Digital Assets [2023] EWLC 412 (30 July 2024)


BAILII is celebrating 24 years of free online access to the law! Would you consider making a contribution?

No donation is too small. If every visitor before 31 December gives just £1, it will have a significant impact on BAILII's ability to continue providing free access to the law.
Thank you very much for your support!



BAILII [Home] [Databases] [World Law] [Multidatabase Search] [Help] [Feedback]

The Law Commission


You are here: BAILII >> Databases >> The Law Commission >> Digital Assets [2023] EWLC 412 (30 July 2024)
URL: http://www.bailii.org/ew/other/EWLC/2023/LC412.html
Cite as: [2023] EWLC 412

[New search] [Printable PDF version] [Help]



Law Commission

Reforming the law

Digital assets: Final report

HC 1486


Law Com No 412


Law

Commission

Reforming the law

Law Com No 412

Digital Assets: Final report

Presented to Parliament pursuant to section 3(2) of the Law Commissions Act 1965

Ordered by the House of Commons to be printed on 27 June 2023

HC 1486

© Crown copyright 2023

This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open-government-licence/version/3.

Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned.

This publication is available at www.gov.uk/official-documents.

Any enquiries regarding this publication should be sent to us at [email protected].

978-1-5286-4173-9

E02924167 06/23

Printed on paper containing 40% recycled fibre content minimum

Printed in the UK by HH Associates Ltd. on behalf of the Controller of His Majesty’s Stationery Office

The Law Commission

The Law Commission was set up by the Law Commissions Act 1965 for the purpose of promoting the reform of the law.

The Law Commissioners are:

The Right Honourable Lord Justice Green, Chairman

Professor Sarah Green

Professor Nicholas Hopkins

Professor Penney Lewis

Nicholas Paines KC

The Chief Executives of the Law Commission are Stephanie Hack and Joanna Otterburn.

The Law Commission is located at 1st Floor, Tower, 52 Queen Anne's Gate, London SW1H 9AG.

The terms of this report were agreed on 17 May 2023. All website links were correct at 23 June 2023.

The text of this report is available on the Law Commission's website at

https://www.lawcom.gov.uk/project/digital-assets/.


Contents

Glossary

List of abbreviations

Digital assets and the law of personal property

About this project

Other work on digital assets

The team working on this paper

Acknowledgements and thanks

CONCLUSIONS

Our tripartite approach to law reform in this report

The principles underlying our approach

Summary of our recommendations and conclusions

CHAPTER 3: A “THIRD” CATEGORY OF THING TO WHICH PERSONAL

PROPERTY RIGHTS CAN RELATE

Overview

Are certain digital assets things in possession?

Are certain digital assets things in action?

A third category thing — analogies with both things in possession and things in action

Avoiding unnecessary boundary issues

Terminology: data objects, digital objects and third category things

Our recommendation: minimalist statutory confirmation

CONCLUSIONS IN PRACTICE

Introduction

Our proposed criteria

Different digital assets — applying technology neutral principles in a way that is responsive to specific technology

Introduction

Factual and legal control

Factual control

Common law development and technical expert group

The legal consequences of control

Introduction

Background to concepts used in this report

A transfer operation that effects a state change

Transfers by “a change of control”

Derivative transfers of title

A common law special defence of good faith purchaser for value without notice

Introduction

Defining and distinguishing intermediated holding arrangements

Legal frameworks for intermediated holding arrangements

Introduction

Crypto-token collateral arrangement structuring options under the current law

Application of the FCARs regime to crypto-tokens, cryptoassets, and mere record/register tokens

Developing a bespoke legal framework for crypto-token collateral arrangements

Introduction

Breach of contract

Vitiating factors

Following and tracing

Breach of trust, equitable wrongs, and constructive trusts

Burning tokens

Proprietary restitutionary claims at law

Unjust enrichment

250

The tort of conversion

253

Injunctions

262

Enforcement

263

Awards denominated in crypto-tokens

267

CHAPTER 10: RECOMMENDATIONS AND CONCLUSIONS

270

APPENDIX 1: TERMS OF REFERENCE

274

APPENDIX 2: ACKNOWLEDGEMENTS

277

vi


Glossary

Term

Definition

Account abstraction

Account abstraction involves programming a user account with smart contracts, such as to improve the security, accessibility, and general flexibility of the account.

Airdrop

A distribution of an allocation of crypto-tokens, often to past and/or current users of a Layer 1 or Layer 2 system, and often unsolicited. Users might receive airdrop crypto-tokens directly to their wallet or need to go through a process to claim the allocated tokens.

Assignment

The transfer of a right from one person to another.

Bailment

A bailment occurs when one person takes possession of a possessable thing that belongs to (is owned by) another, usually for a specific purpose.

Bitcoin

Bitcoin is the archetypal example of a public, permissionless crypto-token system and is a communications channel which creates a system for electronic transactions. The system allows individuals to communicate with one another without the need for a centralised intermediatory to authenticate the integrity of any communication or message.

bitcoin

The native notional quantity unit which exists within, and as a result of, the Bitcoin system.

Blockchain

A method of recording data in a structured way. Data (which might be recorded on a distributed ledger or structured record) is usually grouped into timestamped “blocks” which are mathematically linked or “chained” to the preceding block, back to the original or “genesis” block.

Burn address

A crypto-token public address the private key to which is unknown. This type of address is normally used to remove tokens from circulation, thus reducing the total number and so “burning” or “destroying” them.

Carbon emissions allowance

A carbon emissions allowance (“CEA”) is an allowance created under a statutory scheme designed to incentivise certain market participants to reduce the emissions released into the atmosphere annually, on a net basis. The current scheme applicable in England and Wales is the United Kingdom Emissions Trading System.

Central bank digital currency

A central bank digital currency (“CBDC”) is a digital fiat currency issued by a country’s central bank.

Charge

A type of non-possessory security interest that can be taken over an asset. The owner of the asset creates a proprietary right in relation to that asset in favour of the person who takes the benefit of the charge.

Code

A language used to give instructions to computers. Code might take various forms of abstraction depending on how the code is created by software developers, its usage (for example, in DLT systems), or whether it is intended for direct execution by a computer.

Composable/composability

Composability is a system design principle that deals with the inter-relationships of components. A highly composable system provides components that can be selected and assembled in various combinations to satisfy specific user requirements.

Computer program

A collection of instructions written in code that are executed by a computer.

Conversion

An action in tort for wrongful interference with possession of a thing.

Cryptoasset

A cryptoasset, in the sense we use it in this report, refers to a crypto-token which has been “linked” or “stapled” to a legal right or interest in another thing. Linking or stapling refers to a legal mechanism whereby the holder of a legal right or interest in a thing is identified by reference to a crypto-token.

For more detail, see Chapter 8 (Collateral arrangements).

Crypto-token

A crypto-token exists as a notional quantity unit manifested by the combination of the active operation of software by a network of participants and network-instantiated data.

For more detail, see Chapter 4 (Third thing in practice).

Custodial intermediated holding

An arrangement under which users retain superior legal title or equitable title to the assets or entitlements to assets held on their behalf or for their account. In the event of the custodial holding intermediary entering an insolvency process, these entitlements would ordinarily not form part of the holding intermediary’s estate and would not be available to meet the claims of its general creditors.

Custody

See custodial intermediated holding.

Data structure

A data structure is a format for organising, processing, retrieving and storing data.

Decentralised finance/DeFi

A general term for automated and/or deterministic and decentralised and/or disintermediated applications providing financial services on a (generally decentralised and often blockchain-based) settlement layer, including payments, lending, trading, investments, insurance and asset management.

Digital asset

Any asset that is represented digitally or electronically. There are many different types of digital assets, not all of which will be capable of being things to which personal property rights can relate. In this report, we use the term in a broad sense.

Distributed ledger

A digital store of information or data. A distributed ledger is shared (that is, distributed) among a network of computers (known as nodes) and may be available to other participants. Participants approve and eventually synchronise additions to the ledger through an agreed consensus mechanism.

Distributed ledger technology (“DLT”)

Technology systems that enable the operation and use of a distributed ledger.

Downtime

A temporal period during which a machine, computer, or a network is out of action or unavailable for use.

Ethereum

A public, permissionless blockchain system operating as a transaction-based state machine. Ethereum serves as a foundation upon which decentralised applications can be built using smart contracts.

ether

The native notional quantity unit which exists within, and as a result of, the Ethereum system.

Fiat currency

Currency that is accepted to have a certain value in terms of its purchasing power which is unrelated to the value of the material from which the physical money is made or the value of any cover which the bank (often a central government bank) is required to hold.

Fungible

A subjective quality of things that parties are willing to accept as mutually interchangeable with other things of a similar kind, quality and grade. For example, pound coins are generally treated as a class of fungible things because one pound coin is generally accepted by counterparties as equivalent to and interchangeable with another pound coin. Other classes of things that are generally treated as fungible include gold, crude oil and shares in a company.

Hash Time Locked Contract (“HTLC”)

Hash Time Locked Contracts require the recipient to acknowledge receipt by generating cryptographic proof prior to a stipulated deadline to receive the payment. A HTLC is a combination of two technical encumbrances that can be added to a transaction — a hashlock and a timelock. A hashlock is a type of encumbrance that restricts a transaction until a hashed version of a public key generated by the initiator of that transaction is unlocked with the associated private key. A timelock is a similar form of constraint that specifies the earliest time or block when that transaction can be added to the blockchain.

Instantiated / Instantiation

See Chapter 4 (Third thing in practice), para 4.16.

Intermediary

An individual or, more commonly, an organisation which holds an interest in securities or other assets held on the behalf of, or for the account of, another person.

Intermediated securities

Interests in investment securities which are held by participants through an intermediary or a chain of intermediaries.

Layer 1

A general term used to describe base-level blockchain, DLT or crypto-token architecture, systems, networks or protocols.

Layer 2

A general term used to describe a secondary protocol built on top of, or to interact with, an underlying (“Layer 1”) DLT or crypto-token architecture, system, network or protocol. Layer 2 protocols generally use the underlying Layer 1 protocol for certain functions, including settlement of transactions and transaction security.

Lien

A right to retain possession of a thing until a claim or debt has been satisfied.

Lock and mint

A general term used to describe arrangements which involve relinquishing control over one form of crypto-token (the “locked” token), and the related receipt of control of a different form of crypto-token, which is the “minted” token.

Multi-signature arrangement

Multi-signature arrangements are also referred to as M-of-N arrangements, with M being the required number of signatures or keys to authenticate an operation and N being the total number of signatures or keys involved in the arrangement.

Negotiable/Negotiability

Negotiability means not only that an instrument is transferable but also that, in the hands of a holder in due course (broadly a good faith purchaser for value without notice that has satisfied all relevant formalities), it is enforceable despite a defect in the title of any prior holder. The transferor who negotiates a bill to a holder may, therefore, pass a better title than they themselves possess.

Non-custodial intermediated holding

An arrangement under which the holding intermediary acquires (or retains) superior legal title to the assets or entitlements to assets that they hold (or acquire) on behalf of or for the account of users. Under this model, users have primarily personal contractual claims to the return of assets equivalent to those held. In the event of a non-custodial holding intermediary entering insolvency proceedings, these claims would consequently rank as unsecured claims only and would give rise to no priority right of recourse to any specific crypto-tokens or token entitlements.

Novation

A process by which the rights and obligations under a contract are taken up by a third party through the extinction and replacement of the original contract.

Offchain/onchain

Offchain refers to actions or transactions that are external to (or are undertaken on a distinct secondary protocol such as a Layer 2 that operates on top of or interacts with) the distributed ledger, structured record, blockchain or cryptotoken system. Onchain refers to actions or transactions where the data is recorded by the distributed ledger or blockchain.

Omnibus account

An account which is used to hold the securities of more than one investor on a pooled unallocated basis (in contrast to an individually segregated account in which securities of each investor are separated from one another).

Open-source software

Open-source software is software that is released under a licence in which the copyright holder grants users the rights to use, study, change, and distribute the software and its source code to anyone and for any purpose.

Permissioned

Requiring authorisation to perform a particular activity.

Permissionless

Not requiring authorisation to perform a particular activity.

Pledge

A type of security interest involving a debtor transferring possession of a thing serving as security to a creditor. It is therefore a type of bailment.

Private key

See “Public key cryptography”.

Public key

See “Public key cryptography”.

Public key cryptography

Public key cryptography, or asymmetric cryptography, is an encryption scheme that uses two mathematically related, but not identical, keys (normally structured as long strings of data) — a public key and a private key. The generation of such key pairs depends on cryptographic algorithms which are based on mathematical problems. Each key performs a unique function. The public key is used to encrypt, and the private key is used to decrypt. So in a public key cryptography system, any person can encrypt a message using the intended receiver’s public key, but that encrypted message can only be decrypted with the receiver’s private key.

Rollup

Rollups perform transaction execution outside Layer 1 systems and then the data is posted to Layer 1 systems (where consensus as to the state of the DLT, blockchain, or crypto-token system may be reached). As data is included at the Layer 1 level, this allows rollups to be secured by native Layer 1 security. This layered approach means rollups allow for potential increases in transaction execution, increased scalability, and lower transaction costs.

Sharding of keys

Splitting a single key into multiple pieces and copies of those pieces, such that some subset of the pieces can be recombined to recover and use the key for a signature and transaction.

Smart contract

Computer code that, upon the occurrence of a specified condition or conditions, is capable of running automatically or deterministically according to pre-specified functions.

Smart legal contract

A legally binding contract in which some or all of the contractual terms are defined in and/or performed automatically or deterministically by a computer program.

Social recovery wallet

A way of implementing wallet security that allows for recovery of access in the event that the private key is inaccessible. A wallet is configured with a single “signing key” that can be used to approve transactions, with the added layer of a set of “guardians”, of which a majority can cooperate to change the signing key of the account.

Stablecoin

Crypto-tokens with a value that is intended to be pegged, or tied, to that of another asset, currency, commodity or financial instrument. The peg might be based on assets held by the issuer, or on a mathematical algorithm and is generally intended to remain on a stable (often 1:1) basis over time.

Staking

The term staking derives from its use within the “proof-of-stake” type of consensus mechanism used by certain blockchains or crypto-token systems to achieve distributed consensus. Under proof-of-stake consensus mechanisms, validators transfer or “stake” capital or value into a smart contract within the system. This staked value then acts as collateral that can be destroyed if the validator behaves in certain, pre-agreed ways which are considered to be negative for the overall consensus mechanism or system security (such as acting dishonestly or lazily). The validator is then responsible for checking that new blocks propagated over the network are valid and occasionally creating and propagating new blocks themselves. The validator is rewarded (often with new crypto-tokens) for undertaking this process (and contributing to the overall security of the consensus model) and penalised by the destruction of some or all of its staked collateral if it behaves in certain negative ways.

The term staking has recently been used by market participants in a broader, less specific way, simply to refer to transferring or locking certain capital or value to smart contracts in return for a reward, even where no positive contribution is made by the staker and/or where the staked capital or value is not at risk.

State/State change/Transfer operation that effects a state change

We use the term “state” to refer to the canonical and chronological order of events as recorded within the distributed, transaction-based ledger or structured record of a crypto-token system (and “change of state” to changes to that record). The transaction operation, once confirmed, results in a change of state of the distributed ledger or structured record according to the protocol rules of the crypto-token system.

Unspent transaction output (“UTXO”)

The output of a valid transaction on certain crypto-token systems, which is available to be used by the transferee as the input for a new transaction. The distributed ledger or structured record of the crypto-token system records (in the form of data) these available and spendable transaction outputs.

Voluntary carbon credit (“VCC”)

A voluntary carbon credit is a carbon credit created pursuant to self-regulatory programs. Those who participate in voluntary carbon markets can “offset” their emissions by purchasing VCCs, which evidence that investment has been made or action has been taken in projects aimed at reducing greenhouse gas.

Wrench attack

A wrench attack is where an attacker physically coerces a holder of crypto-tokens either to transfer those cryptotokens or give up control of those crypto-tokens (for example by giving over their private key). It is called a wrench attack because a wrench might be a suitable object with which physically to coerce someone.

List of abbreviations

ALI

American Law Institute

BAYC

Bored Ape Yacht Club

BTC

bitcoin

CBDC

Central bank digital currency

CEA

Carbon emission allowance

DAO

Decentralised autonomous organisation

DeFi

Decentralised finance

DLT

Decentralised ledger technology

ENS

Ethereum Name Service

ETH

ether

ETS

Emissions Trading System

EUA

European carbon emission allowance

FCA

Financial Conduct Authority

FCARs

Financial Collateral Arrangements (No 2) Regulations 2003

FCD

European Union Financial Collateral

Directive 2002/47/EC

NFT

Non-fungible token

LPA 1925

The Law of Property Act 1925

UCC

Uniform Commercial Code (United States)

ULC

Uniform Law Commission (United States)

UNIDROIT

The International Institute for the Unification of Private Law

UTXO

Unspent transaction output

VCC

Voluntary carbon credits

xviii


Digital assets

To the Right Honourable Alex Chalk MP, Lord Chancellor and Secretary of State for Justice

DIGITAL ASSETS AND THE LAW OF PERSONAL PROPERTY

widely used in statutes and cases and property rights feature in most commercial transactions relating to things of value. Property rights are important for the proper characterisation of numerous modern and complex legal relationships, including intermediated holding arrangements, collateral arrangements and structures involving trusts. Property rights are also important in cases of bankruptcy or insolvency, when objects of property rights are interfered with or unlawfully taken, and for the legal rules concerning succession on death.2 Property rights are useful because, in principle, they are recognised against the whole world, whereas other — personal — rights are recognised only against someone who has assumed a relevant legal duty.

ABOUT THIS PROJECT

Background

Call for evidence, interim update paper and consultation paper

Territorial extent

OTHER WORK ON DIGITAL ASSETS

Related past and current Law Commission work

Past work

Ongoing work

THE TEAM WORKING ON THIS PAPER

ACKNOWLEDGEMENTS AND THANKS

OUR TRIPARTITE APPROACH TO LAW REFORM IN THIS REPORT

We should try to avoid the creation of a new legal and regulatory regime that will discourage the use of new technologies rather than provide the foundation for them to flourish.

Prioritising common law development

Targeted statutory law reform

Support from industry-specific technical experts

THE PRINCIPLES UNDERLYING OUR APPROACH

common law cannot develop the legal certainty the market requires.

The common law of England and Wales is sufficiently resilient and flexible for digital assets

roundtable and our subsequent discussions with senior and specialist judges;

The interaction between common law development and statutory intervention

English law (like other common law systems) does not necessarily require statutory intervention in order to support new asset classes or financial structures. As we have seen recently with cryptoassets, and as has been demonstrated over past decades and centuries with numerous once-novel asset classes, the common law has inherent flexibility that allows it to adapt to accommodate commercial need.

Legislation to confirm and support the existing common law position so that the common law can continue to develop

Focused, technical statutory intervention

Applying technology-neutral principles in a way that is responsive to specific technology

Birss was careful to acknowledge the differences between different forks of the original Bitcoin network, each of which manifest different crypto-tokens:42

There are four bitcoin networks in issue in this case: BSV, BTC, BCH and BCH ABC... Each later network started life as a copy of the blockchain of a pre-existing network (which is after all public) but by then applying different software thereafter.

As part of the Financial Services and Markets Bill, the UK is clarifying powers to bring stablecoin and cryptoasset activities into the existing financial services framework in an agile way via secondary legislation. Detailed firm-facing rules will be delegated to the UK’s regulators.

This means that the UK will be able to update regulation in an agile way to support innovation and address risks as the sector rapidly evolves, rather than hard-coding detailed rules into primary legislation.

Greater input from specialist market participants on technical issues

Consistency with other legal and regulatory regimes

Consistency

Differentiation

[Internationally mobile transactions and markets] have a tendency to ‘tip’, which means that once the use of a governing law reaches a critical mass in a given market, most market participants tend to use that law because of the benefit from using standardised contract and procedures.

property rights under Hong Kong law and is capable of being held on trust: Re Gatecoin Limited [2023] HKCFI 914.

China, which in 2021 introduced widespread bans on crypto-token trading is reportedly considering the option of softening this strict stance. See Library of Congress, “China: Central Bank Issues New Regulatory Document on Cryptocurrency Trading” (2021); People’s Bank of China, “Circular on Further Preventing and Disposing of Speculative Risks in Virtual Currency Trading” (2021), available at: https://www.gov.cn/zhengce/zhengceku/2021-10/08/content_5641404.htm; and A Cuthbertson, “Bitcoin price poised for ‘orthogonal’ shakeup as China softens stance” (2023) Independent, available at: https://www.independent.co.uk/tech/bitcoin-price-latest-china-crypto-b2288046.html.

Singapore has recently put forward plans to reduce and mediate retail access to crypto-token markets despite the jurisdiction’s earlier ambitions to facilitate a more hands-off - albeit cautionary - approach to crypto-token regulation. See Monetary Authority of Singapore, “Proposed Regulatory Measures for Digital Payment Token Services” (2022); and Monetary Authority of Singapore, “Keynote Speech by Mr Ong Chong Tee, Deputy Managing Director (Financial Supervision), Monetary Authority of Singapore, at Asia Securities Industry & Financial Markets Association (ASIFMA) Annual Conference 2018 on 1 November 2018” (2018).

In Japan in 2015, the Tokyo District Court held that bitcoin was not a thing capable of ownership within the Japanese Civil Code. Since that judgment, an amendment to the Japanese Payment Services Act added the concept of “Virtual Currency”. Lee and Van de Looverbosch suggest that this intervention has brought crypto-tokens within the sphere of property law, as a form of “property value”: J Lee and M Van de Looverbosch, Property and Data: A Confused Relationship (2021). See also J Lee and A Darbellay, A Data Governance in AI, FinTech and RegTech: Law and Regulation in the Financial Sector (2022), available at: https://ssrn.com/abstract=3995492 and paras 4.58-4.61 of our consultation paper.

In 2020, Switzerland introduced the Federal Act on the Adaptation of Federal Law to Developments in Distributed Ledger Technology, which broadly amended a number of existing statutory regimes to better incorporate digital assets, available at: https://www.newsd.admin.ch/newsd/message/attachments/60601.pdf.

In 2020, Liechtenstein introduced the Token and Trusted Technology Service Provider Act 2019-301, which provides for the tokenisation of assets and rights. This legislation creates a new legal object - a token - and a specific, separate regime for the regulation and use of those tokens.

In 2020, Germany introduced the Gesetz zur Umsetzung der Anderungsrichtlinie zur Vierten EU-Geldwascherichtlinie which, among other things, introduced a new category of “crypto assets” into the definition of financial instruments for the purposes of German banking legislation. See also para 14.46 of our consultation paper.

In 2018, Malta introduced the Virtual Financial Assets Act which, alongside the Innovative Technology Arrangements and Services Act (2018) and the Malta Digital Innovation Authority Act (2018), comprehensively legislates on the issuance and use of virtual financial assets.

SUMMARY OF OUR RECOMMENDATIONS AND CONCLUSIONS

Chapter 3: A “third” category of thing to which personal property rights can relate

Detailed overview of Chapter 3 (Third thing)64

The powerful case for reconsidering the dichotomy between [things] in possession and [things] in action and recognising a third category of intangible property... in a way that would take account of recent technological developments.

Whinney 79which suggested that there could be no third category thing and confines to history the “red herring” 80of a circular and hollow debate on categorisation.

Detailed overview of Chapter 4 (Third thing in practice)81

Detailed overview of Chapter 5 (Control)86

Detailed overview of Chapter 6 (Transfers)96

Detailed overview of Chapter 7 (Intermediated holding arrangements)98

Detailed overview of Chapter 8 (Collateral arrangements)99

However, the development of such a security interest would likely not be a complete solution given that such a security interest would likely be reliant on static, comprehensive notions of control.

Detailed overview of Chapter 9 (Remedies)100

Chapter 3: A “third” category of thing to which personal property rights can relate

OVERVIEW

All personal things are either in possession or in action. The law knows no tertium quid 103between the two.

quotas; 106more recently, it has been in response to crypto-tokens.107

Once the thing that constitutes a crypto-token has been determined, the law can then apply existing concepts to determine whether property rights can relate to that thing.

ARE CERTAIN DIGITAL ASSETS THINGS IN POSSESSION?

Things in action and things in possession

Our recommendations on electronic trade documents

Our approach to third category things and possession

ARE CERTAIN DIGITAL ASSETS THINGS IN ACTION?

Crypto-tokens as things in action?

Things in action as a residual category

a sub-classificatory system distinguishing certain kinds of [things] in action (such as contractual rights) from others (such as intellectual property rights).

It is clear from the consultation paper and the UKJT Legal Statement that there is already a high degree of legal certainty that there exist certain types of intangible property that are not things in action (in the strict sense). Given this, we strongly agree that the law of England and Wales should recognise a third category of property (in our view, it already does). We agree that it is not conceptually coherent or helpful for crypto-tokens and other intangible assets that do not consist of a legal claim by the property holder against another legal person to be treated as things in action (or at least not things in action to which the legal principles applicable to things in action in the strict sense apply). Treating them as such implicitly limits the flexibility of the common law to develop legal principles that are best suited to such intangible assets, including in relation to transfers, security and relative title. Put another way, if such intangible property were to be included in a category of things in action, it would be necessary to bifurcate the legal principles applicable to things in action between those that consist of a legal claim by the property holder against another legal person and those that do not, so that the common law develops appropriate legal principles for this new sub-category. This seems tantamount to acknowledging a third category of property. Similar considerations apply to suggestions that intangible assets that do not consist of a legal claim by the property holder against another legal person should, instead, be characterised as things in

possession, which is a suggestion made by other commentators that consider that such property should be subject to possessory-style legal concepts.

The position at common law

instance, 166although most were decided in connection with interim relief.167

Singapore,176 and the United States,177 including in substantive proceedings. 178In those cases, courts have also referred to or relied on the analysis in AA v Persons Unknown,179 the UKJT Legal Statement,180 and our consultation paper.181

We may have reached the point [where] ‘native’ digital objects demand recognition in their own right, however disruptive this may be for the dogmatic structure of inherited legal categories.

A THIRD CATEGORY THING — ANALOGIES WITH BOTH THINGS IN POSSESSION AND THINGS IN ACTION

it is crucial that courts faced with cryptoasset disputes avoid the simplistic analogy between the tangible and intangible.

The starting point of our analysis is therefore, as it was in the First Legal Statement, to identify what, if anything, might genuinely be novel and distinctive from a legal perspective about the use of blockchain and DLT in such structures.

Over recent years cryptoassets and the activities underpinning their use (or ‘crypto’) has evolved into an extensive, complex, and rapidly evolving ecosystem. It features a myriad of different activities and business models, each generating different types of opportunities and risks for the actors involved.

AVOIDING UNNECESSARY BOUNDARY ISSUES

TERMINOLOGY: DATA OBJECTS, DIGITAL OBJECTS AND THIRD CATEGORY THINGS

Data objects and digital objects

“Third” category

OUR RECOMMENDATION: MINIMALIST STATUTORY CONFIRMATION

There are centuries of case law considering the factors that make a thing an appropriate object of personal property rights, which the courts can continue to apply in this context so that the third category does not become inappropriately broad. We consider this to be the most effective and least interventionist recommendation that we can make to facilitate the law’s development on this point.

[the] powerful case for reconsidering the dichotomy between [things] in possession and [things] in action and recognising a third category of intangible property ... in a way that would take account of recent technological developments.

Recommendation 1.

Chapter 4: Our third category recommendation and conclusions in practice

INTRODUCTION

now recognises certain digital assets, including crypto-tokens, as distinct things which are capable of being objects of personal property rights. We conclude that such things should be regarded as falling within a third category of things to which personal property rights can relate, rather than being categorised as things in action or things in possession.

paper and discuss consultees’ comments in response to them. We make consequential modifications and clarifications to those criteria (which we now treat as indicia).

OUR PROPOSED CRITERIA

Data

Composed of data represented in an electronic medium, including in the form of computer code, electronic, digital or analogue signals.

Crypto-tokens as composite things

A crypto-token exists as a notional quantity unit manifested by the combination of the active operation of software by a network of participants and network-instantiated data.

components. It is more complex than the £1 coin since it lacks any tangible basis and its most significant properties are matters of digital functionality rather than legal attribution. Like the coin, however, it comprises more than one component. It is grounded in, but not confined to, the technical features of its own digital design. Its outward manifestation is a string of data generated by transactions between participants on a distributed ledger system. But to see the asset as mere data would ignore its larger functionality, just as we would fail to appreciate the full economic or legal significance of a coin by treating it as a mere metal disc. If the law is to recognise digital assets as property for private law purposes, then it would benefit from analysing them as composite things. The asset is more than mere data. It is a set of transactional functionalities. The most important of these is the capacity of the person who holds the private key to effect new transactions which will be recognised as valid by the technical rules of the system. Analysed in this way, the asset can be viewed as a specific transactional power over unique data entries on the ledger.”232

characterised as the notional thing which is recorded in the distributed ledger, but is not the data (or data strings or data structures) which form the ledger.”233

While [a crypto-token’s] form relies on its technical instantiation as a data structure, its function is derived not merely from the abstract existence of the technical system in which it persists, but fundamentally by the active operation of that system by a network of users. A crypto-token is consequently an object that has both, and is a composite of, technical and social dimensions — crypto-tokens exist as instantiations in socio-technical systems.

This means that the functional qualities arise through the combination of network-instantiated data 242and the active operation of the system by participants in the network (that run the specific system protocol software).243 A core purpose of the crypto-token system is to ensure that the notional quantity units cannot be double spent — by specifying how consensus as to “state” (including state transitions) is reached — meaning that the notional quantity unit in question is rivalrous.244

Independent of persons and independent of the legal system

Such systems will be operated, managed and administered under contractual and/or statutory rules and protocols. They will or are likely to create private law rights and obligations as between participants and the operator/administrator in relation to the maintenance of the distributed ledger/structured record and settlement processes (for the holding and transfer of title to the digital assets recorded in the systems). The existence of such private rights and obligations is likely to obfuscate the analysis as to whether the digital assets themselves (issued, held and transferred by means of such a system) can properly be considered as existing “independently of the legal system”.

system than crypto-tokens. Specifically, European Union carbon emission allowances (“EUAs”) and carbon emission allowances (“CEAs”) rely on statutory provisions for their continued existence, yet have been categorised by the courts as intangible things that are not a thing in action in the narrow sense.265 In our consultation paper, we said that EUAs would not satisfy our proposed criteria because their existence relies on statutory provisions.266 However, we no longer use our criteria to define the hard boundaries of the third category of thing to which personal property rights can relate and as such, our recommendation and conclusions do not seek to change the existing common law position.

Rivalrous

Rivalrousness seems to be a suitable concept for inclusion in the definition of the third category. It acts as a useful separator between pure information and cryptoassets. It follows from the reasoning given in Ruscoe v Cryptopia,270 with which we agree, in which cryptocurrencies were distinguished from other digital assets such as databases or photographs where the information could be “infinitely duplicated”. The idea of cryptocurrencies is to create an item of tradeable value, not simply to impart information.

While we agree that “rivalrousness” is central to the question of whether or not something constitutes property under common law principles, this is a complex and nuanced issue and not something that is suited to definition in statute.

As a result it is meaningful to describe bitcoin not merely as something which is transferable but as “rivalrous” (see the Law Commission’s recent Digital Assets: Consultation Paper). For a transferable thing to be rivalrous, the holding of it by one person necessarily prevents another from holding that very thing at the same time. Because the holder cannot double spend their bitcoin, such that it is rivalrous, the cryptoasset can be said to be capable of assumption by a third party (see the definition of property in National Provincial Bank v Ainsworth). 273Thus, as Mr Justice Bryan held in AA v Persons Unknown 274citing Ainsworth, a cryptoasset such as bitcoin is property.

The feasibility, cost, efficiency and equity of exclusion is separable from rivalry in consumption.

Rivalrousness in the context of third category things

The signing of the hashed transaction record with users’ private keys in the first place, and the incorporation of these records into a hashed chain of blocks produced by the proof of work, solves the double spending problem. This characteristic of bitcoin does not emerge as a matter of law or convention, it is a characteristic which arises as a matter of fact from the way the software works. As a result it is meaningful to describe bitcoin not merely as something which is transferable but as “rivalrous”.

DIFFERENT DIGITAL ASSETS — APPLYING TECHNOLOGY NEUTRAL PRINCIPLES IN A WAY THAT IS RESPONSIVE TO SPECIFIC TECHNOLOGY

Private, permissioned blockchain systems and different uses of blockchain technology

Private, permissioned blockchain or DLT-based systems that do not manifest third category things

Different use-cases for third category things

each crypto-token being a distinct thing), instead of physical bearer instruments, creating “digital bearer instruments”; or

register or record of interests instead of a conventional database (with each crypto-token being a distinct thing, but used simply to record or register something system-external).

Increased optionality in legal structuring using third category things

Carbon emissions allowances and voluntary carbon credits

Defining the third category of property as “data objects” raises (without necessarily addressing) questions as to whether EUAs and VCCs constitute property at all, and if so, whether a fourth category of property exists under English law.

VCCs can be seen as representing exclusive access to a finite resource - namely, an independently verified certification that the holder either directly or indirectly has reduced or removed from the atmosphere one metric ton of carbon dioxide equivalent, in accordance with relevant carbon standards and registry rules. They therefore constitute an intangible asset that is distinct from any underlying register in which entitlements to such VCCs are recorded.

In-game digital assets and domain names

Digital files and digital records

Digital files are excludable by design through access controls at the logical layer. This typically includes an identity and access management system, often in the form of user accounts with associated privileges and passwords.

INTRODUCTION

consider that the concept of control is likely to be appropriate for the vast majority of these third category things. However, we do not think that third category things should be defined by the concept of control directly. The concept of control might not always map neatly or consistently onto those third category things: control is highly complex, composable 368and multi-faceted in the context of third category things; and different technology, products and services use control in different ways.

FACTUAL AND LEGAL CONTROL

FACTUAL CONTROL

The ... requirements ... contemplate that ‘control’ assumes a role that is a functional equivalent to that of ‘possession’ of movables. However, ‘possession’ in this context is a purely factual matter and not a legal concept. Moreover, because a digital asset is intangible, this functional equivalence to possession involves only the dominion and power over a digital asset but does not involve the physical situs dimension applicable to possession of movables. Whether ‘control’ . exists is a matter of fact and does not depend on a legal conclusion. However . the presence of control gives rise to legal consequences.

Factual control over digital objects is complex and technology specific

Rivalrousness is preferable to control when defining the thing in question

Consistency with the law of possession

COMMON LAW DEVELOPMENT AND TECHNICAL EXPERT GROUP

A technical expert group on factual and legal issues relating to control and other issues relating to digital asset systems and markets

It follows that the legal statement is not in fact a statement of the law. Nevertheless, in my judgment, it is relevant to consider the analysis in that Legal Statement as to the proprietary status of crypto currencies because it is a detailed and careful consideration and, as I shall come on to, I consider that that analysis as to the proprietary status of crypto currencies is compelling and for the reasons identified therein should be adopted by this court.

Possible scope and output of the technical expert group

A control example

Other examples of control

Recommendation 2.

THE LEGAL CONSEQUENCES OF CONTROL

It allows for subtle but important differences to develop without diluting or distorting the concept of possession as a physical construct or automatically importing all the “baggage” that comes with the concept of possession.

The legal consequences of control — areas of alignment

Situations in which “ownership” and “control” are separated

Defects in transfers rendering the transfer void

Osbourne (in relation to NFTs), 441and Armstrong (in relation to EUAs). 442We discuss this in more detail in Chapter 9 (Remedies).443

Intermediated holding arrangements and agency

Transfers by a change of control

Intention

However, we re-iterate our caution that always to search for an element of human intentionality risks introducing an unreal human element to what can often be automatic or deterministic processes.453

If there is no person that can be found to have the requisite intention, it may be appropriate to conclude that there is no person with Control of the asset and/or that a particular arrangement has given rise to a relinquishment of Control rather than a transfer of Control. This could potentially be the case in certain circumstances where crypto-tokens are deposited in certain token contracts governed on a completely decentralised basis or with addresses in respect of which no person has knowledge of the private key. We do not see any policy rationale for excluding that possibility.

Perfection requirement for qualifying non-possessory security interests

While the concept of control is prima facie attractive, unfortunately English law precedent in the context of the Financial Collateral Arrangements (No 2) Regulations 2003 ("FCARs"), has declared that the concept of control (for the purpose of perfecting a financial collateral arrangement) has the same [or similar] characteristics as when the term is used in English law to distinguish a fixed charge from a floating charge [subject to certain qualifications of uncertain scope]. Lesser measures of factual or legal control, which are almost inevitable in the context of the practical operation of control arrangements in a blockchain or DLT-based system, would run the risk of not being recognised by the English courts as constituting sufficient control to found a legal or equitable proprietary title to a relevant digital asset (in the third category). And this area would remain unsatisfactory with regard to taking security over [third category things], as well as over other forms of financial collateral (i.e. financial instruments, cash and credit claims).

The difficulties with rigid legislative definitions

The concept of control, as [used] by the FCARs and the courts, has caused a great deal of difficulty.

The legal consequences of control — remaining differences

Relative title

Title is best understood as referring to a claim to an asset arising from a proprietary interest. In its strict sense, title does not refer so much to the content of the claimant's proprietary interest — i.e., to the incidents of practical enjoyment which his interest in the asset confers on him — but to the strength of his claim to that enjoyment, relative to other people who have similar interests in the same asset. Inherent in the notion of title is the question whether one person's claim to those incidents is stronger or weaker than that of other potential claimants. Professor Goode has expressed the point as depending on the difference between the quantum of the claimant's right to the asset and the strength of that right as against others...

To summarise then, relativity of title is about the respective enforceability of competing claims to vindicate the incidents of enjoyment inherent in some particular proprietary interest.

The relativity principle has no part to play in determining competing legal claims to [things] in action, except where the [thing in action] is embodied in a documentary intangible or in those rare instances where the title arises from an unauthorised substitution of an original asset. In general, the relativity principle illustrates the pragmatic interaction in common law reasoning between the rules of evidence and procedure, and the substantive principles governing the creation and transfer of property interests.

decentralised finance markets which have evolved around them recognise this core feature and allow the layering of further technical encumbrances, including the splitting or distribution of control. These markets and many related products are also more often designed by reference to control and the powers and incentives/incentive mechanisms of participants, rather than in terms of claims/rights, corresponding duties and obligations.482

Shared control

Interference with control

5.101 There was strong support among consultees for the proposition that factual control (and intention, see paragraph 5.55 above) can be taken together to provide “best evidence” of the superior legal title to a digital object. This conclusion is limited to digital objects within the third category, and does not affect rights or claims enforceable by action. We think the better and more practical view — supported by those consultees who are closely involved in markets involving such digital objects, and market practice 496— is that factual control (plus intention) can found a legal proprietary interest in a digital object. We conclude that in certain circumstances such a control-based legal proprietary interest can be separated from (and be inferior to or short of) a superior legal title.

5.102 We think that in certain circumstances, claims involving third parties asserted by or against a person with a control-based legal proprietary interest (that was subject to a superior legal title of another person), could be based on and determined by reference to the controller’s control-based legal proprietary interest. We discuss this in more detail in Chapter 7 (Intermediated holding arrangements) in relation to intermediated holding arrangements and in Chapter 9 (Remedies) in relation to available causes of action and associated remedies.

5.103 In coming to that conclusion we acknowledge that the courts are best placed to develop the law by reference to the facts and technology in front of them (and in cases where genuine disputes arise). We think in this area, common law development is a more appropriate way for the law to evolve than by reference to the less nuanced hypothetical factual scenarios discussed in this paper and in academic and market commentary. Indeed, as we discuss in more detail in Chapters 7 (Intermediated holding arrangements) and 9 (Remedies), it has already begun to do so.497

Conclusion 1.

5.104 We conclude that factual control (plus intention) can found a legal proprietary interest in a digital object. We conclude that in certain circumstances such a controlbased legal proprietary interest can be separated from (and be inferior to or short of) a superior legal title.

Chapter 6: Transfers

INTRODUCTION

BACKGROUND TO CONCEPTS USED IN THIS REPORT

A transfer operation that effects a state change

From a technical standpoint, the ledger of a cryptocurrency such as Bitcoin can be thought of as a state transition system, where there is a ‘state’ consisting of the ownership status of all existing bitcoins and a ‘state transition function’ that takes a state and a transaction and outputs a new state which is the result.

In Ethereum, the state is made up of objects called ‘accounts’, with each account having a 20-byte address and state transitions being direct transfers of value and information between accounts.

effects a state change” in our consultation paper.506 We also noted that a change of state or a transfer operation that effects a state change does not necessarily happen instantaneously in crypto-token systems. 507In addition, depending on the system involved, it may take some time for the transfer operation that effects a state change to become probabilistically irreversible (in the context of some proof of work based systems) or finalised (in the context of some proof of stake based systems).508

A system for state transitions, not “just a record”

Factual consequences of a transfer operation that effects a state change

Legal consequences of a transfer operation that effects a state change

A crypto-token exists as a notional quantity unit manifested by the combination of the active operation of software by a network of participants and network-instantiated data.

A TRANSFER OPERATION THAT EFFECTS A STATE CHANGE

Since every transaction relating to that token adds to its chain, some would say a fresh piece of property is created every time bitcoin is transferred, but there is no need on this appeal to get into that debate.

There can be no UTXO without there being basic units from which it is calculated. In the case of the Bitcoin system, the basic unit is the satoshi. The satoshi is a construct by the system, as is the UTXO. Both are defined by the software of the system (the information attribute). The function of the satoshi (the functional or operational attribute) is an object that can be the subject of instructions to the system, to be recorded on the blockchain... What they are sending are satoshis, not the UTXO.

TRANSFERS BY “A CHANGE OF CONTROL”

example, both the UNIDROIT Working Group 569and the UCC Committee570 acknowledge that a transfer of a crypto-token can be made by a change of control.

If [a concept of control and intention specific to digital objects] 572is available, then the consequences can be worked out by the court as necessary to resolve the disputes before them. The courts have not shied away from deciding novel points.

Conclusion 2.

DERIVATIVE TRANSFERS OF TITLE

... incorporeal money can indeed be transferred. To speak of incorporeal transfers gives full effect to the principle that the law should aim for functionally equivalent outcomes regardless of whether money is paid in corporeal or incorporeal form. Moreover, on a closer investigation, the principle of derivative transfer of title can never have entailed that the payer’s possession or ownership of a corporeal asset actually passed, physically, to the recipient. That would be to take an extreme, and unrealistic, approach to the reification of property interests. On balance. it is justifiable to treat the incorporeal transfer [of money by means of an inter-bank payment] as involving a derivative means of acquiring title. First, the creation of the recipient’s title depends on the expression of the payer’s will at the outset. It is the payer who initiates the payment instruction. Secondly. the fact that the recipient’s claim against his or her bank is newly created does not necessarily entail that he or she takes it free from competing titles. Indeed, it would take an extreme and unrealistic conception of derivative means of acquiring title to sustain the view that transfers of incorporeal money should be treated differently from corporeal transfers. Even in the simplest case of a transfer of ownership by delivery of a chattel, the network of jural relations constituted by the transferee’s possession and ownership of the chattel is different from that constituted by the transferor’s former possession and ownership. 577The transferee does not in fact succeed to the same possession and ownership as the transferor. Possession and ownership are legal constructs. Unlike the corporeal assets they relate to, they cannot be transferred in space from one person to another.

A COMMON LAW SPECIAL DEFENCE OF GOOD FAITH PURCHASER FOR VALUE WITHOUT NOTICE

The provisional proposal in our consultation paper

We think that the best way to avoid any lingering uncertainty as to the application of the common law special defence of good faith purchaser for value without notice is explicitly to recognise its application in relation to transfers of crypto-tokens.

How our conclusion might take effect at common law

We do not advocate the wholesale importation of the law of negotiable instruments as it currently stands into the law of cryptoassets... However, the concepts which lie behind the law of negotiable instruments match closely the structural elements which a law of cryptoassets should achieve, and this body of law provides some useful conceptual scaffolding which could be relatively easily adapted to the position in respect of cryptoassets.

Analogy with the common law special defence of good faith purchaser for value without notice that applies to money

Preserve[s] the decentralized nature of bitcoin and other cryptocurrencies, enable[s] secured lenders to enjoy legal benefits of their existing commercial practices, and protect[s] the negotiability of bitcoin by allowing onward transferees to take bitcoin and cryptocurrencies free of existing encumbrances.

Analogy with the common law defence of good faith purchaser for value without notice that applies to negotiable instruments

It would be a relatively straightforward incremental step for the courts to recognise a mercantile custom treating onchain transfers of crypto-tokens as negotiable, where such a custom can be demonstrated. ... We believe such custom is highly evident in the case of many frequently traded crypto-tokens. ... We see no reason why the same kind of technical extension to the common law to recognise a global mercantile custom should not also apply in the case of crypto-tokens. We also believe that market practice established in relation to certain crypto-tokens can easily (and very quickly) be extended to similar crypto-tokens by analogy.

It is no doubt true that negotiability can only be attached to a contract by the law merchant or by a statute; and it is also true that, in determining whether a usage has become so well established as to be binding on the courts of law, the length of time during which the usage has existed is an important circumstance to take into consideration; but it is to be remembered that in these days usage is established much more quickly than it was in days gone by; more depends on the number of the transactions which help to create it than on the time over which the transactions are spread; and it is probably no exaggeration to say that nowadays there are more business transactions in an hour than there were in a week a century ago. Therefore, the comparatively recent origin of this class of securities in my view creates no difficulty in the way of holding that they are negotiable by virtue of the law merchant; they are dealt in as negotiable instruments in every minute of a working day, and to the extent of many thousands of pounds. It is also to be remembered that the law merchant is not fixed and stereotyped; it has not yet been arrested in its growth by being moulded into a code; it is, to use the words of Cockburn CJ in Goodwin v Robarts, capable of being expanded and enlarged so as to meet the wants and requirements of trade in the varying circumstances of commerce, 637the effect of which is that it approves and adopts from time to time those usages of merchants which are found necessary for the convenience of trade.

A limited development

would not be any legally effective consent to the transfer from the victim.659 In such a case, in the absence of a broad innocent acquisition rule, a third party who acquires the crypto-token from the perpetrator might be vulnerable to a claim by the victim.660

Once the Tether [a crypto-token/stablecoin] had been swept from the user accounts into the [Binance central unsegregated pool address] the users were then granted credit in the amount of the value swept which would then constitute [Binance] a purchaser and no longer susceptible to any remedy at the suit of the claimant so long as it acted [in good faith and without notice].

Good faith purchase for value and notice

The price of that development is the elimination of adverse titles that might have otherwise been recognised in the victims of fraud. The development favours an extreme form of security of transaction over security of interest, achieved by technical design rather than by legal rules.

6.106 Moreover, crypto-tokens are potentially more amenable to sophisticated evidential presumptions which might enable an original legal title holder to identify their cryptotoken post-transfer. That is particularly the case with non-fungible tokens based on standards such as ERC 721 and ERC 1155, but it might also be the case (to a lesser extent) with UTXO-based tokens.678 The particular token standard in question and the particular crypto-token (or third category thing) in question is also likely to affect the question of whether a recipient had actual notice of the defect in title. For example, a recipient of a well-known NFT that was closely associated with a particular person might have “actual knowledge” of a potential defect if their suspicions are raised that the transferor is not the person normally associated with the NFT. This could also be the case for “soul-bound” tokens (a hypothetical example could be a “passport token”) which are closely linked to a particular person. A recipient who acquires a “passport token” of a person other than them might have difficulty in showing they were acting in good faith and without notice of a defect in title.679

Digital securities and NFTs

Rationale for a common law special defence of good faith purchaser for value without notice applicable to crypto-tokens

The proprietary regime applying to money does not so much build trust between the parties as it makes the possible absence of trust less relevant. In the ordinary course of events, the recipient of money who gives good consideration can be assured of taking an indefeasible title to it^The currency principle thus supports what has been called the “anonymity” of money, and its role in facilitating impersonal relations between market agents.

Digital assets are often traded on a distributed ledger system or other electronic networks that permit near instantaneous transactions. The fluidity of the market allows for transactions that recognise the full value of these assets and transactions. This fluidity, and the fact that many transferors are pseudonymous and often based in different jurisdictions, makes investigations as to whether there are any conflicting proprietary rights in the asset being acquired highly impractical. A person who has a proprietary right in a digital asset is therefore in a better position than a transferee to protect itself from wrongful activity by taking steps to safeguard its proprietary rights. The availability of an innocent acquisition rule would facilitate the types of transactions referred to above, and would contribute to legal certainty and efficient markets. In the absence of an innocent acquisition rule, the risk of third-party proprietary claims to a digital asset would be likely to be factored into, and reduce, the amount that a prudent buyer would be willing to pay for the digital asset or the value a secured creditor would assign to the digital asset as an encumbered asset. Moreover, the legal certainty provided by an innocent acquisition rule also benefits custodians of digital assets and their clients ... The availability of an innocent acquisition rule will reduce friction in transactions and reduce costs for all involved. The availability of innocent acquirer status in other areas, such as negotiable instruments and securities has proved effective and safe for the operation of those markets. Digital assets are playing an important role in the current economy and are expected to play an even greater role over time.

Conclusion 3.

Chapter 7: Intermediated holding arrangements

INTRODUCTION

indirectly through accounts at holding intermediaries (such as intermediary exchanges). This might be for a variety of purposes, including improved security over their holdings; access to specific trading markets; lower cost and/or more efficient transaction execution and settlement systems; yield- or revenue-generating opportunities; and access to different token functionalities.

DEFINING AND DISTINGUISHING INTERMEDIATED HOLDING ARRANGEMENTS

describe both a variety of intermediated holding arrangements and non-holding services. Some of those arrangements or services are not necessarily consistent with the traditional conception of custody arrangements in, for example, regulated financial services markets. Indeed, many consultees said that the terminology around cryptotoken specific holding patterns is unclear, particularly the term “custody”.700

Clearer terminology

Custody of cryptoassets is conceptually similar to traditional finance as the custodian holds itself out as being responsible for safekeeping a cryptoasset on behalf of another.

Our revised terminology

holding of crypto-tokens or crypto-token entitlements by an intermediary on behalf of or for the account of others. These are further divided between the following two sub-types of intermediated holding arrangement (each of which we explain in more detail below):

intermediary”; and

intermediary”.

directly or indirectly to the safeguarding or administration of crypto-tokens or crypto-token entitlements that do not involve a service provider holding those crypto-tokens or crypto-token entitlements on behalf of or for the account of others.

Holding

We define “holding” as the capacity to exercise, or to coordinate or direct, the exercise of “full factual control”.

Intermediated holding and holding intermediaries

intermediary: arrangements under which the holding intermediary acquires (or retains) superior legal title to the crypto-tokens or crypto-token entitlements that they hold (or acquire) on behalf of or for the account of users. Under this model, users have primarily715 personal contractual claims to the return of assets equivalent to those held. In the event of a non-custodial holding intermediary entering insolvency proceedings these claims would consequently rank as unsecured claims only and would give rise to no priority right of recourse to any specific crypto-tokens or token entitlements.716

Non-holding services

LEGAL FRAMEWORKS FOR INTERMEDIATED HOLDING ARRANGEMENTS

Contract-based full title transfer/title acquisition arrangements

Trusts

Clarification of conceptual approaches to trust

The three certainties

Certainty of intention
Certainty of objects
Certainty of subject matter

Conclusion 4.

Rights to swap

A presumption of trust

Dealings in trust-based crypto-token claims: section 53(1)(c) of the Law of Property Act 1925

Section 53(1)(c) and its potential application to crypto-tokens

7.70    Section 53(1)(c) requires that:

must be:

Options for reform

Conclusions on reform

Formalities for statutory assignments under section 136 LPA 1925

Shortfalls and crypto-token custodial holding intermediary insolvency

The specifics of any statutory provisions 796must be considered in coordination with the development of broader legal and regulatory regime(s) for crypto-token markets and related activities, including intermediated holdings of crypto-tokens or cryptotoken entitlements. In particular, the risks to users in insolvency scenarios might be very different where crypto-tokens are held by intermediaries when compared with cash, or traditional financial securities, which might require different (and potentially novel) approaches to the way in which the law currently approaches insolvencies of investment banks or of payment and securities settlement systems. This could include a more market, service-provider and technology-specific approach to the allocation of shortfall losses where a shortfall occurs and the (trust-based) custodial holding intermediary enters insolvency proceedings. 797A more discrete and forensic approach might, for example, be warranted in scenarios where movements of crypto-tokens and/or crypto-token entitlements are recorded in great detail by a combination of the books and records of the custodial holding intermediary and the distributed ledger or structured records of the crypto-token systems themselves.

Alternative and supplementary legal structures for intermediated holding arrangements

The extension of bailment or creation of an analogous control-based concept

bailor directs. 798Bailments can be undertaken gratuitously or for reward. Where a bailment relationship arises, the bailor is under a duty of care to take such care of the thing as is reasonable in the circumstances.799

Common law development of a control-based legal proprietary interest

7.107 Second, recognition of a control-based legal proprietary interest would promote flexibility within the common law by providing “a greater palette of rights and remedies which parties might use to structure their commercial relationships”.809 In addition to flexibility, Linklaters LLP also pointed to additional and specific benefits. For example, the recognition of a control-based legal proprietary interest would provide the basis on which a control-based security interest (akin to a pledge) might be developed. 810As we explain in Chapter 8 (Collateral arrangements), we now conclude that this would be a useful development within the law. 811We then proceed to set out a range of suggested scenarios for the incorporation of control-based security interests into a more comprehensive and nuanced future collateral regime for (certain) crypto-tokens and (certain) cryptoassets, which we recommend should be developed as a matter of priority. 812Linklaters LLP also explained that the availability of a control-based custodial intermediated holding arrangement (as an alternative to trust) might be helpful for conflict of laws purposes given that some jurisdictions do not recognise common law trusts but will be more familiar with “possessory”-style security interests. Gunnercooke LLP made a similar point.813

Conclusion 5.

An alternative conceptual framework

Agency

Trilateral non-tokenised agency relationships

7.120 We agree that agency principles could be useful in structuring trilateral agency arrangements where an agent is given “mandate” powers over a principal’s account at a holding intermediary.825 We do not consider there to be anything in our analysis of the existence or utility of a control-based legal proprietary interest that would prevent such arrangements being implemented in relation to intermediated accounts over crypto-token entitlements that are not themselves tokenised. 826The objects of personal property rights held in such intermediated holding accounts and over which an agent may be granted control (without simultaneously acquiring title to such objects by virtue of that control) are things in action. They are contractual or equitable entitlements to crypto-tokens, not crypto-tokens themselves. Consequently, we consider these mandate arrangements as identical conceptually to those that are routinely granted in the conventional financial services sector over bank and securities accounts.827

Bilateral and trilateral tokenised agency relationships

7.121 However, we conclude that the analysis would be different in (1) a bilateral principalagent relationship where the agent holds crypto-tokens on behalf of the principal, or (2) a trilateral arrangement where the agent is given mandate control over the principal’s account entitlements in tokenised form. For these arrangements the agent would acquire a control-based legal proprietary interest in such crypto-tokens by virtue of the full factual control it exercises by holding them.828 The parties would remain free to stipulate under the relevant contract or trust deed that the principal retains full and sole legal title and the agent acquires no legal or beneficial title to the crypto-tokens that the agent holds on behalf of the principal. However, this would only be effective as between the principal and agent themselves. It would have no effect on proprietary claims involving third parties asserted by or against the agent, which would still be based on and determined by reference to the agent’s control-based legal proprietary interest.

7.122 Nevertheless, we do not regard our conclusion on the existence of control-based legal proprietary interests as imposing any undue limitations on the utility of agency facilities for structuring crypto-token intermediated holding arrangements in any real practical sense. Where an agent has agreed to or accepted private undertakings recognising the principal’s full retention of title over crypto-tokens that the agent holds on behalf of the principal, these undertakings can if appropriately structured and depending on the circumstances impose meaningful, substantive constraints on the agent’s conduct in relation to proprietary third-party claims. Any attempt by the agent to bring or respond to such claims on the basis of its relative title to held crypto-tokens might amount to a breach of contract, trust and/or fiduciary duty, for which it would face the possibility of legal action by the principal.

Fiduciary duties

7.123 Depending on the use-case, intermediated holding arrangements could also rely on supplementary legal frameworks such as those involving fiduciary duties, which may arise on the basis of agency principles and/or other relationships outside of trusts.

7.124 Agency, in this strict legal sense, is a relationship that gives rise to fiduciary duties.829 In Bristol and West Building Society v Mothew, Lord Justice Millett (as he then was), defined a fiduciary in the following terms:830

A fiduciary is someone who has undertaken to act for or on behalf of another in a particular matter in circumstances which give rise to a relationship of trust and confidence. The distinguishing obligation of a fiduciary is the obligation of loyalty. The principal is entitled to the single-minded loyalty of his fiduciary. This core liability has several facets. A fiduciary must act in good faith; he must not make a profit out of his trust; he must not place himself in a position where his duty and his interest may conflict; he may not act for his own benefit or the benefit of a third person without the informed consent of his principal.

7.125 In Al Nehayan v Kent 831Lord Justice Leggatt (as he then was) referred to agents as one of the “settled categories of fiduciary”, alongside trustees, partners, company directors and solicitors. His Lordship noted that it was possible — albeit exceptional — for fiduciary duties to be recognised outside of these established categories. He said that “fiduciary duties typically arise where one person undertakes and is entrusted with authority to manage the property or affairs of another and to make discretionary decisions on behalf of that person.”832

7.126 A non-custodial holding intermediary ordinarily owes users contractual duties in relation to the services provided. However, additional fiduciary duties may also arise on the basis of an agency relationship. Even in the absence of agency, fiduciary duties may be implied as a result of the activities undertaken by the holding intermediary. Examples of the types of activities that could give rise to fiduciary duties include the provision of services relating to investment advice, investment management, brokering trades on a discretionary (as opposed to “execution only”) basis and arranging loans of crypto-tokens with third parties.833

7.127 The existence of fiduciary duties in addition to the contractual obligations that ordinarily define a non-custodial intermediated holding relationship can be beneficial to users. The breach of such fiduciary duties may give rise to proprietary remedies.834 In the event of a holding intermediary entering insolvency proceedings, these remedies could enable users to achieve enhanced recoveries relative to what would be possible on the basis of unsecured contractual claims alone.

7.128 For example, where a holding intermediary obtains secret profits, illegitimate commissions, or bribes in breach of fiduciary duty, users may be able to take advantage of a constructive trust imposed on the intermediary to prevent them from profiting from their position.835 The subject matter of that constructive trust would not form part of the holding intermediary’s estate. However, to the extent a constructive trust is found in this context at all, it would likely only apply to the gains obtained in breach of fiduciary duty or their traceable substitutes (including further gains). It would not operate to alter the characterisation of a user’s primary entitlement to the redelivery of held assets, which would remain in the form of unsecured contractual claims.836

“Lock and mint” facility developers as holding intermediaries

Chapter 8: Collateral arrangements

INTRODUCTION

extract value from what otherwise could be underutilised assets. They might also have the potential to support increased market efficiency and stability by improving liquidity and more effective management of counterparty credit risk. 849However, market participants require a high level of confidence in the legal reliability and predictability of such arrangements.

incorporating practical control as a core constituent element but defined in terms of a more flexible, higher order framing principle that we refer to as “provision”;

and include rules to determine which national laws apply to various aspects of collateral arrangements that incorporate cross-border elements; and

the FCARs, and coordination with related policy initiatives such as the future financial services regulatory regime for crypto-token and cryptoasset markets.

Our terminology

persons that directly manage the establishment of credit facilities, the creation and servicing of loans and/or the intermediated holding of collateral using conventional operational processes. These arrangements bear many similarities to those used currently by intermediaries in mainstream financial markets and by traditional credit institutions such as banks when extending loans secured by investment securities, bank account cash balances and real-world assets. In crypto-token and cryptoasset858 markets, this form of lending is often referred to as “CeFi” or “Centralised Finance”, highlighting the dependence of such facilities on traditional intermediaries as direct providers of credit and/or intermediated holding arrangements for the underlying collateral.859

CRYPTO-TOKEN COLLATERAL ARRANGEMENT STRUCTURING OPTIONS UNDER THE CURRENT LAW

Title transfer and security collateral arrangements

Title transfer collateral arrangements

Security-based collateral arrangements

Non-possessory security arrangements (mortgage and equitable charge)

Possessory security arrangements

A control-based security interest?

APPLICATION OF THE FCARS REGIME TO CRYPTO-TOKENS, CRYPTOASSETS, AND MERE RECORD/REGISTER TOKENS

The FCARs

facilitate the provision of financial collateral under bilateral transactions, and thereby promote not only the stability of the financial markets but also their efficiency, by requiring Member States to disapply rules of law and statutory provisions that would otherwise invalidate financial collateral arrangements...

Issues relating to the FCARs

“financial collateral”. That is, do such things fall within the definition of “cash”, “credit claims” or “financial instruments” under the FCARs regime?912

“Financial collateral” arrangements

Cash

money in any currency, credited to an account, or a similar claim for repayment of money and includes money market deposits and sums due or payable to, or received between the parties in connection with the operation of a financial collateral arrangement or a close-out netting provision.

Financial instruments
Credit claims

Clarifying the scope of “financial collateral”

Cash

Mere register/record tokens

Cryptoassets

Tokenising equity securities and other registered corporate securities

Recommendation 3.

The problems with “possession or control”

“Possession or control”

delivered, transferred, held, registered or otherwise designated so as to be in the possession or under the control of the collateral-taker or a person acting on its behalf...

Applying “possession or control” to crypto-token collateral arrangements

Conclusions on the FCARs

DEVELOPING A BESPOKE LEGAL FRAMEWORK FOR CRYPTO-TOKEN

COLLATERAL ARRANGEMENTS

bespoke statutory security interest for crypto-tokens and cryptoassets that was more aligned to their functionality and use. Again, this could be formulated to accommodate, more readily and potentially with greater certainty and versatility various collateral holding and servicing facilities.

also be included within the range of security interests for the purposes of the FCARs.

Positioning of a bespoke statutory legal framework for crypto-token and cryptoasset collateral arrangements

Consequently, we limit our observations to highlighting some of the key issues that we anticipate would need to be considered as part of any future law reform initiative rather than set out in detail any substantive recommendations.

8.109 A legal regime that supports innovation can also influence its direction of development. For example, integrating crypto-token and cryptoasset markets with mainstream financial markets through the creation of a unified, undifferentiated collateral regime could encourage crypto-token and cryptoasset markets to adopt the structural characteristics of mainstream financial markets. This could result in an increasing reliance on certain key intermediaries to facilitate and provide core services, further enhancing their (potentially systemic) importance within crypto-token and cryptoasset markets. It could also have unintended negative consequences for DeFi platforms by constraining the potential and utility of their applications, which are designed to deal with risk in different ways to traditional financial markets counterparties and infrastructure providers.

8.110 An alternative approach is to implement differentiated collateral regimes for cryptotoken and cryptoasset markets distinct from the equivalent framework for mainstream financial markets.977 This could arguably be more effective at encouraging an alignment of business practices where appropriate (for example, between mainstream financial markets intermediaries and crypto-token service providers that utilise a CeFi model). It could also better preserve opportunities for innovation in the DeFi sector by supporting applications that directly utilise the native technological functionality of crypto-token systems.

Possible objectives for a crypto-token collateral framework

8.111 Formulating any bespoke statutory legal framework for crypto-token and cryptoasset collateral arrangements would require consideration of, and the striking of an appropriate balance between, a number of different objectives including (but not limited to):

Differentiation between offchain and onchain collateral arrangements?

8.112 A crypto-token and cryptoasset collateral regime might be structured as follows.

8.113 The statutory framework could support the establishment of, and recognise guidance from, expert industry panels tasked with monitoring the emergence of future market and technological developments as well as evolving standards for best practices in crypto-token and cryptoasset lending markets. These panels could issue authoritative statements on the extent to which various forms of communication and/or transaction records could and should be capable of fulfilling the fraud prevention objective underpinning evidentiary requirements.983

Formulating a perfection-criteria for qualifying non-possessory security interests

8.114 As we explain above, 984we do not view “possession or control” as a satisfactory conceptual or practical basis on which to build a perfection requirement. Attempting to accommodate a myriad of configurations within a perfection principle defined in terms of “control” is unnecessarily artificial and not readily understandable by market participants.

8.115 Formulating an appropriate alternative requires attention to the purpose underlying perfection requirements. Where formal registration requirements are disapplied, perfection criteria provide an alternative method for ensuring the adequate publicity of collateral arrangements to third party creditors.985

8.116 We conclude that “provision” might fulfil this function effectively. Some form of factual control over crypto-tokens would be an important constituent element of any such perfection requirement, 986but would not define it. Rather, the concept would capture the practical manifestation of features of the arrangement that are observable by potential third party creditors. This would indicate the possible existence of proprietary claims in crypto-tokens and cryptoasset subject to collateral arrangements other than their assumed or apparent owner. At the same time, it need not operate in a way which overly restricts innovation or undermines market efficiency.

Any right of the collateral-provider to substitute financial collateral of the same or greater value or withdraw excess financial collateral or to collect the proceeds of credit claims until further notice shall not prevent the financial collateral being in the possession or under the control of the collateral-taker.

consider necessary or desirable to enable relevant collateral arrangements governed by English law to be commercially useful, workable, safe and effective as part of the UK's modern, dynamic and internationally-focused financial markets.

The accommodation of a potential control-based security interest recognised in common law

Developing a statutory security interest for crypto-tokens

Conflict of laws

How a bespoke statutory legal framework for a crypto-token and cryptoasset collateral regime might interact with the existing FCARs framework

Whether the FCARs should be reformed to include a “provision” based perfection requirement applicable to non-possessory security arrangements

8.140 CLLS-FLC propose that the FCARs should be reformed to incorporate a “provision” concept for the taking and perfecting of qualifying security interests over financial collateral. 997The proposal aims to address longstanding and widespread criticism of the uncertainties, practical challenges and limitations arising from the interpretation of the current “possession or control” test. The proposal was framed by reference only to the FCARs and not to specific issues relating to crypto-tokens or to cryptoassets. Therefore, were such amendments made to the FCARs, they could have a twofold benefit. First, they would achieve the intended benefits described by CLLS-FLC in their paper.998 Second, the concept of “provision” would be more applicable to cryptotokens and cryptoassets. In particular, it could provide for a legal framework that better facilitated the entering into, operation, rapid, priority enforcement and/or resolution of collateral arrangements involving those crypto-tokens or cryptoassets to which it was clear that the FCARs applied.999 Indeed, we model our suggested concept of a perfection-criteria for qualifying non-possessory security interests under a crypto-token and cryptoasset collateral regime on “provision”.

Whether crypto-tokens and cryptoassets themselves should remain subject to a distinct and bespoke statutory collateral regime, or included within the scope of the amended FCARs

such an early stage of development and have the potential to generate substantial social and economic risks such that limiting their interaction with other financial markets should be the priority.1008

8.148 Second, it could be reflective of a conclusion that the justifications for the disapplication of various insolvency code provisions under the FCARs 1010that confer substantial advantages on collateral-takers do not apply (whether at all or to the same extent) to the equivalent receivers of crypto-token and cryptoasset collateral and the associated markets in which they operate. The justifications under the FCARs are that the relevant insolvency code disapplications help support the stable and efficient operation of financial markets by reducing systemic risk caused by “domino” contagion effects. 1011While this conclusion may be defensible 1012in relation to conventional wholesale financial markets and the activities of financing intermediaries that support their operation, it is not self-evident that the same cost benefit assessment would apply to crypto-token and cryptoasset markets and financing intermediaries.1013 Indeed for many crypto-token and cryptoasset markets, both in general and in relation to (and at times, as a result of) DeFi platforms in particular, it could be argued that supporting the creation and rapid enforcement of collateral arrangements in cryptotoken and cryptoasset markets may amplify rather than diminish systemic risk.1014

8.149 Whichever option is judged appropriate in policy terms, we think that it is also important to recognise that the choice itself will influence market development. Integrating crypto-token and cryptoasset markets with mainstream financial markets through the creation of a unified, undifferentiated collateral regime could encourage crypto-token and cryptoasset markets to adopt the structural characteristics of those markets. This could result in an increasing reliance on certain key intermediaries to facilitate and provide core services, further enhancing their (potentially systemic) importance within crypto-token and cryptoasset markets. It could also have unintended negative consequences for DeFi platforms by constraining the potential and utility of their applications, which are designed to deal with risk in different ways to traditional financial markets counterparties and infrastructure providers.

8.150 By contrast, maintaining a differentiated collateral regime for crypto-token and cryptoasset markets might be more effective at encouraging an alignment of business practices where appropriate. This might include for example further alignment between mainstream financial markets intermediaries and crypto-token service providers that utilise a CeFi model — that is, aligning businesses practices across service and arrangement-type as opposed to across asset-classes. It could also better preserve opportunities for innovation in the DeFi sector by supporting applications that directly utilise the native technological functionality of crypto-token systems.

8.151 The extent to which a bespoke statutory legal framework for a crypto-token and cryptoasset collateral regime should interact with the existing FCARs framework is a question that will likely need to be answered before (or as part of) the creation of such a bespoke framework. It is also possible that given the nascence of crypto-token and cryptoasset markets, that question might need to be considered (and reconsidered) over time as the crypto-token and cryptoasset markets mature and become increasingly regulated.

8.152 We do not attempt to provide a view or answer to that question in this report. Instead, we simply highlight that legal issues relating to scope, and the creation of a bespoke statutory legal framework for a crypto-token and cryptoasset collateral regime are also intertwined with complex policy-related issues.

Our recommendation

8.153 We conclude that the introduction of bespoke collateral regime applicable to cryptotokens and cryptoassets is consistent with the Government’s stated policy objective of making the UK a global hub for crypto-token and cryptoasset technology and investment. 1015It would provide market participants with clarity and flexibility on their legal structuring options for entering into effective crypto-token and cryptoasset collateral arrangements. It might also be designed so as to encourage increased, prudent participation in crypto-token and cryptoasset lending markets and support the emergence of innovative applications for generating yield from crypto-token and cryptoasset holdings and/or facilitating their deployment as effective credit risk safeguards.

8.154 However, formulating the substantive provisions of any such regime, and defining the extent of its interaction with the collateral regime for financial markets transactions, is a complex undertaking. Identifying the optimal approach cannot solely be determined by reference to applicable private law principles or the mere technical feasibility of statutory commercial law reform (although both will be of central importance).

8.155 Therefore, we anticipate that this law reform will require a wide-ranging crossfunctional investigation and rigorous cost benefit analysis. 1016It will also require coordination with and the appropriate allocation of policy objectives between other policy initiatives impacting the operation and development of crypto-token and cryptoasset markets and the conduct of market participants, such as changes in the regulatory environment.1017

8.156 We also think that any law reform initiative must involve considered engagement with a broad range of stakeholders to determine the underlying policy objectives and the relative importance ascribed to them.

8.157 We acknowledge the existence of potential functional similarities in the use and structuring of financing facilities collateralised by conventional financial collateral and crypto-tokens respectively. However, we do not think that it can be assumed that the impact of their operation on underlying trading markets will necessarily be consistent without further careful analysis. For example, it could be argued that liquidity enhancement is a more convincing policy justification than systemic risk minimisation for disapplying insolvency code provisions that could otherwise inhibit the rapid, priority enforcement of financial collateral arrangements.1018 Whether the availability of such collateral enforcement mechanisms would necessarily have the same positive impact on the stability and efficiency of crypto-token and cryptoasset markets and thereby provide sufficient justification for granting insolvency code privileges to collateral receivers under crypto-token and cryptoasset collateral arrangements would need to be established.1019

8.158 We therefore recommend that, as a matter of priority, the Government sets up a multidisciplinary project to formulate and put in place a bespoke statutory legal framework that better and more clearly facilitates the entering into, operation and enforcement of (certain) crypto-token and (certain) cryptoasset collateral arrangements.

8.159 We support this recommendation with the following conclusions. The project should:

Recommendation 4.

Chapter 9: Causes of action and associated remedies

INTRODUCTION

BREACH OF CONTRACT

Application of remedies for breach of contract

Action to enforce an obligation to “pay” non-monetary quantity units such as cryptotokens

Given the volatility of [some] crypto-tokens and the fact that the valuation of the claim may well depend on a different date in either case, the difference between treating it as a foreign currency claim, or as a damages claim for failing to deliver a commodity could be enormous.

VITIATING FACTORS

Mistake

category thing is void for mistake, the ordinary rules following recovery of objects transferred under a void contract would apply.1053

Misrepresentation

Duress and undue influence

Remedies where the contract is void

Remedies where the contract is rescinded

FOLLOWING AND TRACING

Following or tracing?

Following or tracing into mixtures

Specific evidential questions for crypto-tokens

arrangements and back to self-held arrangements.1093

token as part of the chain of transactional processes. These exchanges might occur through a variety of different mechanisms, including automated market maker protocols where crypto-tokens are exchanged for other tokens deposited into a liquidity pool smart contract.1095

arrangements that rely on the functionalities of crypto-token systems themselves to automate certain processes that mimic or replicate the substantive economic effect of traditional finance arrangements, such as collateralised loans.1096

BREACH OF TRUST, EQUITABLE WRONGS, AND CONSTRUCTIVE TRUSTS

Breach of pre-existing duties

Constructive trust arising in cases of theft and fraud

Application to third category things

BURNING TOKENS

PROPRIETARY RESTITUTIONARY CLAIMS AT LAW

Burning tokens

UNJUST ENRICHMENT

Burning tokens

Unjust enrichment is ... of limited assistance, because ... burning does not involve an enrichment to the defendant. There may also be issues with establishing the ‘at the expense of’ requirement or the unjust factor.

THE TORT OF CONVERSION

The general law

The need for specific and discrete principles of tortious liability

Burning tokens and the remedial lacuna

Vulnerability of third category things

Issues with strict liability

Developments in the United States

Our conclusion

Appropriateness of common law development

The common law often works incrementally and by analogy with existing cases, and rightly so; but if the facts change in a way which is more than incremental I do not believe the right response of the common law is simply to stop and say that incremental development cannot reach that far.

Conclusion 6.

INJUNCTIONS

Application to third category things

ENFORCEMENT

Third party debt orders

Encumbering and taking control of a judgment debtor’s property

Charging orders

Nominated persons orders

Taking control of a judgment debtor’s property

An enforcement regime of this kind would need to be highly technology-responsive, and certain third category things, including crypto-tokens are unlikely to be suitable candidates for enforcement in this manner. The fundamental difficulty remains that where a judgment debtor had already refused to provide the private key or transfer crypto-tokens in breach of a court order an additional layer of statutory enforcement mechanism is likely to be superfluous.1280

AWARDS DENOMINATED IN CRYPTO-TOKENS

Consultees’ views

of conversion under Missouri law is generally the market value of the property at the time of conversion.” This seems only to be relevant to the quantum of the damages awarded, and not to their denomination. Second, immediately after awarding conversion damages in the amount of 33.7398 bitcoin, the court proceeds to impose a constructive trust over “the 33.7398 bitcoin, and [orders] disgorgement thereof”. This is a conceptually questionable approach to ordering alternate remedies, and potentially undermines the utility of the damages award, even to the extent that it might not be characterisable as an award for damages.

Chapter 10: Recommendations and conclusions

Recommendation 1.

Paragraph 3.76

Recommendation 2.

Paragraphs 5.36

Recommendation 3.

Paragraph 8.86

Recommendation 4.

Paragraph 8.161

Conclusion 1.

Paragraph 5.104

Conclusion 2.

10.8

We conclude that it is possible (with the requisite intention) to effect a legal transfer of a crypto-token offchain by a change of control or onchain by a transfer operation that effects a state change.

Paragraph 6.47

Conclusion 3.

Paragraph 6.124

Conclusion 4.

Paragraph 7.54

Conclusion 5.

Paragraph 7.115

Conclusion 6.

Paragraph 9.83

The Law Commission is asked to:

The Law Commission’s work at this stage will not include:

ANNEX TO TERMS OF REFERENCE

Part A: key questions

Part B: Possible additional questions for consideration

Appendix 2: Acknowledgements

Advisory panel

Charles Proctor

Professor Craig Warmke

Professor David Fox

Professor Hannah Yee-Fen Lim

Hin Liu

Professor Jennifer Payne

Jordan Fish

Lawrence Akka KC

Professor Louise Gullifer KC

Peter Hunn

Professor Sir Roy Goode KC

Professor Tatiana Cutts

Mr Justice Zacaroli

The following bodies and individuals responded to our consultation paper

Academic institutions

Centre for Commercial Law at the University of Aberdeen

Bournemouth University

Dickson Poon School of Law (King’s College London)

Queen May Intellectual Property Research Institute, Queen Mary University of London

Cloud Legal Project, Centre for Commercial Law Studies, Queen Mary University of London

Businesses and financial institutions

Aimichia Technology Co Ltd

Binance

Coinbase

D2 Legal Technology

Deloitte Legal (UK)

Digital Pound Foundation

Meta

Moneybrain Ltd

Village Mall Pty Ltd

Law firms

Ashurst LLP

Clifford Chance LLP

Eversheds Sutherland LLP

Gunnercooke LLP

Hugh James LLP

Linklaters LLP

Norton Rose Fulbright LLP

Russell-Cooke LLP

Stirling & Rose LLP

Groups and associations

The Association for Financial Markets in Europe (Post Trade Legal Committee) (AFME) and the Association of Global Custodians (AGC) (joint response)

Association of Pension Lawyers

Bar Council’s Law Reform Committee

CILEX

Clifford Chance LLP Industry Group

The Commercial Bar Association (COMBAR) and the Chancery Bar Association

Company Law Committee of the City of London Law Society

Crypto Council for Innovation

DeCaDe

Digital Commerce Committee of the Business Law Section of the Law Council of Australia

Digital Law Association

Digital Token Identifier Foundation

Electronic Money Association

Financial Law Committee of the City of London Law Society

Financial Markets Law Committee

International Digital Assets Counsel Association and CryptoUK (joint response)

International Securities Lending Association

International Standards Organization

International Swaps and Derivatives Association

LawFiDAO

Scottish Government Expert Reference Group on Digital Assets

Society of Trust and Estate Practitioners (STEP)

TechUK

The Law Society

Individuals

Professor Alistair Milne

Andrew Griffith MP

Professor Andrew Tettenborn

Dr Benjamin Hayward

Catherine Phillips

Dr Chathuni Jayathilaka and Dr Yin Harn Lee (joint response)

Charles Kerrigan and Susan Draper

Professor David Gibbs-Kneller

Professor Duncan Sheehan

Helen Pugh

Hin Liu

Ilias Ioannou

Jacqueline Cook

Professor Johanna Jacques

Joshua Tjeransen

Dr Jenny Jingbo Zhang

Katie Mccay

Professor Kelvin FK Low

Ken Moon

Marina Comninos

Lewis McAuley-Jones

Dr Michael Crawford

Melih Esmer

Professor Monomita Nandy, Alberto Pallotta, Mann Matharu, Professor Suman Lodh, Vito

Ciciretti, Gurnam Selvarajah (joint response)

Dr Neil Maddox, Dr Edana Richardson (joint response)

Professor Orkun Akseli

Professor Paula Moffatt

Simon Deane-Johns

Stephan Smoktunowicz

Professor Tatiana Cutts

Timothy Chan

Tom Ffiske

Dr Vaclav Janecek

Yuri Volkov

The Law Commission team met or otherwise corresponded with the following people and organisations in relation to this project.

Government and public bodies

Department for Digital, Culture, Media and Sport

Financial Conduct Authority

HM Land Registry

HM Revenue and Customs

HM Treasury

Intellectual Property Office

Scottish Government

The Bank of England

Businesses and financial institutions

Copper.co

Euroclear UK & Ireland Limited

Everledger

Outlier Ventures

Tech Nation

Trustology

Law firms

Allen and Overy LLP

Anderson Kill LLP

Ashurst LLP

Clifford Chance LLP

CMS

Gunnercooke LLP

Herbert Smith Freehills LLP

Linklaters LLP

Mishcon de Reya LLP

Rahman Ravelli

Stephenson Law

Groups and associations

Financial Law Committee of the City of London Law

Society Institute of Art and Law

International Swaps and Derivatives Association

Society of Computers and Law

The International Capital Market Association

Individuals

Adedamola Adetola

Dr Aleksi Ollikainen-Read

Professor Alistair Milne

Alfonso Delgado

Dr Andrea Tosato

Professor Andrew Dickinson

Andrew Hinkes

Antonis Polemitis

Charles Proctor

Chris Donovan

Professor Christian von Bar

Professor Craig Warmke

Dr Daniel Carr

Professor David Fox

David Quest KC

Gabriel Shapiro

Gigi

Professor Hannah Yee-Fen Lim

Hin Liu

Ingrid York

Professor Jason Grant Allen

Jeff Bandman

Jonathan Gilmour

Jordan Fish

Professor Joshua Fairfield

Professor Kelvin FK Low

Professor Louise Gullifer KC

Michael Pek

Peter Hunn

Peter Werner

Philip Wood CBE, KC

Racheal Muldoon

Professor Sir Roy Goode KC

Simon Deane-Johns

Dr Stephen Castell

Professor Stephen Watterson

Professor Tatiana Cutts

Dr Thomas Dunser

Wendy Harrison

Zoe Wyatt

1

For a more detailed consideration of personal property rights, see paras 2.1-2.25 of our consultation paper.

2

We do not consider succession in this paper. However, if a digital asset is found to be an object of personal property rights at law, then it will be capable of forming part of a deceased person’s estate. Some

3

stakeholders have argued that access to social media accounts, email accounts and other end user licence agreement-based accounts should also be capable of passing on succession. While we do not consider this issue in this report, it was suggested as part of our consultation exercise on our 14th programme of law reform that the Law Commission should undertake a separate project looking specifically at the rights of access on death and incapacity to such accounts.

4

Digital Assets (2021) Call for Evidence, available at: https://s3-eu-west-2.amazonaws.com/lawcom-prod-storage-11jsxou24uy7q/uploads/2021/04/Call-for-evidence.pdf.

The responses to our call for evidence are available at: https://s3-eu-west-2.amazonaws.com/lawcom-prod-storage-11jsxou24uy7q/uploads/2022/10/Digital-assets-call-for-evidence-responses.pdf.

5

Digital Assets (2021) Interim Update, available at: https://s3-eu-west-2.amazonaws.com/lawcom-prod-storage-11jsxou24uy7q/uploads/2021/11/Digital-Assets-Interim-Update-Paper-FINAL.pdf.

6

Digital Assets (2022) Law Commission Consultation Paper No 256, available at: https://s3-eu-west-2.amazonaws.com/lawcom-prod-storage-11jsxou24uy7q/uploads/2022/07/Digital-Assets-Consultation-Paper-LawC2mmissionH1.pdf.

7

A number of responses set out the aggregation of the positions of a group of consultees. Taking this into account, we received responses from over 100 consultees.

8

   https://www.lawcom.gov.uk/project/digital-assets/.

9

https://lawtechuk.io/ukjt.

10

  https://www.unidroit.org/work-in-progress/digital-assets-and-private-law/.

11

  https://www.uniformlaws.org/viewdocument/final-act-164?CommunityKey=1457c422-ddb7-40b0-8c76-

39a1991651ac&tab=librarydocuments.

12

We received a submission from ERG see Appendix of our consolidated consultee responses.

13

See, for example: HM Treasury, “Future financial services regulatory regime for cryptoassets: Consultation and call for evidence” (2023); “UK regulatory approach to cryptoassets, stablecoins, and distributed ledger technology in the financial markets: Response to the consultation and call for evidence” (2022); Bank of England, “The digital pound: A new form of money for households and businesses?” (2023); Bank of England Financial Policy Committee, “Financial Stability in Focus: Cryptoassets and decentralised finance” (2022); J Cunliffe, “Innovation in post trade services - opportunities, risks and the role for the public sector” (2022); Financial Conduct Authority, “Cryptoassets: our work” (2019). We have also engaged in regular and detailed discussions with the Bank of England, the Financial Conduct Authority, the Ministry of Justice and HM Treasury.

14

As defined in those respective projects.

15

  UKJT, “Legal Statement on cryptoassets and smart contracts” (2019), (“Legal Statement”) available at:

https://lawtechuk.io/insights/cryptoasset-and-smart-contract-statement.

16

UKJT, “Digital Dispute Resolution Rules” (2021), available at: https://lawtechuk.io/insights/ukjt-digital-disputes-rules.

17

UKJT, “Legal statement on the issuance and transfer of digital securities under English private law” (2023), (“Legal Statement on Digital Securities”) available at: https://lawtechuk.io/insights/ukjt-digital-securities.

18

HM Revenue and Customs, Cryptoassets Manual (2021), available at: https://www.gov.uk/hmrc-internal-manuals/cryptoassets-manual.

19

HM Revenue and Customs, “Call for evidence: The taxation of decentralised finance involving the lending and staking of cryptoassets” (2022).

20

HM Revenue and Customs, “Expanding the Investment Transactions List for the Investment Management Exemption and other fund tax regimes” (2022).

21

Bank of England, “The digital pound: A new form of money for households and businesses?” (2023). See also the collaboration between HM Treasury, the Financial Conduct Authority and the Bank of England on the Financial Market Infrastructure sandboxes intended to allow participants to “test and adopt new technologies and practices”: J Cunliffe, “Innovation in post trade services - opportunities, risks and the role for the public sector” (2022).

22

Financial Conduct Authority, “Cryptoassets: our work” (2023).

23

HM Treasury, “UK regulatory approach to cryptoassets, stablecoins, and distributed ledger technology in the financial markets: Response to the consultation and call for evidence” (2022).

24

HM Treasury, “Future financial services regulatory regime for cryptoassets: Consultation and call for evidence” (2023).

25

Bank of England Financial Policy Committee, “Financial Stability in Focus: Cryptoassets and decentralised finance” (2022).

26

More information and the latest updates are available at: https://www.lawcom.gov.uk/project/smart-contracts/.

27

More information and the latest updates are available at: https://www.lawcom.gov.uk/project/electronic-trade-documents/.

28

As of June 2023: https://bills.parliament.uk/bills/3344.

29

More information and the latest updates are available at: https://www.lawcom.gov.uk/project/conflict-of-laws-and-emerging-technology/.

30

More information and the latest updates are available at: https://www.lawcom.gov.uk/project/decentralised-autonomous-organisations-daos/.

31

Sir Geoffrey Vos MR, “Cryptoassets as property: how can English law boost the confidence of would-be parties to smart legal contracts?” (2019), available at: https://www.judiciary.uk/wp-

content/uploads/2019/05/Sir-Geoffrey-Vos-Chancellor-of-the-High-Court-speech-on-cryptoassets.pdf.

32

That is, they might be made up of different technological components that can be selected and assembled in various combinations to satisfy specific user requirements, which might change or be malleable over time. A good example in relation to the crypto-token ether is “The Merge”, which was the joining of the original execution layer of Ethereum (the “Mainnet” that has existed since “genesis”) with its new proof-of-stake consensus layer, the “Beacon Chain”. This eliminated the need for proof-of-work based mining and instead enabled the network to be secured using staked ether. See https://ethereum.org/en/roadmap/merge/.

33

This would need to include those with expertise in the crypto-token markets, and not just those with expertise in traditional finance markets or intermediated securities markets.

34

We held three public roundtable discussions with market participants to discuss our consultation paper. These were well attended, with over 200 attendees across the three events. We also consulted with our advisory panel and over 100 market participants.

35

  Including the UKJT; the UNIDROIT Working Group on Digital Assets (“UNIDROIT Working Group”); the

American Law Institute and the Uniform Law Commission’s Uniform Commercial Code and Emerging Technologies Committee (“UCC Committee”); and the Expert Reference Group on Digital Assets in Scots Private Law (“ERG”).

36

See Chapter 1 (Introduction), para 1.13, where we discuss the value of the responses received, and Appendix 2. Responses to our consultation are available on our website: https://www.lawcom.gov.uk/project/digital-assets/.

37

Although we recognise that this has been the approach of other law reform initiatives, including: (1) UCC Committee, Amendments to the Uniform Commercial Code (2023) art 12; UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) principle 2(1), p 16, available at: https://www.unidroit.org/wp-content/uploads/2023/04/C.D.-102-6-Principles-on-Digital-Assets-and-Private-Law.pdf; and (3) the Liechtenstein Token and Trusted Technology Service Provider Act 2019-301.

38

We discuss these categories and this categorisation issue in detail in Chapter 3 (Third thing). See also from para 3.17 below where we explain these terms.

39

UKJT, Legal Statement on Digital Securities para 6.

40

  The wider network of participants in crypto-token systems are very different to those in traditional finance

systems. For an introduction, see our call for evidence on Decentralised Autonomous Organisations, paras 2.3-2.28: Decentralised Autonomous Organisations (2022) Call for Evidence, available at: https://s3-eu-west-2.amazonaws.com/lawcom-prod-storage-11jsxou24uy7q/uploads/2022/11/DAOs-Call-for-Evidence-LC.pdf. For a more detailed overview of the different crypto-token ecosystem functions performed by various participants, see G Shapiro, “A Functionalist Framework for DeFi Regulation” (2022), available at: https://lexnode.substack.com/p/a-functionalist-framework-for-defi.

41

For more detail and discussion on this point, see Chapter 3 (Third thing).

42

  [2023] EWCA Civ 83, [2023] 4 WLR 16 at [26] (emphasis added). The case before the Court of Appeal

proceeded on the basis that the factual case advanced by the claimant could be assumed to be correct. However, the (potentially significant) distinctions between different forks of the original Bitcoin network are likely to be important in any future trial, particularly in relation to the concept of “decentralisation”: see Lord Justice Birss’ comments at [33]-[39], [72] and [77].

43

HM Treasury, “Future financial services regulatory regime for cryptoassets: Consultation and call for evidence” (2023).

44

Above at para 1.12.

45

We also recommend that, as a matter of priority, the Government sets up a multi-disciplinary project to formulate and put in place a bespoke statutory legal framework that better and more clearly facilitates the entering into, operation and enforcement of (certain) crypto-token and (certain) cryptoasset collateral arrangements: para 8.161. That necessarily involves policy-related questions which are beyond the scope of this report. As we discuss in Chapter 8 (Collateral arrangements), the need for a high level of legal certainty with respect to collateral arrangements led us to conclude that common law development would not be sufficient.

46

At one end of the spectrum, central banks are considering state-backed digital currencies and traditional finance markets are attempting to incorporate (some parts of) this new technology into their practices. Often, this is achieved through permissioned, centralised systems. At the other end of the spectrum is experimental, iterative technology and legal structuring, largely based on open source, public and permissionless systems. The markets that use technology remain relatively small (as compared to the traditional finance markets) and the assets involved can often be thinly-traded and subject to differing levels of control (including economic control over large amounts of value). The use-cases for the technology are still evolving and competing with existing products as the market grows. The technology also lends itself to competitive or creative destruction, given it is in many cases easily copyable or replicable and reliant on (sometimes) fickle or flighty capital or ongoing participation by network participants. Because of these features, it is difficult to predict how markets will integrate this technology, whether permissioned or permissionless systems will see greater success and how markets will evolve as they compete with (or embrace) the technology.

47

See paras 1.17 of Chapter 1 (Introduction).

48

The Law Society, England and Wales: a world jurisdiction of choice (2019).

49

See HM Treasury, “Future financial services regulatory regime for cryptoassets: Consultation and call for evidence” (2023) para 1.11, which sets out four overarching policy objectives: (1) to encourage growth, innovation, and competition in the UK; (2) to enable consumers to make well-informed decisions, with a clear understanding of the risks involved; (3) to protect UK financial stability; and (4) to protect UK market integrity. See also “Keynote Speech by John Glen MP Economic Secretary to the Treasury, at the Innovate Finance Global Summit during Fintech Week 2022” (2022).

50

UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023).

51

  In this report, we describe the ways in which our approach differs, where relevant.

52

 UCC Committee, Amendments to the Uniform Commercial Code (2023) art 12.

53

Above art 12.

54

Oxera is an economics and finance consultancy and was commissioned by LegalUK to identify the economic value of the law of England and Wales to the UK. See Oxera, “Economic value of English law” (2021), available at: https://legaluk.org/wp-content/uploads/2021/09/The-value-of-English-law-to-the-UK-economy.pdf.

55

Above p 28.

56

  HM Treasury, “Government sets out plan to make UK a global cryptoasset technology hub” (2022).

57

We note that there has even been negative reaction from digital asset markets where law reform initiatives seek to support digital asset markets. For a more detailed discussion, see C Reyes, “Emerging Technology’s Unfamiliarity with Commercial Law” (2023), available at: https://ssrn.com/abstract=4388919.

58

See for example: Securities and Exchange Commission v Plexcorps (2017, Case Number 1:17-cv-07007-CBA-RML) (an enforcement action in relation to an initial coin offering, claiming this to be in violation of securities law); In the Matter of Zachary Coburn (2018, Release Number 84553) (an enforcement action against the founder and creator of a crypto-token trading platform, alleging that the defendant caused the platform to violate securities law); Securities and Exchange Commission v Kik Interactive Ltd (2019, Case Number 1:19-cv-05244) and Securities and Exchange Commission v Telegram Group Inc (2019, Case Number 1:19-cv-09439) (although no fraud was alleged in these actions, these cases represent the first major litigation decisions about whether a token is a security); Securities and Exchange Commission v Ripple Labs (2020, 1:20-cv-10832) (an ongoing enforcement action relating to 14.6 billion notional units of a crypto-token called XRP, allegedly sold unlawfully as a security by the defendant); In the Matter of bZeroX (2022, Release Number 8590-22) (a Commodity Futures Trading Commission action, which was subsequently settled, against a DeFi platform, alleging that the platform facilitated margined and leveraged retail commodity transactions without proper registration or diligence) - see also Commodity Futures Trading Commission v Ooki DAO (formerly d/b/a bZx DAO) (2023, Case Number 3:22-cv-05416); Securities and Exchange Commission v Bittrex Inc (2023, Case Number 2:23-cv-00580); Securities and Exchange Commission v Beaxy Digital Ltd (2023, Case Number 1:23-cv-1962); Securities and Exchange Commission v Justin Sun (2023, Case Number 1:23-cv-02433); and Securities and Exchange Commission v Genesis Global Capital LLC (2023, Case Number 1:23-cv-00287). For more information on these actions, as well as further examples, see Morrison Cohen LLP, “Cryptocurrency Litigation and Regulation Tracker” (2023), available at: https://www.morrisoncohen.com/news-page?itemid=471.

59

For example, in Hong Kong, regulators that had previously banned retail access to crypto-token investments have recently announced intentions to grant retail access to licenced exchanges. See Hong Kong Securities

60

and Futures Commission, “Statement on regulatory framework for virtual asset portfolios managers, fund distributors and trading platform operators” (2018); Julia Leung, “Embracing Innovation, Regulation and the Future of Finance”, Keynote Address at Hong Konh FinTech Week 2022 (2022). The Hong Kong Court of First Instance has also recently confirmed that a crypto-token is capable of being an object of personal

61

In the European Union, the Markets in Crypto-assets Regulation (MiCA) was recently passed by the European Parliament: Proposal for a Regulation of the European Parliament and of the Council on Markets in Crypto-assets, and amending Directive (EU) 2019/1937; European Parliament, “Cryptocurrency dangers and the benefits of EU legislation” (2023). The regulation introduces requirements for organisations engaged in the issuance and trading of cryptoassets. The regime places a particular focus on asset-backed and emoney tokens and imposes licensing, incorporation and whitepaper publication obligations on certain cryptoasset issuers. As a regulation, MiCA is directly applicable in EU Member States (as specified in Article 288 of the Treaty on the Functioning of the European Union), and therefore has direct effect.

62

Our report does not consider regulatory matters and does not seek to create any sort of regulatory regime for any particular type of digital asset. Instead, our goal is to create a facilitative and legally certain environment in which such assets can flourish. This is distinct from other initiatives — discussed in this report — which seek to regulate any resulting economic activity.

63

For example, milk quotas and certain types of carbon emission allowances might not necessarily be “digital” but might still fall within the third category.

64

Chapter 3 (Third thing) considers issues set out in chapters 2 to 10, 14 and 15 of our consultation paper. It deals with consultation questions 1 to 15, 25, 27 and 28.

65

These are high-level descriptions and we discuss each in detail in our consultation paper, see from para 4.18 (things in possession) and from para 4.26 (things in action). Personal property rights do not refer to a thing but to a relationship between a person and a thing. Nevertheless, a necessary starting point is to identify what kind of “things” can be the object of personal property rights because the relationship is not one that can arise between persons and all things. Jeremy Bentham made this point long ago when he pointed out that “in common speech in the phrase ‘the object of a man’s property’, the words ‘the object of’ are commonly left out.” See J Bentham, An Introduction to the Principles of Morals and Legislation (1789) Ch 16 s 2 para XXVI n 35. Similarly, Professor Birks said that “a right in rem is one whose exigibility is defined by reference to the existence and location of a thing, the res to which it relates”: P Birks, An introduction to the law of restitution (1985) p 49. See also chapters 2 and 4 of our consultation paper in general and para 4.100 where we discuss the point that other “categories” of things to which personal property rights can relate could be said to exist.

66

The exception to this is electronic trade documents which seek to replicate the legal functionality of a specific form of tangible thing — paper trade documents. We discuss our reasoning for this exception in detail from para 4.20 of our consultation paper and in our separate report (and subsequent Bill) on electronic trade documents: Electronic Trade Documents: Report and Bill (2022) Law Com No 405; Electronic Trade Documents Bill, the current version of which is available at: https://bills.parliament.uk/bills/3344. See also from para 3.20 below.

67

  B McFarlane and S Douglas, “Property, Analogy and Variety” (2022) 42(1) Oxford Journal of Legal Studies

161, 166.

68

But digital assets such as crypto-tokens do have a tangible, albeit highly distributed, existence in that they rely on real physical infrastructure including hardware, the work of humans and/or machines, energy expenditure, network effects, liquidity and integration in existing social, economic or financial infrastructure.

69

Rights in things in action are often described in a narrow sense: “rights in things in action, denied physical enjoyment, are asserted by taking legal action or proceedings” although “the difference between the thing and rights in the thing is more elusive for things in action than for things in possession.” M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) para 4.002.

70

Obvious examples are bitcoin and ether, although many other crypto-tokens are designed in similar ways. For a detailed consideration of this point (albeit in the context of United States regulatory laws), see L Cohen, G Strong, F Lewin and S Chen, “The Ineluctable Modality of Securities Law: Why Fungible Crypto Assets Are not Securities” (2022), available at: https://dx.doi.org/10.2139/ssrn.4282385. We also note that the explicit purpose of the Bitcoin whitepaper was to reduce the need for counterparties to rely on intermediaries for transactions, and to facilitate communication of value on a peer-to-peer basis: S Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System (2008) pp 1 and 8, available at: https://nakamotoinstitute.org/static/docs/bitcoin.pdf.

71

In Ruscoe v Cryptopia [2020] NZHC 728, [2020] 22 ITELR 925 (High Court of New Zealand) at [123], Gendall J criticised the idea that a crypto-token must necessarily fall into one of the two categories of personal property for it to be an object of personal property rights, calling it a “red herring”. The authors of The Law of Personal Property also suggest that engaging in a semantic debate on the characterisation of personal property is a “red herring”: M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) para 8.049.

72

Which in itself can be extremely challenging and is likely to result in a different answer for different types of assets.

73

None of them are things in action in the narrow sense and none of them are tangible. See Chapter 3 (Third thing), para 3.38 for more detail.

74

This recommendation is technology neutral in that it does not focus on any single or class of digital asset, crypto-token, protocol, system, network or technological feature. And it allows the common law to be technology specific and interrogate the idiosyncratic features of the asset in question when considering its proprietary status.

75

At our Judicial Roundtable on 19 January 2023, various members of the judiciary, including senior and specialist judges expressed support for a statutory confirmation of what they saw as the existing common law position. This point was subject to significant discussion and received broad support.

76

Nor would such a statutory confirmation prevent a thing from being deprived of legal status as an object of personal property rights for any other reason.

77

Your Response v Datateam Business Media Ltd [2014] EWCA Civ 281, [2015] 1 QB 41 at [27], by Moore-Bick LJ.

78

See, for example, the concerns of Moore-Bick LJ in Your Response v Datateam Business Media Ltd [2014] EWCA Civ 281, [2015] 1 QB 41 at [27], by Moore-Bick LJ.

79

  (1885) 30 Ch D 261 at p 285, by Fry LJ.

80

See n 71 above.

81

Chapter 4 (Third thing in practice) considers chapters 6 to 10 of our consultation paper. It deals with consultation questions 7, 8, 9, 10, 11, 12, 13 and 14.

82

  A thing is rivalrous if the use or consumption of the thing by one person, or a specific group of persons,

necessarily prejudices the use or consumption of that thing by one or more other persons.

83

In chapters 6 to 10 of our consultation paper, we provisionally concluded that crypto-tokens satisfied our proposed criteria but digital files, digital records, email accounts, certain in-game digital assets, domain names and certain carbon emissions trading schemes did not.

84

Tulip Trading v Van der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [24], by Birss LJ.

85

As we discuss at para 4.35 below, when the concept of rivalrousness is diluted by references to excludability or exclusivity of control, it is no longer capable of delineating between different types of digital assets. By way of example, see Illustration 5 of the UNIDROIT Principles which explains that password protected Word and Excel files fall within the definition of controllable “electronic record”: UNIDROIT Working Group, UNIDROIT Principles on Digital Assets and Private Law (2023) p 19 para 2.17.

86

Chapter 5 (Control) of this report considers chapter 11 of our consultation paper. It deals with consultation questions 16, 17, 18 and 19.

87

For a good summary of the different participants within a given system, see G Shapiro, “A Functionalist Framework for DeFi Regulation” (2022), available at: https://lexnode.substack.com/p/a-functionalist-framework-for-defi. For a detailed consideration of the interaction between different types of control/power within decentralised systems, see for example: G Shapiro, “Defining Decentralization for Law” (April 2020) Medium, available at: https://lex-node.medium.com/defining-decentralization-for-law-58ca54e18b2a, J Garcia and J Leung, “Data Points to Measure Blockchain Network Centralization” (21 October 2020), available at: https://ketsal.com/wp-content/uploads/2020/10/Ketsal-Open-Standards-Measures-of-Blockchain-Network-Centralization-Oct-21-2020.pdf and B Srinivisan and L Lee, “Quantifying Decentralization” (28 July 2017), available at: https://news.earn.com/quantifying- decentralization-e39db233c28e.

88

Tulip Trading v Van Der Laan [2022] EWHC 667 (Ch) at [32]-[35], by Falk J and [2023] EWCA Civ 83, [2023] 4 WLR 16 at [31]-[36], by Birss LJ.

89

See also our discussion of that point in Chapter 3 (Third thing).

90

For our detailed discussion on why not, see paras 11.113-11.128 of our consultation paper and para 5.12 of this report.

91

This would need to include those with expertise in the crypto-token markets, and not just those with expertise in traditional finance markets or intermediated securities markets.

92

In our consultation paper, we suggested that one option for the name of this group would be the “Control Panel”.

93

  UKJT, Legal Statement on Digital Securities Appendix 1 (p 44).

94

  A crypto-token might be linked to a thing in action: see chapter 14 of our consultation paper. For example, in

a securities context, an issuer might use a crypto-token to create a digital security, with the result that, “upon transfer of ... [the token], the rights or interests associated with it (i.e. the actual security) might simultaneously and automatically be transferred, without the need for further act or formality”: UKJT, Legal Statement on Digital Securities para 86.

95

Courts are adept at developing wider legal principles by reference to the specific set of factual circumstances before them. For example, in the context of crypto-tokens, the Court of Appeal considered only different implementations of bitcoin, but nonetheless recognised the broader principle that “a cryptoasset such as bitcoin is property”: Tulip Trading v Van der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [24], by Birss LJ.

96

Chapter 6 (Transfers) considers chapters 12 and 13 of our consultation paper. It deals with consultation questions 20, 21, 22, 23, 24 and 26.

97

See para 12.63 of our consultation paper.

98

Chapter 7 (Intermediated holding arrangements) considers chapters 16 and 17 of our consultation paper. It deals with consultation questions 29, 30, 31, 32 and 33.

99

Chapter 8 (Collateral arrangements) considers chapter 18 of our consultation paper. It deals with consultation questions 34, 35, 36, 37, 38 and 39.

100

Chapter 9 (Remedies) considers chapter 19 of our consultation paper. It deals with consultation questions

40 to 47.

101

These are high-level descriptions and we discuss each in detail in our consultation paper, see from para 4.18 (things in possession) and from para 4.26 (things in action). Because property rights are rights in relation to things, it is more accurate to refer to “rights in things in possession” and to “rights in things in action” to capture the divide between the property right and the object of the property right, see M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) para 4.002. See also chapter 2, n 77, chapter 2 in general and para 4.100 of our consultation paper, where we discuss the argument that other “categories” of things to which personal property rights can relate exist.

102

Colonial Bank v Whinney (1885) 30 Ch D 261 at 285, by Fry LJ.

103

That is, a third thing that is indefinite and undefined but is related to two definite or known things.

104

See discussion from para 3.38 below. We agree with the conclusion of the UKJT that Colonial Bank v Whinney is not good authority for limiting the scope of the categories of things to which personal property rights can relate. See UKJT, Legal Statement para 71. We also agree with the view expressed by Professor Fox and Professor Gullifer in their joint response to our call for evidence that: “The reasoning in [Colonial Bank v Whinney] turned on the interpretation of the bankruptcy statutes then in force. It has been taken out of context and used as authority for a proposition that it [was] not meant to support”. See also the discussion at paras 5.115-5.122 of our consultation paper.

105

Even without recognising such a “third” category, there are arguments that other categories of things to which personal property rights can relate already exist at law: candidates include patents and statutory intellectual property rights. For a discussion on our use of the terminology “third” category, see para 3.65 below.

106

Swift v Dairywise (No 1) [2000] 1 WLR 1177, [2000] BCC 642 concerned the question of whether a milk quota was “property” under Insolvency Act 1986, s 436.

107

Even since the publication of our consultation paper, the common law continued to refine its treatment of digital objects. See, for example: LMN v Bitflyer Holdings Inc [2022] EWHC 2954 (Comm) (November 2022); Tulip Trading Ltd v Van Der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 (February 2023); Osbourne v Persons Unknown Category A [2023] EWHC 39 (KB) (January 2023); Osbourne v Persons Unknown Category A [2023] EWHC 340 (KB) (February 2023); Piroozzadeh v Persons Unknown [2023] EWHC 1024 (Ch) (March 2023).

108

We received 66 responses to consultation question 1. Forty-one consultees agreed that the law of England and Wales should recognise such a third category. Seventeen consultees agreed with the proposition in our question but provided a qualified or mixed answer, most often drawing on the themes and difficulties summarised in our consultation paper. Seven consultees disagreed in some form.

109

Many consultees provided criticisms of the three criteria for “data objects” that we provisionally proposed in our consultation paper. See consultation question 6 and chapter 5 of our consultation paper for a detailed description of the criteria. For our discussion on the term “data object”, see from para 3.62 below and for discussion on our proposed criteria and consultee responses, see Chapter 4 (Third thing in practice).

110

Para 10.53. See also the discussion in our consultation paper in chapter 2 and paras 10.1-10.53 where we discussed these concepts in more detail.

111

For a detailed discussion on the case law in this area, see paras 3.38-3.48 below.

112

For an overview of some of these practical reasons, see from para 1.3 of our consultation paper, and the reasons discussed by the UKJT in the Legal Statement at paras 36-41.

113

See paras 3.38-3.48 of this report.

114

See from para 4.48 of our consultation paper and paras 2.31-2.33 and 3.43-3.48 of this report.

115

This reflects Edelman J’s concept of property rights as articulated in Hocking v Director-General of the National Archives of Australia [2020] HCA 19 at [205].

116

See our discussion from para 10.44 of our consultation paper.

117

See n 108 above. On crypto-tokens, of the 48 consultees who responded to consultation question 15, 29 agreed outright and six provided qualified agreement. Nine consultees provided a mixed response, and four consultees disagreed outright.

118

Of the 29 consultees who responded to our call for evidence on this point, 25 agreed outright and three provided a mixed response. One consultee disagreed outright, arguing that a crypto-token should not be capable of being the object of personal property rights. The Digital Assets (2021) Call for Evidence is available at: https://s3-eu-west-2.amazonaws.com/lawcom-prod-storage-11jsxou24uy7q/uploads/2022/10/Digital-assets-call-for-evidence-responses.pdf. The responses to our call for evidence are available at: https://s3-eu-west-2.amazonaws.com/lawcom-prod-storage-11jsxou24uy7q/uploads/2022/10/Digital-assets-call-for-evidence-responses.pdf.

119

See our discussion of this point in paras 10.40-10.43 of our consultation paper. See also n 170 below where we discuss the academic commentary in more detail. Not everyone agrees with this position or this overall value judgment and some make different value judgments to support arguments that certain things (specifically crypto-tokens) should not attract personal property rights at law. See, for example, R Stevens, “Crypto is Not Property” (2023) Law Quarterly Review (forthcoming) pp 1-2, 18-20, available at: https://ssrn.com/abstract=4416200.

120

Including the exercise of identifying exactly what the thing consists of, which in itself can be extremely challenging, and is likely to result in a different answer for different types of assets.

121

While this might seem question-begging, the point is simply that the category is broad enough to encompass all of those things amenable to possession, as opposed to any subset.

122

M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) para 1.018; and Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156 at [44], by Stephen Morris QC. See also Financial Markets Law Committee (“FMLC”), “Issues of legal uncertainty arising in the context of virtual currencies” (2016) p 6, available at: http://fmlc.org/wp-content/uploads/2018/03/virtual_currencies_paper_-_edited_january_2017.pdf.

123

M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) para 4.002.

124

This is the standard account of the effect of a property right. A full account also needs to recognise that, in the common law’s system of relative title applicable to things in possession, this really means a right good against the whole world except against those with a superior, possessory right. For example, the finder of a gold watch has a legal right by virtue of their possession of the gold watch. This right is good against the world except against the person who lost the watch (and anyone with a right prior to the person who lost the watch, and so on).

125

M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) para 4.002 which also recognises that “the difference between the thing and rights in the thing is more elusive for things in action than for things in possession”.

126

For more detailed discussion on this argument, see from para 4.29 of our consultation paper and para 2.323.37 below.

127

As opposed to the personal property rights in things in possession, which are of course legal rights.

128

See para 4.18 of our consultation paper.

129

Electronic Trade Documents Bill, clause 3(1).

130

Although, in 2011, the Financial Collateral Arrangements (No 2) Regulations 2003 (“FCARs”) were amended to incorporate a partial definition for “possession” (FCARs, reg 3(2)). The effect of this amendment was to clarify that for the purposes of the FCARs, intangible assets in the form of cash or intermediated securities entitlements booked to an account in the name of the collateral taker were capable of being “possessed”, as opposed to defining the concept of possession more broadly.

131

See para 4.19 of our consultation paper and see also D Fox, “Cryptocurrencies in the Common Law of Property”, in S Green, D Fox, Cryptocurrencies in Public and Private Law (2019) para 6.29.

132

Electronic Trade Documents (2022) Law Com No 405, para 5.9.

133

Above. See related discussion in Chapters 5 (Control), 7 (Intermediated holding arrangements), and 9 (Remedies).

134

Electronic Trade Documents (2022) Law Com No 405 from para 2.61.

135

See for example Bills of Exchange Act 1882, s 2.

136

Clause 3(1) of Electronic Trade Documents Bill.

137

See n 66. See also the explanatory notes to the Electronic Trade Documents Bill at para 65, available at: https://bills.parliament.uk/Publications/47902/Documents/2302.

138

And, in the limited context of the FCARs, possession applies to intangible things, see para 8.91 below.

139

B McFarlane and S Douglas, “Property, Analogy and Variety” (2022) 42(1) Oxford Journal of Legal Studies 161, 166.

140

See COMBAR and the Chancery Bar Association at p 338 (para 1.5). COMBAR and the Chancery Bar Association generally argued in favour of third category things being amenable to possession see, for example, pp 353-357 (paras 15.1-15.20). On electronic trade documents, see also the responses of Melih Esmer pp 788-789, and Ilias Ioannou pp 583-584.

141

For some digital assets that might do this, such as digital bearer securities, see UKJT, Legal Statement on Digital Securities. We note that, in that paper, the UKJT applied the concept of negotiability — traditionally applicable to tangible negotiable instruments — to digital bearer securities. We discuss this in more detail in Chapter 6 (Transfers).

142

S Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System (2008) at pp 1 and 8, available at: https://nakamotoinstitute.org/static/docs/bitcoin.pdf.

143

See Chapters 6 (Transfers), 7 (Intermediated holding arrangements), 8 (Collateral arrangements) and

9 (Remedies) of this report respectively.

144

For more detailed discussion on this point, see paras 5.9 and 5.16.

145

See paras 4.55-4.66 of our consultation paper for more detailed discussion on this point.

146

We make this point repeatedly in this report. For discussion of each of these points, see 7.111, 8.37 and

9.77.

147

Things in action are, in general, things in relation to which rights “are asserted by taking legal action or proceedings”, although “the difference between the thing and rights in the thing is more elusive for things in action than for things in possession”. M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) para 4-002. See also the Singaporean case of Janesh s/o Rajkumar v Unknown Person [2022] SGHC 264 at [56]-[68] where the court discussed the concept of a wider or residual class of things in action, but concluded only that the term thing in action as it is used “may not be entirely clear” (at [67]). See also our detailed discussion of this point at paras 4.29-4.38 of our consultation paper.

148

Of the 51 consultees who considered this point, 45 consultees agreed, either explicitly or impliedly (by their descriptions of crypto-tokens), that crypto-tokens cannot be conceived of as rights or claims in themselves and that they can be used and enjoyed independently of whether any rights or claims in relation to them are enforceable by action. The remaining six consultees thought that crypto-tokens might be potentially rights-based, although this was said with specific reference to private, permissioned systems, or intermediated holdings. As we express elsewhere, we think that such systems or holding arrangements could give rise to things in action as against the system operator or intermediary — see Chapter 7 (Intermediated holding arrangements). See also n 149.

149

See K Low and M Hara, “Cryptoassets and property” in S van Erp and K Zimmermann, Edward Elgar Research Handbook on EU Property Law (forthcoming), available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4103870. See also K Low, “Cryptoassets and the Renaissance of the Tertium Quid?” (2023), available at: https://ssrn.com/abstract=4382599, which usefully discusses the history of things in action. For completeness, one other consultee did suggest that a cryptotoken could be conceptualised as a “right to have the ledger updated ... in accordance with the relevant protocols of the distributed ledger”: Crypto Council for Innovation at p 398 (emphasis removed). However, protocol rules generally do not convey rights on participants to have the ledger updated, but instead specify how valid transaction instructions can be authenticated, see para 10.91 and Appendix 4 of our consultation paper. Our view is that the concept put forward by this consultee is consistent with our description of a crypto-token from para 4.13 below. We do not think that this consultee intended to suggest that cryptotokens constitute rights or claims in themselves.

150

Professor Low, p 688. See also the discussion in Janesh s/o Rajkumar v Unknown Person [2022] SGHC 264 at [56]-[68] referencing K Low “Bitcoins as Property: Welcome Clarity?” (2020) 136 Law Quarterly Review 345 and K Low, “Cryptoassets and the Renaissance of the Tertium Quid?” (2023), available at: https://ssrn.com/abstract=4382599.

151

See Chapter 4 (Third thing in practice) from para 4.13, for a detailed discussion on this point.

152

Of course, such a law might impact the use of and treatment by the market of such crypto-tokens.

153

For a detailed consideration of this case and a translation of the judgment, see: L Gullifer, M Hara, C Mooney, “English translation of the Mt. Gox judgment on the legal status of bitcoin prepared by the Digital Assets Project”, available at: https://www.law.ox.ac.uk/business-law-blog/blog/2019/02/english-translation-mt-gox-judgment-legal-status-bitcoin-prepared.

154

See Mt. Gox, “Notice of Expiration of Deadline for Selecting Repayment Methods and Registering Payee Information” (2023), available at: https://www.mtgox.com/img/pdf/20230407_announcement_en.pdf. See also from para 4.58 of our consultation paper and paras 2.39 and 3.46 of this report where we discuss Japan’s change in stance toward the property status of crypto-tokens.

155

We explain why in detail from para 4.13 below.

156

See n 184 below.

157

K Low, “Cryptoassets and the Renaissance of the Tertium Quid?” (2023) p 688 (para 20.1), available at: https://ssrn.com/abstract=4382599.

158

For a more detail overview of the case law, see paras 3.38-3.48 below.

159

Linklaters LLP pp 743-744 (para 1.2). See also responses from The Law Society p 708; International Digital Assets Counsel Association and CryptoUK (“IDAC and CryptoUK”) pp 592-593; the Centre for Commercial Law at the University of Aberdeen pp 245-246; and ISDA pp 633-636 (para 2.1).

160

In this context, A Ray, Dr Clifford and Dr Roberts suggest that “that traditional legal rules and principles may not apply easily into online realms”: see D Clifford, A Ray, and H Roberts, “The Rise and Rise Again of Digital Assets - Reconceptualising Data as Property” in N Mrockova, A Nair, and L Rostill, Modern Studies in Property Law: Volume 12 (2023) (forthcoming).

161

Swift v Dairywise (No 1) [2000] 1 WLR 1177, [2000] BCC 642 concerned the question of whether a milk quota was “property” under s 436 Insolvency Act 1986.

162

Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156. This case considered, among other things, the proprietary status of carbon emission allowances in the context of claims for restitution and knowing receipt. The court concluded that a carbon emission allowance was “not a [thing] in action in the narrow sense, as it cannot be claimed or enforced by action” at [60], by Stephen Morris QC.

163

A-G of Hong Kong v Chan Nai-Keung [1987] 1 WLR 1339, (1987) 3 BCC 403 at p 1342 where the Privy Council said: “Their Lordships have no hesitation in concluding that export quotas in Hong Kong although not ‘things in action’ are a form of ‘other intangible property’”.

164

Re Celtic Extraction Ltd [2001] Ch 475, [2000] 2 WLR 991. In this case, Morritt LJ had to decide whether a waste management licence could constitute property for the purposes of the Insolvency Act 1986. Focusing on transferability as a key component of property, the Court of Appeal held that a waste management licence could be “property”. However, this was either by virtue of being a thing in action, or falling within the meaning of “every description of property”.

165

Tulip Trading v Van Der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [24]-[25], by Birss LJ who also described the thing to which the property right can relate.

166

Piroozzadeh v Persons Unknown [2023] EWHC 1024 (Ch); Osbourne v Persons Unknown Category A [2023] EWHC 340 (KB); Osbourne v Persons Unknown Category A [2023] EWHC 39 (KB); D'Aloia v Persons Unknown [2022] EWHC 1723 (Ch); Amir Suleymani v Nifty Gateway LLC [2022] EWHC 773 (Comm); Nicholls v Little [2022] EWHC 2344 (QB); HDR Global Trading Ltd v Shulev [2022] EWHC 1685 (Comm); Tulip Trading Ltd v Van Der Laan [2022] EWHC 667 (Ch); Osbourne v Persons Unknown [2022] EWHC 1021 (Comm); Danisz v Persons Unknown and Huobi Global Ltd [2022] EWHC 280 (QB); LMN v Bitflyer Holdings Inc [2022] EWHC 2954 (Comm); Jones v Persons Unknown [2022] EWHC 2543 (Comm); R v Wright (Nigel) [2022] EWCA Crim 882; DPP v Briedis [2021] EWHC 3155 (Admin); Wang v Darby [2021] EWHC 3054 (Comm); Fetch.ai Ltd v Persons Unknown [2021] EWHC 2254 (Comm); Litecoin Foundation Ltd v Inshallah Ltd [2021] EWHC 1998 (Ch); Reyes v Persons Unknown [2021] EWHC 1938 (Comm); Marian Toma, David True v Ciaran Murray [2020] EWHC 2295 (Ch); Ion Sciences vs Persons Unknown (unreported, 21 December 2020, Commercial Court); AA vs Persons Unknown [2019] EWHC 3556 (Comm), [2020] 4 WLR 35; Liam David Robertson v Persons Unknown (unreported, 15 July 2019); Vorotyntseva v Money-4 Ltd [2018] EWHC 2596 (Ch).

167

Most cases involve interim applications in which a party seeks an order or directions before the substantive hearing of a claim. They are therefore concerned with specific preliminary issues (such as whether the court has, or should accept, jurisdiction), and subject to rules which limit the extent to which these issues are argued before the court. Jurisdictional facts may only need to be proved to the standard of a “good arguable case”, and certain issues may not be in dispute for the purposes of the application although not determined finally. In Tulip Trading Ltd v Van Der Laan [2022] EWHC 667 (Ch), for example, there was no dispute at first instance that the bitcoin in issue was property (at [141]), and no argument on the point on appeal.

168

[2019] EWHC 3556 (Comm), [2020] 4 WLR 35 at [55]-[61].

169

Tulip Trading v Van Der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [24], by Birss LJ.

170

AA v Persons Unknown [2019] EWHC 3556 (Comm), [2020] 4 WLR 35 at [58], [55], [59] respectively.

Bryan J considered the UKJT’s analysis “compelling” (at [57]). The UKJT Legal Statement drew on a long line of case law and academic commentary, which supported an understanding of crypto-tokens as things to which personal property rights could relate. The idea that crypto-tokens are capable of being objects or things in themselves (and are best described in those terms) is now widespread in legal and academic commentary, to the extent that it is standard in authoritative practitioner texts and textbooks: G Virgo, The Principles of Equity & Trusts (5th ed 2023), para 4.3.1; L Gullifer, Goode and Gullifer on Legal Problems in Credit and Security (7th ed 2022), para 1.58; M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) para 8-049. This approach is not new but builds on longstanding scholarship, which describes various digital assets in similar terms (see paras 10.40-10.43 of our consultation paper which sets out commentary back to 1993). Over the last ten years, commentators have increasingly coalesced around this view and, in that sense, the development of commentary and scholarship is broadly consistent with the trajectory we identify in the case law. See, for example: J Allen, “Cryptoassets in private law” in I Chiu and G Deipenbrock, Routledge Handbook of Financial Technology and Law (1st ed 2021); D Fox, “Cryptocurrencies in the Common Law of Property” in D Fox and S Green, Cryptocurrencies in Public and Private Law (2019) para 6.05; J G Allen, “Property in Digital Coins” (2019) 8(1) Environmental and Planning Law Journal 76, 95; A Hinkes, “Throw away the key, or the key holder? Coercive contempt for lost or forgotten cryptocurrency private keys, or obstinate holders” (2019) 16(4) Northwestern Journal of Technology and Intellectual Property 225; J Perkins and J Enwezor, “The legal aspect of virtual currencies” (2016) Journal of International Banking and Financial Law, 569; L Chambers, “Misappropriation of cryptocurrency: propelling English private law into the digital age?” (2016) 5 Journal of International Banking and Financial Law 263.

171

The case of Fetch.ai v Persons Unknown [2021] EWHC 2254 (Comm) involved crypto-tokens held on a crypto-token exchange called Binance. The court held that crypto-tokens were capable of being objects of personal property rights. In contrast to the judgment in AA v Persons Unknown [2019] EWHC 3556 (Comm), [2020] 4 WLR 35, Judge Pelling QC described the “assets credited to the first applicant’s accounts on the Binance Exchange” as “[things] in action”, at [9] (emphasis removed). This has been referred to as a “marked departure from the reasoning set out in the UKJT Legal Statement (endorsed in AA v Persons Unknown)”: J G Allen, H Wells, and M Mauer, “Cryptoassets in Private Law: Emerging Trends and Open Questions from the First 10 Years” (2022), available at: https://ssrn.com/abstract=4206250. However, given that Binance Exchange generally operates as a non-custodial holding intermediary, we consider that the better interpretation of the Fetch.ai judgment is that the court correctly classified the applicant’s right against Binance Exchange as a thing in action (broadly, a personal contractual claim to the return of assets equivalent to those held). This interpretation is partially supported by the description of a Binance account in Piroozzadeh v Persons Unknown [2023] EWHC 1024 (Ch) at [8], by Trower J.

172

Chen v Blockchain Global Ltd [2022] VSC 92 (application for preservation of property in respect of Bitcoin); Commissioner of the Australian Federal Police v Bigatton [2020] NSWSC 245 (order of restraint of cryptotokens held in digital wallets). See generally A Lane and L Adam, “Crime and Cryptocurrency in Australian Courts” (2022) 48(3) Monash University Law Review (forthcoming), available at: https://bridges.monash.edu/articles/journal_contribution/Crime_and_Cryptocurrency_in_Australian_Courts/2 2207720.

173

Shair.Com Global Digital Services Ltd v Arnold [2018] BCJ 311. See also Copytrack Pte Ltd v Wall [2018] BCSC 1709 in which Skolrood J considered the crypto-tokens in question to be the “property” of the claimant, notwithstanding the court’s conclusion that the status of the crypto-tokens as a type of “good” could not be determined on summary judgment.

174

Re GateCoin Ltd (In Liquidation) [2023] HKCFI 914, HCCW 18/2019 (confirming the availability of trust). Courts have granted interlocutory proprietary injunctions over crypto-tokens without any party suggesting that crypto-tokens are not “property”: Nico Constantijn Antonius Samara v Stive Jean-Paul Dan [2021] HKCFI 1078 at [41]; Yan Yu Ying v Leung Wing Hei [2021] HKCFI 3160; Huobi Asia Limited v Chen Boliang [2020] HKCFI 2750.

175

Ruscoe v Cryptopia Ltd (In liquidation) [2020] NZHC 728, [2020] 22 ITELR 925 at [69], by Gendall J.

176

Algorand Foundation Ltd v Three Arrows Capital Pte Ltd (HC/CWU 246/2022) (May 2023) (the Singapore High Court held that the claimant was a “creditor” within s 124(1)(c) of the Insolvency, Restructuring and Dissolution Act 2018 but that an obligation to re-transfer loaned stablecoins (USDC) could not constitute a monetary debt for the purposes of a statutory demand under s 125(2)(a) of that Act); CLM v CLN [2022] SGHC 46 (application for proprietary injunction); B2C2 Ltd v Quoine Pte Ltd [2020] SGCA(I) 02; B2C2 Ltd v Quoine Pte Ltd [2019] SGHC(I) 03. At first instance, Simon Thorley J sitting in the Singapore International Commercial Court considered that crypto-tokens satisfied the Ainsworth criteria, and so were capable of attracting personal property rights. But he left open the question of the categorisation of crypto-tokens. The Singapore Court of Appeal found that there was no intention to create a trust, so did not need to rule on whether crypto-tokens could be objects of personal property rights.

177

In the United States, courts repeatedly affirm that cryptoassets can attract proprietary rights albeit often in a specific statutory context. See a brief summary of US case law in our consultation paper at paras 4.52-4.54.

178

Algorand Foundation Ltd v Three Arrows Capital Pte Ltd (HC/CWU 246/2022) (May 2023); Re GateCoin Ltd (In Liquidation) [2023] HKCFI 914; HCCW 18/2019 (Hong Kong) in which the Hon Linda Chan J held that cryptocurrency is “property” and is capable of being held on trust at [82](3).

179

Osbourne v Persons Unknown [2023] EWHC 39 (KB) at [18], by Lavender J; Jones v Persons Unknown [2022] EWHC 2543 (Comm) at [23], by Nigel Cooper QC; DPP v Briedis [2021] EWHC 3155 (Admin), [2022] ACD 19 at [10], by Fordham J.

180

DPP v Briedis [2021] EWHC 3155 (Admin), [2022] ACD 19 at [10], by Fordham J; Tulip Trading v Van Der Laan [2022] EWHC 667 (Ch) at [16], by Falk J; AA v Persons Unknown [2019] EWHC 3556 (Comm), [2020] 4 WLR 35 at [56]-[58], by Bryan J.

181

The bankruptcy court presiding over the Chapter 11 cases of Celsius Network LLC and its affiliates referred to our consultation paper: “Legal principles that are applicable in the United Kingdom are not binding on courts in the United States, but they may be persuasive in addressing legal issues that may arise in this case. In the future the [US Bankruptcy Court] may consider the [Law Commission’s Consultation Paper] in connection with the legal issues in this case.”: Celsius Network LLC, Case No. 22-10964 (MG), 17 October 2022, United States Bankruptcy Court Southern District of New York. Tulip Trading v Van Der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [24], by Birss LJ.

182

See paras 4.55-4.66.

183

J G Allen, H Wells, and M Mauer, “Cryptoassets in the Courts: Emerging Trends and Open Questions in Private Law from the First 10 Years” (2022) SMU Centre for AI & Data Governance Research Papers, referencing P Palka, “Virtual Property: Towards a General Theory” (2017) p 150, available at: cadmus.eui.eu/handle/1814/49664.

184

The Japanese Payment Services Act has been amended to include the concept of “Virtual Currency”, with effect from 1 April 2017. An unofficial English translation of the Japanese Payment Services Act is available at: https://www.japaneselawtranslation.go.jp/en/laws/view/3078/en. Commentary suggests that the statutory definition squarely includes many crypto-tokens. For consideration of the amendment and case see: J Lee and M Van de Looverbosch, Property and Data: A Confused Relationship (2021) in J Lee and A Darbellay, A Data Governance in AI, FinTech and RegTech: Law and Regulation in the Financial Sector (2022), from p 8, available at: https://ssrn.com/abstract=3995492; see also paras 4.58-4.61 of our consultation paper.

185

In 2019, Liechtenstein enacted The Liechtenstein Token and TT Service Provider Act. The Act creates a new legal object - a token - and a specific, separate regime for regulation and use of those tokens. An unofficial translation of the Report and Application of the Government to the Parliament of the Principality of Liechtenstein concerning the Creation of a law on Tokens and TT Service Providers is available at: https://impuls-liechtenstein.li/wp-content/uploads/2021/02/Reportand-Application-TVTG-extract.pdf.

186

In 2020, Switzerland implemented the Federal Act on the Adaption of Federal Law to Developments in Distributed Ledger Technology. The statute amends various pieces of legislation, and enables the tokenisation of rights, claims and financial instruments through “ledger-based securities”. These reforms effectively create a technology specific regime which applies existing legal principles and rules to new types of object without significant adaption: Art 973d Federal Act on the Adaptation of Federal Law to Developments in Distributed Ledger Technology 2020 https://www.newsd.admin.ch/newsd/message/attachments/60601.pdf.

187

The principles are intended to facilitate an international standard of best practice and framed such that they can be applied by member states regardless of their underlying conceptual foundations of property law: “Background”, Digital Assets and Private Law Project, available at: https://www.unidroit.org/work-in-progress/digital-assets-and-private-law/; therefore, these principles should also be applicable by member states whose domestic legal systems are civil law-based.

188

The UNIDROIT Working Group explicitly recognises the difficulties that some member states face when dealing with questions as to the proprietary status of new things, particularly intangible things. Nonetheless, principle 3(1) provides that “A digital asset can be the subject of proprietary rights”, with accompanying commentary clarifying that while the principle “does require that digital assets must be susceptible to proprietary rights, it does not prescribe, for instance, the specific requirements for a valid right of ownership in a digital asset or for a valid transfer of the same”: UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) principle 3(1) and pp 23-24 para 3.3.

189

“‘Electronic records’ comprise a class of which ‘digital assets’ ... form a subset”: UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) p 17 para 2.1.

190

A cryptoasset in this sense refers to a crypto-token which has been “linked” or “stapled” to a legal right or interest in another thing. Linking or stapling refers to a legal mechanism whereby the holder of a legal right or interest in a thing is identified by reference to a crypto-token. See Chapter 8 (Collateral arrangements), para 8.12.

191

UKJT, Legal Statement on Digital Securities paras 26-70.

192

T Chan and K Low, “Post-Scam Crypto Recovery: Final Clarity or Deceptive Simplicity?” (2023), available at: https://ssrn.com/abstract=4394820, referring to B McFarlane and S Douglas, “Property, Analogy and Variety” (2022) 42(1) Oxford Journal of Legal Studies 161.

193

Albeit many crypto-tokens do not embody any legal rights or obligations, whereas existing physical bearer instruments are an embodiment of the right to claim performance of the obligations recorded in the document. UKJT, Legal Statement on Digital Securities Appendix 1 (p 44).

194

For a more detailed discussion on our use of these terms, see Chapter 7 (Intermediated holding arrangements).

195

However, we agree with the conclusion of the UKJT that crypto-tokens could be used in a similar way to physical bearer instruments: as an embodiment of the right to claim performance of the obligations recorded by the crypto-token. Other things, including legal rights can also be linked to such third category things. See Chapter 14 of our consultation paper for detailed discussion on this point.

196

Tulip Trading v Van der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [24], by Birss LJ.

197

For more detail on transfers of crypto-tokens, see Chapter 6 (Transfers). See also our discussion on analogies with existing methods of legal transfer in our consultation paper from para 13.114.

198

UKJT, Legal Statement on Digital Securities para 22.

199

HM Treasury, “Future financial services regulatory regime for cryptoassets: Consultation and call for evidence” (2023) para 1.1.

200

The success of such assets will also be affected by, among many other things, policy decisions and the continued interest in and use of such assets by market participants.

201

See below from para 3.62 for a discussion on terminology.

202

For example, some consultees argued that existing third category things, such as carbon emissions allowances are not “composed of data” - see ISDA pp 633-636 (para 2.1). We discuss this feedback in more detail in Chapter 4 (Third thing in practice) at paras 4.6-4.21.

203

See, eg, M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) para 9.007.

204

(1885) 30 Ch D 261 at 285.

205

Linklaters LLP pp 744-746 (para 1.3.1).

206

See above n 120

207

And arguably, the line of case law dates back even further to 1987. In Armstrong, Stephen Morris QC referred back to three decided cases of particular relevance to the issue of proprietary classification: A-G for Hong Kong v Nai-Keung [1987] 1 WLR 1339, (1987) 3 BCC 403; Re Rae [1995] BCC 102, [1995] CLY 421; and most significantly Re Celtic Extraction [2001] Ch 475, [2000] 2 WLR 991. A fourth case, Swift v Dairywise Farms Ltd [2000] 1 WLR 1177, [2000] BCC 642 also involved third category things. See paras 3.38-3.48 and in particular n 166 above.

208

At our Judicial Roundtable on 19 January 2023, various members of the judiciary, including senior and specialist judges, expressed support for a statutory confirmation of what they saw as the existing common law position. This point was subject to significant discussion and received broad support.

209

Nor would such a statutory confirmation prevent a thing from being deprived of legal status as an object of personal property rights for any other reason.

210

If the law of England and Wales is adequately and sensitively to consider issues relating to decentralised finance (DeFi) systems, and more complex crypto-token systems, including Layer 2 applications, then it is important to recognise this reality as soon as possible. See G Shapiro, “A Functionalist Framework for DeFi Regulation” (2022), available at: https://lexnode.substack.com/p/a-functionalist-framework-for-defi. We discuss this point in more detail in Chapters 5 (Control) and 8 (Collateral arrangements).

211

Leaving the legal principles applicable to rights or claims in action which are enforceable only by action to apply to those things that fall squarely within the category of things in action. See Linklaters LLP, pp 743744 (para 1.2).

212

Your Response v Datateam Business Media Ltd [2014] EWCA Civ 281, [2015] 1 QB 41 at [27], by Moore-Bick LJ.

213

See, for example, the concerns of Moore-Bick LJ in Your Response v Datateam Business Media Ltd [2014] EWCA Civ 281, [2015] 1 QB 41 at [27].

214

(1885) 30 Ch D 261 at 285, by Fry LJ.

215

See n 71 above.

216

We provisionally called such things “data objects”. As we discuss from para 3.62, we no longer use the term “data objects”.

217

A thing is rivalrous if the use or consumption of the thing by one person, or a specific group of persons, necessarily prejudices the use or consumption of that thing by one or more other persons.

218

See from para 4.27 below.

219

We received 55 responses to consultation question 2. Twenty-eight consultees agreed with our proposed criterion. Twenty-seven either disagreed, provided a qualified response or suggested alternative or new phrasing for the criterion.

220

See for example, Linklaters LLP p 746 (para 1.3.2); Clifford Chance LLP p 285; Professor Cutts pp 967968; Crypto Council for Innovation p 398; Dr Jayathilaka and Dr Lee p 269; and Timothy Chan p 981.

221

UKJT, Legal Statement para 60.

222

For more detail on this point, see from para 4.13.

223

See para 5.15 of our consultation paper.

224

See paras 5.18 and 10.29 of our consultation paper. See also D Fox, “Digital Assets as Transactional Power” (2022) 1 Journal of International Banking and Financial Law 3, 3: “[A crypto-token’s] outward manifestation is a string of data generated by transactions between participants on a distributed ledger system. But to see the asset as mere data would ignore its larger functionality ...”.

225

We still consider that the technical elements required to constitute working digital asset systems do have a tangible, albeit highly distributed, existence (see n 68 above and para 5.18 of our consultation paper). However, both notional quantity units and the ability/power in respect of a certain notional quantity unit that we discuss from para 4.13 below are clearly intangible, even if recorded data — which is necessary to manifest the thing — is not.

226

For a further detailed discussion on the “form” and the “function” of data instantiated in a system, see paras 10.26-10.27 of our consultation paper.

227

As noted at para 4.8, the need for “composed of data” as a separate criterion for a third category of thing also potentially creates a hard boundary for the category, which we seek in this report to avoid.

228

Tulip Trading v Van der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16. The judgment had not been handed down at the time of publication of our consultation paper (nor had the appeal been heard). As we note in Chapter 3 (Third thing), the statements on the proprietary status of crypto-tokens in that case were made in the context of a claim for permission for service out of the jurisdiction (and the proprietary status of cryptotokens was not in dispute). Nonetheless, they are persuasive and add to the increasing body of common law on this point.

229

Tulip Trading v Van der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [24], by Birss LJ. The case was specifically about bitcoin and other notional quantity units manifested by forks of the original Bitcoin Core code, but the judgment was expressed to include cryptoassets more broadly. See paras [24] and [72].

230

See, for example, para 10.25: “[A] data structure achieves functionality only as a result of, and within, a particular actively operating crypto-token system. On its own, neither the data structure that constitutes the crypto-token nor the crypto-token system as an inert abstract entity is capable of achieving this functionality.” See also para 10.62: “We consider that the law is capable of treating a crypto-token, being a composite of a specific data structure and commonly-understood process or functionality, as a thing.”

231

Linklaters LLP p 746 (para 1.3.2).

232

D Fox, “Digital Assets as Transactional Power” (2022) 1 Journal of International Banking and Financial Law

3, 3.

233

Clifford Chance LLP p 282.

234

Tulip Trading v Van der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [72], by Birss LJ.

235

See PG Hunn, “Only Binary? Atoms and Bits as Objects of Property” (2023), available at: https://papers.ssrn.com/abstract=4419662. In particular, crypto-token systems create objects/things which replicate the characteristics of other things that can be the object of personal property rights, such as tangible things. The protocol rules and the crypto-token system work together to provide factual (as opposed to legal) recognition and protection for those objects/things that mimic some of the functionality of property rights. See also our discussion at paras 10.44-10.54 of our consultation paper.

236

See our consultation paper at para 10.29.

237

We discuss the “state” of the system in more detail in Chapter 6 (Transfers) from para 6.5.

238

Ethereum, “Ethereum Whitepaper” (2023), available at: https://ethereum.org/en/whitepaper/#ethereum-state-transition-function, and G Wood, “Ethereum: A Secure Decentralized Generalised Transaction Ledger” (2014), available at: https://github.com/ethereum/yellowpaper/blob/master/BRANCHES.md.

239

Above.

240

We think it is correct to use the terms ability/power and not the term right. As we discuss at para 3.32 above, crypto-tokens are not rights-based: they cannot be conceived of as rights or claims in themselves and they can be used and enjoyed independently of whether any rights or claims in relation to them are enforceable by action. Nonetheless, sometimes consultees and commentators do use the term right as opposed to ability/power: see Crypto Council for Innovation p 398 and Clifford Chance LLP pp 282-283.

241

Such as authenticating a message or composing a valid transaction instruction which is intended to effect a state change. We do not describe this as an “ability/power to transact”, although recognise that is a suitable short-form way of summarising our position. In general, a validly composed and cryptographically signed transaction will be recognised as valid by other participants in the crypto-token system and eventually will be recorded as a state change (or state changes). However, this is subject to a number of externalities outside of the ability/power of a tokenholder, including (but not limited to) the transaction being included in the ledger (such as in a block by miners or validators) within the crypto-token system and the recorded state change becoming probabilistically irreversible (in the context of some proof of work-based systems) or finalised (in the context of some proof of stake-based systems).

242

For example, the distributed ledger/structured record of transactions which evidences changes to the state of structured or distributed records once consensus is reached between participants in the network and technical encumbrances and associated spending conditions over notional assets (such as the association of a specific quantity of notional assets with a receiving public key address).

243

See above paras 4.13-4.16.

244

See S Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System (2008), pp 1 and 5, available at: https://nakamotoinstitute.org/static/docs/bitcoin.pdf. As the Court of Appeal said in Tulip Trading v Van der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [19], by Birss LJ: “The point of the [Bitcoin] White Paper was to propose a scheme using cryptographic methods to solve the double spending problem and create a form of electronic cash which does not rely on third party financial institutions.” We discuss the concept of rivalrousness in more detail from para 4.27 below.

245

D Fox, “Digital Assets as Transactional Power” (2022) 1 Journal of International Banking and Financial Law 3.

246

Such as recognising the liberty of a person to use the asset, thing or resource — the liberty to transact. Or the right of a person either to exclude or allow access by another person to that particular asset, thing or resource (see our consultation paper at para 2.16). We think this concept also gets closest to Satoshi Nakamoto’s description of Bitcoin, as the archetypal example of a crypto-token system, as a “communications channel” which creates a “system for electronic transactions”, see: S Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System (2008), pp 1 and 5, available at: https://nakamotoinstitute.org/static/docs/bitcoin.pdf. See also paras 10.12-10.51 of our consultation paper.

247

See J Allen, “Cryptoassets in private law” in I Chiu and G Deipenbrock (eds), Routledge Handbook of Financial Technology and Law (1st ed 2021), n 14, discussing the use of the term “token”: “[In computer science] a ‘token’ is a programming object that represents the ability to perform an action in a software system. To this extent, ‘token’ is entirely appropriate.”

248

So long as it is understood that what is being referred to is the notional quantity unit itself. We note that it is perhaps even more accurate (albeit inconvenient) to refer to the integer denomination of the smallest notional quantity unit — satoshis in the case of bitcoin.

249

Ether is the notional unit for transmitting value on the Ethereum network denominated in integer units, the base unit being wei. Each ether equals the value of 10A18 wei. 10 ether would therefore equal 100A18 wei. It is therefore also appropriate (albeit rarer) to refer to the notional unit in terms of wei. See https://ethereum.github.io/yellowpaper/paper.pdf.

250

UNI is an example of a token on Ethereum. Tokens are a notional unit that can be treated as things in themselves and additionally, can be used to represent assets, ideational constructs, or other things within or external to a crypto-token system. UNI conforms to the ERC-20 standard for fungible tokens on Ethereum. The standard defines technical constraints that enable a universal approach for manifesting and transferring a token such that it is interoperable between applications using the crypto-token system. See https://eips.ethereum.org/EIPS/eip-20.

251

A “Bored Ape” (BAYC) is a (popular) form of non-fungible token (NFT). Like a fungible token, a non-fungible token places similar constraints in token smart contracts but for the management of uniquely trackable (and thus “non-fungible”) tokens. Specifically, NFTs on Ethereum commonly implement the ERC-721 standard interface which includes a “tokenId” variable that creates a unique pair between the tokenId and the smart contract address. See https://eips.ethereum.org/EIPS/eip-721. The BAYC token smart contract can be viewed at: https://etherscan.io/token/0xbc4ca0eda7647a8ab7c2061c2e118a18a936f13d.

252

For example, “96 [b]itcoins”: AA v Persons Unknown [2019] EWHC 3556 (Comm), [2020] 4 WLR 35 at [1], by Bryan J; “two NFTs”: Osbourne v Persons Unknown [2023] EWHC 340 (KB) at [4], by James Healy-Pratt.

253

See para 5.24 of our consultation paper.

254

Even if a particular right has become so readily assignable that it is treated, in effect, as if it were an independently existing object to which personal property rights can relate.

255

We received 50 responses to consultation question 3 on this criterion. Of these, 29 agreed outright and four provided qualified agreement. Two consultees provided a mixed response, and 15 disagreed outright. Of the 17 consultees who either provided a mixed response or disagreed, one argued principally from the perspective of legal certainty, one disagreed with the criterion’s role as a gateway, two preferred a spectrum-like application of the criterion, and the remaining 13 highlighted other conceptual concerns.

256

Norton Rose Fulbright LLP pp 836-837; CLLS-FLC pp 507-508.

257

Norton Rose Fulbright LLP pp 836-837. See for example the UKJT, Digital dispute resolution rules, which are used by some market participants.

258

CLLS-FLC pp 507-508. For cases recognising crypto-tokens as capable of being objects of personal property rights, see n 166. For legislation, see (for example) the proposed amendments to the Proceeds of Crime Act 2002 under the Economic Crime and Corporate Transparency Bill 2022, discussed below in Chapter 9 (Remedies) n 1280. See also the various international legislative developments set out from paraas 2.31-2.43, as well as the work of international law reform bodies such as UNIDROIT: UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) principle 2, p 16.

259

CLLS-FLC p 508. See also Linklaters LLP pp 746-747 (para 1.3.3) and Ashurst LLP p 72 (para 4.4).

260

In the sense that third category things are not rights in themselves and they can be used and enjoyed independently of whether any rights or claims in relation to them are enforceable by action before a court.

261

See, for example, paras 10.75-10.77 of our consultation paper where we discuss the case of Re Lehman Brothers International (Europe) (in administration) (LBIE) [2017] UKSC 38, [2018] AC 465, in which the Supreme Court ruled that the foreign currency creditors of LBIE did not have non-provable claims to recover “losses” arising from currency fluctuations following the start of LBIE’s administration, overturning the decisions of both lower courts.

262

See Chapter 14 of our consultation paper; UKJT, Legal Statement on Digital Securities paras 26-70. See also Chapter 8 (Collateral arrangements).

263

This was also the conclusion of the CLLS-FLC at p 504: “with particular regard to private, permissioned systems, the claimant is likely to have some form of [thing] in action in the traditional sense in relation to the digital asset held and transferred through the system; and, to that extent, the subject-matter of that claim will be recognised under traditional English law concepts as a form of incorporeal property.”

264

This point was explicitly recognised by the UKJT, Legal Statement on Digital Securities para 68: “Such a power [to have ultimate control over the register or record] may, depending on the structure, be incompatible with the recognition of any tokens deployed in the system as the object of property.”

265

Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156. The court concluded that an EUA was “not a chose in action in the narrow sense” at [61], by Stephen Morris QC.

266

For further discussion on this point, see Chapter 9 of our consultation paper.

267

See paras 5.48 and 5.79 of our consultation paper. See also T Cutts, “Crypto-Property? Response to Public Consultation by the UKJT of the LawTech Delivery Panel” (2019) p 2, available at: https://ssrn.com/abstract=3406736.

268

Professor Cutts pp 967-968; Centre for Commercial Law at the University of Aberdeen p 247; Clifford Chance LLP pp 285-286; D2 Legal Technology p 414; DeCaDe p 432; Professor Sheehan pp 476-477; Hugh James LLP p 571; Law Society p 709; Linklaters LLP p 762; Dr Crawford p 801; Stephan Smoktunowicz p 932. Of the 51 consultees who responded to consultation question 4 on rivalrousness, 30 agreed outright and 11 provided qualified agreement. Two consultees provided a mixed response, and eight disagreed outright. Of the two consultees who provided a mixed response, one asked for further clarification, and the other disagreed only with our application of the rivalrousness criterion (rather than disagreeing with the criterion itself). Of the eight consultees who disagreed, two disagreed principally with the role of rivalrousness as a gateway criterion, three gave no substantive reasons for disagreeing, and three gave other reasons: CLLS-FLC pp 508-509; Queen Mary Intellectual Property Research Institute p 871; and Professor Low p 689.

269

Clifford Chance LLP pp 285-286.

270

[2020] NZHC 728.

271

Linklaters LLP p 762. Ashurst LLP made a similar point at p 65 (para 2.9) of their response. We agree that it is appropriate for particular technological systems that manifest particular tokens to be treated differently, and not all systems will manifest things that are rivalrous. The Court of Appeal took great care to take a system-specific approach in Tulip Trading (see para 4.14(4)). The judgment dealt with the question of rivalrousness very succinctly (much more so than this report or our consultation paper). As such, while we consider that the issue is complex, it can be answered very simply in certain circumstances, by reference to specific technology.

272

Tulip Trading v Van der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [24], by Birss LJ.

273

[1965] 1 AC 65.

274

[2019] EWHC 3556 (Comm), [2023] 4 WLR at [55]-[61], by Bryan J.

275

Albeit, as we note above at para 4.11 and n 228, as persuasive, but not binding authority.

276

See S Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System (2008), available at: https://nakamotoinstitute.org/static/docs/bitcoin.pdf.

277

Professor Low pp 689-690; this point was expanded on in a subsequent article. See: P Watts and K Low, “The Case for Cryptoassets as Property” (2023) pp 5-6, available at: https://ssrn.com/abstract=4354364.

278

See our consultation paper from para 10.100.

279

A good example being the susceptibility over time of certain hash functions (for example, SHA-256) to bruteforce attacks.

280

Assuming the continued active participation in the network by participants, which might also be unlikely in such a scenario.

281

The Centre for Commercial Law at the University of Aberdeen (at p 247) also said that while they agreed with the concept of rivalrousness, they considered that our consultation paper implied that rivalrousness is not absolute. This report clarifies that we see rivalrousness as an absolute concept.

282

At para 10.101 of our consultation paper, we describe rivalrousness as “a quality that data objects can gain and lose over time”. This was intended to emphasise the binary nature of rivalrousness. At para 5.74 of our consultation paper we also said that rivalrousness “exists on a spectrum”. However, that is simply a reference to the fact that different things are used or consumed in different ways. The Queen Mary Intellectual Property Research Institute, Queen Mary University of London, made a good observation on this point. They said that the concept which our consultation paper described as rivalrousness existing “on a spectrum” is in fact better described as the economic concept of “congestibility”: one’s ability to enjoy the thing depends on the number of users. See Queen Mary Intellectual Property Research Institute p 871. We agree. See also R D Adams and K McCormick, “Private goods, club goods, and public goods as a continuum” (1987) 45(2) Review of Social Economy 192.

283

At paras 2.70-2.73.

284

See for example P Watts and K Low, “The Case for Cryptoassets as Property” (2023), available at: https://ssrn.com/abstract=4354364, which talks of legal rivalrousness, non-rivalrous control, rivalrous control, imperfect and rivalrous control, imperfect and non-rivalrous control and extra-legal control.

285

See our consultation paper at para 5.56.

286

UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) p 17, para 2.3.

287

These assets are defined as “controllable electronic records” and include, for example, certain types of virtual currency and NFTs: UCC Committee, Amendments to the Uniform Commercial Code (With Prefatory Note and Comments) (2023) p 1.

288

See our consultation paper at para 5.61.

289

A highly composable system provides components that can be selected and assembled in various combinations to satisfy specific user requirements. Many crypto-token systems and ancillary products combine different elements of technology to manipulate how control works within those systems.

290

In this way, the test of exclusivity of control indirectly determines whether the thing can be treated as rivalrous in nature. For example, if Alice’s assertion of exclusive control over a thing necessarily excludes Bob from any comparable degree of control, then we might say that the thing is rivalrous in nature. In this example, however, we would be using the practicality of asserting control over a thing, as opposed to directly considering the rivalrous nature of the thing itself.

291

See Illustration 5 of the UNIDROIT Principles which explains that password protected Word and Excel files fall within the definition of controllable “electronic record”: UNIDROIT Working Group, UNIDROIT Principles on Digital Assets and Private Law (2023) p 19, para 2.17.

292

See paras 6.38-6.41. See also para 6.30 where we note that physical storage media is rivalrous and said that a digital file would only satisfy our criterion of rivalrousness if the physical attributes of the storage medium on which it is recorded are considered, as opposed to the characteristics of the file itself. See also from para 4.84 below.

293

See also our discussion on congestibility in n 282 above.

294

Deloitte Legal (UK) made this point in their response at pp 448-449. However, we see some of the difficulties described in the Deloitte response as relating to control or excludability, and not the rivalrousness or otherwise of the object itself.

295

R D Adams and K McCormick, “Private goods, club goods, and public goods as a continuum” (1987) 45(2) Review of Social Economy 192, 198.

296

See our consultation paper at paras 10.27-10.28.

297

See n 241 above.

298

Tulip Trading v Van der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [16]-[24], by Birss LJ; S Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System (2008), available at: https://nakamotoinstitute.org/static/docs/bitcoin.pdf.

299

Importantly, each element of the technical layer of the Bitcoin system, and, by extension, its notional quantity unit, bitcoin, when considered in isolation, consists of data. See for example, Gigi, “Implications of Outlawing Bitcoin” (available at: https://dergigi.com/2021/08/02/implications-of-outlawing-bitcoin): “the basic building blocks of Bitcoin are: numbers, math, and the exchange of messages”, and “Every aspect of Bitcoin is text. The whitepaper is text. The software which is run by its nodes is text. The ledger is text. Transactions are text. Public and private keys are text.”

300

Although crypto-tokens might be scarce as a technical matter, achieving this technical scarcity is not difficult or rare. See Cobie, “Tokens in the attention economy” (2021), in which the author recognises that cryptotokens as an asset class are not scarce. The article goes on to contrast the technical scarcity of cryptotokens with the scarcity of crypto-tokens that achieve widespread (and continued) social use and recognition, available at: https://cobie.substack.com/p/tokens-in-the-attention-economy.

301

Tulip Trading v Van der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [24], by Birss LJ.

302

A hard fork (a split into more than one network) can result from the use of incompatible software by different network participants within a crypto-token system. A hard fork means that a blockchain continues following the path established by the current set of rules, but the fork gives rise to a bifurcated, second path following a new set of rules, as determined by the new software that is incompatible with the original. In contrast, a soft fork can result from the release of new software to the network that is compatible with prior versions so that the network as a whole continues to produce a single blockchain, albeit with participants running different versions of the protocol. See B Biais and others, “The blockchain folk theorem” (2018) Toulouse

School of Economics Working Paper No 17-817. SegWit is an example of a Bitcoin soft fork (see https://github.com/bitcoin/bips/blob/master/bip-0091.mediawiki and https://github.com/bitcoin/bips/blob/master/bip-0148.mediawiki) and Segwit2x is an example of an attempted Bitcoin hard fork that ultimately led to the creation of the distinct Bitcoin and Bitcoin Cash networks (each of which manifest different, rivalrous crypto-tokens).

303

At least for proof-of-work based consensus mechanisms.

304

Each crypto-token system is likely to have a significantly different combination of those elements.

305

See Tulip Trading v Van der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [26], where Birss LJ was careful to acknowledge the differences between different forks of the original Bitcoin network.

306

See, for example, Linklaters LLP pp 743-744 (para 1.2) and CLLS-FLC pp 505-508.

307

CLLS-FLC pp 507-508; The Association for Financial Markets in Europe and the Association of Global Custodians (“AFME and AGC”) pp 11-12.

308

ISDA pp 633-636 (para 2.1); Linklaters LLP pp 744-746 (para 1.3.1).

309

Meta pp 795-796; Professor Cutts p 969.

310

Our conclusions in this report, which provide a guide as to how the common law might develop in the future, should increase legal certainty. This is particularly so given the weight which historically attached to reports of the Law Commission on the state of the common law by the courts. In this regard see, for example, Patel v Mirza [2016] UKSC 42, [2017] AC 467, considering: Illegal Transactions: The Effect of Illegality on Contracts and Trusts (1999) Law Commission Consultation Paper No 154; The Illegality Defence: A Consultative Report (2009) Law Commission Consultation Paper No 189; The Illegality Defence (2010) Law Com No 320.

311

Colonial Bank v Whinney (1885) 30 Ch D 261 at 285, by Fry LJ.

312

CLLS-FLC pp 502-504, 514-518; Ashurst LLP p 79 (para 4.37); Professor Milne p 39; and Clifford Chance LLP p 285.

313

See our detailed analysis on this point at paras 14.19-14.43 of our consultation paper.

314

Linklaters LLP pp 746-747 (para 1.3.3) said: “There seems to be no reason why an arrangement supported by mere social consensus merits a greater recognition as [manifesting a third category thing] compared to an arrangement (which may also benefit from the same social consensus) that is supported by a legal arrangement.” See also our discussion on this point in para 10.103 of our consultation paper.

315

For further discussion of this point, see CLS-FLC p 508, UKJT, Legal Statement on Digital Securities paras 68 and n 264 above.

316

UCC Committee, Amendments to the Uniform Commercial Code (2023) art 12; UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) Principle 2, p 16.

317

UCC Committee, Amendments to the Uniform Commercial Code (With Prefatory Note and Comments) (2023) p 1; UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) Principle 2, p 16.

318

Uniform Law Commission, “Summary: Uniform Commercial Code Amendments” (2022) pp 2-3, available at: https://www.uniformlaws.org/committees/community-home/librarydocuments/viewdocument?DocumentKey=1f2381d0-d879-4137-93f5-36d7341b36d8;

UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) paras 6.16-6.17, p 41.

319

Including, specifically, feedback from the CLLS-FLC pp 507-508. See also Linklaters LLP pp 746-747 (para 1.3.3), Ashurst LLP p 72 (para 4.4), and Crypto Council for Innovation pp 399-400.

320

UKJT, Legal Statement on Digital Securities para 18.

321

The right to claim performance of the obligations recorded in the document is generally transferable, either by way of pledge or by means of delivery of the document itself. See M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) para 5.001. For more detail see Electronic Trade Documents (2022) Law Com No 405 ch 3. Similarly, art 3 Uniform Commercial Code reifies payment rights in certain paper “negotiable instruments”, providing that a person in possession of the paper has the right to enforce the payment right evidenced by that instrument: see § 3-301 of the Uniform Commercial Code. See also J Moringiello and C Odinet, “The Property Law of Tokens” (2022) 74 Florida Law Review 607.

322

In a bearer document, the obligation is owed to whoever is in possession of the document. To transfer a bearer document, the bearer simply delivers the document to another party. In an order document, the obligation is owed to a person named on the document. To transfer an order document, the person in possession of the document must indorse the document. M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) para 5-008. For a discussion on analogies between transfers of crypto-tokens and other types of transfer see chapter 12 of our consultation paper. See also Electronic Trade Documents (2022) Law Com No 405 paras 3.59-3.63.

323

See n 322 above.

324

R Goode and E McKendrick, Goode and McKendrick on Commercial Law (6th ed 2020) para 2.58. For more detail and discussion see paras 14.83-14.97 of our consultation paper.

325

UKJT, Legal Statement on Digital Securities Appendix 1 (p 44).

326

See from para 4.13 above.

327

“Stapling” refers “to a legal mechanism whereby the holder of a legal right or interest in an asset is identified by reference to a cryptoasset, or to another digital object of property or a ledger record that is not itself an object of property (in the case of registered or similar structures)”: UKJT, Statement on Digital Securities para 31. See also Chapter 8 (Collateral arrangements) para 8.12 and Chapter 14 of our consultation paper.

328

See from para 14.19 of our consultation paper.

329

UKJT, Legal Statement on Digital Securities paras 26-70.

330

CLLS-FLC p 504.

331

Ashurst LLP p 66 (n 2).

332

See, for example, Ashurst LLP p 68 (para 2.20), which describes some of the different combinations currently available to market participants.

333

See also our discussion of this point in Chapter 3 (Third thing), paras 3.52-3.53 and Chapter 5 (Control) paras 5.86-5.87.

334

In our consultation paper, we used the term “self-custody” but now refer to these practices as “self-holding”: see Chapter 7 (Intermediated holding arrangements) para 7.21.

335

Leaving the legal principles applicable to rights or claims enforceable by action to apply to those things that fall squarely within the category of things in action: Linklaters LLP pp 743-746 (paras 1.2-1.3.1).

336

See Chapter 9 of our consultation paper, referring to Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156 (which concerned European Union Allowances).

337

We note that some consultees, including Linklaters LLP and ISDA, made strong arguments that VCCs could be treated as “rivalrous” and so VCCs would fall within the proposed criteria in our consultation paper. See Linklaters LLP pp 744-746 (para 1.3.1) and ISDA pp 633-636 (para 2.1): “VCCs achieve ‘rivalrousness’, due to a complex myriad of factors. This includes the fact that there are a limited number of carbon reducing projects that meet the carbon standard rules and a limited number of independent entities capable of verifying compliance with the carbon standard rules. The systems through which VCCs are recorded and traded ensure the asset cannot be double spent, through multilateral contractual frameworks which place certain obligations on the registrar.”

338

ISDA, Legal Implications of Voluntary Carbon Credits (2021) p 13.

339

See, for example, above at pp 9-10.

340

See para 4.15 of our consultation paper and Chapter 3 (Third thing), para 3.39 of this report.

341

See ISDA pp 633-636 (para 2.1); Linklaters LLP p 743 (para 1.1); Deloitte Legal (UK) p 443; Professor Cutts pp 969-970; Dr Crawford p 803; and King’s College London pp 675-677.

342

ISDA pp 633-636 (para 2.1).

343

Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156.

344

As the court explicitly concluded above at [61].

345

Professor Cutts pp 968-969.

346

ISDA pp 633-636 (para 2.1). See also B Holligan, “Commodity or Propriety? Unauthorised Transfer of Intangible Entitlements in the EU Emissions Trading System” (2020) 83 Modern Law Review 979. The article considers in detail how property rules enable market activity through the creation of an “abstract carbon commodity”, describes how that “abstract carbon commodity” could benefit from technology specific considerations and considers the complex interrelationship between public and private law in carbon markets.

347

We analysed email accounts broadly, as opposed to mailboxes directly. We think that mailboxes themselves are more likely to satisfy our proposed criteria. See also the responses from Queen Mary University of London (Cloud Legal Project) pp 888-889 and Deloitte Legal (UK) pp 444-445 which discuss the legal analysis directly in relation to mailboxes.

348

See https://cobie.substack.com/p/wtf-is-web3.

349

We expect that the recording of provenance will become increasingly essential, particularly as large language models and other forms of machine learning become increasingly able to create, replicate and iterate content.

350

For example, in the context of machine learning, see Department for Science, Innovation & Technology, “A pro-innovation approach to AI regulation” (2023) CP 815.

351

We expect that this could be achieved by certain end-user licence agreement-based access rights being granted in respect of (or linked to) a distinct object of personal property rights, such as an NFT. For a more detailed discussion on this point and a practical example, see from para 7.61 of our consultation paper. See also Meta, pp 795-797.

352

DeCaDe pp 437-439.

353

Gunnercooke LLP p 560; Russell-Cooke LLP p 899.

354

Deloitte Legal (UK) pp 445-446.

355

Deloitte Legal (UK) pp 445-446; Meta pp 795-797; Professor Cutts pp 968-969; Russell-Cooke LLP pp 899; Queen Mary University of London (Cloud Legal Project) pp 892-893.

356

Professor Cutts p 968. We also adopt this reasoning. See from para 4.67 above in relation to various CEAs.

357

Professor Cutts pp 968-969; Deloitte Legal (UK) pp 446-447; Dr Crawford pp 802-803; Queen Mary University of London (Cloud Legal Project) pp 892-893; CLLS-FLC p 512.

358

We acknowledge this argument and that we made a similar argument in the context of centralised cryptotoken systems at para 10.103 of our consultation paper. We also discuss the argument in detail in Chapter 7 on in-game digital assets and Chapter 8 on domain names of our consultation paper. See also our discussion on our criterion of independent of persons and independent of the legal system at paras 4.224.26.

359

Twenty of 35 consultees agreed with our provisional conclusion that digital files did not satisfy our proposed criteria. Seven consultees disagreed, and eight expressed mixed views. However, 17 consultees said generally that digital files should not attract property rights, while 12 said that they should.

360

Queen Mary University of London (Cloud Legal Project) p 885.

361

We note, however, that the UNIDROIT Principles also say that “Principles law may have no material impact or utility for such assets”: UNIDROIT Working Group, UNIDROIT Principles on Digital Assets and Private Law (2023) p 19, para 2.17.

362

See, for example, Queen Mary University of London (Cloud Legal Project) pp 884-887. For arguments on how blockchain-system based digital media could be appropriate objects of personal property rights and the interaction of such digital objects with copyright, see J Durham, “Creating True Digital Ownership with the ‘First Sale’ Doctrine” (2023) 23 Wake Forest Journal of Business and Intellectual Property Law Journal 3.

363

We acknowledged this point at para 6.61 of our consultation paper.

364

For example, there is case law on the point that digital files are not appropriate objects of personal property rights, but those cases considered digital files constructed using technology available at the time. See, for example, Your Response v Datateam Business Media Ltd [2014] EWCA Civ 281, [2015] 1 QB 41.

365

For more on this debate, see the responses of Queen Mary University of London (Cloud Legal Project) at pp 884-887, and Dr Hayward at pp 106-108. See also J D Michels and C Millard, “The New Things: Property Rights in Digital Files” (2022) 81 Cambridge Law Journal 323, and in response: D K B Seng and K Low, “Data Objects: New Things or No-Thing More Than Ignis Fatuus” (2022), available at: https://ssrn.com/abstract=4308631. See also J Grimmelmann and C Mulligan, “Data Property” (2022), available at: https://ssrn.com/abstract=4251825, and J Fairfield, “Virtual property” (2005) 85 Boston University Law Review 1047.

366

K Gray, “Property in Thin Air” (1991) 50 Cambridge Law Journal 251, 294. See also our discussion on excludability in our consultation paper at paras 2.70-2.73 and in this report from para 4.33.

367

Sometimes, this concept is thought of or referred to as “holding” or “having” a third category thing.

368

A highly composable system provides components that can be selected and assembled in various combinations to satisfy specific user requirements. For example, many crypto-token systems and ancillary products combine different elements of technology to manipulate how control works within those systems.

369

This would need to include those with expertise in the crypto-token markets, and not just those with expertise in traditional finance markets or intermediated securities markets.

370

Of the 45 consultees who responded to consultation question 16, 23 agreed outright and 11 provided qualified agreement. Three consultees provided a mixed response, and eight disagreed. Of those that provided mixed responses or disagreed, four argued in favour of a concept involving possession: CILEX pp 276-277; LawFiDAO p 729; King’s College London pp 674-677; and COMBAR and the Chancery Bar Association pp 345-357 (paras 15.1-15.20). Conversely, three consultees disapproved of applying the concept of possession to third category things, but also disagreed with the formulation of control set out in our consultation paper: CLLS-FLC p 505; Professor Low p 691; and Professor Sheehan pp 477-480.

Of the 37 consultees who responded to consultation question 18, eighteen agreed outright and four provided qualified agreement. Seven consultees provided a mixed response, and eight disagreed. Those who gave mixed responses or disagreed did not necessarily disapprove of the concept of control, but instead considered that it should be introduced through statute, rather than common law development. See Centre for Commercial Law at the University of Aberdeen p 253; Stirling & Rose LLP p 962; Dr Hayward pp 109110; Eversheds Sutherland LLP p 496; Professor Tettenborn p 53; Deloitte Legal (UK) p 449; CLLS-FLC p 519; CILEX pp 276-277; LawFiDAO p 729; AFME and AGC pp 16-17; Lewis McAuley-Jones p 738.

371

We did not consult on this specific point but this point was raised by many consultees largely in their responses to consultation questions 16, 17, and 18. We consider the responses to these consultation questions in greater detail below.

372

UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) p 38 para 6.2.

373

Our consultation paper referred to “data objects”. We discuss this term in more detail in Chapter 3 (Third thing), from para 3.62.

374

We discuss the concept of “time” in Appendix 3 and 5 of our consultation paper in the context of Layer 2 implementations of crypto-tokens, and Appendix 4 in the context of our short-form, tentative description of a crypto-token. As we suggest, the concept of time might have to take on a level of nuance if it is accurately to apply to, for example, crypto-token systems which may use different methods of establishing a canonical and chronological order of transactional events or state-changes.

375

Including, if applicable, to effect a passing of, or transfer of, that control to another person, or a divestiture of control.

376

Of the 38 consultees who responded to consultation question 17, 17 agreed outright and 13 provided qualified agreement. Two consultees provided a mixed response, and six disagreed.

377

See, for example Deloitte Legal (UK) pp 448-449; ISDA p 636 (para 2.2.1); Hugh James LLP p 573; and Linklaters LLP pp 750-751 (para 1.5.4).

378

For a discussion on the differences between validator staking and non-validator staking, which are beyond the scope of this report, see: J Burnie and M Kimber, “What’s at stake? The legal treatment of staking” (2022) 37 Journal of International Banking and Financial Law 594, also available at: https://gunnercooke.com/whats-at-stake-the-legal-treatment-of-staking/.

Matthew Kimber is the lead lawyer on this project.

379

COMBAR and the Chancery Bar Association pp 345-357 (paras 15.1-15.20), and Linklaters LLP pp 747751 (para 1.5), made points to this effect.

380

Raised by Linklaters LLP pp 749-750 (para 1.5.2).

381

Raised by Deloitte Legal (UK) p 448.

382

See n 68 for our discussion on intangibility.

383

Stirling & Rose LLP p 949.

384

That is not to comment, however, on whether any current example will continue to hold any social or market value.

385

UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) principle 2, p 16; UCC Committee, Amendments to the Uniform Commercial Code (2023) art 12.

386

See our discussion in n 462 below, and Chapter 8 (Collateral arrangements) from para 8.90, regarding the partial definition of possession provided in the Financial Collateral Arrangements (No 2) Regulations 2003 (“FCARs”).

387

As we discuss at para 11.29 of our consultation paper, factual control plays an important role in the concept of possession. In brief, there are two elements to possession: sufficient control/custody and an intention to use that control/custody on one’s own behalf: see for example The Manchester Ship Canal Co Ltd v Vauxhall Motors Ltd [2019] UKSC 46, [2020] AC 1161 at [42] and [55], by Lord Briggs, approving The Manchester Ship Canal Co Ltd v Vauxhall Motors Ltd [2018] EWCA Civ 1100, [2019] WLR 330 Ch 331 at [59], by Lewison LJ.

388

Control over things in action is important for a variety of different legal concepts but does not work in the same way as control over tangible things. For example, control is important when identifying a charge as fixed or floating: “charges have to be characterised as one or the other against the background of a graduated scale of control, ranging from tight restriction to extreme freedom to deal”, M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) para 16.082.

389

But not be fettered or bound by.

390

UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) principle 6 (and associated guidance).

391

We discuss intermediated holding arrangements, including custodial intermediated holding arrangements in Chapter 7. Regulation is out of the scope of our report. However, we note that the regulatory aspects of custodial intermediated holding arrangements were considered by HM Treasury in their recent consultation and call for evidence paper: HM Treasury, “Future financial services regulatory regime for cryptoassets: Consultation and call for evidence” (2023) ch 8.

392

Which we discuss in Chapter 8 (Collateral arrangements) from para 8.104.

393

Although safeguarding would likely include some form of control. This seems to have been (at least provisionally) recognised by HM Treasury, in setting out its regulatory outcomes for a potential cryptoasset custody regime: “Custodians should ensure adequate arrangements to safeguard investors’ rights to their cryptoassets when it is responsible for them such that, if and when the custodian becomes insolvent, those assets are returned to investors promptly and as whole as possible”: HM Treasury, “Future financial services regulatory regime for cryptoassets: Consultation and call for evidence” (2023) p 50.

394

Chapter 8 (Collateral arrangements) para 8.114.

395

See Keynote Speech by John Glen, Economic Secretary to the Treasury, at the Innovate Finance Global Summit during Fintech Week 2022, available at: https://www.gov.uk/government/speeches/keynote-speech-by-john-glen-economic-secretary-to-the-treasury-at-the-innovate-finance-global-summit.

396

Electronic execution of documents (2019) Law Com No 386.

397

Industry Working Group, “Electronic Execution of Documents: Industry Working Group Interim Report” (2022), available at: https://www.gov.uk/government/publications/industry-working-group-on-esignatures-interim-report.

398

Industry Working Group “Electronic Execution of Documents: Industry Working Group Final Report” (2023), available at: https://www.gov.uk/government/publications/industry-working-group-on-esignatures-final-report.

399

[2019] EWHC 3556 (Comm), [2023] 4 WLR 35 at [57].

400

Of the 42 consultees who responded to our provisional conclusion (which suggested the establishment of a technical expert group), 31 agreed outright and four gave qualified agreement. One consultee gave a mixed response, and six disagreed.

401

Such as the UN Convention on the International Sale of Goods Advisory Council (Dr Hayward pp 110-111) and, in the tax avoidance context, the General Anti-Abuse Rule Advisory Panel (D2 Legal Technology pp 417-418 and The Law Society pp 713-714).

402

We think that the guidance of a technical expert group might also be helpful for the ongoing development of a nimble and proportionate regulatory regime.

403

Appendices 2 and 3 of the UKJT, “Public consultation: The status of cryptoassets, distributed ledger technology and smart contracts under English private law” (UKJT Consultation Paper) (2019) are reproduced in appendix 6 of our consultation paper, from p 510. See further our consultation paper, which discusses UTXO-based systems (paras 12.13-12.35), Account-based systems (paras 12.36-12.40), as well as both fungible and non-fungible token standards (paras 12.45-12.60).

404

Hash Time Locked Contracts (“HTLCs”) can be developed as a class of conditional transactions that require the recipient to acknowledge receipt by generating cryptographic proof prior to a stipulated deadline to receive the payment. A HTLC is a combination of two encumbrances that can be added to a transaction — a hashlock and a timelock. A hashlock is a type of encumbrance that restricts a transaction until a hashed version of a public key generated by the initiator of that transaction is unlocked with the associated private key. A timelock is a similar form of constraint that specifies the earliest time or block when that transaction can be added to the blockchain. Conditional payments of this nature are used for escrow-like arrangements in Layer 2 solutions such as the Lightning Network (https://lightning.network/lightning-network-paper.pdf#page=30) in which transactions are completed through a process known as network routing.

405

While we provide real-world examples for illustrative purposes, the technical expert group might decide to frame its analysis in general terms, as was done in the Appendices to the UKJT Consultation Paper.

406

For Layer 1, Bitcoin, and Ethereum, see Glossary. For Solana, see: https://solana.com/. For Avalanche, see: https://www.avax.network/.

407

For Hyperledger Fabric, see: https://www.hyperledger.org/use/fabric. For Corda, see: https://corda.net/.

408

A Antonopoulos and G Wood, Mastering Ethereum (2018) p 227.

409

Token standards are minimum, descriptive standards, and each token smart contract is likely to be implemented in different ways. The internal functioning of the smart contract is not relevant to the standard. The ERC-20 token standard is available at Ethereum, “EIP-20 Token Standard”: https://eips.ethereum.org/EIPS/eip-20. Well-known ERC-20 tokens include Chainlink (LINK), Tether (USDT) and Wrapped Bitcoin (WBTC). The Solana SPL token standard is available at: https://michaelhly.github.io/solana-py/spl/token/client/. The ERC-721 token standard is available at Ethereum, “EIP-721: Non-Fungible Token Standard”: https://eips.ethereum.org/EIPS/eip-721. Many (but not all) Ethereum-based “NFTs” use the ERC-721 standard for their implementation. The Tezos FA2 token standard is available at K Ivanov, “tz1p-12.md”: https://eips.ethereum.org/EIPS/eip-721, and can be used to implement both fungible and non-fungible tokens. Further information on the Tezos FA2 token standard is available at: https://wiki.tezos.com/build/create-a-tezos-token/fa2.

410

For Maker, see: https://makerdao.com/en/. For Aave, see: https://aave.com/.

411

For Uniswap, see: https://uniswap.org/. For Curve, see: https://curve.fi/#/ethereum/swap.

412

Note that we use the term lock and mint broadly, to describe in accessible and consistent language the technical encumbrances and corresponding creation of new tokens that characterise such facilities or arrangements. This is not a term of art within the crypto-token and cryptoasset markets, which generally use more precise and technical terms to refer to the specific features or functionality of the facilities or arrangements in question.

413

For Lido, see: https://lido.fi/. For Rocket Pool, see: https://rocketpool.net/. For the Wormhole bridge protocol, see: https://wormhole.com/. For wrapped bitcoin, see: https://wbtc.network/. For an example of an NFT fractionalisation program, see: https://fractional.art/.

414

For a brief overview of some of the distinctions, see J Burnie and M Kimber, “What’s at stake? The legal treatment of staking” (2022) 37 Journal of International Banking and Financial Law 594, also available at: https://gunnercooke.com/whats-at-stake-the-legal-treatment-of-staking/. Matthew Kimber is the lead lawyer on this project.

415

For Allnodes, see https://www.allnodes.com/. For Coinbase, see https://www.coinbase.com/earn. For P2P Validator, see: https://p2p.org/. See also: https://www.stakingrewards.com/providers/.

416

Generally, blockchain systems require four functions: execution, settlement, consensus, and data availability. Traditional blockchain systems implement all four functions together in a single base consensus layer. Conversely, modular blockchain systems split these functions among multiple separate layers. See Celestia, “Monolithic vs. modular blockchains” (2023), available at: https://docs.celestia.org/concepts/how-celestia-works/monolithic-vs-modular/.

417

For Optimism, see: https://www.optimism.io/. For Arbitrum, see: https://arbitrum.io/. For zkSync, see: https://zksync.io/. For the Lightning Network, see: https://lightning.network/. For Cosmos, see: https://cosmos.network/. For Celestia, see: https://celestia.org/.

418

For Metamask, see: https://metamask.io/. For Argent, see: https://www.argent.xyz/.

419

See https://ethereum.org/en/roadmap/account-abstraction/.

420

For Ledger, see https://www.ledger.com/. For Trezor, see https://trezor.io/. For Opendime, see: https://opendime.com/.

421

For Coinbase, see: https://www.coinbase.com/. For Binance, see https://www.binance.com/en. For Kraken, see https://www.kraken.com/en-gb.

422

For Copper, see: https://copper.co/. For Gnosis Safe, see: https://safe.global/.

423

See the order of Judge Pelling KC in Tai Mo Shan Limited v Oazo Apps Limited (2023) (unreported) in the context of the New York County Supreme Court case Tai Mo Shan Limited v. John Doe Nos. 1-100 (651017/2023), available at:

https://iapps.courts.state.ny.us/nyscef/DocumentList?docketId=PE6l_PLUS_YSqugbfDL9/PNYAxQ==&displ ay=all&courtType=New%20York%20County%20Supreme%20Court&resultsPageNum=1.

424

[2023] EWHC 1024 (Ch).

425

Or at least technology that is a much closer analogue.

426

Examples include Linklaters LLP pp 748-749 (para 1.5.1); COMBAR and the Chancery Bar Association pp 353-357 (paras 15.10-15.20); Norton Rose Fulbright LLP p 840; Dr Hayward pp 108-109; Eversheds Sutherland LLP p 496; and Gunnercooke LLP p 561; Charles Kerrigan and Susan Draper pp 265-266; IDAC and CryptoUK p 592; Professor Akseli pp 854-855; and Ilias Ioannou p 584. See, however, Professor Sheehan pp 477-480.

427

Linklaters LLP pp 748-749 (para 1.5.1).

428

CLLS-FLC pp 514-518; Stephan Smoktunowicz pp 935-936.

429

Or, more accurately, the legal consequences of factual control.

430

An example is CLLS-FLC pp 514-518.

431

See, for example, Gunnercooke LLP p 561; Linklaters LLP pp 748-749 (para 1.5.1); Clifford Chance LLP Industry Group p 330; COMBAR and the Chancery Bar Association pp 353-357 (paras 15.10-15.20); IDAC and CryptoUK pp 604 and 607; Charles Kerrigan and Susan Draper pp 265-266; and ISDA pp 633-636 and 637 (paras 2.1 and 2.2.2).

432

CLLS-FLC pp 517-518, and generally AFME and AGC. For further consideration of the distinction between permissionless and permissioned systems, see Professor Milne p 39.

433

This reflects the two broad categories into which arrangements involving crypto-tokens are generally divided: “CeFi” and “DeFi”. We discuss and define these in Chapter 8 (Collateral arrangements).

434

Above. For example, CLLS-FLC (at pp 514-518) illustrate their argument by reference to bank account mandates and many of their other examples reference private, permissioned blockchain systems or include broad references to “intangibles” without any specific reference to public, permissionless crypto-tokens or crypto-token systems.

435

Of the 33 consultees who responded to consultation question 24, 24 agreed. Two consultees disagreed, while seven provided a qualified or mixed response.

436

The term ownership is generally used to designate the best interest in an object that exists, and the ability to carve-out lesser interests from that (superior) interest. The person with the best interest in an object is accordingly described as the object’s owner. See for example J Penner, The Idea of Property in Law (1997) p 151; D Sheehan, The Principles of Personal Property Law (2nd ed 2017) p 6. However, this has been challenged in S Green and J Randall, The Tort of Conversion (2009) p 81: “In a system where title is relative, there is no room for the concept to which non-lawyers would refer as ‘ownership’”. We return to this discussion in para 5.74 below.

437

See from para 13.35 of our consultation paper, as well as the responses of Norton Rose Fulbright LLP pp 846-847, and Dr Maddox and Dr Richardson pp 833-834. See, more broadly, Dr Crawford p 805.

438

See para 13.35 of our consultation paper, as well as King’s College London pp 680-681 and Dr Maddox and Dr Richardson pp 833-834. See further Smart Legal Contracts (2021) Law Com No 563 paras 5.345.76.

439

See para 13.35 of our consultation paper, and Professor Sheehan, p 478. See also B Haecker, “Proprietary Restitution after Impaired Consent Transfers: A Generalised Power Model” (2009) 68 Cambridge Law Journal 324-360: “only few defects are serious enough to nullify the transferor’s intention altogether. They prevent title passing.” See also D Fox, Property Rights in Money (2008) paras 3.06-3.07.

440

Tulip Trading v Van Der Laan [2022] EWHC 667 (Ch) at [3], by Falk J.

441

Osbourne v Persons Unknown [2022] EWHC 1021 (Comm) at [26], by Judge Pelling QC which considered whether assets “stolen” by persons unknown could be held by the persons unknown on constructive trust for the victim.

442

Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156 at [287], by Stephen Morris QC. See, however, n 473 below.

443

See Chapter 9 (Remedies) para 9.22 and from 9.39.

444

Norton Rose Fulbright LLP pp 846-848; Linklaters LLP pp 748-749 (para 1.5.1); and COMBAR and the Chancery Bar Association p 377 (paras 34.1-34.4).

445

As we discuss in detail in Chapter 7 (Intermediated holding arrangements), the level of control obtained by a holding intermediary might also be different depending on the arrangement.

446

For more detail, see our discussion in Chapter 6 (Transfers), from para 6.5 and in our consultation paper at from para 13.141.

447

For more detail, see our discussion in Chapter 6 (Transfers), and at consultation question 26 and para 13.145 of our consultation paper.

448

Which, as we discuss in Chapter 13 of our consultation paper, itself would result in a change of control (although not necessarily a change of controller). Thirty-five consultees answered question 26. Seventeen consultees agreed although many also referred to a change of control; eleven disagreed. Seven consultees gave a qualified or mixed answer.

449

CLLS-FLC p 516; Linklaters LLP pp 749-750 (para 1.5.2); IDAC and CryptoUK pp 594-596; Dr Zhang p 650; COMBAR and the Chancery Bar Association pp 355-356 (para 15.17); Deloitte Legal (UK) p 451; Eversheds Sutherland LLP p 498; Gunnercooke LLP p 563; Norton Rose Fulbright LLP p 844; Professor Sheehan p 477. We discuss intention in more detail below.

450

The Manchester Ship Canal Co Ltd v Vauxhall Motors Ltd [2019] UKSC 46, [2020] AC 1161 at [42] and [55], by Lord Briggs, approving The Manchester Ship Canal Co Ltd v Vauxhall Motors Ltd [2018] EWCA Civ 1100, [2019] Ch 331 at [59], by Lewison LJ.

451

See our discussion in Chapter 11 of the consultation paper, and (on intention) from para 5.55 below.

452

CLLS-FLC p 516; Linklaters LLP pp 749-750 (para 1.5.2); IDAC and CryptoUK pp 594-596; Dr Zhang p 650; COMBAR and the Chancery Bar Association, pp 355-356 (para 15.17); Deloitte Legal (UK) p 451; Eversheds Sutherland LLP p 498; Gunnercooke LLP p 563; Norton Rose Fulbright LLP p 844; Professor Sheehan p 477. See also D Fox, Property Rights in Money (2008) ch 4, where the author discusses what effect the vitiation of a payer’s intention has on the validity of payments of corporeal money.

453

See Professors Fox and Gullifer in their joint response to our call for evidence, extracted at para 11.66 of our consultation paper.

454

See Linklaters LLP pp 749-750 (para 1.5.2 and their n 15), which we replicate here: “See, for example, Software Solutions Partners Ltd, R (on the application of) v HM Customs & Excise [2007] EWHC 971 (Admin), [2007] BTC 5699, in which the court considered whether an intention to create legal relations existed in the context of an automated electronic process of contracting between insurers and insurance brokers (on behalf of customers). On the basis that all the information necessary for contract formation was pre-programmed in the software according to the parameters laid down by the insurer, the court found that the insurer had invited the insurance broker to use the software as the medium for contract formation and undertook to be bound by the automatically generated policy contract, even if the insurer was temporarily unaware of it ([65] and [67]). More recently, the decision was supported and followed by the Singapore Court of Appeal in Quoine Pte Ltd v B2C2 Ltd [2020] SGCA(I) 02 [94]-[103], which involved a cryptocurrency trading platform.”

455

Linklaters LLP pp 749-750 (para 1.5.2).

456

Either in itself or as part of a higher-order organising framework or principle.

457

See Glossary.

458

Chapter 8 (Collateral arrangements), paras 8.114-8.126.

459

CLLS-FLC p 518.

460

We are grateful for the detailed and persuasive CLLS-FLC paper which contains the proposed changes to the FCARs and a detailed description of the concept of provision. The paper is available in our collated document of responses, and at: https://www.citysolicitors.org.uk/clls/consultations-responses-2/.

461

See also paras 11.119-11.123 in our consultation paper.

462

The FCARs include but do not define the concept of “control” and provide a partial definition for “possession” (from which courts have attempted to extract the meaning of “control”). What constitutes “possession or control” for the purposes of the FCARs is not entirely settled, and has been subject to criticism. We return to this in Chapter 8 (Collateral arrangements) where we discuss how control might work in the context of collateral arrangements in respect of crypto-tokens and cryptoassets.

463

Broadly, a social recovery wallet allows for a single “signing key” that can be used to approve transactions, with the added layer of “guardians”, of which a majority can cooperate to change the signing key of the account. See V Buterin, “Why we need wide adoption of social recovery wallets” (2021), available at: https://vitalik.ca/general/2021/01/11/recovery.html. Account abstraction allows users to enhance the security, accessibility and general flexibility of their user accounts by programming them with smart contracts. See Ethereum, “Account abstraction” (2023), available at: https://ethereum.org/en/roadmap/account-abstraction/.

464

Broadly, a flexible and responsive perfection requirement for qualifying non-possessory security interests that incorporates factual control as a core constitute element but is not defined exclusively by reference to factual control.

465

CLLS-FLC pp 514-518; Professor Low p 694; Professor Sheehan p 479.

466

Linklaters LLP pp 748-751 (para 1.5); Professor Tettenborn p 50; FMLC p 541 (para 4.4.1); Ilias Ioannou p 585; Law Society p 760.

467

Although these examples are crypto-token system specific, similar scenarios could also arise in relation to other digital objects or third category things.

468

D Fox, “Relativity of title at law and in equity” (2006) 65(2) Cambridge Law Journal 330, 333-334.

469

Above, 365.

470

See M Bridge, L Gullifer, K Low, and G McMeel, The Law of Personal Property (3rd ed 2021) para 15.127.

471

33 consultees responded to consultation question 24. Of these, 24 agreed outright. Seven consultees provided qualified agreement or a mixed answer, and two respondents disagreed.

472

Deloitte Legal (UK) pp 448-449; ISDA p 636 (para 2.2.1); Hugh James LLP p 573; Linklaters LLP pp 748749 (paras 1.5.1-1.5.4); IDAC and CryptoUK pp 594-596; Stirling & Rose LLP p 958; Joshua Tjeransen p 662; DeCaDe p 434; Clifford Chance LLP p 295; and Clifford Chance LLP Industry Group p 330 (para 4.14.2).

473

Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156. The court in Armstrong held that the fraudsters in question were capable of being constructive trustees of EUAs (being an intangible thing to which personal property rights can relate). The EUAs were said to be capable of being held on constructive trust for the claimant on the basis that the fraudster’s ministerial control over the EUAs after the taking of the EUAs gave it “some form of de facto legal title”. We note however that some consultees, including the CLLS, consider that Armstrong was wrongly decided, notwithstanding that it has received positive judicial treatment, specifically in the context of crypto-tokens: LMN v Bitflyer Holdings Inc [2022] EWHC 2954 (Comm) at [19], by Butcher J; HDR Global Trading Ltd v Shulev [2022] EWHC 1685 (Comm) at [113], by Henshaw J; AA v Persons Unknown [2019] EWHC 3556 (Comm), [2020] 4 WLR 35 at [58], by Bryan J. See also Goff & Jones: The Law of Unjust Enrichment (9th ed 2016) para 8-67 onwards, and L Chambers and C Buckingham, “Intangible Property and Proprietary Restitution in the High Court” [2013] Lloyd’s Maritime and Commercial Law Quarterly 296, 302 in the context of Armstrong and constructive trust.

474

See also, Tulip Trading v Van Der Laan [2022] EWHC 667 (Ch), in which Falk J at [3] refers to “digital currency assets that TTL claims to own but is currently unable to control or use”. Although this does not strictly support a relativity of title analysis, it does support the view that a superior legal title can potentially persist in relation to third category things even when control is obtained by another person (and lost by the superior legal title holder).

475

We expect that this type of claim/claimant is most likely to arise where control of a digital object has been transferred by one or more controllers against the wishes of one or more other controllers.

476

Indeed, CLLS-FLC said at p 516: “Where the distributed ledger or structured record recording a digital [object] is not constituted as the primary record of entitlement to the digital [object], the best evidence of legal title to the asset is determined by reference to the person who (in accordance with the rules and protocols of the blockchain or DLT-based system) can in fact exercise (as against the other participants in the system and other third parties) the incidents of ownership e.g. the power of disposal and the privileges, benefits or rewards attached to or arising from the relevant digital [object]. This is the person who has factual control of the private key associated with the public address under which the relevant asset is recorded.”

477

UCC Committee, Amendments to the Uniform Commercial Code (2023) art 12; UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) principle 16, p 68.

478

In the sense that Professor Fox describes title in the extract at paras 5.77, 5.79 above.

479

For more detailed discussion on this point, see Chapter 7 (Intermediated holding arrangements), para 7.21.

480

Most commonly, the association of the crypto-token with the receiving public key address.

481

For a detailed discussion of control, see chapter 11 of our consultation paper.

482

If the law of England and Wales is adequately and sensitively to consider issues relating to decentralised finance (DeFi) systems, and more complex crypto-token systems, including Layer 2 applications, then it is important to recognise this reality as soon as possible.

483

For example: (1) UCC Committee, Amendments to the Uniform Commercial Code (2023) art 12; UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) principle 2(1), p 16; and (3) the Liechtenstein Token and Trusted Technology Service Provider Act 2019-301.

484

Principally those set out in the Limitation Act 1980.

485

D Fox, “Relativity of title at law and in equity” (2006) 65(2) Cambridge Law Journal 330, 338.

486

The UNIDROIT Principles recognise this problem at para 7.1, with explicit reference made to relativity of proprietary interests: “Principle 7(1)(a) makes it clear (although it would be implicit in any event) that a person asserting that it has control of a digital asset establishes a presumption that it has the specified abilities. It need not prove the negative—that no one else has the abilities—in order to prove that it has control. ... Of course, a person who was previously (rightfully) had control may demonstrate under applicable domestic law that it has a better proprietary interest than the person who currently has control by proving that the change of control was wrongful”: UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) p 42 para 7.1.

487

D Fox, “Relativity of title at law and in equity” (2006) 65(2) Cambridge Law Journal 330, 339.

488

However, as we discuss in Chapter 7 (Intermediated holding arrangements), current intermediated holding structures will generally follow either a full title transfer model or a trust-based model. In either circumstance, a holding intermediary would also obtain superior legal title to the digital objects held. See also the arguments made in a summons filed by Tai Mo Shan Ltd against unknown defendants in the US Tai Mo Shan Limited v John Doe Nos 1-100 litigation (Case Number 651017/2023), available at: https://iapps.courts.state.ny.us/nyscef/ViewDocument?docIndex=0fXwxvv5v163bEmNzYobww==. In this case, the Wormhole Protocol brought the claim against the unknown defendants notwithstanding the hack was in respect of user assets (albeit after a purported assignment of user claims). As we discuss at para 5.33 above, this case involved related English High Court proceedings.

489

See para 6.44(3) where we note that providers of software-as-a-service in non-holding relationships might manipulate factual control in different ways.

490

See, for example, our discussion on certain of these issues in our advice to government on smart legal contracts: Smart Legal Contracts (2021) Law Com No 563, paras 3.63-3.75.

491

On this point, the UNIDROIT Principles say: “As a practical matter, there is little chance that another person would appear in a contested proceeding to claim that it has the relevant exclusive [control] abilities without the putative control person’s consent. Under the criteria, that other person also would not have control. Any concern about such a person (e.g. hacker, thief, or finder) appearing to make such a claim seems unwarranted. Moreover, experience has shown that in situations in which the relevant abilities have been obtained wrongfully the abilities have quickly been exercised and the assets have been removed from the control of the original control person. This reflects a set of risks that are inherent in digital assets”: UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) p 42 para 7.2.

492

Professor Fox suggests that “The distinction between competing titles and priority rules is a loose one, but, for the most part, it is not important to try to draw it sharply. For once the differences in terminology are stripped away, it will be seen that disputes over competing titles necessarily depend on rules of priority”: D Fox, “Relativity of title at law and in equity” (2006) 65(2) Cambridge Law Journal 330, 337.

493

See Professor Donald Harris’ 1961 essay, in which he identified nine factors which the courts have considered in the context of identifying possession: D R Harris, “The Concept of Possession in English Law” in A G Guest (ed), Oxford Essays in Jurisprudence (1961) p 70. The nine factors are set out in M Bridge, L Gullifer, K Low, and G McMeel, The Law of Personal Property (3rd ed 2021) para 11.009.

494

See discussion from para 5.74 above.

495

We note that CLLS-FLC response suggested that drastic change could potentially undermine the attractiveness of the law of England and Wales (pp 503, 505), although other consultees made the same point in favour of such change.

496

IDAC and Crypto UK pp 593-594; ISDA pp 636-638; Linklaters LLP pp 747-751 para (1.5); Gunnercooke LLP p 561.

497

For example, in February 2023 Oasis, a platform for decentralized finance, received an order from the High Court of England and Wales “to take all necessary steps that would result in the retrieval of certain assets involved with the wallet address associated with the Wormhole Exploit”, a major exploit that occurred in February 2022: https://blog.oasis.app/statement-regarding-the-transactions-from-the-oasis-multisig-on-21st-feb-2023/. In considering whether to grant the order, the High Court heard evidence on the potential availability of, among other things, causes of action under New York law in replevin and conversion. Of course, that is not to say that the High Court of England and Wales would entertain such causes of actions under the law of England and Wales. See a summons filed by Tai Mo Shan Ltd against unknown defendants in the Tai Mo Shan Limited v John Doe Nos 1-100 litigation (Case Number 651017/2023), available at: https://iapps.courts.state.ny.us/nyscef/DocumentList?docketId=PE6l_PLUS_YSqugbfDL9/PNYAxQ==&displ ay=all&courtType=New%20York%20County%20Supreme%20Court&resultsPageNum=1.

498

We discuss offchain transfers at para 6.39 below.

499

For a more detailed description of the complex processes that involve a “transfer” see LeXpunK Response to HM Treasury, “Future financial services regulatory regime for cryptoassets: Consultation and call for evidence” (2023) paras 19-25, available at:

https://drive.google.com/file/d/1RmlkWsGiOODeXxmZVFcyeHJdMjIy72oy/view.

500

See also Chapter 12 of our consultation paper for more detail.

501

See chapter 12 of our consultation paper for more detail. We discuss in detail in chapter 11 of our consultation paper and Chapter 5 (Control) of this report why we think it is appropriate for the law of England and Wales to develop jurisprudence concerning a concept of control that can be applied to third category things, including crypto-tokens.

502

Although not necessarily a change of controller/controlling person.

503

That is, the source that is accepted by network participants as authoritative in accordance with the consensus mechanism specified by the protocol rules of the system.

504

Ethereum, “Ethereum Whitepaper” (2023), available at: https://ethereum.org/en/whitepaper/#ethereum-state-transition-function.

505

Above.

506

See, in particular, consultation paper chapters 12 and 13, paras 12.63-12.66.

507

Unconfirmed transactions are stored by nodes (system participants) in a memory list called a memory pool or transaction pool. Nodes use this pool to keep track of transactions that are known to the network but are not yet included in the distributed ledger or structured record. A number of variables, such as the fee included in the transaction data structure, affect when the transaction will be included in the distributed ledger or structured record. See A Antonopoulos, Mastering Bitcoin (2nd ed 2018) ch 8.

508

Within some crypto-token systems, transactions effected by entries on the distributed ledger or structured record are not described as achieving “empirical finality”. Instead, they are referred to as becoming “probabilistically irreversible”. This is because it might be theoretically or mathematically possible to modify or reverse a transaction retroactively. For some systems, this is only possible temporarily (based on our current technology), because the probability of a transaction being reversible decreases as more blocks are added on top of the block containing the transaction. See L Gullifer and R Hay, "How final is final? Settlement finality, blockchains and DLT" (2020) 1 Journal of International Banking and Financial Law 8, 8. Note, however, that this article refers largely to proof of work-based systems and that proof of stake-based systems do achieve finality in a different way based on validator consensus.

509

See para 13.7 of our consultation paper. Most consultees agreed. Some agreed explicitly, such as Eversheds Sutherland LLP p 497. Some agreed impliedly (such as those consultees who argued for a relativity of title analysis): FMLC p 545; IDAC and CryptoUK p 592. Other consultees gave qualified or nuanced agreement: Clifford Chance LLP p 299; Professor Sheehan p 478; Simon Deane-Johns p 914. AFME and AGC disagreed at p 5 (and 19): “An entry on the ledger should represent definitive direct rights against issuers”.

510

Note that the original quote refers to “transactions”, and not “factual states”. However, we think the better description is to refer to factual states and state changes, given our conclusion that state changes do not necessarily constitute legal “transactions”.

511

D Fox, “Cryptocurrencies in the Common Law of Property” in D Fox and S Green, Cryptocurrencies in Public and Private Law (2019) para 6.49; consultation paper para 13.8.

512

For more detail on this point, see Chapter 10 and Appendices 3 and 6 of our consultation paper.

513

See UKJT, Legal Statement on Digital Securities para 33. Of course, a blockchain, distributed ledger or structured record does form part of a crypto-token system and, in itself, is in many ways like a database. We note that the point the UKJT was emphasising when it used this language was specifically limited to recordkeeping functionality of crypto-token systems.

514

See para 4.18 and associated footnote for more detail on this point.

515

Although the record itself is of course an integral constituent part of the functionality of the system. The system should be understood as a state transition system which implements a series of states, inputs, transition functions between states based upon inputs, and outputs. The software systems maintain a consensus-based state and transition to a new canonical state according to the system software, typically through the form of cryptographically authenticated transactions. See PG Hunn, “Only Binary? Atoms and Bits as Objects of Property” (2023), available at: https://papers.ssrn.com/abstract=4419662.

516

See para 12.67 of our consultation paper.

517

Consultees were largely critical of the language used in this observation and its potential legal consequences, and we discuss it in detail from para 6.21 below.

518

Although not necessarily a change of controller/controlling person.

519

For example, Linklaters LLP pp 751-752 (para 1.6); CLLS-FLC pp 520-521; Stephan Smoktunowicz p 936; and Gunnercooke LLP p 562.

520

See Norton Rose Fulbright LLP pp 842-843; Professor Low p 693; Ashurst LLP p 77 (para 4.33); COMBAR and the Chancery Bar Association pp 359-360 (paras 21.1-21.3); IDAC and CryptoUK pp 594-596; and Clifford Chance LLP p 286 (and also pp 296-297), the latter responding that it is “unhelpful to place emphasis on the technical modalities of transfer and the change of state that is effected when a crypto-token is transferred ... the feature of state change may be considered an indicator of a data object but should not affect its legal characterisation beyond that.”

521

That a third category thing must be composed of data represented in an electronic medium, including in the form of computer code, electronic, digital or analogue signals.

522

Linklaters LLP p 746 (para 1.3.2); Clifford Chance LLP p 282; Professor Cutts pp 967-968. See further from para 4.6.

523

See below from para 6.21 below for more discussion on this point.

524

See our consultation paper at para 5.18, and also 10.29: “as a consequence of having both form and function, a crypto-token does not exist solely as a technical construct or as pure data. While its form relies on its technical instantiation as a data structure, its function is derived not merely from the abstract existence of the technical system in which it persists, but fundamentally by the active operation of that system by a network of users. A crypto-token is consequently an object that has both, and is a composite of, technical and social dimensions — crypto-tokens exist as instantiations in socio-technical systems.” See also chapter 3 of our consultation paper.

525

See para 4.18 on this point.

526

Tulip Trading v Van der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [72], by Birss LJ.

527

Consultation paper at para 12.10.

528

Linklaters LLP pp 751-752 (para 1.6); CLLS-FLC pp 520-521; Stephan Smoktunowicz p 936; and Gunnercooke LLP p 562.

529

Norton Rose Fulbright LLP pp 842-843; Professor Low p 693; Clifford Chance LLP pp 286, 296-297; Ashurst LLP p 77 (para 4.33); COMBAR and the Chancery Bar Association pp 359-360 (para 21.1-21.3); and IDAC and CryptoUK at pp 594-596.

530

That is, they agreed with our descriptions in our consultation paper as to how transfers typically operate.

531

See, for example, Norton Rose Fulbright LLP pp 842-843; Professor Low p 693; Clifford Chance LLP pp 296-297; and Ashurst LLP p 77 (para 4.33).

532

See consultation question 20.

533

Simply put, this is the concern that a digital asset may be transferred from Alice to Bob, yet retained by Alice, who can then also transfer it to Caroline. It is a feature of assets that are not divested on transfer. For example, information can be “double-spent”. Alice can tell Bob a joke, and then subsequently tell Caroline the same joke. In contrast, tangible objects cannot be “double-spent”. If Alice gives Bob an apple, Alice cannot then subsequently give the same apple to Caroline. Double-spending would be particularly problematic in a digital payment context. Consider a digital asset that is used as a means of payment. If Alice can pay a digital asset (such as a unit of a digital currency) to Bob, but then also pay the same digital asset to Caroline, her capacity to double-spend the digital asset will undermine trust in the payment system.

534

See UKJT, Legal Statement para 45 and Linklaters LLP pp 751-752 (para 1.6).

535

A Delgado and A Kulasinghe, “Response to the Law Commission’s Call for Evidence on Digital Assets” in Law Commission, Digital assets: Responses to the call for evidence (2021) pp 291-300, specifically pp 293-294, available at: https://s3-eu-west-2.amazonaws.com/lawcom-prod-storage-

11jsxou24uy7q/uploads/2022/10/Digital-assets-call-for-evidence-responses.pdf; consultation paper paras 12.24-12.29.

536

Ashurst LLP p 78 (para 4.35(c)).

537

See Chapter 12 of our consultation paper. See also the response of Professor Low at p 693: “Cryptoassets not only need not be conceived of as claims against particular persons, they cannot be so conceived. Accordingly, it is unnecessary for the law to conceive of distinct ledger entries as distinct assets. Rather, it is entirely possible to conceptualise the right as one to maintain one’s control over particular abstract value within a distributed ledger. Since control is effectively transferred upon a cryptoasset transfer, the law can simply conceive of what has been transferred as the right of control, which is not distinct but one and the same. Doing so greatly simplifies the resolution of disputes because it is consistent with the expectations of the majority of lay participants.”

538

Linklaters LLP pp 751-752 (para 1.6).

539

See “Unspent transaction output (UTXO)” in our glossary, and Appendix 3 of our consultation paper.

540

COMBAR and the Chancery Bar Association pp 347-348 (paras 15.5.4-15.5.5).

541

COMBAR and the Chancery Bar Association p 348 (para 15.5.5). See also A Antonopoulos, Mastering Bitcoin (2nd ed 2018) ch 6.

542

COMBAR and the Chancery Bar Association pp 348-349 (para 15.5.7); HM Revenue & Customs, Cryptoassets Manual (2022), available at: https://www.gov.uk/hmrc-internal-manuals/cryptoassets-manual.

543

COMBAR and the Chancery Bar Association p 350 (para 15.5.9); HM Revenue & Customs, Cryptoassets Manual (2022), available at: https://www.gov.uk/hmrc-internal-manuals/cryptoassets-manual. This analysis is supported by the fact that certain crypto-token systems cap the supply (or potential future supply) of tokens in circulation and have specific mechanisms for the creation of new tokens regulated by their protocol rules. Only certain transactions create “new” tokens (a “coinbase” transaction in the Bitcoin system, for example). For more detail, see A Antonopoulos, Mastering Bitcoin (2nd ed 2018) ch 8. To describe a transfer as necessarily involving a creation of new crypto-tokens as a matter of law would therefore seem to conflict with the technical specifications of the relevant system as a matter of fact. See further S Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System (2008) p 4, available at: https://nakamotoinstitute.org/bitcoin/; Liquid, “Understanding Cryptocurrencies With Limited Supply” (2021), available at: https://blog.liquid.com/limited-cryptocurrency-supply.

544

See Glossary. See also paras 12.36-12.40 of our consultation paper and Appendix 2 of UKJT Consultation Paper (reproduced in Appendix 6 of our consultation paper, from p 510).

545

See, for example, the discussion in D Fox, “Cryptocurrencies in the Common Law of Property” in D Fox and S Green, Cryptocurrencies in Public and Private Law (2019) paras 6.81-6.96. However, also note that the Ordinals Protocol enables inscriptions on specific bitcoin satoshis (the smallest notional unit of account within the Bitcoin system). The Ordinals Protocol assigns each satoshi a sequential number. Once these satoshis are numbered and identified, individual satoshis can be inscribed with arbitrary content, creating unique Bitcoin-native digital artifacts that can be held in Bitcoin wallets and transferred using Bitcoin transactions. See https://docs.ordinals.com/.

546

In high-level terms, an automated market maker is a smart contract-based mechanism which mathematically defines the price of certain pairs of crypto-tokens and provides liquidity for those pairs of tokens (in “pools”). If a person wants to swap one crypto-token for another, they can make a trade directly with the automated market maker smart contract, using the relevant liquidity pool(s). The deposit of tokens into a liquidity pool as a liquidity provider — and the subsequent reacquisition of tokens — could however be a good example of where an “independent acquisition” analysis might be more appropriate, and therefore could also support the extinction/creation analysis.

547

COMBAR and the Chancery Bar Association pp 356-357 (para 15.19). Some DeFi arrangements rely upon the functionalities of crypto-token networks themselves to automate certain processes that replicate the substantive economic effect of collateralised loans, but the “collateral” might not always be locked or provided to segregated accounts.

548

Professor Cutts pp 971-972. In this respect, see also UKJT, Legal Statement para 52 n 39, commenting on Trustee of the Property of FC Jones & Sons v Jones [1996] EWCA Civ 1324. One explanation is that the acquisition of a token in a transaction is some form of independent acquisition: see our consultation paper, paras 13.14-13.15. Although we considered that mining or validator rewards could constitute an independent acquisition, we did not extend that reasoning to the output of transfers. See also n 546 above in the context of deposits of tokens into a liquidity pool as a liquidity provider.

549

We conclude that a special defence of good faith purchaser for value without notice applicable to cryptotokens can be recognised and developed by the courts through incremental development of the common law. Such a special defence might provide a legal method by which new, indefeasible title to a crypto-token can arise at law. See discussion on this point in D Fox, Property Rights in Money (2008) at paras 8.22-8.23.

550

Professor Cutts p 971. The courts have not always made this distinction clear. See, for example, FHR European Ventures LLP v Cedar Capital Partners LLC [2014] UKSC 45; [2015] AC 250 at [44], by Lord Neuberger.

551

Professor Cutts, p 972. See also Ashurst LLP p 88 (para 4.76): “By reason of the Law Commission’s approach to the transfer of crypto-tokens, the Law Commission also appears to view the options between following and tracing as binary in relation to the much wider category of data objects. We consider such a restrictive approach to be unnecessary. Both following and tracing are evidential processes. Both may be applicable. The applicability of one over the other is to be determined by the facts of a given case to determine the most appropriate analytical process.”

552

Norton Rose Fulbright LLP pp 841-3; Ashurst LLP pp 77-79 (para 4.35); and our consultation paper at paras 10.29 and 10.33.

553

See consultation paper question 26 and para 13.142.

554

See para 5.10. This description mirrors the definitions provided by UNIDROIT and the UCC: UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) principle 6, p 38; UCC Committee, Amendments to the Uniform Commercial Code (2023) art 12.105.

555

An example might include the physical transfer of control through the transfer of hardware, or a transfer on a Layer 2 system.

556

See, for example, CLLS-FLC pp 515-517, 520, 525; Linklaters LLP pp 749-750 (para 1.5.2); IDAC and CryptoUK pp 594-596; COMBAR and the Chancery Bar Association pp 353-357 (paras 15.10-15.20); Dr Zhang p 650; and Hin Liu, who in response to our consultation paper provided an early draft of “Transferring legal title to a digital asset” (2023) 5 Journal of International Banking and Financial Law 317. For a more detailed discussion of intention, see Chapter 5 (Control).

557

Albeit that it is possible that legal title from such a transfer could be susceptible to being defeated by a subsequent (and conflicting) onchain transfer in certain circumstances (see Linklaters LLP pp 748-749 (para 1.5.1).

558

See, for example, Hin Liu, who in response to our consultation paper provided an early draft of “Transferring legal title to a digital asset” (2023) 5 Journal of International Banking and Financial Law 317. See in particular pp 318 and 320.

559

See Linklaters LLP pp 748-749 (para 1.5.1).

560

Linklaters LLP pp 748-749 (para 1.5.1); IDAC and CryptoUK pp 594-596.

561

Deloitte Legal (UK) pp 448-449, ISDA p 636 (para 2.2.1), Hugh James LLP p 573, and Linklaters LLP pp 750-751 (para 1.5.4) raised points in this regard.

562

Linklaters LLP pp 748-749 (para 1.5.1).

563

Linklaters LLP pp 748-749 (para 1.5.1).

564

See OpenDime, available at: https://opendime.com/. Also of relevance is the simple passing of control over private keys, for example, revealing the private keys in a will on death - see Gunnercooke LLP p 562. See also HDR Global Trading Ltd v Shulev [2022] EWHC 1685 (Comm), where private keys were sent over email.

565

For example, the Lightning Network, available at: https://lightning.network/. See IDAC and CryptoUK pp 594-596. for detailed argument on this point. We note, however, that not all Layer 2 (or other scaling solutions) function in the same way, and each technology would have to be considered based on its own functionality.

566

COMBAR and the Chancery Bar Association p 356 (para 15.18).

567

J Burnie, M Millward and M Kimber, “What’s at stake? The legal treatment of staking” (2022) 37 Journal of International Banking and Financial Law 594, also available at: https://gunnercooke.com/whats-at-stake-the-legal-treatment-of-staking/.

Matthew Kimber is the lead lawyer on this project.

568

For software as a service, see Gunnercooke LLP p 561.

569

UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) principle 6, p 38.

570

UCC Committee, Amendments to the Uniform Commercial Code (2023) art 12.105.

571

COMBAR and the Chancery Bar Association p 357 (para 15.20).

572

Note that COMBAR and the Chancery Bar Association pp 345-357 (at paras 15.1-15.20) used the term “digital possession” and made a persuasive argument for the concept of possession applying directly to digital objects. However, for the reasons we discuss in this report, particularly in Chapter 4 (Third thing in practice), we think it is appropriate to distinguish possession and a concept of control and intention specific to digital objects.

573

In a pledge, the pledgor transfers various elements (but not all) of their property interest to the pledgee, including the right to possession: S Douglas, Liability for Wrongful Interference with Chattels (2011) p 37.

574

We discuss independent acquisition of rights in relation to digital objects at paras 13.14-13.16 of our consultation paper.

575

We discuss the arguments for and against this in detail from para 6.21 above.

576

D Fox, Property Rights in Money (2008) paras 1.101, 1.106 and 1.107.

577

Referencing W N Hohfeld, Fundamental Legal Conceptions (1964) ch 2 and W W Buckland, Textbook of Roman Law (3rd ed 1963) at p 204.

578

As we discuss in more detail from para 6.39 above, we now recognise based on feedback from consultees that a transfer of legal title to a crypto-token could be effected (i) onchain, through a transfer operation that effects a state change coupled with a change of control; or (ii) offchain, through a change of control.

579

A general principle of the law of England and Wales which is traditionally expressed in Latin as follows: nemo dat quod non habet. It is sometimes referred to as the “nemo dat” principle. The nemo dat principle is “the basic rule in relation to title in English law ... that no one can give what they do not have”. See M Bridge, L Gullifer, K Low, and G McMeel, The Law of Personal Property (3rd ed 2021) para 31.002.

580

D Fox, “Cryptocurrencies in the Common Law of Property” in D Fox and S Green, Cryptocurrencies in Public and Private Law (2019) para 6.48.

581

We discuss these exceptions and defences in more detail in our consultation paper from para 13.23.

582

D Fox, Property Rights in Money (2008) at 2.11 and D Fox, “Cryptocurrencies in the Common Law of Property” in D Fox and S Green, Cryptocurrencies in Public and Private Law (2019) para 6.59.

583

Miller v Race (1758) 1 Burr 452; Clarke v Shee (1774) 1 Cowp 197; Bills of Exchange Act 1882, s 29.

584

See M Bridge, L Gullifer, K Low, and G McMeel, The Law of Personal Property (3rd ed 2021) para 26.004 and onwards for more detail on the categories of “holder” and the types of possession required.

585

See consultation question 22 and paras 13.23-13.94.

586

For our discussion on the concept of fungibility, see from para 15.9 of our consultation paper.

587

UCC Committee, Amendments to the Uniform Commercial Code (2023) art 12.102(2).

588

UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) principle 8, p 43.

589

Consultation questions 22 to 24.

590

Of the 38 consultees who responded to this question, 21 agreed outright and eight provided qualified agreement. Four consultees provided a mixed response, and five disagreed.

591

Albeit that it is possible that the title from such a transfer could be susceptible to being defeated by a subsequent (and conflicting) onchain transfer in certain circumstances (see Linklaters LLP pp 748-749 (para 1.5.1).

592

Not all consultees agreed with this. See, for example, Professor Tettenborn, p 55. See further UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) principle 6, p 38.

593

As explained in Chapters 3 (Third thing) and 4 (Third thing in practice).

594

Nor do we suggest defining the contours of a third category of thing to which personal property rights can relate.

595

UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) principle 2, p 16; UCC Committee, Amendments to the Uniform Commercial Code (2023) art 12.

596

Consultation paper para 13.52.

597

See Linklaters LLP pp 752-757 (para 1.8). At pp 255-256, the Centre for Commercial Law at the University of Aberdeen considers the possibility that such a defence might exist at law, although does not make a conclusive argument either way. Compare with the response of Clifford Chance LLP, pp 297-299. At pp 401-402 the Crypto Council for Innovation highlight that crypto-tokens could be brought within the regime for negotiable instruments, because “the concepts which lie behind the law of negotiable instruments match closely the structural elements which a law of cryptoassets should achieve”. ISDA at p 613 (para 2.2.2) makes a similar point.

598

Consultation paper para 13.50.

599

Crypto Council for Innovation p 402.

600

This is in part because the first use-cases for crypto-tokens were, to a greater or lesser extent, as a means of exchange, a store of value or a unit of account. While some crypto-tokens are still primarily used for these purposes, crypto-tokens now have many different use-cases. In particular, they are no longer confined to “money” or “money-like” use-cases, and most jurisprudence and regulatory and legal commentary on cryptotokens treats them as objects of personal property rights, without answering the question as to whether they are or can be money.

601

Such as El Salvador: S Perez, C Ostroff, “El Salvador Becomes First Country to Adopt Bitcoin as National Currency” (September 2021): https://www.wsj.com/articles/bitcoin-comes-to-el-salvador-first-country-to-adopt-crypto-as-national-currency-11631005200.

602

Hansard (HL), 2 February 2023, vol 827, col 811; Bank of England, “The digital pound: A new form of money for households and businesses?” (2023).

603

See D Fox, Property Rights in Money (2008) para 2.09.

604

UCC Committee, Amendments to the Uniform Commercial Code (2023) art 12.

605

C Reyes, “Emerging Technology's Unfamiliarity with Commercial Law” (2023) p 9, available at: https://ssrn.com/abstract=4388919.

606

Bank of England banknotes are promissory notes within the meaning of s 83 of the Bills of Exchange Act 1882. They are legal tender under the Currency and Banknotes Act 1954 s 1(2). They are physical things which embody a thing in action: a promise by the issuer (the Bank of England) to pay the bearer in currency — albeit since sterling is no longer backed by physical assets such as gold, the obligation is merely to pay the bearer in its own notes. See C Proctor, Mann on the Legal Aspect of Money (2019) at paras 2.20-2.23.

607

Crypto Council for Innovation, p 402; Linklaters LLP pp 752-757 (para 1.8); Centre for Commercial Law at the University of Aberdeen pp 255-256; Clifford Chance LLP pp 297-299; D2 Legal Technology p 418; FMLC p 541; ISDA p 613 (para 2.2.2).

608

UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) pp 43-44 paras 8.1-8.2; UCC Committee, Amendments to the Uniform Commercial Code (With Prefatory Note and Comments) (2023) p 1. This is also consistent with the view we expressed in our consultation paper at para 13.56.

609

Bechuanaland Exploration Co v London Trading Bank Ltd [1898] 2 QB 658; Goodwin v Robarts (1875) LR 10 Ex 337.

610

J S Rogers, “Negotiability, property, and identity” (1990) 12(2) Cardozo Law Review 471, 508; see also Bullard v Bell (1817) 4 F Cas 624 at 627, by Story J.

611

UKJT, Legal Statement on Digital Securities paras 26-39 and Appendix 1 (p 44).

612

As we discuss above, we do not consider that tangibility is a barrier to recognition of digital objects as objects of personal property rights. Nor should tangibility alone be a barrier to development of an innocent acquisition rule applicable to digital objects. See also Linklaters LLP: “the historical association of negotiable instruments with things in action embedded in things in possession is merely a historical accident as opposed to a fundamental design feature” (at p 754-757 (para 1.8.3)). Linklaters LLP said that they do not “see any policy rationale for limiting negotiability status to tangible things” (at p753-754 (para 1.8.2).

613

Crypto-tokens are not rights in themselves and they exist independently of any rights or claims in that might also exist in relation to them. They can also be used and enjoyed independently of whether any rights or claims in relation to them are enforceable by action.

614

Bullard v Bell (1817) 4 F Cas 624 at 627 by Justice Story; J S Rogers, “Negotiability, property, and identity” (1990) 12(2) Cardozo Law Review 471, 508.

615

See Chapter 3 (A “third” category of thing to which personal property rights can relate).

616

We use that term in a limited sense to express the idea under the law of England and Wales that digital objects can benefit from a common law special defence of good faith purchaser for value without notice. However, as we discuss in this chapter, we think it is better to draw analogies with negotiable instruments rather than simply to treat digital objects as negotiable instruments.

617

Ethereum, "Ethereum Whitepaper" (2023), available at: https://ethereum.org/en/whitepaper/#ethereum-state-transition-function.

618

S Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System (2008) at pp 1 and 8, available at: https://nakamotoinstitute.org/static/docs/bitcoin.pdf.

619

Linklaters LLP also made this point explicitly in a detailed consideration of the evolution of the law merchant with respect to negotiable instruments, which we recommend reading in full at pp 754-757 (para 1.8.3) of their response.

620

For further, and alternative, arguments in this area, see A Tettenborn, “Transfer of chattels by non-owners: still an open problem” (2018) 77(1) Cambridge Law Journal 151.

621

See Goodwin v Robarts (1876) LR 10 Ex 337 at 352 (and in the House of Lords (1876) 1 App Cas 476), as well as Kennedy J in Bechuanaland Exploration Company v London Trading Bank [1898] 2 QB 658 and Bigham J in Edelstein v Schuler & Co [1902] 2 KB 144.

622

See broadly Linklaters LLP pp 752-757 (para 1.8).

623

Above.

624

And regardless of one’s views on the nature or purpose of those markets.

625

See also our discussion on crypto-tokens and cryptography at paras 10.40-10.43 of our consultation paper.

626

S Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System (2008), available at: https://nakamotoinstitute.org/static/docs/bitcoin.pdf.

627

G Wood, “Ethereum: A Secure Decentralized Generalised Transaction Ledger” (2014), available at: https://github.com/ethereum/yellowpaper/blob/master/BRANCHES.md.

628

The following data uses “onchain” data and so does not tell the full story when it comes to adoption and usage because (1) this data relates only to Layer 1 usage and does not account for any Layer 2 use; and (2) this data does not account for any offchain activity (although, of course, offchain activity is likely to involve intermediated holding arrangements/book-entry activity and therefore not bearer-like instruments so would not support the argument in favour of mercantile custom arising).

629

The Block, “On-chain Metrics: Bitcoin” (2023), available at: https://www.theblock.co/data/on-chain-metrics/bitcoin.

630

The Block, “On-chain Metrics: Ethereum” (2023), available at: https://www.theblock.co/data/on-chain-metrics/ethereum.

631

Above.

632

Image Clearing System enables digital images of cheques and credits to be exchanged between participant banks and building societies across the whole of the UK for clearing and settlement. See https://newseventsinsights.wearepay.uk/data-and-insights/payment-statistics-overview/. We note however that this statistic applies only to the UK image clearing system, whereas statistics for crypto-tokens are global.

633

Linklaters LLP p 753 (para 1.8.2).

634

[1971] 1 Lloyd’s Rep 439, 444.

635

While beyond the scope of this report, it is almost certain that the rate of technological change will accelerate significantly in the coming years, particularly given the development of artificial intelligence and large language models.

636

[1902] 2 KB 144 at 154-155 (footnotes omitted).

637

Goodwin v Robarts (1874-75) LR 10 Ex 337 at 346, by Cockburn CJ.

638

Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156.

639

See the case itself above, as well as commentary by authors such as KFK Low and J Lin, “Carbon Credits as EU Like It: Property, Immunity, TragiCO2medy?” (2015) 27(3) Journal of Environmental Law 377; M Bridge, L Gullifer, K Low, and G McMeel, The Law of Personal Property (3rd ed 2021) para 15-127; and N McBride, ‘mcbridesguides: Armstrong v Winnington Networks Ltd’ (2013), available at:

http://mcbridesguides.com/wp-content/uploads/2013/08/armstrong-v-winnington-networks-ltd.pdf.

640

Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156 at [61].

641

Above at [58].

642

In Armstrong, Stephen Morris QC (sitting as Deputy High Court Judge) (at [100]-[102]) placed express reliance on Lipkin Gorman v Karpnale Ltd [1991] 2 AC 548, a case which supported the availability of the defence to proprietary restitutionary claims. The thing in question in Lipkin Gorman was money. In principle, the common law special defence of good faith purchaser for value without notice should not have been available to clear the title to the EUAs of any previous legal interests, because EUAs are not money (and it is not clear from the judgment that the court considered them to be money). There are two potential ways in which the Armstrong approach might be justified. First, the court might have taken the common law special defence of good faith purchaser for value without notice as it operates in relation to money and/or negotiable instruments and either extended the application of such a defence or applied a new special defence by analogy, such that it was available for “intangible property” (at [58]). However, this was not made express in the judgment. Alternatively, the judgment could be read as acknowledging the existence of a separate and more limited good faith purchaser for value without notice principle which operates as a distinct defence to proprietary restitutionary claims.

643

Tulip Trading v Van der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [25], by Birss LJ. See above from para 6.21.

644

UKJT, Legal Statement paras 47 and 124.

645

But see footnotes 548 and 549 above where we discuss how it might.

646

UKJT, Legal Statement paras 1-2.

647

This is particularly the case with Account-based tokens and crypto-tokens based on “fungible” token standards, although it is arguably less likely with UTXO-based tokens and is not the case with NFTs. See D Fox, “Cryptocurrencies in the Common Law of Property” in D Fox and S Green, Cryptocurrencies in Public and Private Law (2019) para 6.76, where the point is made that: “the unique transactional history recorded in some crypto-coins, such as bitcoins, may mean that it can never be mixed in an absolute sense”.

648

Spence v Union Marine Insurance Co Ltd (1868) LR 3 CP 427.

649

Indian Oil Corp Ltd v Greenstone Shipping SA (Panama) [1988] QB 345.

650

Trustee of the Property of FC Jones v Jones [1997] Ch 159 at 168, by Millett LJ. However, some case law suggests that when money is withdrawn from a bank account, thus converting the thing in action (the bank account debt) into drawn money, a claimant might be able to trace at common law from the bank account into the drawn money (even where that drawn money was mixed with other money): Lipkin Gorman v Karpnale Ltd [1991] 2 AC 548. Agip (Africa) Ltd v Jackson [1990] Ch 265 at 286, by Millett J, upheld [1991] Ch 547 at 566, by Fox LJ; Snell’s Equity (34th ed 2019) para 30-053. Professor Smith has previously argued against mixing defeating tracing at common law: L Smith, The Law of Tracing (1997) pp 71, 162-174.

651

See D Fox, Property Rights in Money (2008) paras 4.05 and 7.16-7.24, referring to Westdeutsche v Landesbank Girozentrale v Islington London Borough Council [1994] 4 All ER 890 at 917, by Hobhouse J; Lipkin Gorman v Karpnale Ltd [1991] 2 AC 548 at 572, by Lord Goff; and First National Bank of Southern Africa v Perry No 2001 (3) SA 960 at 967, by Schutz JA.

652

As we note in our consultation paper, if tracing into a mixture were possible at law, the victim might still retain legal title to the crypto-tokens (or maybe entitlements to crypto-tokens) in the mixture, and might be able to bring a proprietary claim at law (although common law remedies to vindicate property rights are essentially limited to personal remedies). See G Virgo, The Principles of the Law of Restitution (3rd ed 2015) p 629. As the UKJT note, this also applies to money: “an original owner can, it appears, trace legal title to money through a straight substitution, not involving a mixture, against a transferee that is not a bona fide purchaser for value without notice (see Trustee of the Property of F C Jones & Sons (A Firm) v Jones [1997] Ch 159 (CA))”: UKJT, Legal Statement on Digital Securities para 52, n 39.

653

T Chan and K Low, “Post-Scam Crypto Recovery: Final Clarity or Deceptive Simplicity?” (2023), p 4, available at: https://ssrn.com/abstract=4394820. See also HDR Global Trading Ltd v Shulev [2022] EWHC 1685 (Comm) at [113], by Henshaw J, where the issue did not arise as there was no evidence of mixing: “The cryptoassets in the Account were transferred there directly or indirectly, without any evidence of any relevant mixing, from other Nexo corporate cryptocurrency accounts. Nexo therefore has title to the cryptoassets in the Account, alternatively (if necessary) can follow its title into those assets and recover them as owner (cf Trustee of the Property of FC Jones & Sons v Jones [1996] EWCA Civ 1324; Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10)”.

654

As in HDR Global Trading Ltd v Shulev [2022] EWHC 1685 (Comm) at [113], by Henshaw J, considered in the note above.

655

See paras 13.47-13.49 and 13.73-13.75 of our consultation paper. See also H Pugh, “Crypto fraud and the bona fide purchaser for value defence” (2023) 1 Journal of International Banking and Financial Law 5 at 6, referring to Ellis v Digit Europe Ltd (CL-2021- 000753) (unreported), in which the High Court “implicitly accepted that the equitable bona fide purchaser defence could apply to transferees of cryptocurrency”.

656

See also H Pugh, “Crypto fraud and the bona fide purchaser for value defence” (2023) 1 Journal of International Banking and Financial Law 5, 6.

657

This might occur where the defendant induces the victim to transfer a thing by making a fraudulent misrepresentation. In such a case, although the victim’s consent is defective, its presence at the point of transfer means that superior legal title passes, albeit subject to the victim’s mere equity. In general, a mere equity is a claimant's inchoate (imperfectly formed) right to rescind or to claim an equitable interest which is binding on specific object of property rights. That inchoate right will transform into an equitable proprietary claim (an equitable interest) if and when the person chooses to enforce it. In other words, the person must perform some other act to cause their mere equity to crystallise as an equitable interest. See Snell’s Equity (34th ed 2019) para 2.006. See also from para 9.39 below.

658

A wrench attack is where an attacker physically coerces a holder of crypto-tokens either to transfer those crypto-tokens or to give up control of those crypto-tokens (for example by giving over their private key). It is called a wrench attack because a wrench might be a suitable object with which physically to coerce someone (as immortalised by the famous XKCD comic, see https://xkcd.com/538/). Such attacks are also sometimes referred to as “rubber hose cryptanalysis”, where the chosen object is instead a rubber hose (see https://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis).

659

See further Chapter 9 (Causes of action and associated remedies).

660

We discuss this in more detail in our consultation paper at chapter 19 and in this report in Chapter 9 (Remedies).

661

See, for example, Crystal Blockchain, “Crypto & DeFi Hacks & Scams Report” (2021) p 7, available at: https://crystalblockchain.com/security-breaches-and-fraud-involving-crypto/. Hacks might, however, involve large quantities of tokens.

662

To the extent that the special defence does not already apply by analogy with the special defence in the context of money or negotiable instruments.

663

We also note that, to the extent that market participants operate on the basis of the analysis in the UKJT Legal Statement, this proposal actually represents an amelioration of the existing law — only in certain circumstances will a good faith purchaser for value without notice “take free” of existing (legal and equitable) interests, rather than on every transfer.

664

[2023] EWHC 1024 (Ch).

665

[2023] EWHC 1024 (Ch) at [26], by Trower J.

666

See D Fox, Property Rights in Money (2008) paras 8.39-8.42.

667

On this point, s 27 and s 29 of the Bills of Exchange Act 1882 codify the previous common law position applying to all kind of negotiable instruments, including banknotes, but the equivalent rule applying to money “must be inferred by analogy” with those sections, see D Fox, Property Rights in Money (2008) para 8.33. We say that crypto-tokens are neither money nor negotiable instruments, so whether only executory consideration suffices for the purposes of a common law special defence applicable to crypto-tokens would have to be inferred by analogy with the position for money and negotiable instruments. It is not possible to say that Piroozzadeh provides any authority or support for this, given the point was not raised or argued in that case.

668

Although likely not most fraudulent acquisitions, given that in most of those cases the fraudster will acquire good legal title.

669

D Fox, “Cryptocurrencies in the Common Law of Property” in D Fox and S Green, Cryptocurrencies in Public and Private Law (2019) para 6.100; H Pugh, “Crypto fraud and the bona fide purchaser for value defence” (2023) 1 Journal of International Banking and Financial Law 5, 7.

670

D Fox, “Cryptocurrencies in the Common Law of Property” in D Fox and S Green, Cryptocurrencies in Public and Private Law (2019) para 6.100. As Professor Fox sets out at n 143 (para 6.100), this distinction is a classic theme in the literature on commercial law: M Franklin, “Security of Acquisition and Transaction” (1931) 6 Tulane Law Review 589; L Ellis, “Transfer of Movables by a Non-Owner” (1980) 55 Tulane Law Review 145.

671

H Pugh, “Crypto fraud and the bona fide purchaser for value defence” (2023) 1 Journal of International Banking and Financial Law 5, 7.

672

UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) principle 8, pp 43-45; UCC Committee, Amendments to the Uniform Commercial Code (With Prefatory Note and Comments) (2023) p 245. See also Bills of Exchange Act 1882 s 29(1)(b).

673

See May v Chapman (1847) 16 M&W 355 at 361, per Parke B; Jones v Gordon (1877) 2 App Cas 616 at 635, per Lord Gordon; London Joint Stock Bank v Simmons [1892] AC 201 at 221, per Lord Herschell.

674

Indeed, some of the suggestions made by Pugh to modify the test of actual notice explicitly seek to reduce the privacy of individual parties, for example by treating transactions involving “privacy coins” or “mixers” differently to other transactions: H Pugh, “Crypto fraud and the bona fide purchaser for value defence” (2023) 1 Journal of International Banking and Financial Law 5, 7.

675

See OpenSea, “Why is my NFT marked for suspicious activity?” (2023), available at: https://opensea.io/. It is likely that the flagging system is wider than a system that flags only “legal title”.

676

In an Initial Exchange Offering of LEO Tokens disclosure document, iFinex (Bitfinex) wrote that the exchange continues to implement various strategies for recovery of funds stolen in 2016. Available at: https://www.bitfinex.com/wp-2019-05.pdf.

677

It has also been suggested by some market participants that “newly minted” bitcoin might attract a premium compared to older bitcoin, given its lack of a (potentially tainted) transaction history. However, we understand that this might no longer be true (if it ever was) in the market today. See P Sibenik, “Tainted Bitcoin Isn’t What You Think It Is” (2021), available at: https://cipherblade.com/blog/tainted-bitcoin-isnt-what-you-think-it-is/.

678

See also our discussion of Ordinals in n 545 above.

679

D Stoean and M Kimber, "Bind to law: Soulbound tokens and property law" (2022) 11 Journal of International Banking and Financial Law 744. Matthew Kimber is the lead lawyer on this project. Diana Stoean was a research assistant on this project.

680

UCC Committee, Amendments to the Uniform Commercial Code (2023) art 12-102(2); UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) principle 8, pp 43-45.

681

See also our consultation paper from para 13.84.

682

For further discussion of linking or stapling, see Chapter 8 (Collateral arrangements), para 8.12.

683

See UKJT, Legal Statement on Digital Securities paras 12-20, 22-27.

684

See UKJT, Legal Statement on Digital Securities para 33.

685

See, for example, the initial (now updated) Otherside terms and conditions relating to “Koda” NFTs which permitted the licensor to terminate a licence to intellectual property in certain circumstances (such as nonpayment of royalties), available at: https://twitter.com/punk6529/status/1520697348929822720?s=20.

686

D Fox, Property Rights in Money (2008) para 2.11. See also M Franklin, “Security of Acquisition and Transaction” (1931) 6 Tulane Law Review 589; G Gilmore, “The Commercial Doctrine of Good Faith Purchase” (1954) 63 Yale Law Review 1057; and L Ellis, “The Transfer of Moveables by a Non-Owner” (1980) 55 Tulane Law Review 145.

687

For a detailed consideration of autonomy within the crypto-token space, see R Grassman, V Bracamonte, M Davis and M Sato, “Attitudes to Cryptocurrencies: A Comparative Study Between Sweden and Japan” (2021) 15(1) The Review of Socionetwork Strategies 169.

688

See n 515.

689

For consultees who broadly considered that the security and sanctity of transactions involving third category things should be protected, see: AFME and AGC p 18; COMBAR and the Chancery Bar Association pp 360-361 (paras 22.1-22.3); Deloitte Legal (UK) p 450; FMLC pp 543-544; and Stephan Smoktunowicz p 937.

690

Electronic Money Association pp 487-488.

691

Assuming an efficient market. See D Fox, Property Rights in Money (2008) para 2.14.

692

D Fox, Property Rights in Money (2008) para 2.18.

693

An approach generally more favoured in civil law systems. See, for example, C Harding and M Rowell, “Protection of Property versus Protection of Commercial Transactions in French and English Law” (1977) 26 International and Commercial Law Quarterly 354.

694

D Fox, Property Rights in Money (2008) para 2.28; see also D Fox, “Constructive notice and knowing receipt: an economic analysis” (1998) 57(2) Cambridge Law Journal 391.

695

Valued at approximately $2 trillion according to IMF in October 2021: International Monetary Fund, “Global Financial Stability Report” (October 2021), available at:

https://www.imf.org/en/Publications/GFSR/Issues/2021/10/12/global-financial-stability-report-october-2021.

It is however well-known that such value fluctuates over time and that the above figure has reduced to approximately $1 trillion at the time of publication of this report. In addition, different people have different views of the value the market should attribute to different crypto-tokens and crypto-token systems.

696

UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023) p 44 para 8.4.

697

This is one of the standard model for holding intermediary exchanges in operation today, particularly in the retail sector. However, some holding intermediaries do offer, as a premium service and/or for institutional users, segregation of entitlements at individual, client-specific, network addresses.

698

Fungibility is not an absolute concept. Fungibility instead depends on what different parties are willing to accept as mutually interchangeable. For a more detailed discussion, see paras 15.9-15.17 of our consultation paper.

699

See M Yates and G Montague, The Law of Global Custody (4th ed 2013) para 3.24.

700

See, for example, COMBAR and the Chancery Bar Association pp 367-371 (paras 29.1-29.15).

701

That is, a “custodial arrangement” in which a “custodian” holds crypto-tokens on behalf of or for the account of other persons and has the capacity to exercise or to coordinate or direct the exercise of factual control in terms of both its positive and negative aspects: consultation paper paras 16.12, 16.15.

702

A recent example of the lack of consensus regarding the meaning of custody was provided by the Interim Report of the Examiner appointed by the US Bankruptcy Court of the Southern District of New York in Re Celsius Network LLP. Celsius, an intermediary, offered yield generation and collateralised lending services in connection with crypto-tokens deposited on its platform by users. Celsius filed for bankruptcy on 13 July 2022. In her commentary on the development of a custody product by Celsius earlier in 2022, the Examiner reported that “there was no ‘common understanding’ of the concept of custody between team members with a ‘finance background’ and those without”: Interim Report of Shoba Pillay, Examiner, In re Celsius Network LLC, et al. (Chapter 11 Case No. 22-10964) p 40.

703

We received 30 responses to consultation question 29. Twenty-one consultees agreed with our proposed criterion. Eight provided a mixed or qualified response and one disagreed.

704

See for example, the responses of: Professor Sheehan p 480; Deloitte Legal (UK) p 453; and Professor Milne p 45.

705

The Digital Pound Foundation referred specifically to CASS 6 of the FCA Handbook and Article 40 of The Financial Services and Markets Act 2000 (Regulated Activities) Order 2001 (the “RAO”). Similar comments were also made by Clifford Chance LLP, the Clifford Chance LLP Industry Group and IDAC and CryptoUK.

706

COMBAR and the Chancery Bar Association p 369 (para 29.7). COMBAR and the Chancery Bar Association referred only to trust relationships. In this chapter we consider arrangements where the user retains the ultimate (legal or beneficial) title to the assets held by the intermediary.

707

HM Treasury, “Future financial services regulatory regime for cryptoassets: Consultation and call for evidence” (2023) (the “2023 HM Treasury Cryptoasset Regulatory Consultation Paper”), para 8.2.

708

See, for comparison in the context of regulated financial services markets the FCA Handbook Client Asset Sourcebook (CASS), and CASS 6 (Custody rules), 6.2.1R, and CASS 3 (Collateral), 3.1.5G. In its recent consultation paper, the HM Treasury suggested that the existing custody provisions in the Client Assets Sourcebook (CASS) might be used as a basis to design bespoke custody requirements for cryptoassets. That consultation paper also sets out proposed design features for cryptoasset a custody regime: 2023 HM Treasury Cryptoasset Regulatory Consultation Paper, p 51-52 and in particular Table 8A and 8.A. See also Pearson, Lomas v RAB Market Cycles (Master) Fund Ltd [2009] EWHC 2545 (Ch), in which Briggs J (as he then was) used contractual references to “custody” and “custodian” in part to conclude that the relevant parties intended for assets held by an intermediary prime broker to continue to belong beneficially to its client: at [53].

709

We discuss this in more detail in Chapter 5 (Control).

710

This includes software and/or hardware devices used by holders of crypto-tokens to undertake self-holding, or self-custody more securely. For example, this might include the provider of a hardware wallet (for example, Ledger), an offline storage mechanism for private keys; or a software wallet service (for example, Metamask).

711

In our consultation paper, we used the term “self-custody”. See, for example, paras 10.68, 13.127, 16.16 and 16.44.

712

UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023), principle 10(2) and associated commentary at para 4. See also principle 12, and in relation to the appointment of subcustodians at principle 15.

713

In a custodial intermediated holding arrangement involving segregated assets held in their totality on trust for (or otherwise subject to the superior title of) a third-party beneficiary or superior title holder, a custodial holding intermediary’s general creditors will have no claim to those assets at all. However, where more complex structures are deployed, such as funds of commingled holdings held on behalf of a number of third parties and the intermediary itself, a portion of the value of such holdings representing the holding intermediary’s co-ownership entitlement can fall into the bankruptcy estate and be subject to claims of general creditors.

714

We consider the extension of bailment and/or development of an analogous concept based on control from para 7.97 below.

715

Primarily, but not necessarily exclusively. Depending on how a non-custodial intermediated holding arrangement is structured, the non-custodial holding intermediary might for example, also owe users fiduciary duties. In certain circumstances, a breach of these duties could entitle users to proprietary remedies. To a limited extent, these remedies could enable them to achieve a greater level of recovery in a non-custodial holding intermediary insolvency process than would be possible from unsecured contractual claims alone: see from para 7.123 below.

716

The definitions of the two sub-categories have also been revised to accommodate alternative or supplementary legal structures that could be used to structure intermediated holding arrangements beyond the two options of (1) contract-based outright title transfer/title retention and (2) trust, as described in our consultation paper. See from para 7.95 below.

717

For more detail see para 16.51 of our consultation paper.

718

We note that such arrangements can also be described as “outright transfer or full retention of title” arrangements, and we used this terminology in our consultation paper (see paras 16.42-16.49). In this context, “full retention of title” refers to circumstances in which a non-custodial holding intermediary retains for the account of a user full title to crypto-tokens or crypto-token entitlements that has been acquired other than by way of a transfer from such user (for example by way of a transfer from a third party, or as a protocol-generated reward or distribution for participating in mining or staking activities). We do not use the term “retention of title” elsewhere in this paper to avoid any confusion with arrangements whereby a user seeks to retain legal (or beneficial) title in their assets.

719

See Glossary.

720

Depending on the terms agreed and the circumstances of the relationships arising with users, non-custodial holding intermediaries may also be subject to additional private law obligations such as tort or fiduciary duties. Non-custodial holding intermediaries may also be subject to regulatory and/or other statutory obligations depending on the particular activities they undertake and the particular products involved.

721

Consultation paper paras 16.44-16.49.

722

The “three certainties” required to establish an effective trust under the general law are certainty of intention, subject matter and object and were first set out in Knight v Knight (1840) 49 ER 58. We discuss the “three certainties” in more detail below from para 7.43.

723

Although not normally characterised as custodial intermediated holdings, certain (centrally controlled) “lock and mint” facilities might potentially be subject to a trust analysis. This could include crypto-token bridges, wrapping protocols, collateralised lending arrangements, fractional ownership, and collateralised trackertoken issuance platforms: see discussion in our consultation paper at paras 16.29-16.40. Ongoing proceedings involving Oasis, a platform or decentralised finance, provide a useful example. These relate to a major exploit that occurred in February 2022, in which a hacker exploited a vulnerability in the Wormhole Protocol (a token bridge), enabling it to extract “locked” crypto assets: see Chapter 5 (Control), para 5.90 and n 497. In a judgment of 6 March 2023, the High Court did not consider the legal characterisation of token bridges under the law of England and Wales. However, it did hear evidence on the availability of potential causes of action under New York law. In relation to that question, arguments were made which at least appear to rely on an understanding of Wormhole Protocol as (partially) akin to a holding intermediary: Tai Mo Shan Limited v Oazo Apps Limited (6 March 2023, unreported, EWHC) Pelling J.

724

We consider such arrangements and mechanisms for “linking” or “stapling” in Chapter 8 (Collateral arrangements) from para 8.12.

725

Ruscoe v Cryptopia Limited (in liquidation) [2020] NZHC 728, [2020] 22 ITELR 925 (New Zealand); Quoine Pte Ltd v B2C2 Ltd [2020] SGCA(I) 02 (Singapore); Re GateCoin Ltd (In Liquidation) [2023] HKCFI 914 (Hong Kong).

726

Primarily in relation to the satisfaction of subject-matter certainty in connection with intangible assets held in omnibus accounts. We consider the two approaches endorsed by courts in this context below, and in our consultation paper from para 16.66. Recently, the High Court of Hong Kong, holding that cryptocurrencies are capable of forming the subject matter of a trust, made references to both approaches without concluding in favour of either one: Re GateCoin Ltd (In Liquidation) [2023] HKCFI 914 at [61]-[62], by Chan J.

727

We received 30 responses to consultation question 30. Twenty-six consultees agreed with our conclusions without reservation. Four consultees offered qualified support. No consultees disagreed.

728

However, we note that some consultees did consider that statutory clarification “may be helpful, but not essential”: King’s College London p 679; and/or would “undoubtedly assist” where case law expresses a range of views: Clifford Chance LLP p 305.

729

H Liu, L Gullifer and H Chong, “Client-intermediary relations in the crypto-asset world” (2020) University of Cambridge Faculty of Law Research Paper No 18/2021 p 4, reproduced in P Davies and C Tan, Intermediaries in Commercial Law (2022).

730

For a detailed discussion including of indicative case law see our consultation paper paras 16.57-16.63.

731

Pearson, Lomas v Lehman Brothers Finance SA [2010] EWHC 2914 (Ch) at [258], by Briggs J (as he then was).

732

See our consultation paper paras 16.62, 16.64. This remains the case even if the identity of beneficiaries is subject to constant change over time, or if account ledgers or registers are maintained on a pseudonymous basis or otherwise do not comprehensively identify all the persons holding beneficial entitlements: Ruscoe v Cryptopia Limited (in liquidation) [2020] NZHC 728, [2020] 22 ITELR 925 at [148]-[150], [157]; H Liu, L Gullifer and H Chong, “Client-intermediary relations in the crypto-asset world” (2020) University of Cambridge Faculty of Law Research Paper No 18/2021 p 4, reproduced in P Davies and C Tan, Intermediaries in Commercial Law (2022).

733

The characterisation of the interests of beneficiaries under such trusts was addressed as the second subpoint of consultation question 30. Twenty-six consultees agreed with our conclusion and four provided qualified support.

734

Westdeutsche Landesbank Girozentrale v Islington London Borough Council [1996] AC 669 at 705, by Lord Browne-Wilkinson.

735

This is due to the relevance of the “allocation principle”, or “the law’s insistence that proprietary rights cannot be acquired in fungibles forming an unidentified part of a bulk until they have been separated by some suitable act of appropriation”: R Goode, “Ownership and Obligation in Commercial Transactions” (1987) 103

Law Quarterly Review 433, 436. See also V Dixon, “The Legal Nature of Intermediated Securities: An Insurmountable Obstacle to Legal Certainty?” in L Gullifer, J Payne, Intermediation and Beyond (2019) p 64. This principle applies both to legal and equitable property claims, to absolute transfers and the grant of security interests: L Gullifer, Goode and Gullifer on Legal Problems of Credit and Security (7th ed 2022) para 6.19; M Yates, G Montague, The Law of Global Custody (4th ed 2013) para 3.27.

736

[1994] 1 WLR 452.

737

On this approach, the argument is that the complete interchangeability of these types of assets renders the allocation principle unnecessary and inapplicable to achieve subject matter certainty. We discuss the “intangible asset exception” in our consultation paper from para 16.72. Similar reasoning was applied by the New Zealand High Court in considering whether valid trusts could be granted over unallocated holdings of crypto-tokens: Ruscoe v Cryptopia Limited (in liquidation) [2020] NZHC 728, [2020] 22 ITELR 925 at [22], [137](b), [146].

738

We discuss the equitable co-ownership approach in detail in our consultation paper from para 16.69. Much of the academic commentary and judicial reasoning is in the context of holdings of intangible assets such as shares and other securities. We discussed the legal issues arising in relation to intermediated securities in particular in a previous scoping paper: Law Commission of England and Wales, Intermediated securities: who owns your shares? A Scoping Paper (2020).

739

For further explanation of and commentary on such arrangements see Chapter 8 (Collateral arrangements) para 8.12.

740

See n 727 above.

741

M Yates and G Montague, The Law of Global Custody (4th ed 2013) para 3.47; R Goode, “Are Intangible Assets Fungible?” 3 Lloyd’s Maritime and Commercial Law Quarterly 379; G Richardson, “Lehman Brothers: Traditional Trust Principles and 21st Century International Bank Failures” (2011) 17 Trusts and Trustees 226. G Cooper, “Virtual property as trust assets and investments” (2021) Journal of International Banking and Financial Law 751, 752.

742

Pearson, Lomas v Lehman Brothers Finance SA [2010] EWHC 2914 (Ch) at [231]-[232], by Briggs J (as he then was), citing with approval the analysis of Campbell J in White v Shortall [2006] NSWSC 1379 at [212].

743

Pearson, Lomas v Lehman Brothers Finance SA [2010] EWHC 2914 (Ch) at [258], by Briggs J (as he then was); see also our consultation paper at para 16.82.

744

Pearson, Lomas v RAB Market Cycles (Master) Fund Ltd [2009] EWHC 2545 (Ch) at [38], [60]-[64], by Briggs J (as he then was). Pearson, Lomas v Lehman Brothers Finance SA [2010] EWHC 2914 (Ch) at [293], by Briggs J (as he then was).

745

Pearson, Lomas v Lehman Brothers Finance SA [2010] EWHC 2914 (Ch) at [293], by Briggs J (as he then was).

746

COMBAR and the Chancery Bar Association paras 30.8-30.9.

747

Pearson, Lomas v Lehman Brothers Finance SA [2010] EWHC 2914 (Ch) at [258], by Briggs J (as he then was).

748

Pearson, Lomas v Lehman Brothers Finance SA [2010] EWHC 2914 (Ch) at [293], by Briggs J (as he then was).

749

Pearson, Lomas v RAB Market Cycles (Master) Fund Ltd [2009] EWHC 2545 (Ch) at [38], [52], [60]-[64], by Briggs J (as he then was). The terms of the trust could still provide for additional protections. For example, to the extent that the holding intermediary exercises a right of use over trust assets for the purposes of lending them to third parties, the contractual rights that the holding intermediary has against those third parties for the return of equivalent assets could be held on trust for the user as could any rights to collateral posted by those third parties. This is specifically referenced as a possibility in Pearson, Lomas v Lehman Brothers Finance SA [2010] EWHC 2914 (Ch) at [240]. See also L Gullifer, Goode and Gullifer on Legal Problems of Credit and Security (7th ed 2022) para 6.65. However, as RAB Market Cycles demonstrates, the absence of such protections does not necessarily preclude a finding of trust. But in practice, holding intermediaries may be unwilling to offer such protections. They may compromise the efficacy of close-out netting-based credit-risk safeguards in third party lending contracts, thereby severely limiting the extent to which holding intermediaries can realise and capture economic benefits from rehypothecating client assets.

750

Consultation paper para 16.107.

751

We received 32 responses to consultation question 31. Twenty-four consultees agreed, three provided qualified or mixed views and five disagreed.

752

Pearson, Lomas v Lehman Brothers Finance SA [2010] EWHC 2914 (Ch) at [225]. In the crypto-token context, see Wang v Darby [2021] EWHC 3054 (Comm) at [52]-[53]. M Yates, G Montague, The Law of Global Custody (4th ed 2013) para 3.48.

753

See, for example, Gunnercooke LLP p 565.

754

COMBAR and the Chancery Bar Association p 374 (para 31.1); FMLC p 549 (para 5.3); Electronic Money Association p 488.

755

The responses from consultees re-enforced our original observation that the operating models potentially affected by this proposal reached beyond conventional intermediated holding arrangements and might include more complex and developing arrangements such as certain (centrally controlled) “lock and mint” arrangements: see para 16.103 of our consultation paper. The proceedings in respect of a hack of the Wormhole Protocol provide a useful potential example, see n 497 above. Depending on how broadly it was applied, a presumption of trust could create uncertainty for platforms that may not typically be regarded as custodial intermediary holdings but may nevertheless be at risk of being characterised as such by application of the presumption.

756

UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023), principle 10(4) and associated commentary at p 35 paras 5-7. See also our analysis of an earlier draft of these principles in our consultation paper at para 16.101.

757

Joint response of AFME and AGC p 22 (para 20.45); Ashurst LLP p 80 (para 4.42); Professor Low p 696.

758

See, for example, 2023 HM Treasury Cryptoasset Regulatory Consultation Paper.

759

Some consultees noted that holding intermediaries wishing to avoid trust liabilities are likely to draft terms of use so as to rebut and/or exclude the application of a presumption of trust in any case: Clifford Chance LLP p 305 and FMLC p 549 (para 5.3).

760

UKJT, Legal Statement on Digital Securities paras 119-137.

761

The specific wording of the provision is: “a disposition of an equitable interest or trust subsisting at the time of the disposition, must be in writing signed by the person disposing of the same, or by his agent thereunto lawfully authorised in writing or by will”.

762

As stated above, equitable beneficial interests in crypto-tokens or crypto-token entitlements can be represented by book entries in the internal account ledgers of intermediaries or by tokens themselves (at para 7.52. A detailed assessment of the application of s 53(1)(c) LPA 1925 to a range of dealings in book entry crypto-token entitlements and equitable entitlements linked to or recorded by custodially held cryptotokens is set out at paras 17.24-17.25 of our consultation paper. Crypto-tokens can also be linked to equitable interests in (or incorporate equitable secured claims to) specified assets or funds comprised of real-world physical assets, such as physical gold bars, or things in action such as debt claims.

763

For analysis of alternative characterisations of transfers in equitable entitlements to intermediated securities that arguable would not constitute dispositions for the purposes of s 53(1)(c) LPA 1925 see M Bridge, L Gullifer, K Low, G McMeel, The Law of Personal Property (3rd ed 2021) para 27.050; J Benjamin, Interests in Securities (2000) para 3.39-3.40.

764

It has been argued that s 53(1)(c) LPA 1925 only applies to qualifying dispositions that are at risk of being exploited for fraudulent purposes against trustees but, not by trustees: see SL Claimants v Tesco plc [2019] EWHC 2858 (Ch) at [116], by Hildyard J, considering the approach of Lord Upjohn in Vandervell v Inland Revenue Commissioners [1967] 2 AC 291 at 311, and B McFarlane and C Mitchell, Hayton and Mitchell on the Law of Trusts & Equitable Remedies (14th ed 2015) paras 3.077-3.079. For consideration of alternative interpretations of the fraud prevention purpose underpinning s 53(1)(c) LPA 1925 see H Liu, "Transfers of equitable interests in the digital asset world" (2022) 5 Journal of International Banking and Financial Law 325.

765

This is because in general, the common law takes a pragmatic approach to the electronic execution of transactions. For detailed analysis of this point, see our prior work on electronic execution, smart legal contracts and intermediated securities: Electronic Execution (2019) Law Com No 386; Law Commission of England and Wales, Smart Legal Contracts - Advice to Government (2022); and Law Commission of England and Wales, Intermediated securities: who owns your shares? A Scoping Paper (2020).

766

We acknowledge that there is a possibility of the courts adopting a broader characterisation of the fraud prevention purpose underpinning s 53(1)(c) LPA 1925, which could potentially result in the formalities rule requiring a different interpretation. However, we do not regard this risk as being of practical significance at present and certainly not sufficient in and of itself to justify any statutory intervention to clarify or amend the current law.

767

Consultation paper paras 17.54-17.59.

768

Any such clarification would be expressed as matters of general principle, not by exclusive reference to any particular category of assets, and could therefore encompass entitlements to crypto-tokens as well as investment securities.

769

For example, Articles 11(1) and 11(2). See para 17.55(2) of our consultation paper, and ns 1560 and 1561.

770

Consultation paper para 17.57. We received 31 responses to consultation question 32. Twenty-five agreed with our provisional conclusion, one provided qualified support and five disagreed. We note that these responses were submitted before the publication of the UKJT’s recent work on digital securities, which we refer to below.

771

UKJT, Legal Statement on Digital Securities paras 119-137 generally, and specifically, at paras 130 and 132 in which the authors state: “we see no reason why the requirements in s 53(1)(c) for writing and signature cannot be fulfilled by electronic documents and digital signatures in any event... we consider that an electronic document, with a digital signature which is intended to authenticate it, is perfectly capable of satisfying the statutory requirement, whatever its original intended purpose.”

772

We note that a number of consultees were supportive of statutory reform, predominantly on the basis of Option 2(a) and with a minority of such consultees being in favour of Option 2(b). However, we consider that a substantial majority of the reasons expressed in support of statutory intervention relating to the existence and impact of interpretive uncertainty arising in connection with s 53(1)(c) LPA 1925 have been fundamentally and adequately addressed by the work of the UKJT.

773

This is an issue that has potentially had an impact on mainstream financial markets. See Clifford Chance LLP, “The treatment of crypto-tokens at English law: back to the future” (2019), in which the authors suggest that ambiguity in relation to formalities law has in part influenced the choice of some major settlement institutions in the Eurobonds market to be based outside the UK: at p 22. Similarly, in previously arguing for clarificatory reform of s 53(1)(c) LPA 1925 in connection with the activities of securities intermediaries, CLLS-FLC have emphasised that “[financial markets infrastructures] operating immobilisation systems must operate under a legal framework that achieves a "high degree of legal certainty (see [the Principles for Financial Market Infrastructures published by the Bank for International Settlements], Principle 1, Key Consideration 1)” - Response to the Joint Working Party of the City of London Law Society Company Law, Financial Law and Regulatory Law Committees to the Law Commission’s Consultation on Intermediated Securities (2019) p 27.

774

M Bridge, L Gullifer, K Low, and G McMeel, The Law of Personal Property (3rd ed 2021) para 22.051, 22.055. H Beale (ed), Chitty on Contracts (34th ed 2021) para 22.008.

775

The statutory wording referring to the requirement that the written assignment be made “under the hand of the assignor” has been interpreted as meaning that it must be signed by the assignor.

776

See UKJT, Legal Statement on Digital Securities. At para 152 the UKJT note that “A transfer of Digital Securities would not be required to meet the requirements of s 136(1) provided it did not involve a legal assignment (which we consider to be readily avoidable).” We fully agree with this conclusion.

777

Electronic execution of documents (2019) Law Com No 386, paras 2.15-2.17, 3.1; Statement of the Law: Execution with an electronic signature, (4)-(7). Our position here is consistent with the analysis of Y Liew in the fourth edition of Guest on The Law of Assignment (4th ed 2021) paras 2.18, 2.34.

778

This includes unintentionally on the part of the holding intermediary (for example, due to a fraud or hack or because of administrative or operational error). Shortfalls can also arise because of improper activity by a holding intermediary. They can also happen as a result of activity consistent with the proper operation of an intermediated holding arrangement, such as following the exercise of a right of use over and subsequent lending of crypto-tokens, either to a third party or through a DeFi platform. See our consultation paper para 17.60.

779

The Financial Services Compensation Scheme will not provide compensation in this context because claims against crypto-token holding intermediaries would not fall within its remit: see FCA Handbook Compensation Sourcebook (“COMP”), in particular COMP 5.2.

780

K van Zwieten, Goode on Principles of Corporate Insolvency Law (5th ed 2018) paras 8.02, 8.55.

781

Consultation paper para 17.66. M Yates, G Montague, The Law of Global Custody (4th ed 2013) para 3.55. The pro rata approach was adopted by the New Zealand High Court to apportion shortfall losses remaining following the insolvency of a custodial crypto-token exchange in Ruscoe v Cryptopia Limited (in liquidation) [2020] NZHC 728 at [204].

782

M Solinas, “Bitcoins in Wonderland: Lessons from the Cheshire Cat” (2019) 3 Lloyd’s Maritime and Commercial Law Quarterly 433, 450. In the context of intermediated securities holdings trading activities in conventional financial markets, see FMLC, Property Interests in Investment Securities (2004) p 11.

783

Barlow Clowes International Ltd (in liq) v Vaughan [1992] 4 All ER 22 at 42, by Woolf LJ. For an overview of the different approaches to tracing that could apply as an alternative to a pro rata allocation principle, see B McFarlane, R Stevens “Interests in Securities - Practical Problems and Conceptual Solutions” in L Gullifer, J Payne, Intermediated Securities - Legal Problems and Practical Issues (2010) pp 41-43.

784

M Solinas, “Bitcoins in Wonderland: Lessons from the Cheshire Cat” (2019) 3 Lloyd’s Maritime and Commercial Law Quarterly 433, 450. Pearson v Lehman Brothers Finance SA [2010] EWHC 2914 (Ch) at [244]. Where consistent with the commercial expectations of the parties, a pro rata allocation of shortfall risks could be supported on the basis of an implied term of the trust or services agreement governing the custodial intermediated holding arrangement: L Gullifer, Goode and Gullifer on Legal Problems of Credit and Security (7th ed 2022) para 6.26.

785

This includes the rule in Clayton’s Case (1816) 1 Mer 572 or a “first in, first out” approach; and the “rolling charge” or “North American” approach: consultation paper para 17.67.

786

For the reasons previously stated in our consultation paper, we think that this characterisation should be of limited or no application: consultation paper n 1589, and paras 16.69-16.74.

787

The allocation of losses of the intermediary might be considered in different ways. For example, that allocation might either be generally applicable, irrespective of the reason for the shortfall, or take place only where shortfall losses are themselves due to a relevant breach by the intermediary (and where that breach is not covered by a valid trustee exemption clause): consultation paper para 17.79 and n 1590.

788

While acknowledging that a targeted regime might facilitate more just outcomes across a range of shortfall scenarios, we also considered that it risked generating further uncertainty. In turn, this could generate litigation costs and delays to the return of trust assets so as to undermine the aim of the statutory rule in the first place.

789

We received 30 responses to consultation question 33. Twenty-one consultees agreed, five provided qualified or mixed views, and four disagreed.

790

COMBAR and the Chancery Bar Association p 376 (para 33.1).

791

UNIDROIT Working Group, Principles on Digital Assets and Private Law (2023), principles 13(4)-(6) (and the associated commentary at p 45 paras 6-7).

792

AFME and AGC pp 24-25.

793

Deloitte Legal (UK) cited potential amendments to the Financial Services and Markets Bill to include cryptoassets: at p 454. See also responses of The Centre for Commercial Law Studies at the University of Aberdeen p 259-260; Professor Low p 697; FMLC p 551 (para 5.5).

794

These outcomes include that custodians “should ensure adequate arrangements to safeguard investors’ rights to their cryptoassets when it is responsible for them such that, if and when the custodian becomes insolvent, those assets are returned to investors promptly and as whole as possible”: 2023 HM Treasury Cryptoasset Regulatory consultation paper at para 8.7(1).

795

Table 8.A sets out Proposed Design Features for Crypto-asset Custody Regime and includes “Resolution and Insolvency” considerations at page 53. Questions 23 and 24 (Box 8.A) then seeks consultees’ views on the proposed features of a potential regime: 2023 HM Treasury Cryptoasset Regulatory consultation paper.

796

For example, the relevant specifics could potentially accommodate limitations in scope to the application of or alternatives to any pro rata rule: see para 7.86 above.

797

See, for example, Lister and Panahy who suggest that “As regulation progresses, the Digital Settlement Asset Special Administration Regime will need to become increasingly bespoke (beyond what is currently proposed) to cater for the differences in activities between various firms. N Lister and L Panahy, “There is nothing so stable as change”: is the Treasury’s proposed new special administration regime for stablecoin and other systemic DSA firms a change in the right direction? (2022) 37 Journal of International Banking and Financial Law 610. See also CLLS: Response to HM Treasury’s consultation “Managing the failure of systemic digital settlement asset (including stablecoin) firms”, available at: UKP1-2017065734-v1-CLLS-Response-to-stablecoin-SAR-consultation.pdf.

798

In a bailment at will, the bailor can take back possession at any time — the bailor retains an immediate right to possession, but the bailee has possession as a matter of fact. In a term bailment, the bailor’s right is limited to that of the reversion. It is only once the term bailment comes to an end that the bailor can take back possession of the object.

799

Volcafe Ltd v Compania Sud Americana de Vapores SA [2018] UKSC 61; [2019] AC 358 at [8]-[9], by Lord Sumption. M Bridge, L Gullifer, K Low, G McMeel, The Law of Personal Property (3rd ed 2021) paras 12.004-12.005, 12.030.

800

UKJT, Legal Statement paras 87-88. M Solinas, “Bitcoins in Wonderland: Lessons from the Cheshire Cat” [2019] 3 Lloyd’s Maritime and Commercial Law Quarterly 433, 448. Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) para 12.008.

801

We discuss the “extinction/creation analysis” and an alternative characterisation, the “persistent thing analysis”, in more detail in Chapter 6 (Transfers).

802

H Liu, L Gullifer and H Chong, “Client-intermediary relations in the crypto-asset world” (2020) University of Cambridge Faculty of Law Research Paper No 18/2021 pp 5-6, reproduced in P Davies and C Tan, Intermediaries in Commercial Law (2022).

803

We received 29 responses to consultation question 34. Twenty-two consultees agreed with our provisional conclusion against the extension of bailment and/or development of an analogous concept. One consultee provided a qualified view and six consultees disagreed.

804

Dr Crawford p 807; Professor Tettenborn p 57. Some consultees went further, arguing against the conceptual coherence of bailment at all: Dr Gibbs-Kneller pp 426-427. This consultee also provided the Law Commission with an advance copy of “‘A Rule Adumbrated’: Bailment on Terms and the Rule of Law”, Law Quarterly Review (forthcoming).

805

However, we recognised that as markets evolve, there might be good reasons for developing a legal mechanism that allows for the imposition of legal duties on a party without the need for a trust relationship to arise and in the absence of contract. For that reason, we invited consultees to provide specific examples of market structures or platforms that would benefit from frameworks in the alternative to trust and/or contract: consultation paper paras 17.98-17.103.

806

As set out above, 22 consultees agreed with our provisional conclusion against the extension of bailment and/or development of an analogous concept. These consultees broadly agreed that there was no need for an additional framework on the basis that trust arrangements provided sufficient functionality and were already widespread throughout the markets.

807

In particular, Norton Rose Fulbright LLP, Linklaters LLP and COMBAR and the Chancery Bar Association.

808

COMBAR and the Chancery Bar Association p 377 (para 34.2). See also Norton Rose Fulbright LLP pp 847-848 and Linklaters LLP pp 748-749 (para 1.5.1 (ii)). For a broader discussion on this point, see Chapter 5 (Control).

809

COMBAR and the Chancery Bar p 377 (para 34.2).

810

For example, where market participants are creating smart contract based “collateral” arrangements, without any formalities, including as to registration: Linklaters LLP pp 748-749 (para 1.5.1).

811

Chapter 8 (Collateral arrangements) from para 8.36

812

Chapter 8 (Collateral arrangements) from para 8.104.

813

Gunnercooke LLP p 565.

814

Some consultees considered if and when it would or would not be appropriate for fiduciary duties to arise. Informal “Safekeeping” scenarios provide a useful example (where one party (A) gives a private key to another (B) for safekeeping on an informal basis). Norton Rose Fulbright LLP said that in those scenarios contract law would not be applicable, and fiduciary duties not appropriate merely for taking control over a third category thing. Bailment or an analogous conceptual framework could provide a legal solution where B later refuses to return control. Professor Duncan Sheehan submitted that in most cases of safekeeping, an agency relationship might arise in which B would be authorised to deal with the assets in some ways and accountable for breach of the agency agreement and accompanying fiduciary duties if things go wrong.

We agree that both agency and fiduciary duties might have application including in respect of involuntary and/or gratuitous arrangements and discuss both below from para 7.95. However, we do not consider that fiduciary duties will exist or be appropriate in all scenarios. Fiduciary duties “impose heavy constraints on a fiduciary’s personal autonomy, and should be imposed only when nothing else will do the job”: Sarah Worthington, “Four Questions on Fiduciaries” (2016) 2 The Canadian Journal of Comparative and Contemporary Law 2, 732.

815

By reference to bailment, Norton Rose Fulbright LLP noted additional advantages including that bailment allows for the bailee an insurable interest in the thing that is the subject of the bailment; it enables a proprietary action by the bailee (even, in some circumstances, against the bailor); it allows for sub-bailment; it deals with attornment: Norton Rose Fulbright LLP pp 847-848.

816

On this point, Norton Rose Fulbright LLP said that many DeFi participants on public blockchains do not see themselves as agreeing to a web of contracts and so relationships such as staking might be amenable to this analysis: pp 847-848.

817

However, we recognise the concern of some consultees regarding legal certainty: Clifford Chance LLP p 308. We also recognise that aspects of the law of bailment, which might be applied by analogy, have been subject to comparatively limited consideration by the courts as compared to trusts and contract: see para 7.114 below and our consultation paper at para 17.98.

818

On this point, we note commentary that questions whether the “alleged distinct features of bailment are better explained in terms of general principles of contract, tort, unjust enrichment and property”, such that “so-called bailment cases” might best be explained by reference to foundational conceptual categories within the private law. Such commentary demonstrates the flexibility open to courts if they were to develop a control-based legal proprietary interest as an alternative holding structure: GP McMeel “The Redundancy of Bailment” (2003) Lloyd's Maritime and Commercial Law Quarterly 169.

819

In the context of tangible assets, where clients/legal title holders and an intermediary agree that client/legal title holders should be tenants in common of the total assets deposited, there may be a bailment: Mercer v Craven Storage [1994] CLC 328, HL; Glencore International v Metro Trading International [2001] 1 Lloyd's Rep 284 at [154]-[155]. However, if the client’s assets are mingled without others, and the intermediary merely promises to redeliver an equivalent quantity to the client in isolation and without any agreement as to co-ownership, there would be no possibility of a bailment. The arrangement would instead be considered a relinquishment of legal title once transferred to the intermediary: A Burrows, English Private Law (3rd ed 2013) para 16.18; H Liu, L Gullifer and H Chong, “Client-intermediary relations in the crypto-asset world” (2020) University of Cambridge Faculty of Law Research Paper No 18/2021 p 7, reproduced in P Davies and C Tan, Intermediaries in Commercial Law (2022).

820

See our consultation paper at para 17.98 and n 1605 in particular.

821

See for example, CLLS-FLC. The UNIDROIT Working Group also discuss control by an agent and agency relationships in in brief terms: Principles on Digital Assets and Private Law (2023) p 28, para 5; p 41 para 22.

822

CLLS-FLC pp 506-507.

823

Linklaters LLP pp 748-749 (para 1.5.1).

824

An intermediary “may be a bailee of goods, an agent to sell them and a trustee of the proceeds of sale”: P Watts, Bowstead and Reynolds on Agency (22nd ed 2020) paras 1.032-1.033.

825

M Brindle, R Cox, Law of Bank Payments (5th ed 2017) paras 6.23-6.236. We also think that this structure could also be used to grant an agent control over (without conferring title on the agent to) an omnibus account holding the entitlements of multiple principals on an unallocated commingled basis. This structure could be appropriate where for example, principals appoint the agent under identical investment mandate terms.

826

We consider tokenised arrangements in Chapter 8 (Collateral arrangements) at para 8.12.

827

A possible example of a trilateral agency mandate relationship consistent with this analysis being recognised in relation to intermediated non-tokenised entitlements to crypto-tokens may be the recent decision of HDR Global Trading Ltd v Shulev [2022] EWHC 1685 (Comm). However, we note that the judgment does not expressly analyse nor state any conclusions as to the legal characterisation of the crypto-token entitlements held in the intermediated internal ledger trading account that was the subject of the dispute. Accordingly, it does not necessarily provide a clear crypto-token market specific affirmation of our analysis. In any event, we think that our conclusions are valid based on the arguments set out in this section and the clear analogy that can in our view be drawn with trilateral mandate arrangements in relation to choses in action over bank accounts and securities entitlements.

828

See Chapter 5 (Control).

829

De Busshe v Alt (1878) 8 Ch D 286; Kirkham v Peel (1880) 43 LT 171; Lamb v Evans [1893] 1 Ch 218; New Zealand Netherlands Society Oranje Inc v Kuys [1973] 1 WLR 1126; English v Dedham Vale Properties Ltd [1978] 1 WLR 93; Korkontzilas v Soulos (1997) 146 DLR (4th) 214. See also P Watts, Bowstead and Reynolds on Agency (22nd ed 2020) para 1.001.

830

[1998] Ch 1 at 18A-C, referred to by Birss LJ in Tulip Trading v Van Der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [42] as “The classic definition of a fiduciary”. His Lordship went on to explain that the role of a fiduciary has certain key characteristics which involve “acting for or on behalf of another person in a particular matter and also that there is a relationship of trust and confidence between the putative fiduciary and the other person”: at [70].

831

[2018] EWHC 333 (Comm) at [157].

832

[2018] EWHC 333 (Comm) at [157], [159]. See also Tulip Trading v Van Der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [74].

833

Fiduciary Duties of Investment Intermediaries (2014) Law Com No 350 paras 10.8, 10.14, 10.17, 10.22, 10.29-10.30, 10.33. See also Forsta AP-Fonden v Bank of New York Mellon [2013] EWHC 3127 (Comm) at [173]; JP Morgan Chase Bank v Springwell Navigation Corp [2008] EWHC 1186 (Comm) at [573].

834

See further analysis in Chapter 9 (Remedies) from para 9.35. It is important to emphasise however that “not every breach of duty committed by a fiduciary is a breach of fiduciary duty”: Bristol and West Building Society v Mothew [1998] Ch 1 by Millett LJ (as he then was). A non-custodial holding intermediary subject to fiduciary duties may also owe for example a common law contractual duty of care in connection with the delivery of various services, breach of which would give rise to personal contractual remedies. It is only where the holding intermediary’s actions amount to a breach of its fiduciary duty of loyalty that an affected user may be able to access equitable proprietary remedies.

835

Keech v Sandford [1726] EWHC J76; Boardman v Phipps [1967] 2 AC 46; A-G for Hong Kong v Reid [1994] AC 324 at 338; FHR European Ventures LLP v Cedar Properties LLC [2014] UKSC 45, [2015] AC 250 at [34]-[37]. A Burrows, Remedies for Torts, Breach of Contract, and Equitable Wrongs (2019) pp 528-529. See further analysis in Chapter 9 (Remedies).

836

A potential exception to this could be where the breach of fiduciary duty occurs at and not subsequent to the initial deposit of crypto-tokens by a user. Consider for example, a non-custodial holding intermediary that receives crypto-tokens as agent to allocate them to a specified investment strategy for the account of its principal. Instead, the intermediary agent improperly designates and/or applies them upon receipt for use in other unauthorised deals, in breach of fiduciary mandate duty, generating a personal gain. In such circumstances it is possible that the tokens (and any traceable substitutes) might be treated as being held on constructive trust, converting the principal’s unsecured contractual rights to their return into an equitable proprietary entitlement. Such an outcome could potentially be justified on the basis of analogising with the decision in Longfield Parish Council v Robson [1913] 29 TLR 357 (Ch D). In that case, an agent who had been engaged to buy property for his principal was held to hold the property on constructive trust after they had in fact purchased it for themselves.

837

Consultation paper paras 16.91 and 16.96.

838

Fiduciary Duties of Investment Intermediaries (2014) Law Com No 350 paras 10.8, 10.42-10.44, 10.49 and 10.52. See also our consultation paper at paras 16.88-16.90 as well as Blair J: “The basic rights and liabilities of the parties and the fiduciary relationship, if it is to exist at all, must accommodate itself to its terms.... This applies with particular force when the parties are substantial financial institutions dealing on an arms-length basis”: Forsta AP-Fonden v Bank of New York Mellon SA/NV [2013] EWHC 3127 (Comm) at [177]-[178] (citing Hospital Products Ltd v United States Surgical Corp [1984] 156 CLR 41 at 97).

839

See n 723 above.

840

Tulip Trading v Van Der Laan [2022] EWHC 667 (Ch).

841

Above at [73].

842

Tulip Trading v Van Der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16.

843

Above at [77], by Birss LJ.

844

Above at [40], [51], [74], [86], by Birss LJ. The argument would characterise the developers as undertaking a role involving discretionary decision-making and the exercise of authority and control over the state of and updates to the software code on which the Bitcoin network and related specified networks operated. This role would have been undertaken for and on behalf of other people, in relation to crypto-tokens (as objects of personal property rights) to which those other people held legal title, amounting to an “entrustment of property” and thereby, in aggregate, giving rise to a fiduciary relationship.

845

The appeal related to an interim application and not substantive proceedings. As such, these points were not determined finally. The Court of Appeal did not conclude that there would necessarily be a fiduciary duty in law in the circumstances alleged by the claimant (and Birss LJ acknowledged that for the claimant’s case to succeed there would need to be “a significant development of the common law on fiduciary duties”). Rather, the Court considered that “the case advanced raises a serious issue to be tried”: Tulip Trading v Van Der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [78], [86], [91], by Birss LJ.

846

We do not discuss whether it is ever appropriate (and if so, in what circumstances) for software engineers/developers of open-source code for software protocols to owe duties of care and/or fiduciary duties to users of those software protocols in detail in this report. However, we raised the issue in our call for evidence on decentralised autonomous organisations (“DAOs”) (see paras 5.33-5.45) and expect to discuss the issue in detail in our scoping paper on DAOs. More information and the latest updates are available at: https://www.lawcom.gov.uk/project/decentralised-autonomous-organisations-daos/.

847

L Gullifer, “What should we do about financial collateral?” (2012) 65 Current Legal Problems 377, 378: “The point of collateral is to protect A against credit risk relating to B.... It does this by acquiring a proprietary interest in assets, so that it has a right to pay itself out of the value of those assets, despite the insolvency of B.

848

However, we consider our analysis is potentially applicable more widely insofar as third category things utilise the same or similar underlying technology as crypto-tokens.

849

For further discussion on this point, see from para 8.111.

850

For more on this terminology, see from para 8.12 below.

851

The scope of the FCARs regime is largely a question of legal interpretation. However, considering whether new asset classes such as crypto-tokens, CBDCs and stablecoins fall within scope arguably also involves the question as to whether the relevant policy rationales behind the FCARs regime also applies to such assets and so whether such assets should fall within scope. This is particularly the case when considering whether clarifications to the scope of the FCARs should be made. For a more detailed discussion of some of these issues, see from para 8.54 below.

852

The scope of the regime — that is, which crypto-tokens and cryptoassets fell within scope — would again be a policy-related issue in part and would also be likely to depend on whether (and if so, how) clarifications were made to the scope of the FCARs to include certain crypto-tokens or cryptoassets.

853

See, in particular, consultee responses to consultation question 39 in n 974 and n 1001 below.

854

The UKJT define “stapling” as referring “to a legal mechanism whereby the holder of a legal right or interest in an asset is identified by reference to a cryptoasset, or to another digital object of property or a ledger record that is not itself an object of property (in the case of registered or similar structures)”: UKJT, Legal Statement on Digital Securities para 31. We adopt the same approach.

855

For more details on how such a legal mechanism might be structured see our consultation paper Chapter 14 and the UKJT, Legal Statement on Digital Securities para 84.

Broadly, to be effective, the legal mechanism linking an entitlement to a crypto-token must satisfy the following conditions. First, it must render the right to or in the underlying entitlement transferable through an “on chain” disposition of the linked crypto-token that is (or is capable of being) effected by an update to the ledger on which the token is instantiated. Second, it must prevent the “decoupling” of the right to or in the instrument such that it cannot be transferred independently of an on-chain transfer of the linked token: H Liu and L Gullifer, “Financial collateral arrangements in the digital asset world” (2022) Journal of International Banking and Financial Law 527, 528. The UKJT has concluded that “English law provides several mechanisms that could be used for stapling legal interests to cryptoassets or to ledger entries that are not themselves assets,” some of which permit not only the conferring of rights but also the imposition of obligations on holders of securities: UKJT, Legal Statement on Digital Securities paras 84-118.

856

At least those stablecoins which are structured as a token which has been "linked" or "stapled" to a legal right or interest in another thing, such as a right to redeem a certain (monetary) amount. Algorithmic stablecoins or those not linked to any legal right or interest might be better described as crypto-tokens.

857

See the UKJT, Legal Statement on Digital Securities para 33.

858

We intentionally use the term cryptoasset here to include both crypto-tokens and those crypto-tokens linked or stapled to things external to crypto-token systems.

859

Examples of CeFi Lending Platforms include Nexo (https://nexo.io/.) and BlockFi (https://blockfi.com/).

860

We note that decentralised finance platforms may be subject to a degree of re-characterisation risk. Ongoing litigation involving Oasis, a platform for decentralised finance, provides a useful example. See our brief discussion of those proceedings in Chapter 5 (Control) and Chapter 7 (Intermediated holding arrangements) in particular n 497 and n 732.

861

See Wharton Blockchain and Digital Asset Project, “DeFi Beyond the Hype: The Emerging World of Decentralized Finance” (2021) p 2, available at: https://wifpr.wharton.upenn.edu/wp-content/uploads/2021/05/DeFiBeyond-the-Hype.pdf.

862

L Gullifer “What should we do about financial collateral?” (2012) 65 Current Legal Problems 377, 377.

863

SI 2003 No 3226.

864

We received 34 responses to consultation question 35. Twenty-six consultees agreed with our conclusion, four provided qualified views, and four consultees disagreed. However, a number of consultees went on to identify particular issues which they said undermined the practical operation of title transfer collateral arrangements and necessitated targeted law reform. We address these considerations within our discussion of a legal framework that better facilitates crypto-token collateral arrangements: from para 8.104 below.

865

We set out possible advantageous of a title transfer collateral arrangement to a collateral taker in our consultation paper at para 18.14.

866

Close out refers to the process by which a contract is terminated, all transactions or obligations governed by that contract are accelerated so as to be immediately due and payable or due for performance, and all nonmonetary obligations are converted into their monetary equivalents. These sums are then aggregated and netted against each other in settlement of the related claims. To the extent that that the obligations owed by each party to the other do not match there will be a single payment claim representing the value of the net surplus remaining. Note that issues of netting and/or set off (whether contractual, by mandatory operation of law or otherwise) will be important for the future development of crypto-token markets but are outside the scope of this consultation paper.

867

See L Gullifer, Goode and Gullifer on Legal Problems of Credit and Security (7th ed 2022) para 6.45.

868

Re Cosslett (Contractors) Ltd [1998] 1 Ch 495 at 508, by Millett LJ (as he then was).

869

Santley v Wilde [1899] 2 Ch 474; Maugham v Sharpe (1864) 17 CB NS 443.

870

The existence of a specifically enforceable agreement is critical to the creation of a charge because the existence of the equitable proprietary right relies on a chargee having a specifically enforceable right to have the charged property appropriated to the payment of the debt or discharge of some other obligation. As Briggs J put it: “It is that right of specific enforcement which transforms what might have otherwise been a purely personal right into a species of proprietary interest in the charged property...”: Re Lehman Bros International (Europe) Ltd (In Administration) [2012] EWHC 2997 (Ch) at [43], citing Palmer v Carey [1926] AC 703 at p 706, by Lord Wrenbury. See also M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) para 16-068.

871

We received 35 responses to consultation question 36. Twenty-three consultees agreed with our conclusion, nine provided qualified or mixed views, three disagreed.

872

L Gullifer “What should we do about financial collateral?” (2012) 65 Current Legal Problems 377, 385.

873

This includes from our call to evidence (for example, the responses of Linklaters LLP and FMLC) and throughout our consultation process. This process, including some of these concerns, is summarised in our consultation paper at paras 18.22-18.23. For specific concerns raised in responses to our consultation paper, see Ashurst LLP p 82 (para 4.47), FMLC p 552 (para 6.2), IDAC and CryptoUK p 600, CLLS-FLC p 531 Stirling & Rose LLP p 960.

874

Perfection refers to steps required by statute in various contexts to give publicity to security interests in assets owned by another person to ensure their effectiveness against competing third party claims. Failure to comply with these steps results in the interests being void in the event of the collateral provider entering insolvency proceedings. We discuss perfection requirements from para 8.90 and from para 8.144 below.

875

For a more detailed discussion of issues relating to control, see Chapter 5 (Control).

876

Pledges are one of two forms of possessory security recognised under the law of England and Wales. The other form of possessory security is the lien: a right to retain possession of a thing until a claim or debt has been satisfied. However, liens are of limited utility as credit risk management tools or devices for obtaining credit on a secured basis since they do not provide any right to realise or appropriate the value inherent in the detained assets in the event of a debtor default. Consequently, we did not substantively analyse liens as part of our review of the forms of security permissible under the current law.

877

Things regarded as purely intangible cannot be possessed currently as a matter of law, and consequently cannot be the subject of a valid pledge. However, see para 3.20 above in relation to Electronic Trade Documents. Although documentary intangibles (such as bills of lading, bearer bonds or other negotiable instruments) can be pledged, “there seems to be greater uncertainty surrounding what might have been assumed to be the essential right of the pledgor to reclaim the pledged instrument on discharge of the secured obligation”: M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) para 16-023. The authors note that in perhaps as a consequence, characterisation issues are more prevalent: para 16-076.

878

M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) paras 12.015, 16.024-16.026.

879

Coggs v Bernard (1703) 2 Ld Raym 909, 92 E.R. 107. M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) para 16.011, n 71; H Beale, M Bridge, L Gullifer, E Lomnicka, The Law of Security and Title-Based Financing (3rd ed 2018) para 5-01.

880

L Gullifer, Goode and Gullifer on Legal Problems of Credit and Security (7th ed 2022) para 1.44. A pledgee is not entitled to enforce their interest by way of foreclosure: Carter v Wake (1877) 4 Ch D 605.

881

We set these out at para 18.42 of our consultation paper. These problems are particularly acute for sophisticated financial market participants but might be less problematic for non-commercial users.

882

See our consultation paper at paras 18.42-18.44.

883

We received 31 responses to consultation question 37. Twenty-two consultees agreed with our provisional conclusion outright, while four consultees offered mixed or qualified support. Five consultees disagreed.

884

Courts would therefore be able to deviate from the principles underpinning pledge where appropriate. For example, there is considerable uncertainty as to whether and on what conceptual basis a pledge can be granted over an unallocated part of an identified bulk of fungible assets: M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) paras 16.024-16.026. This undermines their utility as a potential secured financing structure for crypto-token intermediaries, which routinely utilise omnibus accounts: see Chapter 7 (Intermediated holding arrangements) at para 7.3.

885

IDAC and CryptoUK commented that “possessory” security interests are not a widely recognised format for crypto-token collateral arrangements. They anticipated that given the degree of negative control required, “pledges” via “possession” of crypto-tokens would not be flexible enough to give effect to the intention of the parties and accommodate the full spectrum of encumbrances over collateral: pp 600-602. We agree. See also CLLS-FLC p 530, and Dr Crawford p 808, who submitted that the recognition of control-based security interests was unnecessary as mortgages and charges are capable of meeting the requirements of market participants.

886

Norton Rose Fulbright LLP p 848.

887

Dr Zhang p 652.

888

FMLC p 553.

889

ISDA p 637 (para 2.4).

890

Law Society p 721; Linklaters LLP pp 759-760 (para 1.12); ISDA p 638 (para 2.4).

891

The Centre for Commercial Law at the University of Aberdeen p 261.

892

For example, Norton Rose Fulbright LLP submitted that the “false wealth” problem raised by a lack of registration is not necessarily greater for third category things than tangible assets: p 848. The Law Society considered that, in the context of capital markets, any policy reasons in favour of maintaining a registration requirement for UK corporate security providers are limited, given that most collateral arrangements fall under the FCARs and, as such, are not subject to registration: Law Society p 721. See also Dr Zhang p 652.

893

For sophisticated financial and crypto-token market participants to realise the practical benefits of any such development in the law, the incorporation and accommodation of control-based security interests, by way of an amendment to the FCARs and/or by an express statutory provision in any future crypto-token collateral regime, would likely be required. We discuss this at para 8.138 below.

894

European Directive on Financial Collateral Arrangements, Directive 2002/47/EC of the European Parliament and Council of 6 June 2002, OJ L 168/43.

895

L Gullifer, Goode and Gullifer on Legal Problems of Credit and Security (7th ed 2022) para 6.34; see also Directive recitals 3, 5, 10 and 17.

896

FCARs, SI 2003 No 3226, reg 4.

897

Statute of Frauds 1677, s 4.

898

Section 53(1)(c) Law of Property Act 1925 (“LPA 1925”). For further analysis of this provision in relation to transfers of and dealings in equitable entitlements to crypto-tokens see Chapter 7 (Intermediated holding arrangements), from para 7.68-7.76.

899

Section 135 LPA 1925. For further analysis of this provision in relation to transfers of and dealings in equitable entitlements to crypto-tokens see Chapter 7 (Intermediated holding arrangements), paras 7.777.80.

900

FCD, recital 10.

901

FCD, recital 17.

902

“Title transfer financial collateral arrangement” and “security financial collateral arrangement” are defined in reg 3(1) of the FCARs. A security financial collateral arrangement is defined as “any legal or equitable interest or any right in security, other than a title transfer financial collateral arrangement, created or otherwise arising by way of security”. This includes all four forms of consensual security interests that are available under the general law: pledge, lien, mortgage, and charge. For the purposes of the FCARs, charges that can form the basis of a qualifying security financial collateral arrangement are limited to: (i) fixed charges, and (ii) charges created as floating charges “where the financial collateral charged is delivered, transferred, held, registered or otherwise designated so as to be in the possession or under the control of the collateral-taker or a person acting on its behalf...”.

903

Defined in reg 3(1) FCARs as “any corporate body, unincorporated firm, partnership or body with legal personality except an individual, including any such entity constituted under the law of a country or territory outside the United Kingdom or any such entity constituted under international law”.

904

This definition means that the FCARs’ personal scope of application is wider than that required by the FCD (see art 1(2) of the FCD).

905

This requirement is included in the definitions of both “title transfer financial collateral arrangement” and “security financial collateral arrangement” in reg (3)(1) FCARs.

906

In reg 3(1) FCARs, “relevant financial obligations” are defined broadly to mean “the obligations that are secured or otherwise covered by a financial collateral arrangement....”. See further: L Gullifer, Goode and Gullifer on Legal Problems of Credit and Security (7th ed 2022) para 6.36.

907

“Relevant financial obligations” could therefore include, for example, a physically settled forward contract for the delivery of a quantity of a form of crypto-tokens (regardless of whether those crypto-tokens satisfied the definition of “financial collateral” or not).

908

The application of the definitions of the individual categories of financial collateral to different forms of crypto-tokens are considered in paras from para 8.57.

909

Reg 3(1) FCARs. The two categories are “security financial collateral arrangement” and “title transfer financial collateral arrangement”.

910

H Liu and L Gullifer (2022) “Financial collateral arrangements in the digital assets world” (2022) 8 Journal of International Banking and Financial Law 527, 528.

911

L Gullifer, Goode and Gullifer on Legal Problems of Credit and Security (7th ed 2022) para 6.40; H Liu and L Gullifer (2022) “Financial collateral arrangements in the digital assets world” (2022) 8 Journal of International Banking and Financial Law 527, 528.

912

FCARs, reg 3. We note that this might not merely be a definitional question, but also raises policy questions as to what types of asset were intended to fall within the scope of the FCARs regime, and why the FCARs regime is justified in respect of those assets.

913

In respect of cash, see for example: “The possible inclusion of digital assets within the definition raises similar questions of whether it is appropriate for security interests granted over them to fall within the FCARs. While it could be appropriate for the registration requirements to be disapplied where a collateral taker has control of the digital asset, it is more debatable whether the insolvency protection, the right of use and right of appropriation should apply”: L Gullifer, Goode and Gullifer on Legal Problems of Credit and Security (7th ed 2022) para 6.06.

914

FCARs, reg 3.

915

L C Ho “The Financial Collateral Directive’s practice in England” (2011) 26 Journal of International Banking Law and Regulation 151, 155. “Cash” does not include cash in the form of bank notes (or coins): Recital 18, FCD; nor does it include book debts (although in certain circumstances they could qualify as financial collateral by reason of being a credit claim): G Yeowart, R Parsons, E Murray and H Patrick, Yeowart and Parsons on The Law of Financial Collateral (2016) para 3.09. See further analysis in our consultation paper at paras 18.55-18.56.

916

J Perkins and J Enwezor, “The legal aspect of virtual currencies” (2016) Journal of International Banking and Financial Law 569, 570 to 572; R Cohen, P Smith, V Arulchandran, A Sehra, “Automation and blockchain in securities issuances” (2018) Journal of International Banking and Financial Law 144, 149-150; M Solinas, “Bitcoins in Wonderland: Lessons from the Cheshire Cat” [2019] 3 Lloyd’s Maritime and Commercial Law Quarterly 433, 444-445; D Fox, “Cryptocurrencies in the Common Law of Property” in S Green, D, Fox, Cryptocurrencies in Public and Private Law (2019) paras 6.61-6.62; L Gullifer, Goode and Gullifer on Legal Problems of Credit and Security (7th ed 2022) paras 6.05-6.06. See further discussion at paras 15.57-18.61 of our consultation paper.

917

See also our discussion on the application to crypto-tokens of the special defence of good faith purchaser without notice that applies to money in Chapter 6 (Transfers). We also discuss actions for an agreed sum and, separately, “monetary” awards in more detail in Chapter 9 (Remedies). See also our consultation paper at paras 13.39-13.40, 18.54-18.62 and 19.19-19.25.

918

L Gullifer, Goode and Gullifer on Legal Problems of Credit and Security (7th ed 2022) para 6.05, although see the possible, broader alternative definition of “currency” meaning “currency that is generally used as a medium of exchange within a country” referred to therein.

919

However, for a CBDC to satisfy the definition of “cash” under the FCARs as drafted it would also need to be “credited to an account” or constitute a “similar claim for the repayment of money” (see sub-paras (3) and (4) below. These additional requirements explain why cash in the form of bank notes (or coins) does not qualify as “cash” under the FCARs, despite clearly being “money” in the conventional sense: n 915 above.

920

The argument might be that the latter category of stablecoins are different to money in conventional bank accounts, which would constitute rights against a private issuer that is subject to state regulation and which may in whole or in part, have the benefit of a guarantee or other form of deposit protection provided by the state. However, this distinction seems relatively arbitrary and it is certainly not clearly intended on the face of the FCARs.

921

These points have been set out more substantively elsewhere: L Gullifer, Goode and Gullifer on Legal Problems of Credit and Security (7th ed 2022) para 6.06; H Liu and L Gullifer “Financial Collateral arrangements in the digital asset world” (2022) 8 Journal of International Banking and Financial Law 527, 528.

922

Such as El Salvador: S Perez, C Ostroff, “El Salvador Becomes First Country to Adopt Bitcoin as National Currency” (September 2021), available at: https://www.wsj.com/articles/bitcoincomes-to-el-salvador-first-country-to-adopt-crypto-as-national-currency-11631005200.

923

TheBlockCrypto, “Stablecoin Supply Charts”, available at:

https://www.theblockcrypto.com/data/decentralizedfinance/stablecoins.

924

Most central banks around the world are now exploring the development of CBDCs including through concrete pilot projects: Anneke Kosse and Ilaria Mattei, “Gaining momentum - Results of 2021 BIS survey on central bank digital currencies” (2022) Bank of International Settlements (BIS), paper 125, available at: https://www.bis.org/publ/bppdf/bispap125.htm. This includes in the UK following the establishment of a joint Bank of England and HM Treasury CBDC Taskforce in April 2021, and publication of a consultation paper into a “digital pound”: Bank of England and HM Treasury, “The digital pound: a new form of money for households and businesses?”, Consultation Paper (2023).

925

IntoTheBlock, “NFT Analytics & Insight”, available at: https://www.intotheblock.com/. Albeit a market which remains very small at the time of writing.

926

We note that a number of the academic commentaries referenced above and in our consultation paper were published prior to these major industry developments: see our consultation paper para 18.62(4).

927

FCARs, reg 3(1). The definition includes company shares, bonds and other debt instruments that are tradeable on the capital markets, units in collective investment schemes (as defined under s 235 Financial Services and Markets Act 2000) and money market instruments.

928

See para 8.12 above.

929

The effect of the inclusion of the phrase “claims relating to or rights in or in respect of any of the financial instruments referred to in the preceding part of the definition” is to expressly extend the definition to qualifying financial instruments that are held via intermediaries so that the rights and entitlements of beneficiaries under indirect and intermediated holdings can benefit from the FCARs.

930

G Yeowart, R Parsons, E Murray and H Patrick, Yeowart and Parsons on The Law of Financial Collateral (2016) paras 3.46-3.50.

931

For further commentary on the tokenisation of proprietary interests in equity and other registered corporate securities issued by UK companies see from para 8.78 below.

932

FCARs, reg 3.

933

In brief, “credit claims” constitute monetary claims arising out of an agreement for the repayment of credit granted in the form of a loan by a bank or other credit institution. We considered credit claims in our consultation paper at paras 18.67-18.68.

934

UKJT, Legal Statement on Digital Securities para 33.

935

See Chapter 3 (Third thing) para 3.52 and Chapter 6 (Transfers) para 6.80. This is not however true of a mere register/record token, the holder of which would not necessarily be the holder of the asset that such a mere register/record token records.

936

A documentary intangible as “a document that entitles the holder to claim performance of the obligation recorded in the document and to transfer the right to claim performance of that obligation by transferring the document. The document is said to “embody” the obligation.” See Electronic Trade Documents (2022) Law Com No 405.

937

We recognise that the utility of this analogy relies on a tokenised structures being subject to an effective linking mechanism. This is because a key property of paper-based bearer bonds is that they are negotiable instruments, which prevents any risk of decoupling: UKJT, Legal Statement on Digital Securities paras 39, 53. There is an argument that mercantile custom has already developed to treat crypto-tokens as negotiable (see Chapter 6 (Transfers) from para 6.77 and UKJT, Legal Statement on Digital Securities paras 40, 54, 147). However, even in the absence of tokenised cryptoassets being recognised as negotiable, it is possible to structure the linking or stapling arrangements using legal mechanisms derived from private contractual and/or trust law principles to emulate the practical effects of negotiability. This enables tokenised arrangements to operate in a similar way: UKJT, Legal Statement on Digital Securities para 55. This makes bearer bonds a useful analogy. We note the UKJT takes a similar approach: UKJT, Legal Statement on Digital Securities para 31.

938

H Liu and L Gullifer, “Financial collateral arrangements in the digital asset world” (2022) Journal of International Banking and Financial Law 527, 528.

939

The Companies Act 2006 imposes statutory requirements for issuing companies to maintain (and control) a register of members (s 113). A company is not required to keep a register of its debenture holders. However, if it chooses to issue debentures in registered (as opposed to bearer form), it must comply with the corresponding requirements for debenture holders’ registers set out in the Companies Act 2006 as well. Registers may be kept in electronic form provided that the information in it is adequately recorded for further reference and capable of being reproduced in hard copy form (s 1135). Registers must be kept available for inspection (in the sense of being capable of being viewed, but not necessarily stored at) the company’s registered office or a single alternative inspection location (ss 114 and 743 (for members’ and debenture holders’ registers respectively), and s 1136; and reg 3 Companies (Company Records) Regulations 2008).

The level of control that the company exercises over its registers must be sufficient to satisfy the statutory maintenance obligations stipulated, which include, for example: a duty to register certain transfers of shares or debentures (s 771); the right to refuse to register certain transfers of shares or debentures (s 771); permission to remove certain stale entries on the register of members (s 121); a duty to rectify the register of members when ordered by the Court to do so (s 125); and a duty to guard against and facilitate the discovery of falsification (s 1138). In addition, the effect of s 770 is that proper instruments of transfer are required for the transfer of legal title to shares or registered debentures. Unlike debentures, shares must be

issued in registered form by UK companies since they are now prohibited from issuing bearer warrants for shares (s 779).

940

A “proper instrument of transfer” is one that is appropriate or suitable for stamping by HMRC (Nisbet v Shepherd [1994] 1 BCC 91 at 94-95, by Leggatt LJ). Under current procedures this will be any document (1) which can be submitted to HMRC electronically; (2) which HMRC will recognise as transferring an interest in property; and (3) which is executed and dated. Where the relevant transfer is exempt from stamp duty, we agree with the conclusion of the UKJT that the courts would interpret “proper instrument of transfer” as requiring an instrument that is “capable of recording the key details of the transfer as needed in order to give effect to the transfer”: UKJT, Legal Statement on Digital Securities para 168.

941

For a detailed analysis relating to the tokenisation of equity securities see UKJT, Legal Statement on Digital Securities paras 19-20, 76-83, 143, 155-192.

942

UKJT, Legal Statement on Digital Securities paras 19, 179.

943

Chapter 7 (Intermediated holding arrangements), paras 7.68-7.80.

944

A number of legislative provisions have been revised to facilitate the use of record keeping systems utilising blockchain databases. The definition of “stock ledger” has been updated to include ledgers "administered by or on behalf of the corporation," (s 219 General Corporation Law). The maintenance of corporate records on "one or more electronic networks or databases (including one or more distributed electronic networks or databases)" has also been expressly permitted (s 224 General Corporation Law). This is subject to the relevant ledger being capable of (i) producing a list of the company's stockholders; (ii) recording certain mandatory information; (iii) recording transfer of stock, and (iv) conversion into 'clearly legible paper form', upon the request of a person entitled to inspect the records.

945

See English translation available at:

https://www.bundesfinanzministerium.de/Content/EN/Downloads/Financial-Markets/key-points-financing-for-the-future-act.pdf?__blob=publicationFile&v=2. The proposed legislation will apply to German companies with less than 500 employees and annual revenues of less than EUR100 million.

946

The laws governing and constraining the tokenisation of equity securities by UK companies is also subject to ongoing analysis by the Law Commission in connection with our project exploring legal aspects of and issues relating to DAOs. For further details available at: https://www.lawcom.gov.uk/project/decentralised-autonomous-organisations-daos/).

947

See para 8.22 above.

948

See from para 8.23 above.

949

See FCARs, reg 3(1) (emphasis added). The requirement that collateral is in the “possession or control” of the collateral-taker is included within the definition of a “security financial collateral arrangement”: see n 902. above.

950

FCARs, reg 3(2). The provision states that “For the purposes of [the FCARs] “possession” of financial collateral in the form of cash or financial instruments includes the case where financial collateral has been credited to an account in the name of the collateral-taker or a person acting on his behalf (whether or not the collateral-taker, or person acting on his behalf, has credited the financial collateral to an account in the name of the collateral-provider on his, or that person’s, books) provided that any rights the collateral-provider may have in relation to that financial collateral are limited to the right to substitute financial collateral of the same or greater value or to withdraw excess financial collateral”.

951

This change was enacted as a response to widespread concern among market participants prompted by the decision of the High Court in Gray v G-T-P Group Ltd; Re F2G Realisations Ltd (In Liquidation) [2010] EWHC 1772. In that case, in the context of considering the meaning of “possession or control” under the FCARs, the judge stated that “possession has no meaning in English law as regards intangible property”: at [54].

952

H Beale, M Bridge, L Gullifer, E Lomnicka (eds), The Law of Security and Title-Based Financial (3rd ed 2018) paras 3.42-3.80; G Yeowart and R Parsons, Yeowart and Parsons on the Law of Financial Collateral (2016), ch 8; L Gullifer, “Piecemeal reform: is it the answer?” in F Dahan (ed), Research Handbook on Secured Lending in Commercial Transactions (2014); S Goldsworthy, “Taking possession and control to excess: issues with financial collateral arrangements under English law” (2013) Journal of International Banking and Financial Law 71; L C Ho “The Financial Collateral Directive’s practice in England” (2011) 26 Journal of International Banking Law and Regulation 151.

953

These four different conceptions of control are set out in E Zaccaria, “An inquiry into the meaning of possession and control over financial assets and the effects on third parties” (2017) Journal of Corporate Law Studies 1, 4-5 and L Gullifer, Goode and Gullifer on Legal Problems of Credit and Security (7th ed 2022) from para 6.52.

954

As discussed below, this is not the same “factual control” as we envisage for the purposes of third category things (see Chapter 5 (Control) from para 5.8

955

[2012] EWHC 2997 at [131]-[132], [134], [136], by Briggs J.

956

Gray v G-T-P Group Ltd; Re F2G Realisations Ltd (In Liquidation) [2010] EWHC 1772.

957

Private Equity Insurance Group SIA v Swedbank AS [2017] 1 WLR 1602.

958

In addition (and unlike possession under the common law) possession for the purposes of the FCARs does not include an explicit intention element, although it is possible that this is implied by the incorporation of (intention-based) legal contractual rights of control into the concept.

959

See also G Yeowart, R Parsons, E Murray, H Patrick, Yeowart and Parsons on The Law of Financial Collateral (2016) paras 8.76-8.77.

960

See Re Lehman Brothers International (Europe) (in administration) [2012] EWHC 2997 at [136], by Briggs J. See further L Gullifer, Goode and Gullifer on Legal Problems of Credit and Security (7th ed 2022) para 6.53 and E Zaccaria, “An inquiry into the meaning of possession and control over financial assets and the effects on third parties” (2017) Journal of Corporate Law Studies 1, 16-18.

961

FCARs reg 3(1).

962

Re Lehman Brothers International (Europe) (in administration) [2012] EWHC 2997 at [133], by Briggs J. See also E Zaccaria, “An inquiry into the meaning of possession and control over financial assets and the effects on third parties” (2017) Journal of Corporate Law Studies 1, 23, and L Gullifer, Goode and Gullifer on Legal Problems of Credit and Security (7th ed 2022) para 6.54.

963

For example, conditions might include for example the occurrence of loan repayments, the expiry of loan repayment periods or the maintenance of collateral value thresholds.

964

See for example, the Yawww Platform (https://www.yawww.io/), which provides a matching facility for peer-to-peer SOL-denominated loans and escrow smart contracts for associated NFTs issued on the Solana network to be used as collateral; and also NFTfi, a similar platform on the Ethereum blockchain (for an overview of the escrow smart contracts deployed in connection with NFTfi, see Janesh Rajkumar v Unknown Person [2022] SGHC 264 at [12]). In that case, the claimant was granted an interlocutory proprietary injunction by the Singapore High Court to restrain the defendant from dealing with a Bored Ape Yacht Club NFT that the borrower had previously transferred to an escrow smart contract as collateral for a peer-to-peer loan matched on NFTfi. As a result of the injunction the NFT cannot be traded on the Opeansea NFT marketplace (https://opensea.io/assets/ethereum/0xbc4ca0eda7647a8ab7c2061c2e118a18a936f13d/2162). For further commentary on NFTfi’s escrow smart contract, see T Chan, K Low “DeFi Common Sense: Crypto-backed Lending in Janesh s/o Rajkumar v Unknown Person (“CHEFPIERRE’)” (2023) Modern Law Review 1, 3-4.

965

Furthermore, excess and exposure may be defined to intentionally leave the collateral taker undercollateralised, for example by setting the minimum collateral amount at a specified percentage below the total value of outstanding secured liabilities, or by omitting contingent liabilities from the exposure calculation.

966

Smart contracts can rely on external data providers (or “oracles”), for valuation inputs (see for example, Aave’s use of an aggregated price feed from Chainlink, a decentralised oracle network).

967

Flash loans are special transactions that allow the borrowing of an asset, as long as the borrowed quantity (and a fee) is returned before the end of the transaction. The borrowing of the asset, the use of the borrowed asset for a particular purpose, and the return of the asset (and fee) are arranged and completed within a single “block” on a blockchain (for this reason they are sometimes called “One Block Borrows”). Because of this, these transactions do not require a user to supply collateral prior to engaging in the transaction — the borrowing, use of the asset and return of the asset will only occur and change the state of the blockchain if all three occur. Substitution of crypto-tokens held in on-chain collateral arrangements could therefore potentially be undertaken through flash loans in a similar way to how they are currently utilised in the Aave v2 and v3 platforms. Available at: https://docs.aave.com/developers/guides/flash-loans for more detail on flash loans.

968

The analysis in this section includes issues of interpretive uncertainty as to the features of collateral excess and substitution facilities and the extent to which additional collateral access rights retained by the collateral provider are permissible under the FCARs. These issues (and their implications for collateral arrangements over account based crypto-token entitlements in particular) are similar to those that have been raised by academics and market practitioners in connection with the structuring and operation of intermediated securities collateral facilities in mainstream financial markets: see L Gullifer, Goode and Gullifer on Legal Problems of Credit and Security (7th ed 2022) para 6.54; FMLC, “Issue 1: Collateral Directive: Analysis of uncertainty regarding the meaning of “possession or ... control” and “excess financial collateral” (2012) paras 2.15-2.18, 3.4; Re Lehman Brothers International (Europe) (in administration) [2012] EWHC 2997 at [132]; G Yeowart, R Parsons, E Murray, H Patrick, Yeowart and Parsons on The Law of Financial Collateral (2016) para 8.18.

969

To the extent that was deemed desirable and/or necessary to promote policy goals in that context.

970

Consultation paper para 18.45.

971

Consultation paper para 18.46.

972

Consultation question 38 stated our provisional conclusion that the FCARs should not be extended as set out above. We received 29 responses. Fourteen consultees agreed, 11 disagreed and four gave mixed responses.

973

This was evident in the responses of consultees who agreed and disagreed with our provisional conclusion. For example, a number of consultees who disagreed with our provisional conclusion that the FCARs should not be extended acknowledged deficiencies in the FCARs (including the “possession or control” requirement). Nevertheless, they argued that such deficiencies could be addressed at the same time as extending the financial collateral framework to cover crypto-tokens: IDAC and CryptoUK pp 602-604; AFME and AGC pp 27; IDAC and CryptoUK pp 602-604; Linklaters LLP pp 759-760 (para 1.12), ISLA pp 623-626 (para 2.9).

974

Consultation question 39 stated our provisional conclusion that it would be beneficial to implement law reform to establish a legal framework that better facilitates the entering into, operation, rapid, priority enforcement and/or resolution of crypto-token collateral arrangements. We received 34 responses to consultation question 39. Twenty-seven agreed, two disagreed, and five offered mixed views and/or raised additional issues. See further discussion at n 1001 below.

975

Keynote Speech by John Glen MP, Economic Secretary to the Treasury, at the Innovate Finance Global Summit (4 April 2022).

976

Subsequent to the publication of our consultation paper, HM Treasury published a broad-ranging set of proposals for a new regulatory regime: HM Treasury, “Future financial services regulatory regime for cryptoassets: Consultation and call for evidence” (2023).

977

This might also require there to be updates to the FCARs to exclude crypto-token collateral arrangements in express terms: see from para 8.138 below.

978

See L Gullifer, Goode and Gullifer on Legal Problems of Credit and Security (7th ed 2022) para 6.54.

979

To fall within the scope of the FCARs, a collateral arrangement must be granted to secure or otherwise cover “relevant financial obligations”. These are broadly defined: see para 8.50(3) above and para 18.51(3) of our consultation paper. Under a bespoke statutory framework, “qualifying obligations” might be framed so as to target more precisely the range of activities that the regime is intended to support and is justified in doing so from a policy perspective. This would reduce the risk of collateral regime overlap and the emergence of regime arbitrage opportunities.

980

As we discuss above, complimentary reform of the FCARs would likely be required as well to ensure that the scope of the FCARs was clear.

981

“Durable medium could be interpreted broadly to include, for example, recorded telephone conversations. This would be similar in principle to how the equivalent phrase has been interpreted in the context of the FCD. (See comment on FCD, art 1(5) in Section III.2 (Analysis of the Common Position- Scope (Article 1)), Common Position (EC) No 32/2002 adopted 5 March 2002, OJ C 119 E/22 of 22 May 2002).

982

Formalities rules such as s 53(1)(c) LPA 1925 would therefore be disapplied. For more detail on this issue, see Chapter 7 (Intermediated holding arrangements) paras 7.68-7.80.

983

See also our proposal for encouraging and supporting the establishment of a technical expert group to develop guidance and suggested legal frameworks for crypto-tokens and associated markets in Chapter 5 (Control).

984

See from para 8.95.

985

Publicity minimises the risk of third-party transacting decisions and claims being undermined by an “invisibility of security interests”, and of the value realisable by third parties being compromised by the existence of undisclosed priority security interests. L Gullifer “What should we do about financial collateral?” (2012) 65 Current Legal Problems 377, 388-391.

986

This would diverge from the approach adopted under the FCARs, which focuses instead on legal control as the core organising principle. We agree with Professor Gullifer that, when thinking about intangibles, “what we actually are interested in is a badge of ownership (or of a lesser but proprietary interest)... if what we are interested in is the outward signs of an arrangement, one might have thought that operational [ie factual] control was more important than legal control.”: L Gullifer “What should we do about financial collateral?” (2012) 65 Current Legal Problems 377, 391-392.

987

FCD, art 2(2) (emphasis added).

988

FCARs, reg 3(1). Re Lehman Brothers International (Europe) [2012] EWHC 2997 at [101] (emphasis added).

989

CLLS-FLC, “Financial Collateral: A Proposal For its “Provision” (4 November 2022), para 7, available in our consolidated consultee responses. The paper is also publicly available at: https://www.citysolicitors.org.uk/clls/consultations-responses-2/.

990

For an example of how flash loans could potentially be used as part of a collateral substitution process available at: https://docs.aave.com/faq/swap-and-repay-with-collateral-v2.

991

For an example of how hard coded valuations can compromise collateral and risk management operations for a DeFi lending platform see O Avan-Nomayo “DeFi lender left with $35 million bad debt after quoting depegged stablecoins at $1” (16 May 2022) theblockcrypto.com.

992

We think the similar considerations to that which we set out above at paras 8.88-8.97 in respect of the “possession or control” perfection requirement under the FCARs applies here.

993

See from paras 8.88-8.97 above.

994

This point was raised by a number of consultees, including CLLS-FLC at p 510. which made the following comment: “Given the international nature of blockchain or DLT-based systems, it is necessary as a matter of some urgency to either determine that there is no need to look to any other legal system than English law for an issue before an English court relating to digital assets (in the third category) held in the system - unless a different law is specifically chosen by the participants of the system to govern the relevant issue - or tackle the difficult questions of trying to define what system of law should be applied by an English court to determine proprietary or other issues affecting the relevant assets held in the system. In this latter case, the law should specifically provide for parties to be able to exclude (by contract or otherwise) any rule of English private international law which would otherwise require regard to be had to another legal system in deciding the validity or effectiveness of any action relevant to the system. This seems essential given the uncertainty whether such a rule would apply (it clearly would if concepts of possession are used) and the difficulties that the architecture of blockchain and DLT-based systems raise in determining what other system of law might then be applicable.”

995

More information and the latest updates are available at: https://www.lawcom.gov.uk/project/conflict-of-lawsand-emerging-technology/ and https://www.lawcom.gov.uk/project/digital-assets-which-law-which-court/.

996

See our discussion at paras 814-8.126 above.

997

CLLS-FLC, “Financial Collateral: A Proposal For its “Provision” (4 November 2022), Appendix 1, available in our consolidated consultee responses. The paper is also publicly available at: https://www.citysolicitors.org.uk/clls/consultations-responses-2/.

998

Above, para 1.20.

999

See para 8.50, and our discussion of qualifying financial collateral arrangements from para 8.57 above.

1000

See our discussion on this point at paras 8.68-8.87 above.

1001

Consultation question 39 stated our provisional conclusion that it would be beneficial to implement law reform to establish a legal framework that better facilitates the entering into, operation, rapid, priority enforcement and/or resolution of crypto-token collateral arrangements. It then set out in broad terms the two legislative options set out below. We received 34 responses to consultation question 39. Twenty-seven agreed, two disagreed, and five offered mixed views and/or raised additional issues. However, as we explain below, consultees were divided between the two legislative options presented.

1002

D2 Legal Technology pp 422-423; International Securities Lending Association (“ISLA”) p 625 (para 2.9); Deloitte Legal (UK) p 455.

1003

D2 Legal Technology pp 422-423; ISLA p 625 (para 2.9); Deloitte Legal (UK) p 455.

1004

Referred to by consultees as including increased market efficiency and stability, reduced systemic risk and increased liquidity.

1005

AFME and AGC p 27; Linklaters LLP pp 759-760 (para 1.12), Ashurst LLP pp 86 and Clifford Chance LLP pp 310-311.

1006

IDAC and Crypto UK pp 605-606.

1007

COMBAR and the Chancery Bar Association pp 379-378 (para 39).

1008

Professor Milne pp 46-47.

1009

See R Auer, M Farag and ors “BIS Working Papers 1013 - Banking in the shadow if Bitcoin? The institutional adoption of cryptocurrencies” (2022) Bank for International Settlements Working Papers.

1010

These include rules that could prevent the rapid enforcement of collateral realisation rights, undermine the validity of certain pre-insolvency collateral transfers, suspend the exercise of termination rights and that reserve a portion of collateral value for distribution to other preferential creditors or for the settlement of other debts.

1011

FCD, recital (17). “Domino” contagion risk refers to the potential for the insolvency of a prominent institution to trigger a series of defaults in back-to-back transactions causing financial distress to cascade through chains of counterparties across the market. The purported risk reduction benefits of disapplying the relevant insolvency code provisions are said to outweigh third party and societal costs resulting from the consequential reduction in assets available for distribution to other creditors and the diminished capacity and prospects for rehabilitation of an insolvent entity: R Mokal, “Liquidity, systemic risk, and the Bankruptcy treatment of financial contracts” (2016) 10(1) Brooklyn Journal of Corporate, Financial and Commercial Law 15. At 45, the author strongly criticises this view of contagion in financial markets as being “a product of the unsatisfactory microprudential approach to systemic risk, [which] is theoretically implausible and empirically false”, arguing that it is “asset value contagion” - “a collective action problem in which an asset price shock.causes balance sheet constraints on asset-holders to tighten, causing assets to be liquidated, lowering asset prices further, and so on” that precipitates systemic crises in financial markets.

1012

The underlying policy argument is not universally accepted however, and has been subject to a degree of criticism. See R Mokal, “Liquidity, systemic risk, and the Bankruptcy treatment of financial contracts” (2016) 10(1) Brooklyn Journal of Corporate, Financial and Commercial Law 15. In relation to bankruptcy law immunities (or “safe harbours”) granted to financial contracts, the author argues that from a macro-economic perspective, “Immunities encourage systemic opacity, frothy markets, declining lending standards, the funding of negative value projects, exponentiation of leverage, and procyclical reductions in capital buffers and collateral. This is hugely corrosive to systemic stability. The disapplication of standard bankruptcy moratoria and avoidance or claw-back mechanisms, enables an asset seizure and disposal frenzy by immune creditors. This is harmful not merely to the bankruptcy estate and its stakeholders but also amplifies systemic stress through asset value contagion”: p 63. Mokal also notes that at a micro-economic level, “The primary cost of ill-chosen priority rules is the misallocation of value from the bankruptcy estate, that is, the misallocation of bankruptcy loss. The primary cost of wrong immunities is not merely the misallocation but the destruction of value from the estate”: p 15.

1013

H Liu and L Gullifer, Financial collateral arrangements in the digital asset world (2022) 8 Journal of International Banking and Financial Law 527.

1014

H J Allen, “DeFi: Shadow Banking 2.0?” (2023) 64 William & Mary Law Review 919, 920, 928-929, 942, at which the author argues that as a result of the complexity and rigidity inherent in the automated applications implemented by various platforms coupled with the sector’s capacity for generating leverage and its reliance on stablecoins, “DeFi mirrors and magnifies the fragilities of shadow banking innovations that resulted in the crisis of 2008” and that because “negative spillover effects from DeFi will wreak the most havoc on the real economy if regulated banks become integrated into the DeFi ecosystem, steps should be taken to insulate regulated banks from DeFi” (references are to page numbers in open access draft dated February 18, 2022). For further criticisms of the potential destabilising and pro-cyclicality amplifying effects of leverage in DeFi applications and the susceptibility of stablecoins to “fire sales” or “run risk”, see S Aramonte, W Huang, A Schrimpf “DeFi risks and the decentralisation illusion” (2021) BIS Quarterly Review, 29-32.

1015

Keynote Speech by John Glen MP, Economic Secretary to the Treasury, at the Innovate Finance Global Summit (4 April 2022).

1016

R Auer, M Farag and ors. “BIS Working Papers 1013 - Banking in the shadow of Bitcoin? The institutional adoption of cryptocurrencies” (2022) Bank for International Settlements Working Papers. The authors note that “...the potential for many interlinkages between novel cryptocurrency intermediaries and the mainstream financial system requires a comprehensive approach to assessing and mitigating risks... A recurring lesson from the history of financial crisis is that risks in the “shadow” corners of the financial system can quickly find their way to established and regulated institutions. . the fundamental policy choice is to either focus on a framework that allows such interlinkages but adamantly enforces a more level playing field with regard to the regulation and supervision of financial services. Alternatively, policy could treat cryptocurrencies as a selfcontained system that can develop in parallel with the mainstream financial system but does not interlink with it.”: p 4.

1017

This would include the outcome of the HM Treasury’s current consultation and call for evidence regarding a future financial services regulatory regime specifically for cryptoassets: see HM Treasury, “Future financial services regulatory regime for cryptoassets: Consultation and call for evidence” (2023) (the “2023 HM Treasury Cryptoasset Regulatory Consultation Paper”). As to the allocation of policy objectives between different legal and regulatory initiatives see P Paech, “The value of financial market insolvency safe harbours” (2016) Oxford Journal of Legal Studies 1, 26 and 39 where the author argues that although the existence and scope of “safe harbours” that disapply various insolvency code provisions to the advantage of specified financial markets participants and transactions can have a “significant influence on the behaviour of market participants towards risk-taking while they are going concerns [they are] too bold a tool to control that behaviour. This role is better left to regulation. Regulation is able to address more selectively the vast majority of adverse systemic effects in which safe harbours may have a (smaller or larger) share, notably by establishing requirements for liquidity buffers, mandatory haircuts, initial margin requirements, central clearing and in respect of risk-taking behaviour, without choking the liquidity made possible by the safe harbours.”

1018

See P Paech, “The value of financial market insolvency safe harbours” (2016) Oxford Journal of Legal Studies 1. The author points out that “[a]s a consequence of the introduction of resolution regimes the safe harbour rules will remain without effect in the most systemically relevant failures, notably those of systemically relevant banks, investment firms and infrastructures. Instead, regulators will use a completely different set of legal mechanisms to avoid contagion, including a stay on termination of contracts. Where insolvency proceedings may still occur, notably upon failure of a systemically irrelevant financial institution, the systemic risk rationale of safe harbours does not bite...”; and concludes that “To the extent that safe harbours are based on a systemic risk rationale, this is at odds with reality - the main argument, at least today, is liquidity”: pp 36, 39.

1019

For an example of how a DeFi loan liquidation can lead to a network-wide systemic loss of liquidity, sharp drops in asset prices as well as transaction congestion and high fees, see L Kelly, “How $50 Million in Loans Nearly Crashed Fantom” (7 May 2022) Decrypt.co. The report outlines how a $50m collateralised DeFi loan generated significant price instability and a system-wide degradation in functionality for the Fantom network (a layer one crypto-token protocol, listed on coinmarketcap.com with a market capitalisation at the time of the exploit of in excess of $2.4 billion). Beyond market risk vulnerabilities, DeFi platforms are complex systems that are susceptible to technical vulnerabilities as well. Funds lost by DeFi platforms due to exploits and hacks in the first four months of 2023, have reportedly been in excess of $320 million, although this is admittedly substantially down on the $1.3 billion lost in the same period the previous year (CertiK “HACK3D: The Web3 Security Quarterly Report - Q1 2023” (2023), available at: https://www.certik.com/resources). See also H J Allen, “DeFi: Shadow Banking 2.0?” (2022) William & Mary Law Review (2023) 64 William & Mary Law Review 919 and S Aramonte, W Huang, A Schrimpf “DeFi risks and the decentralisation illusion” (2021) BIS Quarterly Review, 29-32. The liquidity benefits of granting insolvency safe harbours would have to outweigh or otherwise justify accepting the potential negative consequences of a more inequitable creditor distribution and/or reduced rehabilitation prospects in the event of a collateral provider insolvency: R Mokal, “Liquidity, systemic risk, and the Bankruptcy treatment of financial contracts” (2016) 10(1) Brooklyn Journal of Corporate, Financial and Commercial Law 15.

1020

Subsequent to the publication of our consultation paper, HM Treasury have published a broad-ranging set of proposals for a new regulatory regime together with timeframes for their implementation: see the 2023 HM Treasury Cryptoasset Regulatory Consultation Paper.

1021

The chapter draws from a body of case law specifically concerned with third category things. We note however that the categorisation of some things as third category things — specifically EUAs in Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156 — has been criticised by some academic commentators. Those commentators that consider Armstrong to be incorrectly decided often characterise an EUA as a thing in action — or at least an object of personal property rights that should attract the same legal treatment as a thing in action. For debate as to the correct characterisation of an EUA, see commentary such as K Low and J Lin, “Carbon Credits as EU Like It: Property, Immunity, TragiCO2medy?” (2015) 27(3) Journal of Environmental Law 377; M Bridge, L Gullifer, K Low, and G McMeel, The Law of Personal Property (3rd ed 2021) para 15.127; and N McBride, “mcbridesguides: Armstrong v Winnington Networks Ltd” (2013), available at: http://mcbridesguides.com/wp-content/uploads/2013/08/armstrong-v-winnington-networks-ltd.pdf.

1022

However, in some cases it does. The primary example of this is the tort of conversion, but there are other distinctions and nuances that we highlight in this chapter and in Chapter 19 of our consultation paper.

1023

Simon Deane-Johns’ suggestion at pp 923-924 is dealt with by the law of misrepresentation and/or breach of contract - see the sections starting at paras 9.5 and 9.20. LawFiDAO’s suggestion at p 734 is dealt with by the law relating to injunctions - see below para 9.84. Stephan Smoktunowicz’s suggestion at p 942 is best left for consideration as part of any potential future crypto-token collateral regime; see Chapter 8 (Collateral arrangements). The COMBAR and the Chancery Bar Association at pp 388-389 (paras 45.145.5) highlight concerns in relation to data privacy, which is excluded from our terms of reference, and regulation, which we do not consider (and which is dealt with by other bodies including HM Treasury and the Financial Conduct Authority).

1024

A Burrows, A Restatement of the English Law of Contract (2nd ed 2020) p 112.

1025

We did not discuss in detail all remedies for breach of contract (for example, termination) but rather the ones we thought (and continue to think) are most relevant to third category things, or which might give rise to novel legal questions. See our discussion in our consultation paper from para 19.4.

1026

Consultation question 42 grouped together six legal frameworks, asking for views on the applicability of the frameworks absent statutory reform. One such framework was the law of breach of contract. There were 31 responses to consultation question 42. 24 of these responded generally, not differentiating between the six frameworks. Of these 24 responses, 21 agreed, two provided qualified agreement, and one provided a mixed response. Four consultees responded specifically on breach of contract. Of these, two agreed outright and two provided qualified agreement.

1027

The claim will operate in the same way as if the contract were for the exchange of shares or some other object of personal property rights.

1028

Ashurst LLP p 88 (para 4.73). If a dispute arose, a court would be required to consider whether such a clause is a penalty clause (and therefore unenforceable) and/or whether to grant relief from forfeiture in the ordinary way. See Cavendish Square Holdings BV v Talal El Makdessi [2015] UKSC 67; [2016] AC 1172 and Shiloh Spinners Ltd v Harding [1973] AC 691, as well as footnotes 1752-1753 of our consultation paper.

1029

A Burrows, Remedies for torts, breach of contract, and equitable wrongs (4th ed 2019) p 381.

1030

A Burrows, A Restatement of the English Law of Contract (2nd ed 2020) p 149.

1031

See our detailed discussion and reasoning from para 19.19 of our consultation paper.

1032

Of the 24 consultees who responded to this question, 18 agreed outright, five disagreed, and one gave a mixed view.

1033

See our consultation paper at para 19.19; Hugh James LLP p 578; Professor Milne p 47; AFME and AGC pp 27-28; CLLS-FLC p 532. Broader discussions around whether crypto-tokens are money are outside the scope of this analysis.

1034

B Geva and D Geva, “Non-State Community Virtual Currencies” in D Fox and S Green, Cryptocurrencies in Public and Private Law (2019) para 11.56.

1035

At least in England and Wales and other jurisdictions that have not adopted certain crypto-tokens as legal tender. “Legal tender” is usually taken to refer to the banknotes or coins which constitute the national currency issued under the legislation of the State: S Green, “’It's Virtually Money” in D Fox and S Green, Cryptocurrencies in Public and Private Law (2019) paras 2.31-2.33.

Professor Sarah Green is the Commissioner for Commercial and Common Law at the Law Commission of England and Wales, and lead Commissioner for this project.

1036

See B Geva and D Geva, “Non-State Community Virtual Currencies” in D Fox and S Green, Cryptocurrencies in Public and Private Law (2019) para 11.10, and Re United Railways of the Havanas and Regla Warehouse Ltd [1961] AC 1007. This position was, however, rejected in Miliangos v George Frank (Textiles) Ltd [1976] AC 443 in the context of foreign currency obligations. We contrast this historic position with the current modern position in relation to foreign debt claims, and how they might be applied to an obligation to “pay” crypto-tokens, at para 9.14 below.

1037

As Professor Green observes: “the principal consequence for a disappointed seller, having agreed to accept bitcoin, would seem to be remedial, since she thereby loses the ability to sue for the price. This denies the seller the ability to enforce the primary obligation, and its corresponding advantages: debt claims are not discretionary, nor are they subject to the common law constraints of remoteness, mitigation, or penalties, and it is both procedurally and substantively easier for debt claimants to obtain summary judgment”. S Green, “It’s Virtually Money” in D Fox and S Green, Cryptocurrencies in Public and Private Law (2019) para 2.43.

1038

See the response of the Electronic Money Association p 489. See also our discussions on CBDCs and stablecoins in Chapter 8 (Collateral arrangements) in the context of the Financial Collateral Arrangements (No 2) Regulations 2003 (“FCARs”).

1039

The Singapore High Court held that the claimant was a “creditor” within s 124(1)(c) of the Insolvency, Restructuring and Dissolution Act 2018 but that an obligation to re-transfer loaned stablecoins (USDC) could not constitute a monetary debt for the purposes of a statutory demand under s 125(2)(a) of that Act: Algorand Foundation Ltd v Three Arrows Capital Pte Ltd (HC/CWU 246/2022).

1040

Dr Crawford p 808.

1041

A Burrows, Remedies for torts, breach of contract, and equitable wrongs (4th ed 2019) p 402.

1042

Conversely, treating arrangements denominated in crypto-tokens as monetary debts and developing the law to permit an action for the agreed sum in relation to certain crypto-tokens might undermine the existing design and operation of certain DeFi arrangements. That is because many such arrangements rely on the functionalities of crypto-token systems themselves to automate (or render deterministic) certain processes that mimic or replicate the substantive economic effect of traditional finance arrangements, such as collateralised loans but those arrangements are, in general, intentionally not structured as “monetary debt” arrangements.

1043

This example was given by Mr Justice Zacaroli in a lecture delivered to the Insolvency Lawyers Association on 17 October 2019, reproduced in South Square Digest (November 2019) available at: https://southsquare.com/wpcontent/uploads/2019/11/Digest-Nov-2019.pdf.

1044

That is, the current modern position in relation to foreign debt claims, as opposed to the historic treatment of foreign debt claims which we discuss in para 9.10 above.

1045

See rule 14.21 Insolvency Rules 2016: “(1) A proof for a debt incurred or payable in a foreign currency must state the amount of the debt in that currency. (2) The office-holder must convert all such debts into sterling at a single rate for each currency determined by the office-holder by reference to the exchange rates prevailing on the relevant date.”

1046

Mr Justice Zacaroli in a lecture delivered to the Insolvency Lawyers Association on 17 October 2019, reproduced in South Square Digest (November 2019) available at: https://southsquare.com/wpcontent/uploads/2019/11/Digest-Nov-2019.pdf.

1047

Including the US Chapter 11 bankruptcy reorganisation proceedings in respect of Celsius Network LLC (https://cases.stretto.com/Celsius/court-docket/), Voyager Digital Holdings Inc (https://cases.stretto.com/Voyager/court-docket/), FTX Trading Ltd (https://restructuring.ra.kroll.com/FTX/Home-DocketInfo), and the appointment of joint provisional liquidators over the hedge fund Three Arrows Capital Ltd.

1048

A Burrows, A Restatement of the English Law of Contract (2nd ed 2020) pp 178-179.

1049

The effect of rescission is that the contract is set aside from the start. The term “rescission” is also sometimes used to describe the termination of the contract with prospective effect. However, today, the term is more commonly used to describe the retrospective setting aside or wiping away of the contract: see Goff & Jones: The Law of Unjust Enrichment (10th ed 2022) para 40-02.

1050

We received limited feedback on this area of our consultation paper. Five consultees responded. Of these, three provided qualified agreement, one provided a mixed view, and one disagreed with our provisional conclusion that no law reform was required. See n 1026 above for the structure of responses to consultation question 42.

1051

Chitty on Contracts (34th ed 2021) para 5-001; Pitt v Holt [2013] UKSC 26, [2013] 2 WLR 1200 at [108][109], by Lord Walker.

1052

Chitty on Contracts (34th ed 2021) para 5-001. Note, however, that not all mistakes will render a contract void, but only fundamental mistakes: see Chitty on Contracts (34th ed 2021) para 5-008.

1053

See para 19.30 and paras 19.39-19.42 of our consultation paper.

1054

King’s College London pp 680-681. A similar point is made by Dr Maddox and Dr Richardson pp 833-834.

1055

A “misrepresentation” can be defined as a false representation, by words or conduct, about a matter of fact or law: Chitty on Contracts (34th ed 2021) para 9-006.

1056

Where the party making the representation knows that it is false or is reckless as to whether it is true or false: Derry v Peek (1889) 14 App Cas 337.

1057

Where the party making the representation did not have reasonable grounds for believing it to be true: Hedley Byrne & Co Ltd v Heller & Partners Ltd [1964] AC 465; Esso Petroleum Co Ltd v Mardon [1976] QB 801.

1058

Where the party making the representation was neither fraudulent nor negligent.

1059

In cases of non-fraudulent misrepresentation, the court also has a discretion to refuse rescission and order damages in lieu if it considers “that it would be equitable to do so”, having regard to the nature of the misrepresentation, the loss caused to the claimant if the contract were upheld, and the loss that rescission would cause to the defendant: Misrepresentation Act 1967, s 2(2).

1060

Where the claimant has suffered loss as a result of entering into the contract, they might be entitled to damages in the law of tort. For example, in the case of fraudulent misrepresentation the claimant may be able to claim damages under the tort of deceit. In the case of negligent misrepresentation the claimant might be able to obtain damages through the tort of negligence. Damages are also potentially available under the Misrepresentation Act 1967, s 2(1).

1061

King’s College London at pp 681-682 said that damages awarded under s 2(1) of the Misrepresentation Act 1967 are awarded on the same basis as if they were awarded for a fraudulent misrepresentation - Royscot Trust v Rogerson [1991] 2 QB 297. This is despite the fact that, under s 2(1), a claimant need only establish that they entered into the contract after a misrepresentation was made by another party to the contract. This means, although there might be no fraud, that the defendant is liable as if there were a fraud, meaning they are potentially liable for all damages flowing from the loss (not merely those within the reasonable contemplation of the parties) - Doyle v Olby (Ironmongers) Ltd [1969] 2 QB 158. King’s College London said that “the ease and frequency with which digital assets can be traded or utilized means that the losses which might arise as a result of an actionable misrepresentation under s 2(1) could be far beyond what either party might contemplate or reasonably foresee.”

1062

We note that crypto-tokens are not the only assets traded with ease and at high frequency. Markets for debt or equity securities and financial instruments might operate in similar conditions. We are not convinced that reform is needed in the specific context of third category things or crypto-tokens, given the seemingly sufficient operation of the law of misrepresentation in mainstream financial contexts. Courts appear to take a commercial, pragmatic approach when considering cases arising out of these environments: Peekay Intermark Ltd v Australia and New Zealand Banking Group Ltd [2006] EWCA Civ 386. See A Hudson, Securities Law (2nd ed 2013) at paras 24-113-24-114.

1063

Pakistan International Airline Corporation v Times Travel (UK) Ltd [2021] UKSC 40, [2021] 3 WLR 727 at [62], by Lord Burrows.

1064

Above.

1065

Royal Bank of Scotland v Etridge (No 2) [2001] UKHL 44, [2002] 2 AC 773.

1066

UCB Corporate Services Ltd v Williams [2002] EWCA Civ 555 at [86], by Jonathan Parker LJ.

1067

Chitty on Contracts (34th ed 2021) para 1-074.

1068

Cundy v Lindsay (1878) 3 App Cas 459 at 466, by Lord Cairns LC; Benjamin’s Sale of Goods (11th ed 2021) para 16-092.

1069

Westdeutsche Landesbank Girozentrale v Islington London Borough Council [1996] AC 669 at 689 to 690 by Lord Goff who says that “there is no general rule that the property in money paid under a void contract does not pass to the payee”. Professor Fox considers these issues (in relation to money) in detail: D Fox, Property Rights in Money (2008) ch 4.

1070

Instead, the innocent party may have a personal restitutionary claim under the law of unjust enrichment for the value of the benefit transferred pursuant to the void contract: Guinness Mahon & Co Ltd v Kensington and Chelsea Royal London Borough Council [1999] QB 215 (CA); A Burrows, A Restatement of the English Law of Contract (2nd ed 2020) p 179.

1071

Crypto-token system immutability can render it practically impossible to unwind transactions effected in the system: see para 19.40 of our consultation paper.

1072

See para 19.40 of our consultation paper.

1073

We think that this could potentially be analysed as being conceptually similar to an order for delivery up pursuant to a constructive trust.

1074

This could be achieved through a claim in unjust enrichment. See further N Yeo and A Taylor, “Avoiding blockchain contracts” (2019) 9 Journal of International Banking and Financial Law 586.

1075

Norton Rose Fulbright LLP at p 850 said that there is no need to caveat the process of ordering an “equal and opposite” second transaction as not being “rescission in a strict legal sense” (as we wrote at para 19.41 of our consultation paper).

1076

Technically speaking therefore, they are not themselves remedies; rather, they facilitate or permit a claimant to assert their right to other remedies: Foskett v McKeown [2001] 1 AC 102 at 113, by Lord Steyn; G Virgo, The Principles of the Law of Restitution (3rd ed 2015) p 612.

1077

Foskett v McKeown [2001] 1 AC 102 at 127, by Lord Millett.

1078

See G Virgo, The Principles of the Law of Restitution (3rd ed 2015) p 557 for a discussion on terminology in this context. As the author notes, all restitutionary claims which are founded on the claimant’s proprietary rights are properly classified as proprietary claims, since they are dependent solely upon the identification and protection of proprietary rights. But the remedies are not necessarily proprietary remedies, since, depending on the particular circumstances of the case, the appropriate remedy may be either proprietary or personal. See also Trustee of the Property of FC Jones and Sons (a firm) v Jones [1997] Ch 159 at 168 by Millett LJ for a brief mention of the distinction between proprietary claims and proprietary remedies.

1079

Foskett v McKeown [2001] 1 AC 102 at 127, by Lord Millett.

1080

The orthodox view is that the claimant is showing that the value of the property in which they originally had a proprietary interest can be identified in (or “traced” to) property that has been received by the defendant: Foskett v McKeown [2001] 1 AC 102 at 127-128, by Lord Millett. See also G Virgo, The Principles of the Law of Restitution (3rd ed 2015) p 608. However, see T Cutts, “Tracing, Value and Transactions” (2016) 79 Modern Law Review 381, which presents challenges to the view that tracing should be understood as the process of following value through one or more substitutions.

1081

T Cutts, “Dummy asset tracing” (2019) 135 Law Quarterly Review 140, 143.

1082

See Chapter 12 of our consultation paper.

1083

Foskett v McKeown [2001] 1 AC 102 at 127, by Lord Millett.

1084

See paras 19.47-19.51 of our consultation paper.

1085

See generally Spence v Union Marine Insurance Co Ltd (1868) LR 3 CP 427 and Indian Oil Corp Ltd v Greenstone Shipping SA (Panama) [1988] QB 345.

1086

Trustee of the Property of FC Jones v Jones [1997] Ch 159 at 169, by Millett LJ. It has been said that tracing at common law is only possible where there is a “clean substitution”: A Burrows, The Law of Restitution (3rd ed 2011) p 123. Examples of clean substitutions are the exchange of a car for a boat, or a cow for a goat. See also G Virgo, The Principles of the Law of Restitution (3rd ed 2015) p 615, where the point is made that: “Where there has been an irretrievable mixing it is simply not possible to say in what property the claimant has a proprietary interest. Consequently, where such mixing has occurred, the claimant’s legal title to the property will be extinguished".

1087

Trustee of the Property of FC Jones v Jones [1997] Ch 159 at 168, by Millett LJ. However, some case law suggests that when money is withdrawn from a bank account, thus converting the thing in action (the bank account debt) into drawn money, a claimant might be able to trace at common law from the bank account into the drawn money (even where that drawn money was mixed with other money): Lipkin Gorman v Karpnale Ltd [1991] 2 AC 548. Agip (Africa) Ltd v Jackson [1990] Ch 265 at 286, by Millett J, upheld [1991] Ch 547 at 566, by Fox LJ; Snell’s Equity (34th ed 2019) para 30-053. Professor Smith has previously argued against mixing defeating tracing at common law: L Smith, The Law of Tracing (1997) pp 71, 162-174.

1088

Re Hallett’s Estate (1880) 13 Ch D 696; G Virgo, The Principles of the Law of Restitution (3rd ed 2015) p 628.

1089

Foskett v McKeown [2001] 1 AC 102 at 113, by Lord Steyn, and 128-129, by Lord Millett.

1090

T Grant and D Mumford, Civil Fraud: Law, Practice & Procedure (1st ed 2018) para 23-008. See further: P Birks, “The Necessity of a Unitary Law of Tracing”, in R Cranston, Making Commercial Law, Essays in Honour of Roy Goode (1997) pp 239-258; L Smith, The Law of Tracing (1997); J English and M Hafeez-Baig, The Law of Tracing (2021).

1091

See our consultation paper paras 12.10-12.60.

1092

Specifically, NFTs on Ethereum commonly implement the ERC-721 standard interface which includes a ‘tokenId’ variable that creates a unique pair between the tokenId and the smart contract address. Available at: https://eips.ethereum.org/EIPS/eip-721. The BAYC token smart contract can be viewed at: https://etherscan.io/token/0xbc4ca0eda7647a8ab7c2061c2e118a18a936f13d.

1093

The proprietary interest (if any) retained by the user will differ depending on the type of intermediated holding arrangement involved. See further Chapter 7 (Intermediated holding arrangements).

1094

This is particularly the case with Account-based tokens and crypto-tokens based on “fungible” token standards, although it is arguably less likely with UTXO-based tokens and is not the case with NFTs. See D Fox, “Cryptocurrencies in the Common Law of Property” in D Fox and S Green, Cryptocurrencies in Public and Private Law (2019) para 6.76, where the point is made that: “the unique transactional history recorded in some crypto-coins, such as bitcoins, may mean that it can never be mixed in an absolute sense”.

1095

In high-level terms, an automated market maker is a smart-contract based mechanism which mathematically defines the price of certain pairs of crypto-tokens and provides liquidity for those pairs of tokens (in “pools”). If a person wants to swap one crypto-token for another, they can make a trade directly with the automated market maker smart contract, using the relevant liquidity pool(s).

1096

For example, MakerDAO’s protocol is a complex system, supporting the stablecoin ‘DAI’ pegged to the US dollar. DAI tokens may be burnt, ie permanently removed from circulation, when their associated “collateral” falls too low or when the DAI is repaid to release the “collateral”. See, eg, Maker Foundation, “Maker Protocol 101” pp 8 and 27, available at: https://docs.makerdao.com/getting-started/maker-protocol-101.

1097

Professor Cutts p 972. See also Ashurst LLP p 88 (para 4.76): “By reason of the Law Commission's approach to the transfer of crypto-tokens, the Law Commission also appears to view the options between following and tracing as binary in relation to the much wider category of data objects. We consider such a restrictive approach to be unnecessary. Both following and tracing are evidential processes. Both may be applicable. The applicability of one over the other is to be determined by the facts of a given case to determine the most appropriate analytical process.”

1098

See T Cutts, “Dummy asset tracing” (2019) 135 Law Quarterly Review 140.

1099

Foskett v McKeown [2001] 1 AC 102 at 127, by Lord Millett: “The transmission of a claimant's property rights from one asset to its traceable proceeds is part of our law of property, not of the law of unjust enrichment. ... Property rights are determined by fixed rules and settled principles. They are not discretionary. They do not depend upon ideas of what is "fair, just and reasonable".”; P Millett, ‘Proprietary Restitution’ in S Degeling and J Edelman, Equity in Commercial Law (2005) p 325.

1100

A Burrows, The Law of Restitution (3rd ed 2011) ch 6.

1101

M Bridge, L Gullifer, K Low, and G McMeel, The Law of Personal Property (3rd ed 2021) para 32-027.

1102

Professor Cutts argues that a defendant should be liable “either because [they] actuated or participated in a breach of some duty owed to the claimant, or because the claimant’s agent lacked the authority to effect the bank transfer to [them]”: T Cutts, “Dummy Asset Tracing” (2018) pp 29-30, available at: https://eprints.lse.ac.uk/87541/1/Cutts_Dummy%20Asset%20Tracing_Author.pdf; T Cutts, “Dummy asset tracing” (2019) 135 Law Quarterly Review 140.

1103

Snell’s Equity (34th ed 2019) para 30-001.

1104

Without having first obtained informed consent from their principal. See Bristol & West Building Society v Mothew [1998] Ch 1 at 18, by Millett LJ. For more detail, see para 19.55 of our consultation paper; see also Chapter 7 (Intermediated holding arrangements) from para 7.123.

1105

M Bridge, L Gullifer, K Low and G McMeel, The Law of Personal Property (3rd ed 2021) para 36.023.

1106

See paras 19.44-19.45 of our consultation paper.

1107

Foskett v McKeown [2001] 1 AC 102 at 127-128, by Lord Millett. This includes both trustees in breach of trust and innocent third-party recipients who have, for example, been gifted assets by a defaulting trustee.

1108

For example, a fiduciary who receives a bribe or secret commission in breach of fiduciary duty will hold that profit on constructive trust for their principal: FHR European Ventures LLP v Cedar Capital Partners LLC [2014] UKSC 45, [2015] AC 250. See further Chapter 7 (Intermediated holding arrangements) paras 7.1237.129.

1109

A trustee may for example fail to exercise proper care when selecting investments. See Trustee Act 2000, s 3; Pauling's Settlement Trusts (No 2) [1963] Ch 576 at 586, by Wilberforce J; Byrnes v Kendle [2011] HCA 26 (High Court of Australia) at [119], by Heydon and Crennan JJ. On the relationship between trusteeship and crypto-tokens, see generally L Brown, “Cryptocurrencies and trustees: what are the risks?” (2023) 29(3) Trusts & Trustees 186.

1110

AIB Group (UK) Plc v Mark Redler & Co Solicitors [2014] UKSC 58, [2015] AC 1503. See Snell’s Equity (34th ed 2019) para 30-011.

1111

This is an accessorial form of liability, applicable to a defendant who dishonestly assists or induces a trustee or fiduciary to commit a breach of trust or other fiduciary duty: Snell’s Equity (34th ed 2019) paras 30-07730-082.

1112

Arthur v A-G of the Turks and Caicos Islands [2012] UKPC 30.

1113

Novoship (UK) Ltd v Mikhaylyuk [2014] EWCA Civ 908, [2015] QB 499.

1114

Paragon Finance plc v DB Thakerar and Co [1999] 1 All ER 400 at 408, by Millett LJ.

1115

The claimant must show that the trust property was disposed of in breach of fiduciary duty or breach of trust, and that this property (or its traceable proceeds) was received by the defendant for their own benefit (in the knowledge that the trust property had been transferred in breach of fiduciary duty or breach of trust): El Ajou v Dollar Land Holdings Plc [1994] 1 All ER 685; Bank of Credit and Commerce International (Overseas) Ltd v Akindele [2001] Ch 437, 438 (CA). See further Lewin on Trusts (20th ed 2020) para 42-023.

1116

See paras 19.66-19.69 of our consultation paper. We discussed the contexts where digital assets may be held on trust in paras 16.52-16.74 of our consultation paper.

1117

See paras 19.66-19.69 of our consultation paper. See also Chapter 7 (Intermediated holding arrangements) paras 7.123-7.129.

1118

See n 1026 above for the structure of responses to consultation question 42. Five consultees responded specifically on equitable wrongs. Three agreed, one provided qualified agreement, and one gave a mixed response.

1119

Law Society (at pp 723-724) generally agreed with our provisional conclusion but noted that questions might arise in practice as to the existence or otherwise of fiduciary relationships in crypto-token contexts, citing the ongoing Tulip Trading litigation ([2023] EWCA Civ 83, [2023] 4 WLR 16; [2022] EWHC 667 (Ch)). In its response, CILEX wrote that its survey data “indicates that ... Equitable Wrongs have a mixed view from our members regarding the requirement for Statutory Law Reform” (at p 278 (para 6.4)). This was not elaborated on.

1120

Westdeutsche Landesbank Girozentrale v Islington London Borough Council [1996] AC 669 at 716, by Lord Browne-Wilkinson.

1121

D Fox, Property Rights in Money (2008) para 4.106.

1122

Above para 4.99.

1123

In general, a mere equity is a claimant's inchoate (imperfectly formed) right to rescind or to claim an equitable interest which is binding on specific property. That inchoate right will transform into an equitable proprietary claim (an equitable interest) if and when the person chooses to enforce it. In other words, the person must perform some other act to cause their mere equity to crystallise as an equitable interest. See Snell’s Equity (34th ed 2019) para 2-006.

1124

Snell’s Equity (34th ed 2019) para 26-013; Shalson v Russo [2003] EWHC 1637 (Ch), [2005] Ch 281 at [108] and [111], by Rimer J; B Hacker, "Proprietary restitution after impaired consent transfers: a generalised power model" (2009) 68(2) Cambridge Law Journal 324.

1125

Shalson v Russo [2003] EWHC 1637 (Ch), [2005] Ch 281 at [109]-[118], by Rimer J. See further: S Thomas, “Thieves as Trustees: The Enduring Legacy of Black v S Freedman & Co Ltd” (2009) 3 Journal of Equity 52.

1126

D Fox, Property Rights in Money (2008) paras 4.103-4.106; J Tarrant, “Thieves as Trustees: In Defence of the Theft Principle” (2009) 3 Journal of Equity 170. This analysis is endorsed in Snell's Equity (34th ed 2019) para 26-012 and G Virgo, The Principles of Equity & Trusts (5th ed 2023) pp 292-293.

1127

Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156. EUAs are a form of carbon emissions allowance - see [1] and paras 4.67-4.75 above.

1128

Above at [276].

1129

Above at [287]. What is not clear is whether, although the causes of action seem to have been argued in the alternative, the causes of action needed to have been treated by the claimant or the court as mutually exclusive, given the argument made by Professor Fox (see n 1126 above). See L Chambers and C Buckingham, “Intangible Property and Proprietary Restitution in the High Court” (2013) 3 Lloyd’s Maritime and Commercial Law Quarterly 296.

1130

Piroozzadeh v Persons Unknown [2023] EWHC 1024 (Ch) at [23]-[30], by Trower J; Osbourne v Persons Unknown [2023] EWHC 340 (KB) at [24], by James Healy-Pratt; Osbourne v Persons Unknown [2022] EWHC 1021 (Comm) at [25]-[27], by Judge Pelling QC; Wang v Darby [2021] EWHC 3054 (Comm), [2022] Bus LR 121 at [60]-[92], by Stephen Houseman QC; LMN v Bitflyer Holdings Inc [2022] EWHC 2954 (Comm) at [19], by Butcher J; Jones v Persons Unknown [2022] EWHC 2543 (Comm) [21]-[31], by Nigel Cooper QC; DAloia v Persons Unknown [2022] EWHC 1723 (Ch) at [12]-[27], by Trower J.

1131

Osbourne v Persons Unknown [2022] EWHC 1021 (Comm) paras [8] and [25]-[27] (see paras 19.13219.134 of our consultation paper; Jones v Persons Unknown [2022] EWHC 2543 (Comm), criticised by T Chan and K Low, “Post-Scam Crypto Recovery: Final Clarity or Deceptive Simplicity?” (2023), available at: https://ssrn.com/abstract=4394820.

1132

Many of the cases involving crypto-tokens and NFTs involved interim applications in which a party was seeking an order or directions before the substantive hearing of a claim. They were therefore concerned with specific preliminary issues (such as whether the court has, or should accept jurisdiction), and subject to rules which limit the extent to which these issues are argued before the court.

1133

For a discussion of this point, see Piroozzadeh v Persons Unknown [2023] EWHC 1024 (Ch).

1134

See above n 1130.

1135

See Piroozzadeh v Persons Unknown [2023] EWHC 1024 (Ch) at [23]-[30], by Trower J. See also from para 6.56 in Chapter 6 (Transfers) where we discuss common law special defences of good faith purchase for value without notice and the equitable principle of good faith purchase for value without notice.

1136

See Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156 at [272][276], by Stephen Morris QC and Jones v Persons Unknown [2022] EWHC 2543 (Comm) at [21], by Nigel Cooper QC. As we discuss from para 9.39 above, and from para 19.125 of our consultation paper, we do not think these cases provide conclusive authority for the proposition that some form of control-based legal proprietary interest to a crypto-token can be the subject matter of a constructive trust held for the benefit of a victim of theft who (also) retains the superior legal title. Nevertheless, we think that this argument is conceptually more appealing when applied to crypto-tokens than things in action, given the position put forward in this report that a control-based legal proprietary interest can be separated from (and be inferior to or short of) a superior legal title to a crypto-token (whereas that is not possible for a thing in action).

1137

Chapter 5 (Control) from para 5.23.

1138

Burning is discussed in the context of remedies by Hin Liu, who in response to our consultation paper provided an early draft of “Interference torts in the digital asset world”, which is now on SSRN, available at: https://ssrn.com/abstract=4433956.

1139

M Graham, “Burning Crypto Tokens: What Does it Mean & How Does it Work?” (2022), https://boardroom.tv/burning-crypto-tokens-definition/#:~:text=Benefits%20of%20burning%20crypto&text=For%20coins%20like%20Bitcoin%2C%20ther e,proof%2Dof%2Dstake%20network.

1140

See https://notes.ethereum.org/@vbuterin/eip-1559-faq; and https://consensys.net/blog/quorum/what-is-eip-1559-how-will-it-change-ethereum/.

1141

Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156.

1142

Above at [84]-[85], by Stephen Morris QC. It is worth noting that the existence of a proprietary restitutionary claim at law, as distinct from a claim in unjust enrichment, has been criticised by a number of commentators, especially as regards claims to property which is substituted for the original property received. See P Birks, Unjust Enrichment (2nd ed 2005) pp 34 to 36; A Burrows, “Proprietary Restitution: Unmasking Unjust Enrichment” (2001) 117 Law Quarterly Review 412.

1143

Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156 at [84]-[85], by Stephen Morris QC.

1144

Above at [86].

1145

Above at [94].

1146

See paras 19.73-19.76 of our consultation paper. Even so, it is important to note that, as a general rule, the common law has no proprietary remedies (OBG Ltd v Allan [2007] UKHL 21, [2008] AC 1 at [308], by Baroness Hale). Consequently, if the claimant has retained legal title to the object of personal property rights which was received by the defendant, the claimant can only claim the value of the property rather than the property itself (Trustee of the Property of FC Jones and Sons (a firm) v Jones [1997] Ch 159 at 168, by Millett LJ). The only true exception to this relates to land, where the claimant is able to recover land from the defendant. There is also the remedy of delivery up of goods under s 3(3) of the Torts (Interference with Goods) Act 1977, which is a proprietary remedy which is available where the defendant has committed a tort involving interference with the claimant’s property rights, such as conversion. But this remedy is discretionary and is only available where compensatory damages are an inadequate remedy.

1147

See below para 9.63. D Fox, “Cryptocurrencies in the Common Law of Property” in D Fox and S Green, Cryptocurrencies in Public and Private Law (2019) para 6.102

1148

Such a claimant’s claim for restitution of an unjust enrichment would be unlikely to succeed for several reasons, one being that the claimant will not be able to demonstrate that the defendant was enriched at their expense. Instead, the defendant’s enrichment was at the expense of the third party, who transferred the property to them. See generally, Investment Trust Companies v Revenue and Customs Commissioners [2017] UKSC 29, [2018] AC 275, and Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156 at [95]-[98], by Stephen Morris QC.

1149

We discuss how the law on derivative transfer of title is applicable to crypto-tokens and third category things in Chapter 6 (Transfers) and in Chapter 13 of our consultation paper.

1150

Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156 at [85], by Stephen Morris QC: “The asset in respect of which the claimant is asserting a claim may be identified by following the claimant’s original asset into the defendant’s hands or by tracing it into a substitute asset in the defendant’s hands”.

1151

See above n 1026 for the structure of responses to consultation question 42. Four consultees responded specifically on proprietary restitution. Two agreed, one provided a mixed response, and one disagreed. The one consultee in disagreement - CILEX - suggested without elaboration that further consideration might be needed in relation to the application of proprietary restitution to digital assets. For further consideration of proprietary restitution in relation to the burning of crypto-tokens, see below paras 9.52-9.54.

1152

Above at [85].

1153

G Virgo, The Principles of the Law of Restitution (3rd ed 2015) p 558. Professor Virgo considers that, where a personal remedy to a proprietary restitutionary claim (at law) is sought, it might not be necessary for the defendant to retain the object of personal property rights. However, this proposition is based on the availability of an action for money had and received, which was expressly rejected as the basis of a proprietary restitutionary claim in Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156 at [90], by Stephen Morris QC. See further N McBride, “mcbridesguides: Armstrong v Winnington Networks Ltd” (2013), available at: http://mcbridesguides.com/wp-content/uploads/2013/08/armstrong-v-winnington-networks-ltd.pdf.

1154

Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156 at [85] and [88], by Stephen Morris QC. See also [67] and [68] which discusses the distinction between following EUAs and tracing substitute proceeds, although this distinction was not made again at [287].

1155

Chitty on Contracts (34th ed 2021) para 3.088.

1156

Boake Allen Ltd v HMRC [2006] EWCA Civ 25, [2006] STC 606 at [175], by Mummery LJ.

1157

Banque Financiere de la Cite v Parc (Battersea) Ltd [1999] 1 AC 221 at 227, by Lord Steyn.

1158

A defendant to an unjust enrichment claim may be able to raise a defence, such as change of position: Lipkin Gorman v Karpnale Ltd [1991] 2 AC 548 at 580, by Lord Goff.

1159

Bank of Cyprus UK Limited v Menelaou [2015] UKSC 66, [2016] AC 176 at [81], by Lord Neuberger.

1160

Fetch.ai Ltd v Persons Unknown [2021] EWHC 2254 (Comm). See also the Malaysian case of Robert Ong Thien Cheng v LUNO Pte Ltd [2021] 3 All Malaysia Rep 143 (albeit considering section 73 of the Malaysian Contracts Act 1950, not the common law of unjust enrichment). See further: A W-L See and M Yip, “Restitution of Mistakenly Transferred Bitcoins” (2022) 1 Lloyd's Maritime and Commercial Law Quarterly 46.

1161

For more detail, see paras 19.80-19.86 of our consultation paper.

1162

See above n 1026 for the structure of responses to consultation question 42. Four consultees responded to our consultation question on unjust enrichment. Three agreed and one disagreed.

1163

The analysis of an enrichment might also depend on whether the crypto-token in question is non-fungible or fungible, as this will be relevant for determining the market value of such things. Similarly, questions of timing could play an important role, particularly where the value of digital objects such as crypto-tokens and NFTs fluctuates significantly. For example, see Osbourne v Persons Unknown [2022] EWHC 1021 (Comm); Osbourne v Persons Unknown [2023] EWHC 39 (KB); Osbourne v Persons Unknown [2023] EWHC 340 (KB).

1164

Establishing enrichment at the claimant’s expense may require reference to principles of following or tracing - see above from para 9.24.

1165

Hin Liu provided an early draft of “Interference torts in the digital asset world”, which is now on SSRN, available at: https://ssrn.com/abstract=4433956. The content referenced by this footnote is available at p 3 of the SSRN draft.

1166

If the defendant obtained control of the claimant’s crypto-token at any point during the burning process, they are likely to have been enriched, regardless of their subsequent loss of the token: Agip (Africa) Ltd v Jackson [1990] Ch 265 at 285, by Millett J.

1167

A Burrows, The Law of Restitution (3rd ed 2011) ch 16.

1168

Goff & Jones: The Law of Unjust Enrichment (10th ed 2022) ch 8.

1169

Esben Finance Ltd v Wong Hou-Lianq Neil [2022] SGCA(I) 1.

1170

R Leow and T Liau, “A Pyrrhic Victory for Unjust Enrichment in Singapore? Esben Finance Ltd v Wong Hou-Lianq Neil” (2023) 86(2) Modern Law Review 518.

1171

[2012] EWHC 2168 (Ch) at [86], by Sales J.

1172

The outcome in Relfo Ltd v Varsani was upheld by the Court of Appeal ([2014] EWCA Civ 360), although without discussion of the unjust factor/ground for restitution. Goff & Jones: The Law of Unjust Enrichment (10th ed 2022) at p 245 treats this case as judicial endorsement of the existence of a “lack of consent” ground for restitution. However, the judgment and its potential implications have also received criticism, see L Chambers and C Buckingham, “Intangible Property and Proprietary Restitution in the High Court” (2013) 3 Lloyd’s Maritime and Commercial Law Quarterly 296 at 302.

1173

For criticism, see: W Swadling, “Ignorance and Unjust Enrichment: The Problem of Title” (2008) 28(4) Oxford Journal of Legal Studies 627; R Chambers and J Penner, “Ignorance” in S Degeling and J Edelman, Unjust Enrichment in Commercial Law (2008) ch 13.

1174

G Virgo, The Principles of the Law of Restitution (3rd ed 2015) p 152.

1175

Boake Allen Ltd v HMRC [2006] EWCA Civ 25, [2006] STC 606 at [175], by Mummery LJ.

1176

Kuwait Airways v Iraq Airways Co [2002] UKHL 19; [2002] 2 AC 883 at [67], by Lord Nicholls; Clerk & Lindsell on Torts (23rd ed 2020) paras 16-95-16-107.

1177

OBG Ltd v Allan [2007] UKHL 21, [2008] 1 AC 1.

1178

See paras 19.89-19.99 of our consultation paper.

1179

S Green and J Randall, The Tort of Conversion (2009) p 75.

Professor Sarah Green is the Commissioner for Commercial and Common Law at the Law Commission of England and Wales, and lead Commissioner for this project.

1180

See Tongue v RSPCA [2017] EWHC 2508 (Ch) where the defendant was liable in conversion for moving cattle from an absent farmer’s land without permission, although this was done to enable the cattle to be better cared for. See also Marfani & Co Ltd v Midland Bank Ltd [1968] 1 WLR 956 at 970-971, by Diplock LJ

1181

Marfani & Co Ltd v Midland Bank Ltd [1968] 1 WLR 956 at 970-971, by Diplock LJ, who noted that this principle was “subject to some exceptions”.

1182

Section 3(2) of the Torts (Interference with Goods) Act 1977 provides several remedies for conversion. For further detail and relevant authorities, see paras 19.92-19.94 of our consultation paper.

1183

OBG Ltd v Allan [2007] UKHL 21, [2008] 1 AC 1 (incorporeal property); Stewart v Engel [2000] BCC 741 (copyright); Murphy v Electoral Commission [2019] EWHC 2762 (QB), [2020] 1 WLR 480 (information); Your Response Ltd v Datateam Business Media Ltd [2014] EWCA Civ 281, [2015] QB 41 (documents stored electronically on a computer drive).

1184

[2007] UKHL 21, [2008] 1 AC 1.

1185

See paras 19.95-19.99 of our consultation paper; Electronic Trade Documents (2022) Law Com No 405 at pp 81-82.

1186

See para 19.103 of our consultation paper.

1187

See para 19.105 of our consultation paper. We also considered that reform to the Torts (Interference with Goods) Act 1977 would be needed: see para 19.106 of our consultation paper.

1188

See para 19.123 of our consultation paper. We asked consultees whether they agreed with our provisional conclusion that, in relation to the tort of conversion, there are arguments in favour of extending conversion (or a conversion-type cause of action grounded in control rather than possession).

1189

Six general arguments were made by consultees. First, that control is distinct from possession. Second, that there is a large amount of conceptual baggage associated with the tort of conversion. Third, that there are significant differences between third category things and tangible things that warrant different treatment. Fourth, that strict liability in conversion is not appropriate for interactions with third category things. Fifth, that other forms of legal protection are available. Sixth, that a new, distinct cause of action would be preferable. We touch on all of these in our discussion below.

1190

See from para 19.95 of our consultation paper; Electronic Trade Documents (2022) Law Com No 405 at pp 81-82.

1191

For example, the tort of inducing (or procuring) a breach of contract - see Clerk & Lindsell on Torts (23rd ed 2020) para 23-04.

1192

See, for example, Copinger and Skone James on Copyright (18th ed 2020) ch 7.

1193

Clifford Chance LLP, pp 316-317.

1194

See above para 9.55.

1195

See above para 9.47.

1196

For arguments that there might already be sufficient forms of protection available in relation to third category things, see: Professor Sheehan p 483; Law Society p 724; and CLLS-FLC pp 533-534.

1197

See Glossary.

1198

For reasons not to extend proprietary restitution, see above from para 9.53. For reasons not to extend unjust enrichment, see above from para 9.59.

1199

S Douglas, “The Scope of Conversion: Property and Contract” (2011) 74(3) Modern Law Review 329, 338.

1200

CLLS-FLC at pp 533-534 write that extending conversion directly in the context of third category things “would create unacceptable legal risk (as a strict liability tort) for operators/administrators of private, permissioned blockchain or DLT-based systems for the holding and transfer of such digital assets”. The consultee continues to note that such operators/administrators may be required to “take "defensive" measures that adversely affect the efficient and effective operation of their systems in support of the relevant financial market”.

1201

We note that in some situations individuals are exposed to having their property rights interfered with by receivers or law enforcement agencies. Although there are many statutory powers permitting this, any ultra vires interference should entitle the individual to redress. Without specific and discrete principles of tortious liability however, such redress might not be possible in relation to third category things. We consider that a focus on wrongdoing might, for example, be able to be constructed such that it captured such ultra vires actions but did not capture (1) interactions with third category things by innocent recipients; or (2) proper exercises of control in the context of intermediated holding arrangements, non-holding arrangements and DeFi arrangements. On this, see above n 1200. On receivers, see OBG Ltd v Allan [2007] UKHL 21, [2008] 1 AC 1. On law enforcement agencies, see the proposals under the Economic Crime and Corporate Transparency Bill to grant such agencies the power to destroy crypto-tokens (for example, at sch 7, para 30), and the potential parallels with Costello v Chief Constable of Derbyshire [2001] EWCA Civ 381, [2001] 1 WLR 1437.

1202

S Douglas, “The Scope of Conversion: Property and Contract” (2011) 74(3) Modern Law Review 329, 341.

1203

Dr Crawford at p 809 responded that cryptocurrencies have, “albeit in a digital form, re-created the security hazards associated with carrying and storing large quantities of metallic coin (which are covered by the tort of conversion).”

1204

See above n 210. We discuss this point in more detail in Chapter 3 (Third thing) at para 3.72.

1205

See Chapter 6 (Transfers) at para 6.84 and from para 6.113.

1206

This point is made in significant detail by Hin Liu in response to our consultation paper, and the examples given in para 9.72 are taken from this response. Hin Liu provided an early draft of “Interference torts in the digital asset world”, which is now on SSRN, available at: https://ssrn.com/abstract=4433956. The content referenced by this footnote is available at p 10 of the SSRN draft. See also Professor Tettenborn pp 58-59. Some consultees also highlighted potential difficulties in the context of conversion (or a conversion-type cause of action) arising from the differences between possession and control: Katie McCay p 672; Professor Sheehan p 483; and Professor Low p 699.

1207

“It is usually far easier for someone to recognise and comply with exclusionary obligations in respect of objects that have some tangible form”: T Cutts, “Dummy asset tracing” (2019) 135 Law Quarterly Review 140, 159.

1208

Another reason not to apply conversion wholesale to third category things is provided by Professor Tettenborn, who at pp 58-59 writes: “Conversion has a lot of baggage and a lot of complexity ... extending it with alterations to cover [third category things] would pile complication upon complexity.”

1209

See Hin Liu’s “sport bet” example. Hin Liu provided an early draft of “Interference torts in the digital asset world”, which is now on SSRN, available at: https://ssrn.com/abstract=4433956. The content referenced by this footnote is available at pp 14-15 of the SSRN draft.

1210

25 consultees responded to this suggestion, 17 agreed outright, one provided qualified agreement, four disagreed, and three gave mixed views.

1211

See above n 1200. See also Professor Tettenborn pp 58-59.

1212

Thyroff v Nationwide Mutual Insurance Co, 8 NY3d 283 (2007).

1213

See generally R C Merrell, “Trespass to Chattels in the Age of the Internet” (2002) 80(2) Washington University Law Review 675.

1214

Thyroff v Nationwide Mutual Insurance Co, 8 NY3d 283 (2007).

1215

New York Racing Association v Nassau Regional Off-Track Betting Corp, 29 Misc3d 539 (Nassau Co 2010).

1216

CompuServe Inc v Cyber Promotions, 962 F Supp 1015 (SD Ohio 1997); EBay INC v Bidder’s Edge Inc,

100 F Supp 2d 1058 (ND Cal 2000).

1217

Kremen v Cohen, 337 F3d 1024 (9th Cir 2003).

1218

Mango Labs LLC v Eisenberg (2023, Case Number: 1:23-cv-00665); Jessup v Bankman-Fried (2022, Case Number: 4:22-cv-07666-DMR); LCX AG v John Doe Nos 1-25 (2022, Case Number: 154644/2022);

Donovan v GMO-Z.Com Trust Company Inc (2022, Case Number: 3:22-cv-02826); Crypto Asset Fund LLC v MedCredits (2019, Case Number: 3:19-cv-01869-BEN-MDD); Wu v Bitfloor Inc (2019, Case Number:

1:19-cv-00238); Schafer v Graf (2018, Case Number: 1:18-cv-08236); Wanlin Wang, Bibox Grou Holdings Ltd v Wei Liu (2018, Case Number: 655050/2018); Kleinman v Wright (2018, Case Number 9:18-cv-80176-BB); Leidel v Project Investors Inc (2016, Case Number 9:16-cv-80060-KAM). For more information on these claims, as well as further examples, see: Morrison Cohen LLP, “Cryptocurrency Litigation and Regulation Tracker” (2023), available at: https://www.morrisoncohen.com/news-page?itemid=471.

1219

It seems that, at least under New York law, there sometimes remains the need for some physical manifestation of the property in question: Hyperlync Technologies v Verizon Sourcing, 2016 WL 642721 (NY Co Feb 17 2016); Alrai Naked Opportunity v Naked Brand Group, 2019 NY Slip OP 33241(U), 2019 WL 5595157 (NY Co Oct 30, 2019); T J Hall and J A Archer, “The Slow Expansion of Conversion Claims To Cover Intangible Property” (2020), available at: https://www.law.com/newyorklawjournal/2020/02/20/the-slow-expansion-of-conversion-claims-to-cover-intangible-property/.

1220

R C Merrell, “Trespass to Chattels in the Age of the Internet” (2002) 80(2) Washington University Law Review 675, 687.

1221

OBG Ltd v Allan [2007] UKHL 21, [2008] 1 AC 1 (incorporeal property); Stewart v Engel [2000] BCC 741 (copyright); Murphy v Electoral Commission [2019] EWHC 2762 (QB), [2020] 1 WLR 480 (information); Your Response Ltd v Datateam Business Media Ltd [2014] EWCA Civ 281, [2015] QB 41 (documents stored electronically on a computer drive).

1222

We think that wrongful interference would have to be crafted carefully. In particular, there should be a focus on protecting innocent acquirers or those who innocently interact with digital objects. Nonetheless, we do not think that such protection should extend to ultra vires actions by public authorities. See further Costello v Chief Constable of Derbyshire [2001] EWCA Civ 381, [2001] 1 WLR 1437 and OBG Ltd v Allan [2007] UKHL 21, [2008] 1 AC 1.

1223

CLLS-FLC pp 533-534.

1224

We think that tortious liability aligns more appropriately with the nature of crypto-token systems than liability for breach of fiduciary duty, or liability in unjust enrichment. One key reason for this is that the duties owing under the law of tort are owed “towards persons generally” (P H Winfield, The Province of the Law of Tort (1931) p 32), whereas liability for breach of fiduciary duty or in unjust enrichment arguably requires a further step to establish some legal relationship. For example, “a fiduciary, is someone who has undertaken to act for or on behalf of another in a particular matter in circumstances which give rise to a relationship of trust and confidence. The distinguishing obligation of a fiduciary is the obligation of loyalty.”: Bristol and West Building Society v Mothew [1998] Ch 1 at 18A-C, by Millett LJ. For a claim in unjust enrichment to arise, the defendant must (generally speaking) receive a benefit directly from the claimant: Investment Trust Companies v Revenue and Customs Commissioners [2017] UKSC 29, [2018] AC 275 at [43] by Lord Reed. We consider that the position in the law of tort, involving the owing of duties to persons generally, is more aligned to the realities of crypto-token systems, which can feature a wide range of participants with whom a given participant might interact but with whom any such “further step”, such as circumstances giving rise to a relationship of trust and confidence, or enrichment at the expense of another might not occur. For example, the Wormhole hacker never interacted directly with participant “owners” of tokens, but nonetheless was able to acquire $320 million of ether. See summons filed by Tai Mo Shan Ltd against unknown defendants in the US Tai Mo Shan Limited v John Doe Nos 1-100 litigation (Case Number 651017/2023), available at: https://iapps.courts.state.ny.us/nyscef/ViewDocument?docIndex=0fXwxvv5v163bEmNzYobww==, and more broadly, Tulip Trading v Van Der Laan [2022] EWHC 667 (Ch) and [2023] EWCA Civ 83, [2023] 4 WLR 16.

1225

The Torts (Interference with Goods) Act 1977 was a consolidating statute.

1226

Armstrong DLW GmbH v Winnington Networks Ltd [2012] EWHC 10 (Ch), [2013] Ch 156 at [93]. See above at para 9.47.

1227

Tulip Trading v Van der Laan [2023] EWCA Civ 83, [2023] 4 WLR 16 at [71], by Birss LJ. Indeed, in that case Birss LJ contemplated a much more significant and impactful development of the law in relation to the question as to whether the developers of certain crypto-token systems owe fiduciary duties or duties in tort to an “owner” of notional quantity units within those systems: “Pulling all this together, I recognise that for Tulip’s case to succeed would involve a significant development of the common law on fiduciary duties [and tortious duties]” at [86]. Note the discussion of the argument relating to tortious duties at [41].

1228

Jowitt’s Dictionary of English Law (5th ed 2019); see para 19.135 of our consultation paper.

1229

A Burrows, A Restatement of the English Law of Contract (2nd ed 2020) p 161; see para 19.135 of our consultation paper.

1230

Above p 163.

1231

See paras 19.138-19.139 of our consultation paper.

1232

Crowther v Crowther [2020] EWCA 762, [2020] Fam Law 1167 at [48], by Males LJ, quoting Vneshprombank LLC v Bedzhamov [2019] EWCA Civ 1992.

1233

Cretanor Maritime Co Ltd v Irish Marine Management Ltd (The Cretan Harmony) [1978] 1 WLR 966, [1978] 3 All ER 164 at 974, by Buckley LJ.

1234

See paras 19.140-19.141 of our consultation paper.

1235

M Bridge, L Gullifer, K Low, and G McMeel, The Law of Personal Property (3rd ed 2021) para 34.045; Polly Peck International v Nadir (No 2) [1994] 3 ALL ER 764.

1236

Twentieth Century Fox Film Corporation v Harris [2013] EWHC 159 (Ch), [2014] Ch 41 at [7], by Newey J, quoting Millett LJ in Ostrich Farming Corporation Ltd v Ketchell (10 December 1997, unreported).

1237

Consultation paper paras 19.142-19.148. See broadly the cases listed in Chapter 3 (Third thing) at n 166.

1238

Of the 27 consultees who responded to our consultation question, 20 agreed outright, two provided qualified agreement, three disagreed, and two gave mixed views.

1239

LawFiDAO pp 733-734; Law Society p 724.

1240

See AA v Persons Unknown [2019] EWHC 3556 (Comm).

1241

Civil Procedure Rules, r 6.15(1); Zuckerman on Civil Procedure (4th ed) para 5.113.

1242

In D'Aloia v Persons Unknown [2022] EWHC 1723 (Ch), a case concerning interim injunctive relief, Mr Justice Trower permitted service via an NFT airdrop (at [38]), as this would “lead to a greater prospect of those who are behind the tda-finan website being put on notice of the making of th[e] order” (at [39]). See also Piroozzadeh v Persons Unknown [2023] EWHC 1024 (Ch), Osbourne v Persons Unknown [2023] EWHC 340 (KB), and AA v Persons Unknown [2019] EWHC 3556 (Comm) at [72]-[78].

See further: A Held, “Cryptoassets as property under English law Pt II: ownership, situs and the circular question of jurisdiction” (2023) 4 Journal of International Banking and Financial Law 236, as well as the Law Commission’s ongoing project, “Digital assets: which law, which court?”, available at: https://www.lawcom.qov.uk/project/diqital-assets-which-law-which-court/.

1243

Part 69 of the Civil Procedure Rules.

1244

See below para 9.90.

1245

See below from para 9.92.

1246

Part 89 of the Civil Procedure Rules; The Attachment of Earninqs Act 1971.

1247

See para 19.157 of our consultation paper.

1248

We noted at para 19.156 of our consultation paper that a judqment creditor may be able to rely on: disclosure, premises searches, nominated person orders, and custodian assistance.

1249

Of the 26 consultees who responded on this point, 16 aqreed outriqht, three provided qualified aqreement, four disaqreed, and three qave mixed views

1250

Clifford Chance LLP, p 320.

1251

Civil Procedure Rules, r 72.1(1).

1252

Civil Procedure Rules, r 72.1(1).

1253

Civil Procedure Rules, r 72.2.

1254

Clifford Chance LLP p 320. A third party debt order was obtained in the crypto case of Ion Science Ltd v Persons Unknown (28 January 2022, unreported), available at: https://files.lbr.cloud/public/2022-02/Judgment_0.pdf. However, as is clear from the judgment, the subject matter of the claim is in sterling, meaning the crypto-token context of the case is ancillary to the success of the third party debt order.

1255

For this reason, we do not consider that Choice Investments Ltd v Jeromnimon [1981] QB 149, 155-156, in which Lord Denning MR held that a third party debt order can apply to foreign currencies, alters our analysis.

1256

Charging Orders Act 1979, s 1.

1257

Charging Orders Act 1979, s 2(2)(a).

1258

Charging Orders Act 1979, s 2(2)(b).

1259

Charging Orders Act 1979, s 2(2)(c).

1260

Charging Orders Act 1979, s 2(1).

1261

Charging Orders Act 1979, s 2(2)(b)(i)-(iv). The kinds of stock capable of being charged are specified in further detail in the Act. Although certain kinds of crypto-tokens, such as tokenised equity, might fall within the meaning of “stock of any body” under s 2(2)(b)(ii), most crypto-tokens will not.

1262

Clear both from the express wording of the statute, and Gittins v Serco Home Affairs [2012] EWHC 651 (Ch) at [47], by Behrens J.

1263

Although we note that there is no immediate conceptual difficulty with crypto-tokens being the subject of an equitable charge (see above from para 8.24), which is the mechanism used to charge property under the Act: Charging Orders Act 1979, s 3(4).

1264

See further Chapter 7 (Intermediated holding arrangements).

1265

Charging Orders Act 1979, s 2(1)(a)(ii).

1266

See J Lee, “The endgame: issues in enforcement against cryptoassets” (2022) 8 Journal of International Banking and Financial Law 545 at 545. Only one consultee favoured reform in this context. Clifford Chance LLP considered that extending the scope of the regime would provide a “relatively uncomplicated starting point for judgment creditors” in a digital assets context, at pp 320-321.

1267

See also A M Hinkes, “Throw Away the Key, or the Key Holder? Coercive Contempt for Lost or Forgotten Cryptocurrency Private Keys, or Obstinate Holders” (2019) 16(4) Northwestern Journal of Technology and Intellectual Property 225. It is possible to expand the list of property capable of being charged by utilising the Act’s expansion provision: Charging Orders Act 1979, s 3(7). In our 1976 report on charging orders, we recommended the inclusion of “units of any unit trust” (now found under s 2(2)(b)(iv)) within the definition of securities on the basis that “no list is likely to remain appropriate for ever. The inclusion . serves as a reminder . of the way in which totally new kinds of “security” may develop”: Charging Orders (1976) Law Com No 74 at para 86.

1268

Senior Courts Act 1981, s 39(1). This also includes ordering that the nominated person shall indorse a negotiable instrument.

1269

Senior Courts Act 1981, s 39(1)(a).

1270

Senior Courts Act 1981, s 39(1)(b).

1271

For example, theoretically allowing a nominated person to effect an onchain transfer of a third category thing where the defendant refuses to do so (for example, following an order for specific performance of that third category things). Professor Tettenborn, pp 59-60.

1272

The court could, for example, order the defendant to execute a document authorising the claimant to transfer the crypto-token using the private key. If the defendant refuses or neglects to do so, then the court could make an order under s 39 authorising a nominated person to execute that document.

1273

Astro Exito Navegacion SA v Southland Enterprise Co (The Messiniaki Tolmi) (No 2) [1983] 2 AC 787 at 802, by Lord Roskill.

1274

Tribunals, Courts and Enforcement Act 2007, s 62(1), sch 12 para 1(1). For an overview of key provisions, see Hamilton v Secretary of State for Business, Energy and Industrial Strategy [2021] EWHC 2647 at [18][39], by Lane J.

1275

Tribunals, Courts and Enforcement Act 2007, sch 12 para 3(1).

1276

[2020] EWCA Civ 588 at [96], by Lord Leggatt.

1277

To take control, an agent must do one of four things with the goods: (1) secure them on the premises; (2) if found on a highway, secure them there (or within a reasonable distance); (3) remove them and secure them elsewhere; (4) enter into a controlled goods agreement with the debtor. Tribunals, Courts and Enforcement Act 2007, sch 12 para 13(1)(a)-(c).

1278

365 Business Finance Ltd v Bellagio Hospitality WB Ltd [2020] EWCA Civ 588 at [96], by Lord Leggatt.

1279

Clifford Chance LLP pp 318-321, in particular p 320. Further, para 9 of sch 12 imposes a gateway criterion, providing that an enforcement agent may take control of goods only if they are “on premises”. Third category things such as crypto-tokens do not have a singular physical location — given their existence is manifested by distributed networks —and so cannot be located on a specific premises.

1280

However see generally the Economic Crime and Corporate Transparency Bill, which seeks to expand the Proceeds of Crime Act 2002 by introducing additional powers to allow law enforcement agencies “more options for seizure [to] theoretically allow cryptoassets to be seized in the same way as cash and other listed assets”: Home Office “Impact Assessment: Powers to seize illicit cryptoassets (Economic Crime and Corporate Transparency Bill 2022)” (2023) para 62, available at: https://www.gov.uk/government/publications/economic-crime-and-corporate-transparency-bill-2022-impact-assessments.

1281

[1976] AC 443.

1282

We discuss this in the context of an action for the agreed sum above from para 9.8. There, we make the argument that if and when crypto-tokens are treated in a general sense as money (or analogous thereto) there will be a legitimate basis for those crypto-tokens to be considered the subject matter of an award of an agreed sum, and therefore an action in debt (but not before). We do not think it would be appropriate for an action for the agreed sum (which is effectively an award that seeks to enforce the primary obligation under a contract) to be denominated in crypto-tokens until such time as those crypto-tokens are considered to be money (or analogous thereto) because, as discussed above, that would be tantamount to awarding specific performance as of right. The discussion in this section therefore does not apply to an action for the agreed sum, in relation to which different policy considerations arise. The focus is on other, secondary remedies awarded by the court, such as damages for breach of contract or tort, or equitable compensation, which are generally treated as actions for damages.

1283

See paras 19.162-19.166 of our consultation paper.

1284

Of the 31 consultees who answered this consultation question, 15 agreed outright, while six provided qualified agreement. Four consultees gave mixed responses, and six disagreed.

1285

IDAC and CryptoUK at pp 607-608 noted that stablecoins should be capable of being awarded by a court. Hugh James LLP at p 579 made a similar point in relation to central bank digital currencies. The FMLC at p 556 (para 7.3.1) considered that most “market participants, would expect the courts in England and Wales to be able to grant awards denominated in crypto-tokens in appropriate circumstances.” Clifford Chance LLP at pp 321-322 noted that the impact of price volatility on effective award quantum is not an issue, and is merely a reflection of the fact that parties trading crypto-currencies do so in volatile markets.

We note that the High Court recently ordered a cryptocurrency exchange to “conver[t] the cryptocurrency held in the relevant account to fiat currency” (so that there was a sterling denominated claim for the purposes of enforcement): Joseph Keen Shing Law v Persons Unknown (26 January 2023, unreported) at [9], by Judge Pelling KC. We consider that such a conversion could be rendered unnecessary, were a court to decide to award damages in crypto-tokens.

1286

Dr Michael Crawford at p 809 responded that law reform is unnecessary, as an appropriate remedy already exists in the form of specific performance. Dr Zhang at pp 653-654 makes a similar point. CILEX at pp 278279 (para 6.7) responded that crypto-tokens can be volatile, and that this volatility can lessen predictability and can result in unexpected windfalls and losses. It is notable that Simon Thorley IJ in Quoine Pte Ltd v B2C2 Ltd [2019] SGHC(I) 3, [2019] 4 SLR 17 at [256] saw such volatility as a barrier to granting specific performance.

1287

“As a general rule the plaintiff should be compensated for the expense or loss in the currency which most truly expresses his loss”: Services Europe Atlantique Sud (Seas) v Stockholms Rederiaktiebolag Svea, The Folias [1979] QB 491 at 514, by Lord Denning MR, affirmed by the House of Lords: [1979] AC 685 at 701, by Lord Wilberforce.

1288

A Dickinson, “Cryptocurrencies and the Conflict of Laws” in D Fox and S Green, Cryptocurrencies in Public and Private Law (2019) para 5.91; M Howard, J Knott, and J Kimbell, Foreign Currency: Claims, Judgments and Damages (1st ed 2016) para 15.17.

1289

Multiple consultees indicated that the crypto-tokens capable of being so awarded should have money-like qualities, such as being fungible: Professor Tettenborn pp 60-61; Linklaters LLP p 760 (para 1.13).

1290

And for the (policy) reasons we discuss in more detail in paras 19.162-19.166 of our consultation paper. In response to the second limb of consultation question 47, consultees listed various factors that should be relevant to the exercise of this discretion: Linklaters LLP p 760 (para 1.13); Professor Tettenborn p 60; Gunnercooke LLP p 567; Dr Crawford p 809; Moneybrain p 818; Stephan Smoktunowicz p 942; the Centre for Commercial Law at the University of Aberdeen p 264; Clifford Chance LLP pp 322-323; CLLS-FLC pp 534-535; COMBAR and the Chancery Bar Association pp 392-393 (paras 47.9-47.12); and IDAC and CryptoUK pp 607-608.

1291

We note that the United States District Court in Titus Williams v Kasim Mahmood (2022, Case Number 6:21-cv-03074-RK) granted to the defendant “conversion damages in the amount of 33.7398 bitcoin”. We consider that there are (at least) two potential difficulties with this. First, the court does not explain why it felt entitled to award damages denominated in bitcoin, beyond noting that “[t]he measure of damages for a claim

1292

There are wallet providers for many cryptoassets. These companies provide cryptoasset wallets which store public and/or private keys which can be used to track ownership of a cryptoasset, but they do not store the cryptoasset itself which remains on the decentralised DLT. Germany has developed specific regulation to cover wallet providers. See Legal Statement paras 43 and 65. The Legal Statement considers a cryptoasset as consisting of a “parameter” of data, including private keys.

1293

See Eversheds Sutherland LLP’s commentary on the role of the underlying asset.


BAILII: Copyright Policy | Disclaimers | Privacy Policy | Feedback | Donate to BAILII
URL: http://www.bailii.org/ew/other/EWLC/2023/LC412.html