Loan defaults prevented by automatic enrollment in loan protection (protection which would be triggered default following termination from employment) decreases EBRI’s retirement security deficit by $1.96 trillion, or by 53%. This identifies loan defaults following termination of employment as being a key source of “leakage,” as well as an important element of  the nation’s “retirement savings deficit.” The massive size of this systemic retirement security loss from loan defaults has largely gone unnoticed in the past by policymakers, plan sponsors and plan advisers.
Continue Reading 401(k) Loan Protection Helps Address Leakage. How it Works.

The Tax Cuts and Jobs Act’s participant loan changes (which delays the account offset on loan defaults related to unemployment or plan termination) triggers something we would all rather not look at:  the “uncomfortable” manner in which ERISA’s fiduciary rules apply to loans and their administration.These changes should cause plan sponsors and recordkeepers to consider new choices about their handling of loan defaults, something they haven’t had to do in nearly 18 years. This matters because changing a plan’s loan rules is not a minor technical act. Loans are investments subject to the same ERISA prudence rules as any other plan investment, and changes to loan procedures impacts the investment.
Continue Reading Tax Act’s Participant Loan Changes Compels Fresh Review of “Uncomfortable” Loan Fiduciary Obligations

In an almost stealth-like way, innovation is creeping into the marketplace and creating ways to address critical retirement issues, even without an incubator. Though these programs can do little to address what I view as the basic retirement inadequacy issue-that is, employers are generally moving away from the traditional notion of building adequate retirement programs into their employment models-they are making progress toward making the best of what we’ve got.
Continue Reading Aggregation Models, Plan Loan Insurance, Lifetime Income Patents: Addressing Retirement Security by “Looking Through the Wrong End of a Telescope”