DTCC Outlines Principles For Post-Trade Processing Of Security Tokens

CW
Cadwalader, Wickersham & Taft LLP
Contributor
Cadwalader, established in 1792, serves a diverse client base, including many of the world's leading financial institutions, funds and corporations. With offices in the United States and Europe, Cadwalader offers legal representation in antitrust, banking, corporate finance, corporate governance, executive compensation, financial restructuring, intellectual property, litigation, mergers and acquisitions, private equity, private wealth, real estate, regulation, securitization, structured finance, tax and white collar defense.
In a white paper, the Depository Trust and Clearing Corporation ("DTCC") outlined guiding principles for the post-trade processing of "security tokens" ...
United States Technology
To print this article, all you need is to be registered or login on Mondaq.com.

In a white paper, the Depository Trust and Clearing Corporation ("DTCC") outlined guiding principles for the post-trade processing of "security tokens" (i.e., digital assets that are considered securities) to ensure that risks are properly identified and managed.

According to the DTCC, a platform that provides the post-trade processing of security tokens should:

  • have an enforceable legal basis for "each material aspect of its activities in all relevant jurisdictions";
  • adopt governance arrangements to support the platform's operation;
  • appropriately manage "legal, credit, liquidity, operational and other risks";
  • provide settlement finality;
  • minimize the risks associated with the issuance, settlement and custody of security tokens;
  • meet high standards of resilience and security; and
  • maintain the privacy and confidentiality of relevant records while preserving access to regulators and external auditors.

Commentary / Mark Highman

The DTCC provides a thoughtful analysis of the principles that should govern the post-trade processing of security tokens and other digital assets. Of particular interest is the analysis of centralized (or "permissioned") and decentralized ("permissionless") networks, the specific risks inherent in each type of network, and how the high-level principles for post-trade processing of transactions outlined by the DTCC would apply to each type of network.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

DTCC Outlines Principles For Post-Trade Processing Of Security Tokens

United States Technology
Contributor
Cadwalader, established in 1792, serves a diverse client base, including many of the world's leading financial institutions, funds and corporations. With offices in the United States and Europe, Cadwalader offers legal representation in antitrust, banking, corporate finance, corporate governance, executive compensation, financial restructuring, intellectual property, litigation, mergers and acquisitions, private equity, private wealth, real estate, regulation, securitization, structured finance, tax and white collar defense.
See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More