Protocol
  • Getting started with Re
    • FAQs
    • QuickStart Guide
    • Introduction to the Re Protocol
  • What is reUSD?
  • Connect with Us
  • Ethena (ICL)
    • reUSDe FAQ
    • What is reUSDe ?
  • Reinsurance
    • What is Reinsurance?
    • How Collateralized Reinsurance Earns Returns
  • Investor Protections and Risk Management
  • Protocol
    • How the Re Protocol Works
    • Insurance Capital Layer ( ICL )
    • Cells, Cell Managers, and Risk Pools
    • Redemption Process and Liquidity
    • Smart Contract Addresses
    • Fee Splits for Cell Managers and Risk Pools
    • Governance Model
  • Integration with the DeFi Ecosystem
  • Use Cases for the Re Protocol
  • Security and Audits
  • Disclaimers
Powered by GitBook
On this page

Investor Protections and Risk Management

The Re Protocol is designed with robust investor protections and comprehensive risk management strategies to safeguard participant funds while ensuring sustainable growth. By leveraging blockchain technology and industry best practices, the protocol minimizes risk exposure and maximizes transparency.

Core Investor Protections

  1. Fully Collateralized Funds:

    • All assets in the Insurance Capital Layer (ICL) and Risk Pools are fully collateralized, ensuring that claims and obligations can be met promptly and reliably.

  2. Segregated Accounts:

    • Participant funds are held in segregated accounts, preventing commingling of assets and maintaining clear financial accountability.

  3. Independent Audits:

    • Regular third-party audits are conducted to ensure the security, integrity, and compliance of the protocol. These audits include detailed reviews of smart contracts and financial operations.

  4. Transparent Reporting:

    • All transactions, asset holdings, and performance metrics are recorded on-chain, allowing participants to verify data in real time through the protocol’s dashboard.

Comprehensive Risk Management Strategies

  1. Conservative Contract Focus:

    • Initially, the protocol prioritizes non-catastrophic, low-volatility, short-duration program business to ensure predictable and stable returns.

  2. Rigorous Vetting of Cell Managers:

    • Cell Managers undergo a thorough Know Your Business (KYB) and Anti-Money Laundering (AML) screening process before being approved to manage Risk Pools.

  3. Collateralized Risk Pools:

    • All Risk Pools are fully collateralized to mitigate counterparty risk and ensure that capital is available to cover claims.

  4. Controlled Growth:

    • The protocol carefully scales operations, onboarding new Cell Managers and expanding Risk Pools only when governance structures and operational capacity can support growth.

Emergency Protections

  • Pause Mechanism:

    • In the event of a security breach or other emergency, the protocol includes a mechanism to immediately pause operations and safeguard funds. Assets can be transferred to recovery wallets as a precautionary measure.

  • Recovery Wallets:

    • Each Insurance Capital Layer has its own designated recovery wallet for secure storage during emergencies. For example, the recovery wallet for the initial ICL is: 0xDf6bF2713b5c7CA724E684657280bC407938F447.

Governance Oversight

  • Expert-Led Council:

    • During its initial phase, the protocol is governed by a council of industry and DeFi experts who oversee capital allocation, risk management, and participant protections.

  • Transition to Decentralization:

    • As the protocol matures, governance will transition to a decentralized autonomous organization (DAO), empowering participants to play an active role in decision-making.

By embedding these protections and risk management practices into its design, the Re Protocol ensures that participant funds are safeguarded and that the platform remains resilient and transparent. This commitment to security and accountability underpins the long-term success of the protocol.

PreviousHow Collateralized Reinsurance Earns ReturnsNextHow the Re Protocol Works

Last updated 1 month ago