-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ethereum Token Standards & ERC884 & STO #403
Comments
ERC-884. Following a recent Bill, Delaware General Corporation Law now explicitly allows for the use of blockchains in maintaining corporate share registries. ERC-884 is designed to represent equity issued by any Delaware corporation, whether private or public, and includes several provisions over and above ERC-20 that support this use case. These include the requirement for token owners to be whitelisted/identity verified as an integral part of the token. |
https://medium.com/coinmonks/tokenising-shares-introducing-erc-884-cc491258e413 The Securities Exchange Commission (SEC) has additional requirements as to how a crowdsale ought to be run and what information must be made available to the general public. This information is, however, out of scope of the ERC-884 standard, though the standard does support such requirements. For example: the SEC requires that a crowdsale’s website displays the amount of money raised in US dollars. To support this, a crowdsale contract minting these tokens must maintain a USD to ETH conversion rate (via an oracle or some other mechanism) and must record the conversion rate used at time of minting. Implementers of a crowdsale, in order to comply with The Act, must be able to produce an up-to-date list of the names and addresses of all shareholders. Implementers must maintain an off-chain private database that records the owner’s name, physical address, and the Ethereum address used to own their ERC-884 tokens. The implementer must then be able to extract the name and physical address for any Ethereum address, hash that data, and compare the resulting hash to the hash recorded in the contract using the hasHash function, thus affirming the veracity of their information. The specific details of this system are left to the implementer. |
https://medium.com/@apompliano/the-official-guide-to-tokenized-securities-44e8342bb24f What are the disadvantages of Security Tokens? The removal of financial institutions from investment transactions is generally seen as advantageous by the crypto community but there are also a number of disadvantages & risks associated with it. When you remove middlemen, you have to shift the middleman’s responsibilities onto the buyer or seller in the transaction. Security Token Offerings (STO) will require the issuer to underwrite their own deal via third party audits, prepare marketing materials, generally solicit investor interest, and have high confidence in their security & regulatory compliance. Many traditional investors believe that a large percentage of potential issuers are incapable of successfully executing these functions without traditional financial institutions. -- Are Security Tokens legally compliant? If you take away one thing from this guide, remember this: When Security Tokens are done correctly, they don’t skirt laws & regulations, they remove financial institutions and middlemen. Regulation D — This allows an offering to avoid being registered with the SEC, but requires an electronic filing of “Form D” after the securities have first been sold. The individuals offering the security may generally solicit investors for an offering that meets the requirements of Section 506c, which requires verification that the investors are accredited and the information provided during the solicitation must be “free from false or misleading statements.” In most cases, investors who purchase a Regulation D offering may not sell their ownership stake for at least 12 months after their initial purchase. Regulation A+ — This exemption allows an issuer to offer a security qualified with the SEC to non-accredited investors through general solicitation for up to a total of $50,000,000 in investment. Due to the requirement to register the security, Regulation A+ issuance can take longer compared to other options. Regulation A offerings require qualification of a Form 1-A offering circular, including audited financials. Due to the requirement to qualify the security and complete an audit, Regulation A+ issuance can cost more and take longer compared to other options. Regulation A+ offerings treat all money raised as revenue and tax it as such if the money doesn’t represent equity in the underlying company. Regulation S — This is when an offering of securities is deemed to be executed in a country other than the US and therefore not subjected to the registration requirement under section 5 of the 1933 Act. Issuers of the security are still required to abide by the security regulations in each country where they offer their security. Disclaimer: The above summaries of US securities law, including Regulations A+, D, and S, are merely my personal opinion. They should not be construed as legal or investment advice and you should consult a lawyer for any and all questions you have. The Official Guide To Tokenized Securities – Anthony Pompliano – Medium.pdf |
https://hackernoon.com/regulation-s-for-stos-310c40948ce Regulation S provides an exclusion from the Section 5 registration requirements of the Securities Act of 1933, as amended (the “Securities Act”), for offerings made outside the United States by both U.S. and foreign issuers.[2]
|
Types of Security Tokens In my opinion, the emergence of different classes of security tokens will be a key sign of the maturity of the space. This step was never important in utility tokens as their behavior is not dictated by financial assets. Security tokens on the other hand, are programmable representations of financial instruments and, consequently, they should imitate the economic behavior of the underlying asset. · Debt Tokens: Tokens that represent a debt or cash generating vehicle. In the next few sections of this essay, I would like to deep dive into the protocols that can enable the different types of security tokens. Today, I would like to focus on debt instruments. https://hackernoon.com/security-token-2-0-protocols-debt-tokens-af17d5c91a25 |
https://blog.chronobank.io/ethereum-token-standards-19fbcc54fe27
https://blog.neufund.org/token-up-analyzing-the-emerging-security-token-ecosystem-80331e9f4af5
https://medium.com/@tatianakoffman/your-official-guide-to-the-security-token-ecosystem-61a805673db7
https://medium.com/@tatianakoffman/4-security-token-structures-and-the-lawyers-to-help-you-execute-them-53c8a5129f49
https://docs.google.com/spreadsheets/d/1MM5j22WmeK9Lywu_9fRIWsEY18W7qDbcxx5wOBZUZ_k/edit#gid=1663861314
The text was updated successfully, but these errors were encountered: