vw, 768px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-85d55ef elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="85d55ef" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-53eb101" data-id="53eb101" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-43d525e elementor-widget elementor-widget-text-editor" data-id="43d525e" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>You are not required to implement the standards before <strong>December 15, 2025</strong>, but all standards applicable to your firm must be implemented <strong>by that date</strong>. Firms performing services in accordance with Statements on Auditing Standards, Statements on Standards for Accounting and Review Services, or Statements on Standards for Attestation Engagements must design and implement their systems of quality management in compliance with the SQMS and should already have begun this process.</p><p>The initial evaluation of your firm’s designed system of quality management is to be performed during the year ending December 15, 2026, and annually thereafter, to assess whether your system of quality management meets its quality objectives.<sup>1</sup></p><p><strong>Risk Management Tips: </strong></p><p>The clock is ticking, and December 15, 2025, is fast approaching, so although not meant to be all-inclusive, do consider the following risk management tips and best practices:</p><ul><li>Don’t let “perfect be the enemy of good.” If unchecked, this aphorism can create crippling inertia in the development of your quality management process. Understand that a system of quality management is an evolving, iterative, dynamic process. Learn from the process, share information with your team, and use that information to improve your system of quality management.                                                                                                           </li><li>Seek your peer reviewer’s guidance with the transition. Your peer reviewer’s familiarity with your quality control system and understanding of the new standards can be instrumental in assisting you with designing your system of quality management. Ask what tools your peer reviewer believes would be beneficial for you. Ideally, you can obtain your peer reviewer’s insight and tips specific to your unique needs. However, be cautious not to rely too heavily on your peer reviewer (unless you are willing to secure the services of another) as doing so could threaten your peer reviewer’s independence.                                                                           </li><li>Consider having a senior member of your system of quality management development team lead your firm’s brainstorming sessions and adopt a two-phased approach to brainstorming. During the initial phase, the discussion leader should encourage and reinforce that this phase is exclusively for the generation of ideas, and that there be no evaluation or criticism of ideas raised. Care should be taken to record every suggestion. Only during the second phase should the team evaluate or constructively critique aspects of the initial brainstorming phase. This two-phase approach will encourage team members to offer a greater number of suggestions as well as more-nuanced suggestions, which might otherwise not be captured and considered in the development of your system of quality management.                                                                                             </li><li>Consider supplementing your external resources by collaborating with other practitioners with similar practices.                                                                                                                                                                                              </li><li>Don’t overcomplicate your transition process or try to address every potential risk. Instead, focus on the quality risks that are material, relevant, or of higher risk to your firm; the types of industries, businesses, and organizations you serve; and the services you offer.                                                                                                                                                                             </li><li>SQMS No. 1 indicates that root cause analyses should be performed by people responsible for the firm’s system of quality management. But to maintain objectivity, you should take care to avoid assigning individuals to perform root cause analyses that are on engagements being reviewed.</li></ul><p style="padding-left: 40px;">Root cause analysis can be extremely complicated, but don’t get lost. Keep it as simple as possible. Now may be a good time to reacquaint yourself with or to discover the “Five Whys Technique,” which involves repeatedly asking “why” to identify a problem’s root cause. The technique can help you and your firm evaluate and avoid overlooking the root causes of identified deficiencies in your firm’s system of quality management.</p><ul><li>As with the extant quality control standards, the SQMS require you to document your system of quality management. As before, that documentation may be used by your peer reviewer to assess whether your firm has complied with the standards. If documentation indicates your firm will perform procedures exceeding those required by professional standards, those elevated requirements will be the benchmark used to assess your compliance. So, take care in documenting your firm’s quality objectives, quality risks, your responses to those risks, and ultimately your system of quality management, taking care to identify those responsible and accountable for your system.                                                                                                         </li><li>Keep up to date with quality management standards’ developments and take advantage of resources developed and shared by the AICPA:<a href="https://www.aicpa-cima.com/resources/landing/a-journey-to-quality-management?cid=email:sfmc:da_clec_3780_qm_countdown_cpaletterdailyleaderboard_728_90_keon:qmstandardwebcast:na&amp;utm_medium=email&amp;utm_source=sfmc&amp;utm_campaign=da_clec_3780_qm_countdown_cpaletterdailyleaderboard_728_90_keon&amp;utm_content=qmstandardwebcast&amp;utm_promocode=na&amp;utm_medium=email&amp;utm_source=SFMC_RAVE&amp;utm_campaign=&amp;utm_content=853972&amp;AdditionalEmailAttribute2=&amp;AdditionalEmailAttribute3=&amp;AdditionalEmailAttribute4=&amp;AdditionalEmailAttribute5="> A journey to quality management | Resources | AICPA &amp; CIMA         </a>                           </li><li>Firms encountering challenges with the transition should consider seeking external support. Firms may benefit from engaging entities that specialize in offering tailored assistance with the implementation of the quality management standards.</li></ul><p><strong>Contact CAMICO</strong></p><p>CAMICO policyholders with questions regarding this communication or other risk management questions should contact the Loss Prevention department at <a href="mailto:lp@camico.com">lp@camico.com</a>, or call our advice hotline at 800.652.1772 and ask to speak with a Loss Prevention Specialist.</p><p><sup>1 Quality objectives — The desired outcomes in relation to the components of the system of quality management to be achieved by the firm.</sup></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://snoopy.camico.com/blog/be-prepared-the-quality-management-standards-are-coming/">Be Prepared: The Quality Management Standards Are Coming</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Claim Chronicles 126-A</title>
		<link>https://snoopy.camico.com/blog/claim-chronicles-126-a/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=claim-chronicles-126-a</link>
		
		<dc:creator><![CDATA[Amber]]></dc:creator>
		<pubDate>Thu, 26 Jun 2025 21:01:17 +0000</pubDate>
				<category><![CDATA[Claims]]></category>
		<category><![CDATA[CPA]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://www.camico.com/?p=13393</guid>

					<description><![CDATA[<p>First-party damages: refers to losses directly suffered by the policyholder (or insured) firm in response to a firm’s data breach or other covered cyber event. Topic: First-Party Cyber Attack CAMICO policyholder Mary Davis had just signed on to her computer one morning when she received an email from a “potential client” named “Tim,” who was ... <a title="Claim Chronicles 126-A" class="read-more" href="https://snoopy.camico.com/blog/claim-chronicles-126-a/" aria-label="Read more about Claim Chronicles 126-A">Read more</a></p>
<p>The post <a href="https://snoopy.camico.com/blog/claim-chronicles-126-a/">Claim Chronicles 126-A</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="13393" class="elementor elementor-13393" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-e99a117 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="e99a117" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0001c1d" data-id="0001c1d" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-511958c elementor-widget elementor-widget-text-editor" data-id="511958c" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong><em>First-party</em></strong><em> damages: refers to losses directly suffered by the policyholder (or insured) firm in response to a firm’s data breach or other covered cyber event.</em></p><h5>Topic: First-Party Cyber Attack</h5><p>CAMICO policyholder Mary Davis had just signed on to her computer one morning when she received an email from a “potential client” named “Tim,” who was requesting her services. In the email, “Tim” stated that he would pay Mary $7,500 upfront and an additional $300 for processing fees. “The client” asked Mary to invoice him via QuickBooks and so she did. QuickBooks fronted the $7,800 prior to any verification that there were funds in “Tim’s” account to cover the invoice. Four days later, “Tim” sent another email stating that he included an additional $11,000 because he wanted Mary to purchase computers for his daughters and ship them to him. The next day, Mary noticed a credit to her account for $20,000. Later that evening, she received another email from “Tim” saying that he had changed his mind about the computers and asked her to issue him a refund for $11,000 and so she did. “Tim,” (the fraudster) then cancelled the original transaction, causing Mary to lose $11,000 plus the $7,500 that QuickBooks fronted. This is because it turned out that there wasn’t any money in “Tim’s” account to cover the thousands of dollars. Mary contacted the police and her bank to notify them of the fraud and on the same day, she received a notification from Intuit (QuickBooks) that the initial transaction for $20,000 had been charged back. The police came to Mary’s residence and took a report but the damage was done. Mary was now a victim of fraud through her own business and the funds were not recovered.</p><h5>Select the answer that is the correct response:</h5><p><span style="color: #ff9900;"><strong>1. What kind of cyber attack occurred in this claim?</strong></span><br />a. Ransomware <br />b. Phishing <br />c. Password attack</p><p><span style="color: #ff9900;"><strong>2. Was this first-party claim covered by the policyholder&#8217;s coverage with CAMICO?</strong></span><br />a. Yes<br />b. No</p><p><span style="color: #ff9900;"><strong>3. Does CAMICO&#8217;s claims department see more first-party or third-party claims?</strong></span><br />a. First-party claims<br />b. Third-party claims</p><h5>Correct Answers:</h5><p><strong>1. <span style="color: #ff9900;">b.</span></strong> <strong>Phishing</strong> is a variation of spoofing, which occurs when an attacker attempts to obtain personal or financial information from the victim using fraudulent means, most often by impersonating as another user or organization.</p><p><strong>2. <span style="color: #ff9900;">b.</span> No.</strong> It was not covered because it was financial loss by the policyholder, which is not included in the CyberCPA endorsement, the Accountants Professional Liability policy, a Business Owner’s Policy (BOP) or theft policy. For a higher level of coverage, such as a stand-alone cyber policy, contact CAMICO for more information at 1.800.652.1772.</p><p><strong>3. <span style="color: #ff9900;">a and b.</span> Both, and this is why:</strong> For every first-party claim that is reported, there is the risk of a third-party claim developing due to stolen information. CAMICO&#8217;s claims department investigates every claim with both first-party and third-party damages in mind. Third-party damages, if discovered, are handled under the Accountants Professional Liability (APL) policy. Therefore, if a first-party claim is reported, a third-party potential claim is also opened to lock in coverage should third-party damages occur. But in most cases, a third-party claim doesn&#8217;t arise because most policyholders become aware of their system being attacked prior to damages being able to occur. Many policyholders have their own IT team who can shut down the system and start a forensic investigation on what was taken and to notify people as soon as possible.</p><p><em>The “Claim Chronicles” are drawn from CAMICO claims files and illustrate some of the dangers and pitfalls in the accounting profession. All names were changed.</em></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://snoopy.camico.com/blog/claim-chronicles-126-a/">Claim Chronicles 126-A</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Claim Chronicles 126-B</title>
		<link>https://snoopy.camico.com/blog/claim-chronicles-126-b/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=claim-chronicles-126-b</link>
		
		<dc:creator><![CDATA[Amber]]></dc:creator>
		<pubDate>Thu, 26 Jun 2025 20:53:03 +0000</pubDate>
				<category><![CDATA[Claims]]></category>
		<category><![CDATA[CPA]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://www.camico.com/?p=13405</guid>

					<description><![CDATA[<p>Third-party damages: refers to damages alleged by clients or other third parties that the negligence of the CPA firm contributed in whole or in part to the third party’s cyber-related loss. Topic: Third-Party Cyber Attack CAMICO policyholders Michael Jones and Tom Smith of Jones &#38; Smith Accounting Services were out of the office during the ... <a title="Claim Chronicles 126-B" class="read-more" href="https://snoopy.camico.com/blog/claim-chronicles-126-b/" aria-label="Read more about Claim Chronicles 126-B">Read more</a></p>
<p>The post <a href="https://snoopy.camico.com/blog/claim-chronicles-126-b/">Claim Chronicles 126-B</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="13405" class="elementor elementor-13405" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-a3701d2 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="a3701d2" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b049199" data-id="b049199" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-3c12c2e elementor-widget elementor-widget-text-editor" data-id="3c12c2e" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong><em>Third-party </em></strong><em>damages: refers to damages alleged by clients or other third parties that the negligence of the CPA firm contributed in whole or in part to the third party’s cyber-related loss.</em></p><h5>Topic: Third-Party Cyber Attack</h5><p>CAMICO policyholders Michael Jones and Tom Smith of Jones &amp; Smith Accounting Services were out of the office during the week of May 19-23. On May 20, their office received a call from a fraudster who claimed to work for Wells Fargo. Leslie Johnson, a current employee of the accounting firm, was the individual who answered the call and shared the requested information with the attacker. A day later, the scammer initiated multiple fraudulent transactions. While Jones was traveling back to the office on May 26, he received a call from Matthew Patterson, a client relationship manager with Wells Fargo. Patterson advised that a transaction for $224,528 was requested, along with a $175,000 ACH (Automated Clearing House) electronic payment. Jones explained that they were fraudulent transactions, and both were stopped and deleted. Alarmed by the fraud, Jones called the fraud department later that evening to discuss his concerns. He learned that three transactions for $153,000, $193,000, and $175,000 were moved into a fraudulent account and were deleted and reversed on May 23. Four days later, a lump sum for $525,000 was transferred out of the client’s account into a different fraudulent account, however, the funds were not reversed. Wells Fargo was able to stop three transactions, but not the largest one of $525,000. Fortunately for Jones, some of the money was recovered through Wells Fargo’s cyber carrier (after a forensic investigation was conducted).</p><h5>Select the answer that is the correct response: </h5><p><span style="color: #ff9900;"><strong>1. What was the accounting firm&#8217;s breach/ key mistake?</strong></span><br />a. Not implementing multiple security tools to detect and block cyber threats<br />b. Not installing robust security software and maintaining it with the latest security updates<br />c. Human error; lack of proper training and strict adherence to firm-wide protocols</p><p><span style="color: #ff9900;"><strong>2. Was this third-party claim covered by the policyholder’s coverage with CAMICO?</strong></span><br />a. Yes<br />b. No</p><p><span style="color: #ff9900;"><strong>3. Are most third-party claims covered under a policy with CAMICO?</strong></span> <br />a. Yes<br />b. No</p><h5>Correct Answers:</h5><p><strong>1. <span style="color: #ff9900;">c.</span></strong> Leslie Johnson, an employee at the accounting firm, gave the attacker sensitive information without proper verification and company protocol. Firms can and should consider their people as the first line of defense against cyber threats. Human error remains a significant threat to cybersecurity, with a wide range of activities such as weak password practices, falling for phishing attacks, and the mishandling of sensitive information contributing to security breaches. Refer to The Cyber Saga Continues… Protect Your Firm from First-Party and Third-Party Cyber Exposures article in this IMPACT for risk management tips on this topic.</p><p><strong>2. <span style="color: #ff9900;">a.</span> Yes.</strong> It was fully covered under the policyholder’s Accountants Professional Liability (APL) policy because they engaged to do a professional service and their office gave the attacker information that resulted in the fraudulent transactions, so the insuring agreement was met. CAMICO’s APL insurance is designed to cover losses by third parties that CAMICO’s policyholder is responsible for due to negligence. This claim is an example of a vishing cyber attack, or voice phishing, where fraudulent phone calls are made to trick individuals into revealing personal information or money. These scams often involve attackers impersonating trusted entities like banks, government agencies, or tech support to gain the victim&#8217;s trust and exploit them.</p><p><strong>3.<span style="color: #ff9900;"> a.</span> Yes.</strong> As long as a claim fits the insuring agreement and no exclusions apply, most third-party cyber damages that are a result of the professional services that the policyholder engaged to do are covered. How liability is assessed: Was the policyholder liable for allowing the fraudulent activity to occur? What duties did the policyholder owe? What duties did the policyholder breach? What damages were sustained and are those damages a result of the breached duties?</p><p><em>The “Claim Chronicles” are drawn from CAMICO claims files and illustrate some of the dangers and pitfalls in the accounting profession. All names were changed.</em></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://snoopy.camico.com/blog/claim-chronicles-126-b/">Claim Chronicles 126-B</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Cyber Saga Continues… Protect Your Firm from First-Party and Third-Party Cyber Exposures</title>
		<link>https://snoopy.camico.com/blog/the-cyber-saga-continues-protect-your-firm-from-first-party-and-third-party-cyber-exposures/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-cyber-saga-continues-protect-your-firm-from-first-party-and-third-party-cyber-exposures</link>
		
		<dc:creator><![CDATA[Amber]]></dc:creator>
		<pubDate>Tue, 24 Jun 2025 23:34:08 +0000</pubDate>
				<category><![CDATA[Accounting]]></category>
		<category><![CDATA[CAMICO]]></category>
		<category><![CDATA[CPA]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://www.camico.com/?p=13245</guid>

					<description><![CDATA[<p>In today’s digital landscape, it is no surprise that there appears to be a new cybersecurity story in the news every week, from attacks on major infrastructure to small companies being held for ransom. The risk of cyber threats continues to grow for CPA firms, along with other professional services firms, as all are considered ... <a title="The Cyber Saga Continues… Protect Your Firm from First-Party and Third-Party Cyber Exposures" class="read-more" href="https://snoopy.camico.com/blog/the-cyber-saga-continues-protect-your-firm-from-first-party-and-third-party-cyber-exposures/" aria-label="Read more about The Cyber Saga Continues… Protect Your Firm from First-Party and Third-Party Cyber Exposures">Read more</a></p>
<p>The post <a href="https://snoopy.camico.com/blog/the-cyber-saga-continues-protect-your-firm-from-first-party-and-third-party-cyber-exposures/">The Cyber Saga Continues… Protect Your Firm from First-Party and Third-Party Cyber Exposures</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="13245" class="elementor elementor-13245" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-69ce6b7 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="69ce6b7" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0aca252" data-id="0aca252" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-6f2e583 elementor-widget elementor-widget-text-editor" data-id="6f2e583" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>In today’s digital landscape, it is no surprise that there appears to be a new cybersecurity story in the news every week, from attacks on major infrastructure to small companies being held for ransom. The risk of cyber threats continues to grow for CPA firms, along with other professional services firms, as all are considered prime targets for cyber criminals given the wealth of sensitive client data, financial information, and/or legal documents they maintain.</p><p>Don’t be lulled into a false sense of comfort that your firm (or your clients) are too small or too large to be attacked. CAMICO is seeing an uptick in the number of cyber-related claims impacting CPA firms of all sizes and unfortunately, the severity of these cyber crimes and ransomware attacks have grown in recent years.</p><p>Some of the more frequent categories of loss for CPA firms related to cyber claims include:</p><ul><li>Social engineering</li><li>Funds transfer fraud</li><li>Theft of data</li><li>Loss of laptop or data stick</li><li>Unauthorized use of networks</li><li>Failure to protect client confidential information shared with a third-party service provider</li><li>Computer system cloud hack</li><li>Lost profits related to cyber events</li><li>Ransom attacks</li></ul><p>Identifying key cyber risks and best practices to mitigate risk exposures is important to safeguard confidential information, maintain client trust, and ensure your firm’s continuity. One of the important concepts people must be aware of when evaluating their cybersecurity exposures is the difference between first-party risks and third-party risks. First-party risks are damages and losses you incur from a cyber attack or security breach of your firm, whereas third-party risks often arise when a hacker has penetrated the firm’s (or client’s) computer system causing damages to a client or other third party as a result of the cyber incident for which the firm may be blamed in whole or in part.</p><p>As you would expect, first-party cyber exposures have become increasingly problematic for CPA firms as cyber criminals are targeting CPA firms and tax professionals with greater frequency because of the abundance of client data found on CPA firms’ computers. If they are successful in gaining access to a firm’s information infrastructure, there can be costly measures that need to be taken by the firm such as hiring IT forensic experts to determine the extent of the breach, consulting with attorneys who specialize in data breach laws and notification obligations, and providing credit monitoring to those impacted by the breach.</p><p>What may be surprising to some CPAs, however, is the increase in third-party cyber exposures that are impacting firms. These situations often arise when a client has been hacked, and the hacker has penetrated the client’s computer system and once inside, causes all manner of losses for which the CPA firm may be blamed. Unfortunately, many of these incidents tend to be high-dollar claims against the CPA firm. These claims typically include allegations that the firm failed to detect red flags associated with communications executed by the hacker, falling below the standard of care by initiating wire transfers (later determined to be fraudulent) without “proper” client authorization, failure to “warn and advise” clients of the potential risks/threats of cyber attacks, and the list goes on.</p><p><strong>Cyber Claims Trends</strong><br />Human error remains a significant threat to cybersecurity, with a wide range of activities such as weak password practices, falling for phishing attacks, and the mishandling of sensitive information contributing to security breaches.</p><p>Social engineering, which is the art of exploiting human behavior as a manipulation technique to gain access to confidential information, is one of the most dangerous types of cybersecurity threats to CPA firms given the type of information that firms gather and store. “Phishing” is one of the more widespread social engineering schemes, where information in an email attempts to convince a recipient that the email is from a legitimate source and the recipient needs to respond to the request by clicking a link. The trend this past tax season as reported in CAMICO’s mid-March 2025 Alert is bogus emails from the “Social Security Administration” or “IRS e-Services.” As employees are the most common entry point for phishing attacks, a firm’s best protection against social engineering attempts is to make continuous efforts to raise awareness with staff to <strong>never take these emails at face value</strong> and instead, maintain ongoing vigilance and enhanced skepticism with every email and online interaction.</p><p>Consider the following two scenarios from the CAMICO claims files which unfortunately are becoming all too familiar for CPA firms:</p><p style="padding-left: 40px;"><strong>Scenario #1: Client hacked; CPA firm initiated fraudulent wire-transfers<br /></strong>A client of the CPA firm was hacked, and the hacker penetrated and commandeered the client’s email account. The hacker emailed several requests to the CPA firm to wire funds to a new account — a classic “man in the middle” attack. After receiving each request, a CPA firm staff member emailed the client to verify the wire transfer instructions. As the hacker had full control of the client’s email account, the hacker was able to respond back to the CPA firm to verify the payments to the hacker’s overseas bank account.<strong><br /></strong></p><p style="padding-left: 40px;">The above scenario, unfortunately, has become a recurring fact pattern, and these fraudulent wire transfer requests frequently cause large dollar losses. If the fraudster is controlling the client’s email and potentially their phone system as well, and the fraudulent request mimics previous legitimate requests, it is often difficult for the firm to identify the request as illegitimate. When fraud is discovered after the transfer, the funds are usually not recoverable. Domestic banks are not always helpful in preventing fraudulent transfers, as laws tend to limit their risk exposures and enable them to deny responsibility.</p><p style="padding-left: 40px;">With the increased number of claims related to fraudulent wire transfers, the best risk management practice in the absence of any written protocols to the contrary is to verbally confirm <strong>all</strong> wire transfer requests with the client, and <strong>not</strong> rely on email or voicemail confirmations. Unfortunately, technological advances have permitted sophisticated scammers to create AI versions not only of people’s voices, but also realistic avatars of scam targets so that you can’t trust your ears or your eyes on virtual calls (Microsoft Teams). <strong>Ideally, you and your client will have a code word and/or phrase to confirm the authenticity of the person you are speaking to.</strong> Additional loss prevention guidance to minimize fraudulent wire transfer exposure can be found in CAMCO’s article <em>Social Engineering Scams/Fraudulent Wire Transfers</em>. Refer to the Cyber/Data Security Resource Center on CAMICO’s <a href="https://member.camico.com/portal/Policyholder-Login">Members-Only Site</a>.</p><p style="padding-left: 40px;"><strong>Scenario #2: Ransomware</strong><br />An employee of a CPA firm opened an unsolicited email attachment from “IRS e-Services” that immediately downloaded ransomware onto the firm’s computer system. The employee noticed that the file names were rapidly being changed to “Needs Decrypting.” The employee turned off and rebooted the computer, but the virus had already spread to all the firm’s servers, and all the files became encrypted. The employee reported the incident to the firm’s managing partner and the firm promptly took actions in accordance with their Incident Response Plan. Once it was determined that a breach had occurred, the firm complied with applicable state and federal laws, and the breach was reported to law enforcement.</p><p style="padding-left: 40px;">Ransomware is one of the most malicious hacker attack vectors and firms of all sizes have become victims. It sneaks into computer systems, encrypts files, and demands a ransom before agreeing to decrypt the files. A major problem is that hackers do not always decrypt files even after the ransom is paid.</p><p style="padding-left: 40px;">Ransom demands have certainly increased in recent years and it is not unusual to see them range from several thousand dollars to several hundred thousand dollars. Some ransomware attacks rely on software that now has known fixes, so a solution might be found online. Other ransom attacks are more advanced and have no known fixes, other than the victim retrieving and relying on the latest backup files. Therefore, being prepared and taking precautions against cyber risk exposures is essential.</p><p>To gain a greater perspective on how CPA firms are impacted by cyber exposures, refer to the <em>IMPACT 126</em> <em>Claims Chronicles</em> for two additional cyber-related claims.</p><p><strong>Has your firm prepared for a cyber incident?</strong><br />Remember, it is not if you will be attacked, but <em>when</em>.</p><p>The weakest link in most cybersecurity attacks today continues to be the <strong>human element</strong>, so it is important to remember that your firm employees are a vital line of defense. Take action now to arm your employees with education, awareness, and reminders, so that they can make informed decisions about what they click.</p><p>Although not meant to be all-inclusive, the following additional <strong>basic best practice measures</strong> are extremely important when addressing the <strong>human element</strong> of data security:</p><ol><li><strong>Cybersecurity awareness training:</strong> As employees are the most common entry point for phishing attacks, a firm’s best protection against social engineering is to make continuous efforts to raise awareness of the importance of ongoing vigilance and enhanced skepticism of each email and online interaction. Education can come in various forms, both formal and informal. Consider sharing with your team “real-life” examples of the potential scam emails received by members of your firm. Learning of the attempted attacks on their colleagues heightens awareness of the nature and types of scams that pose potential threats.</li></ol><p style="padding-left: 40px;">As part of the firm-wide cybersecurity awareness training, you should also consider reviewing the firm’s existing protocols and infrastructure (refer to the firm’s written security plan in place) that supports the firm’s commitment to taking appropriate cybersecurity precautions so that all employees are aware and updated when changes are made. If your firm does not yet have a written security plan in place or you are in the process of updating your document, refer to CAMICO’s Written Information Security Plan (“WISP” or “ISP”) template. The template can be found on the Cyber/Data Security Resource Center on the CAMICO <a href="https://member.camico.com/portal/Policyholder-Login">Members-Only Site</a>.</p><p style="padding-left: 40px;">Raising the cybersecurity IQ of all employees will help tremendously in guarding against a breach and will minimize your firm’s potential exposure as employees will be better able to recognize social engineering attempts and understand the importance of guarding their login/authentication credentials both in the office and at home. To be of ultimate value, it is important for firms to commit to embracing a motto of continuous education because the threat landscape doesn’t stop evolving when your employees’ cybersecurity training is done.</p><p style="padding-left: 40px;">2. <strong>Use multi-factor authentication.</strong> This can add an extra level of security to prevent an account hack, especially when employees work remotely.</p><p style="padding-left: 40px;">3. <strong>Change and strengthen passwords frequently.</strong> Systems are only as secure as the passwords used to access them.</p><p style="padding-left: 40px;">4. <strong>Ensure all software has the latest security options/patches.</strong> This will help protect against malware, viruses, and hacker attacks.</p><p style="padding-left: 40px;">5. <strong>Require regular data backups.</strong> By encouraging employees to regularly back up their data you are preventing data loss when disaster strikes. While this may be a hard policy to enforce for employees working remotely, it remains the best practice. In many instances, devices can be set to back up to the cloud automatically. When relying on cloud storage remember that ransomware can also compromise cloud services. Any data stored in the cloud should also be periodically backed up to an external hard drive. Data backups ensure that a business can continue to operate, even if resources are taken offline by a ransomware attack.</p><p style="padding-left: 40px;">6. <strong>Maintain strong cyber hygiene.</strong> Reinforce with employees the cyber protocols to be followed when working both in the office as well as remotely (e.g., machine use restrictions, Wi-Fi passwords, VPN, firewalls, etc.).</p><p style="padding-left: 40px;">7. <strong>Remind all employees of the importance of powering down computers when not in use.</strong> Computers are not accessible to attacks or intrusions when powered off.</p><p><strong>Choose the Right Cyber Insurance Coverage</strong><br />Cyber insurance protects against financial losses related to data breaches or other covered cyber events. Cyber insurance coverage is basically divided along two lines:</p><ul><li>First-party, which refers to losses directly suffered by the policyholder (or insured) firm in response to a firm’s data breach or other covered cyber event, and</li><li>Third-party, which refers to damages alleged by clients or other third parties that the negligence of the CPA firm contributed in whole or in part to the third party’s cyber-related loss. CAMICO’s professional liability policy generally will cover third-party cyber claims subject to applicable policy terms, conditions, and exclusions.</li></ul><p>It is possible that a single cyber incident may give rise to both damage suffered by the firm (first-party losses) and damages allegedly suffered by others that blame the firm (third-party losses). The relationship between the first and third parties can be formed in many ways. It can be contractual (for example, engagement letters), built through tort law, common law, or other ways. CPA firm clients are third parties, and others may become a third party based on the nature of an incident. Clients may have insurance of their own, making them a first party with their own cyber insurance carrier.</p><p>First-party insurance typically covers the direct costs of actions needed after a firm has had a data breach, extortion, ransomware attack, or other hacker malfeasance against the firm. Third-party cyber-liability insurance, on the other hand, covers the costs of dealing with the claims of other parties that seek to hold your firm at least partially responsible for damages that they have incurred because of a cyber incident. Sometimes, the line between first-party damage and third-party damage becomes blurred — especially if a firm and its client have both been breached, and forensic analysis cannot conclusively establish either the sequence of events leading up to the breach and/or how the breach occurred.</p><p>Although not meant to be all-inclusive, the table below shows common cyber costs and damage that may be incurred in cyber-related claim situations, classified by first- and/or third-party potential exposures:</p><table><tbody><tr><td width="396"> </td><td width="114"><p style="text-align: left;"><strong>First-Party <span style="text-decoration: underline;">Exposures</span></strong></p></td><td style="text-align: left;" width="114"><p><strong>Third-Party <span style="text-decoration: underline;">Exposures</span></strong></p></td></tr><tr><td width="396">Restoration of the damaged systems, hardware, software and network</td><td width="114"><strong>X</strong></td><td width="114"><strong> </strong></td></tr><tr><td width="396">Cost to restore lost data</td><td width="114"><strong>X</strong></td><td width="114"><strong> </strong></td></tr><tr><td width="396">Ransom fees to retrieve lost data or reopen systems</td><td width="114"><strong>X</strong></td><td width="114"><strong> </strong></td></tr><tr><td width="396">Notification costs</td><td width="114"><strong>X</strong></td><td width="114"><strong>X</strong></td></tr><tr><td width="396">Forensic investigation costs</td><td width="114"><strong>X</strong></td><td width="114"><strong> </strong></td></tr><tr><td width="396">Credit monitoring costs</td><td width="114"><strong>X</strong></td><td width="114"><strong>X</strong></td></tr><tr><td width="396">Reprogramming costs</td><td width="114"><strong>X</strong></td><td width="114"><strong> </strong></td></tr><tr><td width="396">Business interruption costs</td><td width="114"><strong>X</strong></td><td width="114"><strong> </strong></td></tr><tr><td width="396">Lost client’s money sent to someone incorrectly due to a cyber event</td><td width="114"><strong> </strong></td><td width="114"><strong>X</strong></td></tr><tr><td width="396">Costs (restoration, fines/fees, etc.) incurred by the third party required due to lost data</td><td width="114"><strong> </strong></td><td width="114"><strong>X</strong></td></tr></tbody></table><p>Understanding the difference between first-party and third-party risks is essential when seeking cyber insurance. Ideally, every CPA firm should have some degree of insurance coverage for both first-party and third-party risks as the CPA firm faces exposure to many accusations and lawsuits in the event of a compromise or data breach impacting its clients’ data. For example, everyone faces risks of inadvertently forwarding a malware-infected email message that subsequently wreaks havoc after being opened by a recipient, or of their computers and networks being breached and subsequently exploited by hackers to serve as launching pads from which to target others. Relying on only one type of cyber insurance that may be limited to either first- or third-party coverage may leave businesses exposed to significant financial and legal risks. Whereas investing in both first-party and third-party cyber insurance ensures greater protection against today’s growing cyber threats.</p><p>If you have any specific coverage-related questions, please contact your agent or CAMICO at 1.800.652.1772, and ask to speak with your underwriter.</p><p><strong>Additional CAMICO Resources</strong><br />Additional risk management guidance and information on this topic is available on the Members-Only Site — refer to CAMICO’s Cyber/Data Security Resource Center. CAMICO policyholders with questions regarding this communication or other risk management questions should contact the Loss Prevention department at <a href="mailto:lp@camico.com">lp@camico.com</a>, or call our advice hotline at 800.652.1772 and ask to speak with a Loss Prevention Specialist.</p><p style="padding-left: 80px;"> </p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://snoopy.camico.com/blog/the-cyber-saga-continues-protect-your-firm-from-first-party-and-third-party-cyber-exposures/">The Cyber Saga Continues… Protect Your Firm from First-Party and Third-Party Cyber Exposures</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SSARS 27 — A Changing Risk Landscape for Client Advisory Services</title>
		<link>https://snoopy.camico.com/blog/ssars-27-a-changing-risk-landscape-for-client-advisory-services/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ssars-27-a-changing-risk-landscape-for-client-advisory-services</link>
		
		<dc:creator><![CDATA[Amber]]></dc:creator>
		<pubDate>Tue, 24 Jun 2025 23:22:22 +0000</pubDate>
				<category><![CDATA[Accounting]]></category>
		<category><![CDATA[CPA]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://www.camico.com/?p=13302</guid>

					<description><![CDATA[<p>The role of CPA firms who perform “outsourced accounting services” for their clients has greatly expanded over the years into what many today refer to as “client advisory services and/or client accounting services” (“CAS”). With the evolution of CAS, many CPAs have questioned the appropriateness of applying the “preparation standards” (“AR-C 70”) set forth in ... <a title="SSARS 27 — A Changing Risk Landscape for Client Advisory Services" class="read-more" href="https://snoopy.camico.com/blog/ssars-27-a-changing-risk-landscape-for-client-advisory-services/" aria-label="Read more about SSARS 27 — A Changing Risk Landscape for Client Advisory Services">Read more</a></p>
<p>The post <a href="https://snoopy.camico.com/blog/ssars-27-a-changing-risk-landscape-for-client-advisory-services/">SSARS 27 — A Changing Risk Landscape for Client Advisory Services</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="13302" class="elementor elementor-13302" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-41fc038 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="41fc038" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4d2e2ae" data-id="4d2e2ae" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-e755699 elementor-widget elementor-widget-text-editor" data-id="e755699" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The role of CPA firms who perform “outsourced accounting services” for their clients has greatly expanded over the years into what many today refer to as “client advisory services and/or client accounting services” (“CAS”). With the evolution of CAS, many CPAs have questioned the appropriateness of applying the “preparation standards” (“AR-C 70”) set forth in the Statements on Standards for Accounting and Review Services (SSARS) for financial statements prepared as part of CAS engagements, when all other client advisory services (including controllership or CFO services) are performed under the consulting standards.</p>
<p>On April 7, 2025, the AICPA’s Accounting and Review Services Committee issued Statement on Standards for Accounting and Review Services No. 27 (“<a href="https://www.aicpa-cima.com/resources/download/aicpa-statement-on-standards-for-accounting-and-review-services-no-27">SSARS 27</a>”), <em>Applicability of AR-C Section 70 to Financial Statements Prepared as Part of a Consulting Services Engagement</em>. The new SSARS amends AR-C section 70, Preparation of Financial Statements, explicitly excluding financial statements prepared as part of a consulting services engagement performed in accordance with CS section 100, Consulting Services, (“CS 100”) from engagements in which AR-C 70 must be applied.</p>
<p>The scope paragraphs of AR-C 70 were amended to clarify that accountants are not required to apply AR-C 70, but application is not precluded when accountants are preparing financial statements or prospective financial information as part of a consulting services engagement performed in accordance with CS 100 when <em>the preparation of financial statements is <span style="text-decoration: underline;">not</span> the primary objective</em> of the engagement.</p>
<p>The SSARS 27 exception to AR-C 70 preparation engagements is effective for the preparation of interim or annual financial statements for periods ending after December 14, 2026. Early implementation is permitted.</p>
<p>For many CPA firms, SSARS 27 is welcome relief, as performing financial statement engagements under the consulting standards may better align with the evolving needs of clients and the CAS being provided. With that said, SSARS 27, does present a changing “risk landscape” and CAMICO cautions firms not to rush into early adoption without first having appropriate risk mitigating tools and solutions in place. Firms should seek to establish clear guidelines and a timeline for implementation and not short-change the efforts needed to educate themselves and their clients about the implications of this change, including the fine distinctions of when financial statements may be deemed a mere by-product of the services the firm is rendering versus the primary objective of the services.</p>
<p><strong>Proactive documentation</strong> will be critical in managing the changing risk landscape for those firms who seek to embrace the flexibility afforded by preparing financial statements under the consulting standards. New written understandings with the clients should be executed delineating the revised scope and applicable standards of the services being provided. Firms should also consider the appropriateness of including revised indemnification language in these agreements, especially in situations where they may be perceived as, or in fact performing, management responsibilities as part of the CAS engagement.</p>
<p>In the coming weeks, CAMICO will make available engagement letter templates to assist policyholders who choose to early implement SSARS 27. CAMICO is also developing a risk management FAQ document to highlight common inquiries received from policyholders related to the risk management implications of SSARS 27 to CAS engagements and includes suggested best practices to proactively minimize potential exposures. CAMICO policyholders can access these resources on CAMICO’s <a href="https://member.camico.com/portal/Policyholder-Login">Members-Only Site</a> Accounting and Auditing Resource Center.</p>
<p>CAMICO policyholders with questions regarding this article or other risk management topics should contact the Loss Prevention department at <a href="mailto:lp@camico.com">lp@camico.com</a>, or call our advice hotline at 800.652.1772 and ask to speak with a Loss Prevention Specialist.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://snoopy.camico.com/blog/ssars-27-a-changing-risk-landscape-for-client-advisory-services/">SSARS 27 — A Changing Risk Landscape for Client Advisory Services</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Conflicts of Interest Still Cause Trouble for CPAs</title>
		<link>https://snoopy.camico.com/blog/conflicts-of-interest-still-cause-trouble-for-cpas/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=conflicts-of-interest-still-cause-trouble-for-cpas</link>
		
		<dc:creator><![CDATA[Amber]]></dc:creator>
		<pubDate>Tue, 13 May 2025 21:40:17 +0000</pubDate>
				<category><![CDATA[CAMICO]]></category>
		<category><![CDATA[CPA]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Conflict of interest]]></category>
		<guid isPermaLink="false">https://www.camico.com/?p=9685</guid>

					<description><![CDATA[<p>                                                                By Duncan B. Will, CPA/ABV/CFF, CFE Conflicts of interest have long been a major factor in professional liability claims against CPAs. Part of ... <a title="Conflicts of Interest Still Cause Trouble for CPAs" class="read-more" href="https://snoopy.camico.com/blog/conflicts-of-interest-still-cause-trouble-for-cpas/" aria-label="Read more about Conflicts of Interest Still Cause Trouble for CPAs">Read more</a></p>
<p>The post <a href="https://snoopy.camico.com/blog/conflicts-of-interest-still-cause-trouble-for-cpas/">Conflicts of Interest Still Cause Trouble for CPAs</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="9685" class="elementor elementor-9685" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-95c5257 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="95c5257" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-37c49ec" data-id="37c49ec" data-element_type="column">
			<div class="elementor-widget-wrap">
							</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-e2ca313 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="e2ca313" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5e5230c" data-id="5e5230c" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-5d0ff68 elementor-widget elementor-widget-text-editor" data-id="5d0ff68" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><span style="color: var(--contrast);">                                                                <em>By Duncan B. Will, CPA/ABV/CFF, CFE</em></span></p>
<p>Conflicts of interest have long been a major factor in professional liability claims against CPAs. Part of the problem is that potential conflicts of interest are hard to recognize or identify until something goes wrong. When clients are satisfied, they tend to perceive the CPA as a competent advisor who has their best interests at heart. It’s not until clients become disappointed that their perception of the CPA begins to change. The CPA appears to no longer be prioritizing the client’s best interests. Sometimes the CPA may even appear to have sacrificed the client’s best interests to benefit the CPA or another party to the client’s detriment.</p>
<p>One common claim scenario is that of the CPA advising both parties to a transaction, or helping the parties resolve a dispute. For example, the CPA will sometimes agree to represent both the husband and the wife in a divorce when they are still friendly and cooperative. Many times though, the couple&#8217;s relationship will deteriorate, leaving the CPA stuck in the middle and caught in the crossfire. </p>
<p>The same is true for dissolutions or disputes between business partners. Disputes between partners or owners often result in the CPA’s advice becoming perceived by one of them as favoring the other.</p>
<p>Participating in business deals or investments with clients is another common scenario where everyone is happy while the investment performs well. But as soon as it takes a downturn or falls apart, the client’s perception of the CPA erodes.</p>
<p>These scenarios are riskiest when issues develop slowly, and the CPA is slow to recognize the slippery slope they are traversing by continuing to serve the parties’ conflicting interests.</p>
<h5><strong>Case Study</strong></h5>
<p>Consider the following case study (the names have been changed):</p>
<p>For decades, Paul Noble, the founder and managing partner of his CPA firm, had served as a trusted financial advisor to his clients. Like many CPAs, he also had his own personal financial advisor—stockbroker Rich Arrington. Noble frequently shared advice he received from Arrington with his firm’s clients and partners.</p>
<p>Chad Pennyworth, a junior broker at Arrington’s brokerage house, worked with some of Noble’s clients and took on many of Arrington’s accounts when Arrington retired. Noble trusted Arrington’s judgment in Pennyworth’s training and development. Though Noble did not refer any of his clients or acquaintances to Pennyworth, he did inform several of them that he had elected to work with him. Because of Noble’s reputation, many of his clients chose to engage Pennyworth as their own broker when they learned of Noble’s faith in Pennyworth.</p>
<p>Almost immediately after Arrington left, Pennyworth sold Noble some bonds, based on incorrect information that misidentified the bonds’ guarantor as the state, when the bonds were instead guaranteed by a financially challenged local school district.</p>
<p>Pennyworth acknowledged the mistake to Noble, and the brokerage firm agreed to repurchase the bonds from Noble’s portfolio, subject to a nondisclosure agreement, which Noble signed. Noble was pleased when a safer alternative was substituted for the bond investment a couple weeks later.</p>
<p>Two years later though, Noble was troubled when he read of the financial disaster that was all over the news: the local school district’s failure and worthlessness of the bonds the district had guaranteed. Pension funds and investors, including some of his clients, were hurt badly by the losses. Noble felt sorry for the investors but was relieved he had avoided a similar fate.</p>
<p>His relief turned to dismay, as some of his clients called to discuss the impact of the losses they sustained and their intentions to sue Pennyworth and the brokerage house.</p>
<p>Noble’s hands had been tied because of the nondisclosure agreement. He had not warned his clients of the elevated risk of the bond investment, and his clients were now surprised to learn that he was not “in the soup” with them.</p>
<p>During the class action lawsuit against Pennyworth and the brokerage house which followed, Noble’s initial investment, the reversal of that transaction, and the nondisclosure agreement became public knowledge. Noble’s reputation was ruined. He was now seen as a greedy, self-interested collaborator. Ultimately, Noble and his firm were added to the list of defendants in the class action lawsuit. His former clients alleged that Noble and his firm had a duty to disclose the concerns regarding their investment, had ignored the apparent conflict of interest, and had prioritized their own interests over those of their clients.</p>
<h5><strong>Loss Prevention Tips</strong></h5>
<p><strong>Recognize and communicate potential conflicts of interests.</strong> Project the scenario forward to anticipate what would happen if things were to go wrong. Juries tend to sympathize with clients — especially with the benefit of hindsight and the evidence laid out by a skilled attorney.</p>
<p><strong>Embrace “active ethics.”</strong> The CPA should recognize that his or her own personal interests can be adverse to client interests and should not agree to sign nondisclosure agreements without first protecting vulnerable clients. Moreover, disclosing a conflict of interest, while helpful, does not resolve the problem, even if clients acknowledge and sign the CPA’s disclosure regarding the potential conflict of interest. Clients could later argue that their consent was not “informed” by a third party (such as an attorney). Do not get too comfortable with disclosure as a form of protection. In the end, the issue will be whether there is a perception that the CPA’s loyalty to his or her clients waned.</p>
<p><strong>Recognize that there are risks associated with providing referrals.</strong> Clients often link the CPA who gives a referral to the professional who ultimately performs the services. In instances where it may be perceived that a CPA is offering a referral, the CPA should be careful to name three or more qualified candidates to perform the service and encourage the client to perform their own due diligence in assessing the suitability of the professionals’ qualifications.</p>
<p><em>Duncan Will is a Loss Prevention Director and Accounting and Auditing Specialist with CAMICO. He advises policyholders through the CAMICO Loss Prevention hotline and speaks to CPA groups on a wide range of topics.</em></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://snoopy.camico.com/blog/conflicts-of-interest-still-cause-trouble-for-cpas/">Conflicts of Interest Still Cause Trouble for CPAs</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
