- Automated Market Maker
- Blockchain Explained
- Blockchain: Private vs Public
- Blockchain Oracle
- Cryptocurrency Trading
- Digital Assets
- Digital Banking
- Digital Currency
- Digital Securities
- Digital Wallet
- Directed Acyclic Graph
- Equity Crowdfunding
- Equity Tokens
- Hard Fork
- NFTs (Non Fungible Tokens)
- Proof of Work vs Proof of Stake
- Security Tokens
- Stablecoins Explained
- Stablecoins – How They Work
- Smart Contracts
- Token Burning
- Tokenized Securities
- Utility Tokens
- Web 3.0
Table Of Contents
As a responsible crypto investor, you must understand the differences between utility tokens vs security tokens. These tokens serve different purposes in the cryptospace. Their processes differ during trading and issuance. These contrasts make security tokens unique to their utility counterparts.
Why are Security Tokens Important?
The ICO market continues to expand. According to a report from Business Insider, companies raised over $5.6 billion in 2017. While this number seems impressive, the ICO activity of this year already eclipsed it. By May 2018, the ICO market expanded to $6.3 billion. This record growth and the growing appeal of ICOs makes this unique crowdfunding strategy a favorite among tech startups.
The record growth of the ICO sector led to increased scrutiny from regulators such as the Securities and Exchange Commission (SEC). The task of developing regulations for the growing ICO market falls on this organization depending on how the token’s use. The SEC decided that when a token represents ownership, voting rights, or entitles the holder to share of future profits, it’s a security token.
It isn’t always that easy to determine if a coin is a security or utility token. In many instances, a token starts off as a security during an ICO but later evolves into a utility token. This scenario is the case for the hugely popular cryptocurrency Ethereum (ETH). In a June ruling, the SEC determined that Ethereum operated as a security initially, but today it’s a utility token.
To make matters more complicated, a utility token such as ETH can have security tokens issued on its platform. Ethereum’s ERC-20 protocol is the most popular token launching protocol in the cryptospace. New tokens issued on the platform are security tokens if they fail the “Howey Test.”
What is the Howey Test?
The “Howey Test” is a brief questionnaire created by the Supreme Court for determining whether a transaction qualifies as an investment contract. The test became famous during the 1946 Supreme Court case SEC V. Howey. The case revolved around a Howey, Florida-based orange juice company that offered large parts of its land for sale to investors with the intent of having the new owners lease the property back to the citrus developer, who would continue developing the area with the newly acquired funds.
The SEC sued the defendants in this transaction for violating the Securities regulations. The SEC determined that because the investors put forth funds in the hopes of making a profit from the efforts of the citrus farm, the deal was an investment contract. Therefore, the agreement falls under securities regulations.
The Supreme Court developed a simple test to prove the theory. The Howey Test asks investors four critical questions. These questions can be applied to tokens to determine if they are security tokens:
- Are You are Investing Money?
- Do You Expect Profits from Your Investment?
- Are You Investing in A Common Enterprise?
- Will You Profit from the Efforts of a Promoter or Third Party?
Utility tokens serve a use within a platform. In most cases, companies host ICOs to issue utility tokens. These tokens are essential to the functionality of their platforms. Additionally, they do not give token holders rights to the company’s future development or profits. These tokens transfer without regulations, and any company can offer utility tokens without meeting SEC regulations. The open nature of these tokens made them a favorite amongst investors and startups.
Today, utility tokens are more commonly referred to as “digital assets“.
Security tokens operate in a much different manner, and under different requirements. A company cannot just host a security token offering (STO) without fulfilling specific conditions. Companies must provide investors with a plethora of information including the company’s actual address, the names of all board members, and open financial records. These requirements protect investors from fraudulent activity.
On top of the company regulations, investors meet stringent security regulations as well. Companies cannot sell security tokens to anonymous individuals. You will need to provide and prove your identity when investing in these tokens. Know Your Customer (KYC), and Anti-Money Laundering (AML) laws must be adhered to when moving security tokens between owners.
Today, security tokens are commonly referred to as digital securities.
Added Security – Added Investment Funds
While some early crypto investors undoubtedly see security tokens as a burden on the cryptospace, many believe these tokens to provide an essential bridge between traditional investment funds and the cryptomarket. Analysts have predicted a rise in traditional investment firms entering the cryptospace.
These firms require added protection due to the substantial nature of their investments. Security tokens provide them with the protections they need to avoid future financial and legal problems.
Utility Tokens vs Security Tokens
Now that you better understand the differences between these tokens, you are ready to comprehend STOs and what makes them different than their ICO counterparts. Security tokens play an important, and ever-growing, role in the cryptospace. You should expect more platforms entering the cryptomarket using this type of token over the coming years.
You may like
Centralized Exchanges Under Increased Scrutiny Globally as Regulators Probe Operations
Orchestrators of Ponzi Scheme ‘Forsage’ Charged by SEC
Regulatory Update – SEC Probing Coinbase, CFTC Re-Structuring, Infrawatch PH Seeks Binance Ban
Grayscale Files Petition for Review as SEC Denies Latest Spot-ETF Application
Market Collapse Prompts Warnings, Calls for Regulation, and Words of Encouragment
‘Lummis-Gillibrand Responsible Financial Innovation Act’ Unveiled, Tackling Oversight of Digital Assets