The Mysteries Of Crypotocurrencies

Perhaps no aspect of the crypto-currency and blockchain space has been as murky from a legal perspective in the US as the initial coin offering (ICO).

Popularised over the past year, ICOs offer companies a way to crowdsource funds which they then ostensibly use to launch a new cryptocurrency, token, or related startup.

ICOs have been fraught with legal issues from the time they began, as investors have struggled with companies that don't follow through on their promises, and the potential for hacks and fraud.

But while a lot of attention has been paid to the ways that federal prosecutors and regulators like the US Securities and Exchange Commission view ICOs, there are more personal legal implications to consider as well.

Also Crypto Checks in the UK

The Treasury Committee of the UK Parliament plans to launch an investigation into crypto-currencies, namely, to examine how virtual currencies like bitcoin affect British investors and businesses.

Even as crypto-currencies have grown in popularity (and value), their future has remained unclear. Some countries have adapted by fiercely cracking down on crypto-currency exchanges, ICOs, and other elements of the new industry.

Other governments are more cautious in their approach. Still, for a global industry that is known for its extreme volatility, even the slightest inkling that a country may be looking to step in with additional regulation can send markets tumbling.

The inquiry, which was announced on February 22, will explore the ways in which crypto-currencies impact UK consumers, investors and businesses. The Treasury Committee cited the media hype surrounding virtual currencies and their erratic price movements for the probe.

For the time being, there have been no suggestions that the British government is interested in adding regulatory measures to control the cryptocurrency exchanges or ICO launches taking place in the UK.

Nonetheless, in an industry that changes dramatically and quickly, investors will no doubt want to watch to see how the inquiry unfolds in the months to come.

Individual Lawsuits Possible

According to a report by Coin Desk, "buyers can sue sellers privately under the US federal securities laws" which govern similar types of transactions. Companies and individuals looking to make sales in the ICO process (or in similar types of transactions) should be aware of these risks.

At the same time, in the ever-changing world of initial coin and token offerings, buyers should know that there are remedies available to them if they are treated unfairly throughout the process.

Is Crypto-currency a Security?

A great deal of the legal details concerning ICOs comes down to the question of whether or not a coin can be considered a security. This is one of the most hotly contested issues in the crypto-currency world, and a simple answer remains elusive.

In cases where an ICO does constitute an offering of a security, federal law stipulates that the seller of that security must register it or find an exception. If the seller does not, the SEC may step in to enforce the sale or sanction the seller. Most investors in ICOs are at least somewhat familiar with the security classification issue and its ramifications.

However, fewer ICO investors know that the Securities and Exchange Act of 1933 stipulates that a person who buys an unregistered security can actually sue the seller individually to get his money back.

This puts some of the power to determine whether an ICO is or is not a securities sale in the power of the individual investor. This legal detail also means that the remedy would be wide-ranging, and a company implicated in such an unregistered security sale might have to completely refund the investor base.

Investing in cryptocurrencies and other Initial Coin Offerings ("ICOs") is highly risky and speculative, and this article is not a recommendation to invest in crypto-currencies or other ICOs.

Since each individual's situation is unique, a qualified professional should always be consulted before making any financial decisions. Investopedia makes no representations or warranties as to the accuracy or timeliness of the information contained herein. As of the date this article was written, the author owns crypto-currencies.

Investopedia:              Investopedia

You Might Also Read: 

Digital Currency Grows Up:

Bitcoin Is Increasing Ransom Attacks:

« Cyber Criminals Catch Up With Nation-States
Cybercime Against UK Business Is Up 63% »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CCL Solutions Group

CCL Solutions Group

CCL is one of Europe’s leading digital investigation specialists, supporting law enforcement, government and organisations across both public and private sectors.

Vera Security

Vera Security

Vera is a data security platform that provides 360-degree visibility and control over critical business data, anywhere it's shared or stored.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

Dionach

Dionach

Dionach are a certified information security specialists who provide Penetration Testing, IT Security Auditing and Information Security Consultancy.

Armorblox

Armorblox

Armorblox stops targeted email attacks such as 0-day credential phishing, payroll fraud, vendor fraud, and other threats that get past legacy security controls.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

Slice

Slice

Slice offer subscription based Cyber Insurance for small businesses.

Stratejm

Stratejm

Stratejm, a Next Generation Managed Security Services Provider, brings innovation and thought leadership to the fight against cyber criminals.

Stratosphere Networks

Stratosphere Networks

Stratosphere Networks offer managed cybersecurity services rooted in Managed Detection and Response and Security Operations Center services that our team can tailor to meet your needs.

Noname Security

Noname Security

Noname Security detects and resolves API vulnerabilities and misconfigurations before they are exploited.

ClearHub

ClearHub

The aim of ClearHub is simple: to give businesses like yours access to the best talent, all screened and technically tested by Clearvision’s expert team.

Bfore.ai

Bfore.ai

Stop future attacks, today. Bfore.ai is an operational threat intelligence feed to add predictive technology to your security infrastructure.

Responsive Technology Partners

Responsive Technology Partners

Responsive Technology Partners provides superior IT support services including cybersecurity and compliance, telephony, cloud services, cabling, access control, and camera systems.

Cyber Legion

Cyber Legion

Cyber Legion Ltd is a UK-based Cyber Security as a Service (CSaaS) start-up that provides IT security testing services to various organizations around the globe.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

Myntex

Myntex

Myntex® builds the future of mobile security. We empower our partners to deliver exclusive mobile endpoint security software, fortifying against mobile threats, device exploits and data exfiltration.