poster
For Startups

Security tokens complement utility tokens, rather than compete with them

For the past two years utility tokens have dominated the crypto-fundraising market. The two most popular classifications are tokens functioning as “subscriptions” for services and “protocol tokens” that would “burn” in the process of the blockchain infrastructure functioning, just like your usual license keys would. The emergence of security tokens, however, has the potential to broaden the investment horizon by expanding the selection of available investment instruments in 2019.

Security tokens can be classified into the following categories:

1) tokenized assets, starting with physical assets like gold or real estate, and moving to intellectual property rights; IP rights can be “fractioned” into tokenized units and sold on the auctions;

2) tokensresembling shares that differ from tokenized assets in how blockchain technology is being deployed; it is used to store a record about company’s shares. In other words, record in a blockchain becomes a share itself from a legal viewpoint;

3) “exotic” token-securities, e.g. those issued via the Digital Warrant Offerings; or classic financial instruments deposited with licensed depositaries, that issue blockchain-based receipts, that can be sold on the ATS;

That does not mean that utility and protocol tokens will be completely “out of fashion”. Their strength still lies in the decentralized governance and the network effect they create, which means that they will remain relevant for deep tech projects. At the same time, securitization has been one of the main trends of 2018, which was acknowledged both by regulatory authorities, startups, and even by the blockchain technology itself.

We can consider the season of security tokens to be open based on the following:

1) most of the developed markets have already adopted requirements for their issuing;

2) some brokers have “upgraded” their license to work with virtual assets and their derivatives;

3) platforms that planned on legally enabling security tokens trading have now launched publicly and received all necessary licenses.

Despite all of that, I do not think that security tokens compete with utility tokens for the place under the sun, as their use cases do not overlap in any way. Instead, I am predicting that they will create a synergy and complement each other. Utility tokens will lie at the heart of blockchain platform’s infrastructure to enable the issuance of security tokens. Thus, each of them will play a role they were destined to perform. Utility tokens will ensure that platform functions properly and security tokens will act as an investment instrument.

Nestor Dubnevych, Co-Founder at Legal Nodes

Need a lawyer in this area?

avatarchecked

Nestor

Ukraine

5 years in law

Experience
Nestor is an attorney-at-law with more than 5-years’ experience in advising tech c...
choose
choose

Legal Nodes Blog

For Startups
Terms of Use that your users will actually read

In this article Legal Nodes Team talks about Terms of Use, how to write them effectively and why you need them in the first place. You could find a FREE template at the end of this article....

Legal Nodes Team
Privacy (GDPR)
How Can You Leverage a Privacy Kit More Effectively?

In this article, Punit Bhatia, a leading privacy expert, shares how small businesses can become privacy compliant by using Privacy Kits in an effective and why just branding the documents and templates in name of your company is not a good idea....

Punit Bhatia
Legal Nodes Updates
Legal Nodes in 2020: A Year in Review

Despite the fact that for many 2020 will be strongly associated with the coronavirus pandemic and lockdown measures, it would be a mistake to forget all the good things that happened this year. Especially when the festive season approaches, and ...

Legal Nodes Team
Privacy (GDPR)
Internet data mining. Is it legal in the EU?

Data mining is the process of collecting and analyzing human-readable data for own purposes. More and more businesses are built on that concept, scientists and medics also use automatically combined data from different sources to spawn predictio...

Ewa Wojnarska-Krajewska
Privacy (GDPR)
11 simple (but complete) steps towards the GDPR compliance in 2020

The GDPR can be a wake-up call to sort out your processes, procedures and technology and thereby run a more successful organisation. Data is now more essential than ever, regardless of your activities or market sector. Not only will efficiencies...

Thomas Hayes
Contract Work
Force Majeure Clauses and the Effect of Coronavirus on Businesses

The coronavirus pandemic has made force majeure clauses one of the hottest legal topics worldwide. To help businesses navigate this issue, we asked Tom Bohills, an English qualified lawyer and the Founder of Chronos Law, to explain the backgrou...

Tom Bohills
Privacy (GDPR)
Privacy Policy: Everything you need to know

Privacy Policy (or Privacy Notice) is a public legal statement of the company. It explains how the organisation uses information about its users, customers, or employees....

Legal Nodes Team
Privacy (GDPR)
Initial Privacy Assessment: Everything You Need to Know

A privacy assessment is a methodic review of your state of compliance with personal data protection laws....

Legal Nodes Team
Legal Nodes Updates
Legal Nodes Secures the $50k Grant from the Ukrainian Startup Fund Pitching Competition

We are delighted to announce that Legal Nodes scored the highest during the fifth Ukrainian Startup Fund pitching competition and was awarded a $50k Grant. ...

Legal Nodes Team