poster
For Startups

Security tokens complement utility tokens, rather than compete with them

For the past two years utility tokens have dominated the crypto-fundraising market. The two most popular classifications are tokens functioning as “subscriptions” for services and “protocol tokens” that would “burn” in the process of the blockchain infrastructure functioning, just like your usual license keys would. The emergence of security tokens, however, has the potential to broaden the investment horizon by expanding the selection of available investment instruments in 2019.

Security tokens can be classified into the following categories:

1) tokenized assets, starting with physical assets like gold or real estate, and moving to intellectual property rights; IP rights can be “fractioned” into tokenized units and sold on the auctions;

2) tokensresembling shares that differ from tokenized assets in how blockchain technology is being deployed; it is used to store a record about company’s shares. In other words, record in a blockchain becomes a share itself from a legal viewpoint;

3) “exotic” token-securities, e.g. those issued via the Digital Warrant Offerings; or classic financial instruments deposited with licensed depositaries, that issue blockchain-based receipts, that can be sold on the ATS;

That does not mean that utility and protocol tokens will be completely “out of fashion”. Their strength still lies in the decentralized governance and the network effect they create, which means that they will remain relevant for deep tech projects. At the same time, securitization has been one of the main trends of 2018, which was acknowledged both by regulatory authorities, startups, and even by the blockchain technology itself.

We can consider the season of security tokens to be open based on the following:

1) most of the developed markets have already adopted requirements for their issuing;

2) some brokers have “upgraded” their license to work with virtual assets and their derivatives;

3) platforms that planned on legally enabling security tokens trading have now launched publicly and received all necessary licenses.

Despite all of that, I do not think that security tokens compete with utility tokens for the place under the sun, as their use cases do not overlap in any way. Instead, I am predicting that they will create a synergy and complement each other. Utility tokens will lie at the heart of blockchain platform’s infrastructure to enable the issuance of security tokens. Thus, each of them will play a role they were destined to perform. Utility tokens will ensure that platform functions properly and security tokens will act as an investment instrument.

Nestor Dubnevych, Co-Founder at Legal Nodes

Need a lawyer in this area?

avatarchecked

Nestor

Ukraine

5 years in law

Experience
Nestor is an attorney-at-law with more than 5-years’ experience in advising tech c...
choose
choose

Legal Nodes Blog

For Startups
Ultimate guide to connecting Virtual Data Protection Officer

Connecting Virtual DPO can greatly reduce start-up’s data protection costs. This article explains who the Data Protection Officer is, why you should consider outsourcing DPO services, and how to pick one that matches the needs of your business....

Legal Nodes Team
Privacy (GDPR)
Cookie Policy: How to Track Website Users Lawfully

The recent study of the Nederlandse Omroep Stichting (the ‘NOS’), a Dutch news media, showed that more than 1,300 Dutch websites violate the privacy of their users. The violation found by the NOS is simple - the users cannot use the websites wit...

Legal Nodes Team
For Startups
Why Your Startup Needs a Founders' Agreement + Template 2021

Founders Agreement – the key step to set clear intentions for you and your partners and to avoid misunderstandings in the future. In a new post on the Legal Nodes blog, we explain what a Founders Agreement is, reasons for your startup to prepare...

Legal Nodes Team
For Startups
Terms of Use that your users will actually read

In this article Legal Nodes Team talks about Terms of Use, how to write them effectively and why you need them in the first place. You could find a FREE template at the end of this article....

Legal Nodes Team
Privacy (GDPR)
How Can You Leverage a Privacy Kit More Effectively?

In this article, Punit Bhatia, a leading privacy expert, shares how small businesses can become privacy compliant by using Privacy Kits in an effective and why just branding the documents and templates in name of your company is not a good idea....

Punit Bhatia
Legal Nodes Updates
Legal Nodes in 2020: A Year in Review

Despite the fact that for many 2020 will be strongly associated with the coronavirus pandemic and lockdown measures, it would be a mistake to forget all the good things that happened this year. Especially when the festive season approaches, and ...

Legal Nodes Team
Privacy (GDPR)
Internet data mining. Is it legal in the EU?

Data mining is the process of collecting and analyzing human-readable data for own purposes. More and more businesses are built on that concept, scientists and medics also use automatically combined data from different sources to spawn predictio...

Ewa Wojnarska-Krajewska
Privacy (GDPR)
11 simple (but complete) steps towards the GDPR compliance in 2020

The GDPR can be a wake-up call to sort out your processes, procedures and technology and thereby run a more successful organisation. Data is now more essential than ever, regardless of your activities or market sector. Not only will efficiencies...

Thomas Hayes
Contract Work
Force Majeure Clauses and the Effect of Coronavirus on Businesses

The coronavirus pandemic has made force majeure clauses one of the hottest legal topics worldwide. To help businesses navigate this issue, we asked Tom Bohills, an English qualified lawyer and the Founder of Chronos Law, to explain the backgrou...

Tom Bohills