I believe every ICO I’ve seen is security.
The “utility token” defense might not work. Chairman Clayton warned against using the phrase utility token. ICOs that violate securities laws could soon confront punishments or graver consequences. Depending on their function, crypto tokens might be classified as Utility tokens or Security tokens.
Utility Token –
UtIlity tokens represent a unit of account for the network. The bigger the network grows, the more utility in the token, and because the number of tokens is fixed. As the size of the network and transaction volumes within it grows, this will create demand for the tokens.
It is important to note that “utility token” is an organizational distinction–not a legal one. The SEC has not given official guidance on utility tokens, so the industry does not with certainty whether they are subject to securities regulations.
Bloomberg’s Matt Levine compares utility tokens to the Starbucks card:
A Starbucks gift card is probably not security, even though you pay money to a corporation for the card and expect to get back something in the future, because you are not investing the money in the expectation of profit: You’re investing it in the expectation of coffee.
UtIlity tokens have a use case and are not designed as investments, but that doesn’t mean that they don’t bring any profit. They have a certain use case inside the project and don’t represent the company’s share. Utility tokens may grow in price if the demand for service or product increases. So buying such tokens of a project, that solves real problems of users and is constantly being developed and improved, may give great profit in the future.
Golem is a pertinent example, allowing users to lend their own PC’s power to the network which collectively employs it to run a remote supercomputer. Users earn GNT for connecting to the network, but they can also buy them via an exchange. Basic Attention Token is similar, with users rewarded in BAT for using the BRAVE browser and viewing ads.
Also Filecoin – which raised an ICO-record $257 million–plans to provide a decentralized cloud storage service that will take advantage of unused computer hard drive space. ICO contributors received tokens that they will be able to use to purchase storage space from Filecoin once the service has launched.
Launch your ICO or STO Effortlessly: Visit Tokenic
Security Token —
One of the major topics of discussion in cryptocurrency right now is around the development of security tokens. Security tokens give their holders to ownership rights of a company. A security token’s value is derived from a tradable asset; subsequently, it is liable to government laws controlling traditional securities. Security tokens can be utilized to change conventional IPOs(initial public offerings) and issue company shares, profits, and voting rights over the blockchain frameworks.
A security token represents traditional, private security interest. It could represent a share in a company, an LP interest in a fund or a trust, a member share in an LLC. Essentially, you’re taking something that today you have on paper and you’re putting an electronic wrapper around it.
Here’s the definition right from the Securities Act of 1933
The next mega-trend in crypto will be assets migrating to the blockchain in the form of tokens. pretty much any security is better denominated as a token than traditional forms of ownership. This is the future, not share certificates in filing cabinets.
– Trevor Koverko, CEO of Polymath Inc.
Polymath is doing for securities tokens what Ethereum did for utility tokens. Polymath’s ST20 security token protocol embeds regulatory requirements into the tradable tokens themselves, which are only available to verify and authorized participants.
Also, Online retailer Overstock recently announced that tZERO, one of its portfolio companies, will hold an ICO to fund the development of a licensed security token trading platform. The tZERO tokens that are issued from this ICO will be in accordance with SEC regulations. tZERO token holders will be entitled to quarterly dividends from the profits generated by the tZERO platform.
The first major wave of security token offerings has already begun; starting with the launch of Nexo, a crypto-backed instant loan platform by Credissimo; a leading European FinTech Group that has been a key player in Online Consumer Lending and E-commerce Financing for over 10 years. The company generates operating revenues from crypto-backed loans. The company’s positive bottom line is called its Net Profit and, when achieved, 70% from it will be reinvested back into the company to fund more crypto-backed loans, and a fixed 30% from the Net Profit is paid out as dividends to NEXO Token holders in the given accounting period.
How Do We Actually Distinguish Security and Utility Token?
With a specific end goal to decide if a digital token is a security, we can apply the Howey Test. This is used to confirm regardless of whether or not a transaction qualifies as an ‘investment contract’.If it meets the criteria, at that point it will be considered as security and will be subject to additional disclosure and regulation requirements.
So as to be named an investment contract under the Howey Test, a token must meet the following prerequisites:
- There is an investment of money.
- The user expects to profit from the investment.
- The investment of money is in a common enterprise.
- Any profit comes from the efforts of a third-party or promoter.
Do you know: Tokenic is a Token Sale Platform to issue and manage Utility and Security token offerings on Ethereum, EOS and Stellar Blockchain platforms. Contact Us to know more.
Also, do check out our earlier blog posts.
At QuillHash, we understand the Potential of Blockchain and have a good team of developers who can develop any blockchain applications like Smart Contracts, dApps,Smart Coins, DeFi, DEX on the any Blockchain Platform like Ethereum, EOS and Hyperledger.
To be up to date with our work, Join Our Community :-