Interest in various forms of impact investing has been growing, but the array of terms—ESG, SRI, Green Bonds, and Engagement—in this area has contributed to investor confusion. The decision on which form is right for the investor depends on a number of factors, including the investor’s goals, beliefs, resources, and preferences. Though one agreed-upon process to evaluate environmental, social, and governance (ESG) investing actions may never exist, any proposed process should be practical, helping investors make informed decisions with both their time and capital.
Resource Search
Katherine Lorenz, President, Cynthia and George Mitchell Foundation, talks about how a childhood drawing of a cloud inspired her perspective on what it means to be a philanthropist—and how giving sparked discussions about lived experiences and issues around the world. She also shares the special role philanthropy plays in her family relationships.
Stories that are passed down from generation to generation are a way to create a family legacy that will be remembered long after we are gone. These stories are precious in understanding who we are and where we came from. Too often, the people who hold the keys to family stories lose details to memory loss or pass away before their histories can be recorded. Vacation time and the holiday season are ripe opportunities for families to seize the moment to capture family history across generations.
International travelers are vulnerable to a wide range of risks, including political unrest, natural disasters, and medical emergencies. The financial impact of these events on travelers can differ considerably—especially those who are not adequately prepared. Following a checklist of basic practical steps will help you and your families prepare for a safe trip abroad.
A host can be held liable for injuries caused to a third party if an intoxicated guest causes a car accident. If guests are injured on the premises due to hazardous conditions, the homeowner can be held liable. Such incidents may include slipping and falling on icy walkways, uneven floors, or broken staircases. When hosting a social event, following a checklist of practical steps can help eliminate or minimize potentially costly and dangerous outcomes.
Individuals and families today are at a higher risk of being the target of identity theft given their tendency to rely on various third parties to manage their active and complex lifestyles. Protect yourself against identity theft by adhering to a checklist of practical steps to safeguard your personal information.
From the intense wildfire activity in 2017, lessons were learned on the value of smart landscaping. Applying those lessons and other tips, you can enhance your home's resiliency and keep your family safe.
You have too much at stake to be caught unprepared, and your family is too important to be left in the lurch by an estate plan you didn’t realize that you had outgrown. If it has been a while since you have looked at your estate planning and settlement documents, it is time to perform a stress-test on your plan to ensure that none of the key components are missing or outdated. Performing this test regularly is time well-spent to protect your family from the unexpected, including an unanticipated incapacity and death.
Although it is flattering to be asked to be a trustee, you should give careful consideration about serving in this important role, as performing the responsibilities of a fiduciary can expose you to great personal liability, especially if you lack training. Learn from the common mistakes made by family members serving as trustees and the ways for a trustee to protect against the liability that is inherent when serving in a fiduciary role.
When it comes to protecting digital assets, the users can end up being the biggest flaw in your cybersecurity armor. Mistakes like creating easy-to-guess passwords, not encrypting important data, or sending passwords over email can make a hacker’s job easy. To help strengthen your cybersecurity armor and stay ahead of the hackers, here are some cybersecurity best practices.