Governance for Derivative Use Policies

By Equicurious intermediate 2025-10-19 Updated 2026-03-21
Governance for Derivative Use Policies
In This Article
  1. Definition and Key Concepts (What Governance Actually Covers)
  2. The Three Lines of Defense (Why Independence Matters)
  3. Policy Framework Elements (The Non-Negotiable Components)
  4. How It Works in Practice (Building a Real Policy)
  5. Defining Authorized Instruments (The Permission Matrix)
  6. Approval Authority Matrix (Who Signs Off on What)
  7. Setting Risk Limits (Notional, VaR, and Concentration)
  8. Worked Example: Regional Bank Derivative Program (A Mini Case)
  9. Governance Structure in Action
  10. The Daily Risk Dashboard
  11. Quarterly VaR Reporting to the Board
  12. Risks, Limitations, and Tradeoffs (Where Governance Fails)
  13. Common Governance Failures
  14. The Central Tradeoff: Control vs. Speed
  15. Regulatory Requirements (The External Constraints)
  16. Mitigation Checklist (Tiered by Impact)
  17. Essential (high ROI—these prevent 80% of governance failures)
  18. High-Impact (systematic governance)
  19. Ongoing Maintenance (preventing governance decay)
  20. Documentation Retention Standards

Derivative governance frameworks define who can authorize trades, what instruments are permitted, how risks are monitored, and how compliance is enforced. Without clear governance, organizations expose themselves to unauthorized speculation, regulatory violations, and the kind of unchecked risk-taking that has produced some of the most expensive blowups in financial history. The practical foundation isn’t complexity—it’s clarity of authority, limits, and escalation.

TL;DR

Effective derivative governance requires a documented policy with explicit approval authorities, position limits, and a three-lines-of-defense monitoring structure. The goal is preventing unauthorized risk-taking while still allowing timely hedging execution.

Definition and Key Concepts (What Governance Actually Covers)

Governance for derivative use policies is the formal framework an organization builds to control its derivative activities. This isn’t a single document—it’s an interconnected system of policies, authorities, limits, monitoring, and reporting that together determine how derivatives get used (and how misuse gets caught).

The core components:

The point is: governance isn’t bureaucracy for its own sake. It’s the mechanism that converts risk appetite from an abstract board statement into concrete, enforceable constraints on daily trading activity.

The Three Lines of Defense (Why Independence Matters)

The standard governance model uses three independent lines of defense, each with distinct responsibilities:

First line—Trading and Treasury. These teams execute transactions within policy boundaries and perform daily position monitoring. They own the risk directly. Their job is to operate within the limits they’ve been given, flag issues immediately, and never assume that “close to the limit” means “still fine.”

Second line—Risk Management. This function provides independent oversight, performs its own valuations (not relying on trader marks), monitors limit utilization, and escalates breaches. The critical requirement: Risk Management must report independently from Treasury. If the risk team reports to the CFO who also oversees trading, you don’t have independence—you have a structural conflict.

Third line—Internal Audit. Audit conducts periodic reviews of the entire governance framework, tests whether policies are actually being followed, and evaluates whether controls are designed effectively. Audit doesn’t monitor daily—it validates that the monitoring system works.

Why this matters: every major derivatives disaster (Barings, Orange County, MF Global) involved a breakdown in at least one of these lines. Usually the second—independent risk management was either absent, understaffed, or structurally compromised.

Policy Framework Elements (The Non-Negotiable Components)

A complete derivative policy addresses seven elements. Missing any one creates a gap that unauthorized activity can exploit:

ElementWhat It DefinesWhy Gaps Are Dangerous
ScopeWhich entities and activities are coveredUnscoped entities operate without controls
Authorized instrumentsApproved derivative types by categoryNovel instruments bypass existing limits
Purpose restrictionsHedging only vs. speculation permittedAmbiguity enables “hedging” that’s really speculation
Counterparty requirementsCredit standards and documentation (ISDA)Weak counterparties create unmanaged credit exposure
LimitsNotional, VaR, concentration thresholdsWithout limits, position sizes are unconstrained
ReportingWhat data, to whom, how frequentlyUnreported positions are invisible positions
Exception processHow policy deviations get approvedWithout formal exceptions, informal workarounds develop

The point is: each element reinforces the others. A policy that permits instruments but doesn’t set limits, or sets limits but doesn’t require reporting, has structural holes.

How It Works in Practice (Building a Real Policy)

Defining Authorized Instruments (The Permission Matrix)

The most important governance decision is what instruments are permitted, restricted, or prohibited. The classification should reflect both the organization’s hedging needs and its operational capacity to monitor and value each instrument type.

A typical permission matrix:

CategoryPermittedRestricted (requires extra approval)Prohibited
Interest rateSwaps, caps, floorsSwaptions, callable swapsInverse floaters, power options
Foreign exchangeForwards, vanilla optionsBarrier optionsAccumulators, TARFs
EquityIndex futures, protective putsSingle-stock optionsVariance swaps, exotic structures
CreditAll CDS (unless specifically approved)
CommodityFutures for hedgingOptions on futuresStructured commodity products

“Restricted” means the instrument can be used but requires approval above the normal authority level—typically Risk Committee or CFO sign-off. “Prohibited” means no one in the organization can execute that trade, regardless of authority level. This distinction matters enormously (a “restricted” instrument with a sufficiently senior approver is still available; a prohibited instrument requires a policy change to use).

Approval Authority Matrix (Who Signs Off on What)

Approval authorities should scale with transaction size, tenor, and complexity. Larger, longer-duration, or more complex transactions require more senior approval:

Transaction SizeTenorMinimum Approval
Under $25 millionLess than 1 yearTreasurer
$25–100 millionLess than 3 yearsCFO
$100–500 millionLess than 5 yearsRisk Committee
Over $500 millionAny tenorBoard of Directors

The core principle: the authority matrix should be conservative enough to prevent unauthorized risk-taking but practical enough that routine hedging doesn’t require board approval. If every hedge needs CFO sign-off, either the limits are too tight or the program is too large for the current governance structure.

Setting Risk Limits (Notional, VaR, and Concentration)

Effective limit frameworks use multiple overlapping metrics, because no single measure captures all risk dimensions:

Notional limits cap the gross size of positions:

Derivative TypeMaximum NotionalAs % of Assets
Interest rate hedges$2.0 billion200%
FX hedges$500 million50%
Equity overlays$300 million30%
Commodity hedges$100 million10%
Total program$3.0 billion300%

Risk-based limits constrain actual exposure:

MetricLimitMonitoring Frequency
95% 1-day VaR$5 millionDaily
99% 10-day VaR$25 millionDaily
DV01 (dollar value of 1 bp)$500,000Daily
Single counterparty exposure$100 millionDaily
Total unsecured credit exposure$50 millionWeekly

Why this matters: notional limits alone are insufficient. A $100 million interest rate swap and a $100 million equity variance swap have the same notional but vastly different risk profiles. VaR and DV01 limits capture what notional limits miss—the actual risk content of positions.

A sample hedge ratio calculation illustrates this: if you hold a $500 million fixed-rate bond portfolio and execute $450 million in interest rate swaps, your hedge ratio is $450M / $500M = 90%. That ratio, combined with DV01 analysis, tells you whether your residual interest rate risk is within appetite.

Worked Example: Regional Bank Derivative Program (A Mini Case)

Organization: Regional bank, $10 billion in total assets

Derivative program:

Governance Structure in Action

Board of Directors approves the derivative policy annually, sets the risk appetite statement (including maximum VaR tolerance), and receives quarterly exposure reports. The board does not approve individual trades unless they exceed $500 million.

Risk Committee (management level) meets monthly to review all derivative positions, approves transactions exceeding $100 million, monitors limit utilization trends, and escalates concerns to the board. This committee includes the CFO, Chief Risk Officer, Treasurer, and head of Internal Audit (as observer).

Treasury Department executes trades within its delegated authority, manages day-to-day hedging decisions, and reports positions to Risk Management daily. Treasury can execute trades up to $25 million without additional approval.

Risk Management performs independent valuation of all positions (using its own models and market data, not trader marks), monitors all limits in real time, generates exception reports for any limit breach, and reports directly to the CRO—not to the CFO who oversees Treasury.

The Daily Risk Dashboard

Here’s what the Risk Committee sees at its monthly meeting, based on the most recent daily snapshot:

MetricLimitActualUtilizationStatus
Total notional$4.0B$3.9B98%Amber
VaR (95%, 1-day)$5.0M$3.2M64%Green
DV01$500K$380K76%Green
Largest counterparty$100M$85M85%Amber
Unsecured credit exposure$50M$12M24%Green

Actions triggered:

  1. Total notional at 98%—no new trades until existing positions mature or are unwound. Treasury must present a rebalancing plan within 5 business days.
  2. Largest counterparty at 85%—next trade must be directed to a different counterparty. Risk Management to review whether the $100 million single-counterparty limit remains appropriate given the program’s growth.

The practical point: the dashboard doesn’t just display numbers—it triggers specific, pre-defined actions. Every amber and red status should have an associated response protocol (documented in the policy, not improvised in the moment).

Quarterly VaR Reporting to the Board

QuarterAverage Daily VaRMaximum Daily VaRLimitBreaches
Q1$2.8M$3.9M$5.0M0
Q2$3.1M$4.5M$5.0M0
Q3$3.5M$5.2M$5.0M1
Q4$2.9M$3.8M$5.0M0

Q3 breach analysis (the kind of documentation the board should expect):

The point is: a single 1-day breach, quickly resolved, is normal operating experience. The governance test isn’t “do breaches ever occur” but “are breaches detected immediately, escalated properly, and resolved within the defined timeframe.”

Risks, Limitations, and Tradeoffs (Where Governance Fails)

Common Governance Failures

Failure ModeWhat HappensReal-World Consequence
Policy gapsAn instrument or activity isn’t addressedTraders exploit the gap; risk accumulates unmonitored
Authority bypassTraders execute without required approvalUnauthorized positions build until discovery (often too late)
Monitoring failureLimits aren’t enforced in real timePositions exceed appetite before anyone notices
Documentation gapsTrades aren’t properly recordedAudit findings, regulatory penalties, inability to reconstruct exposure
Weak escalationExceptions aren’t reported upwardSenior management makes decisions based on incomplete information

The Central Tradeoff: Control vs. Speed

Every governance framework balances control against execution speed:

Tighter governance means more approval layers, smaller delegated authorities, and more reporting. This reduces operational risk and unauthorized activity but slows hedging execution—potentially causing the organization to miss hedging windows or execute at worse prices.

Looser governance means broader delegated authority and fewer approval requirements. This enables faster response to market conditions but increases the risk of unauthorized or poorly considered trades.

The practical resolution: calibrate governance tightness to the organization’s derivative complexity and risk tolerance. A corporate treasury hedging plain-vanilla FX forwards needs less governance overhead than a financial institution running a multi-asset derivative book. The governance should match the program’s risk profile, not a generic template.

Regulatory Requirements (The External Constraints)

Governance frameworks don’t exist in isolation—they must satisfy regulatory expectations:

JurisdictionKey Requirement
US (Banking)OCC guidance on derivative risk management requires documented policies and independent oversight
US (Funds)SEC Rule 18f-4 requires registered funds to adopt derivative risk management programs
EUEMIR risk mitigation requirements mandate timely confirmation, portfolio reconciliation, and dispute resolution
Basel FrameworkStandards for derivatives governance including counterparty credit risk management
ISDABest practice guidance on documentation standards and operational risk management

Why this matters: regulatory requirements establish a minimum floor for governance. Organizations should build governance that serves their risk management needs, not just regulatory compliance. The best governance frameworks exceed regulatory minimums because the organization’s own risk appetite demands it.

Mitigation Checklist (Tiered by Impact)

Essential (high ROI—these prevent 80% of governance failures)

High-Impact (systematic governance)

Ongoing Maintenance (preventing governance decay)

Documentation Retention Standards

DocumentMinimum Retention
Derivative policyPermanent
Trade confirmationsTrade life + 7 years
Approval records7 years
Valuation reports7 years
Limit exception memos7 years
Board and committee reportsPermanent

The takeaway: governance frameworks work only when they’re actively maintained, consistently enforced, and genuinely independent. A well-written policy that nobody follows is worse than no policy at all—it creates an illusion of control while risk accumulates unchecked.

Related reading:

Related Articles

Disclaimer: Equicurious provides educational content only, not investment advice. Past performance does not guarantee future results. Always verify with primary sources and consult a licensed professional for your specific situation.