When to Think Outside The Box

Thinking outside the box simply means that you’re willing to consider different solutions and methods for reaching your goal or desired outcome.  You want to get from point A to point B, but you don’t necessarily need or want to take the tried and true route to get there (which is inside the box). This can also mean considering some creative alternatives in terms of the goals or desired outcomes. Moving the goalposts, even a little, can have an outsized impact on the game. The phrase is often associated with the Nine-Dot Puzzle, where the box is sometimes literally drawn around the nine dots, framing a solution space, or maybe inferred as the paper on which the dots are drawn.

Think outside the box

In a more general sense, the box is a perspective that provides a set of constraints on possible solutions.  A new perspective looks beyond that set of constraints to enable innovative thinking. Thinking differently can have a powerful and positive effect on your career. As an entrepreneur, this is why you need to think outside the box: it can help you get ahead of your competition in identifying and exploiting opportunities.

Only incremental progress lies inside the box

The reasonable man adapts himself to the world; the unreasonable one persists in trying to adapt the world to himself. Therefore all progress depends on the unreasonable man. – George Bernard Shaw

Sometimes, we can get pretty stuck in our ways. We become complacent, just going through the motions, doing what we need to but no more. We’re scared to deviate from the set route and make our own paths. If everyone just accepted things the way they are, then there would never be any innovation or improvement in the world. 

think outside the box

A lot of the time we’re not even really present in what we’re doing – we’re on auto-pilot. If Thomas Edison was complacent and figured things were good enough the way they were, light bulbs and the electricity to power them might never have been commercially developed. If he hadn’t thought outside the box, the world could (literally) be a very dim place. Identifying topics where complacency exists can identify an opportunity for unconventional thinking. 

More things are variable than you may expect

Whether you believe you can do a thing or not, you are right.
— Henry Ford

If you view things as unchangeable, then nothing will ever change for the better. By thinking outside the box, you are questioning the status quo. Asking how you could improve an experience, product, or service for your clients. This allows you to keep growing as a person and as an entrepreneur. Questioning the status quo can provide the new perspectives necessary for intelligent and forward-thinking decisions in business.

think outside the box for disruptive innovation

When first articulating a client’s problem statement, it is not uncommon to have a lot of unstated assumptions regarding unchangeable factors. Let’s face it – factors that can’t be changed or controlled are boring. In reality, many factors change with time, geography, etc. Indeed, seemingly arbitrary changes in environmental factors may be causing the clients’ difficulties. A better understanding of the clients’ problem space may enable better controls to be identified. As an example, mankind can’t control the weather. On a smaller scale, heating and air conditioning significantly improve the quality of life for millions of people. Specialized “clean rooms” enable various industrial processes (from semiconductor manufacturing to biomedical research). Just because the initial client problem description assumes some factor is unchangeable, does not mean that change and control of that factor is impossible. 

Outside the box perspectives

“The task is…not so much to see what no one has yet seen; but to think what nobody has yet thought, about that which everybody sees.” ― Erwin Schrödinger

Thinking outside the box can expand your worldview, allowing you to have a greater perspective. This includes not only the events and happenings in your career but also in other dimensions in your life. When you’re willing to consider alternative points of view and ways of doing things, you’ll be more open to a variety of different points of view and potential solutions. Moving from the client’s problem to a solution is not always a straight line. Creativity is often required in developing an appropriate perspective before attempting solution innovation.

This need for a new perspective is why so many businesses bring in outside consultants to help come up with new ideas. The consultants don’t carry the burden of constraints on their thinking from existing tools and processes. Their version of Outside-The-Box Thinking can dream up and offer up wildly new ideas that get people excited and lead to innovative pivots etc.

We can help!

Framing and reframing the problem from different perspectives can enable you to see past constraints. These constraints may not exist from a different perspective. Developing a client-centric, solution-agnostic problem statement can enable the needed creative thinking. For wider variety of potential solutions to be exposed, you need a broader perspective of the clients’ problem. Our free Guide to Writing Problem Statements can help you get your client program statement right.  

Whether you are a researcher, business professional, or social entrepreneur, the solutions you develop to the problems that you face matter!  We’d like to hear your thinking on the most important challenges so you can think outside the box for your clients. We have a brief survey that should take less than 2 minutes of your time to complete. You can get started right away by going to this link. I look forward to sharing these insights and resources with you.

A course on the use of perspective to refine problem statements is now available.

  Problem Perspectives Course

If you need help bringing the power of perspective to your client problem statement contact me.

 

Change the Game: You could be the Game-Changer

There is an episode of the vintage TV show “I Love Lucy” where Lucy works wrapping candies on an assembly line. The candies keep coming closer together as the line speeds up. Lucy, and her sidekick Ethel, scramble harder to keep up, though they keep getting further behind. Then Lucy finally says, “I think we’re fighting a losing game”.  Your business initiatives may have you feeling like that – working harder and harder to keep up rather than working smarter. In Lucy’s case, the increasing assembly line speed had some comedic value. It is no laughing matter, however, if your business initiatives are not seeing the results you need. Increasing costs (e.g. effort) and reduced value (e.g., customer traction, efficiency) are signs that it is time to change the game.

Game-changer

Automating a broken process (like Lucy’s) just accelerates the costs. Rather than fighting a losing game, recognize that it’s time to change the game to one that you can succeed at.  Analyzing your broken process may not help if you are working on the wrong problem. In every sector and region, reshaping our world,  are disruptive and innovative game-changers. These may be start-ups or larger corporates, or even social entrepreneurs. They are ambitious, stretching vision with enlightened purpose. Gamechangers see markets as kaleidoscopes of infinite possibilities, assembling and defining them to their advantage. They find their own space, then shape it in their own vision. Most of all game-changers have great ideas. They don’t believe in being slightly cheaper or slightly better. They out-think their competition. By thinking bigger and differently, game-changers are solving a different, better, problem to their competition.

Game-Changing : not just for sports

Lucy’s assembly line, and the sports arena, are not the only place game-changing plays are made.  Through innovation, and strategic vision, we can change the game in business deals, in our career, in relationships, and more. In the non-profit world,  “changing the game” can enable a path to relief for those that need it most. When we articulate the game we are playing, we can examine further with questions like, “what are the rules of this game?”, “how am I keeping score?” “Is this game serving the needs of my clients and myself?”

Game-Changer

 Consider this thought experiment – suppose a  new entrant (e.g., a startup) is competing against an incumbent  (e.g. a large company). If the new entrant decides to offer the product (or some part of it) for free, (e.g., as open-source software)  and chooses to monetize its customer base through some other business model, this changes the rules of the game. Such action with a radically different business model changes customer perceptions. Thus changing the marginal return from existing competencies that the incumbent has. This reshuffles the market: winning no longer requires greater competencies along the status-quo dimension,  some new competitive dimension becomes the measure that determines the winner. In this new game, the existing incumbent company might have no real advantage compared to the new entrant.

Be the game-changer you need to see

The business model is just a type of model, and may not accurately represent the needs and purposes of your business stakeholders and most importantly, your clients. All models are wrong, but some are useful, (according to George Box). What is the model surrounding your business challenge? The rules are you are playing by? Parameters you think you need to follow? What beliefs do you have about the Client’s situation?  What would happen if you reversed or changed the old model’s beliefs? Is there a better foundation or structure or perspective would better serve your goals? your clients’ goals? What new perspective feels empowering? Whenever you feel stuck, see if you can’t find a new, more empowering perspective, and a bigger opportunity to serve your clients.

Game-changer

It’s easy to get distracted by the tools and processes in your current environment. This is especially true when you need to keep the current business running while finding a better way forward. But you won’t be thinking differently if you just focus on the same old tools and processes. Such a focus leads to merely incremental rather than disruptive innovation. To avoid such issues, a clearer statement of your client’s problem is needed before attempting to solve it.  Our free Guide to Writing Problem Statements can help you get your client program statement right.  

We can help you change the game

Whether you are a researcher, business professional, or social entrepreneur, the solutions you develop to the problems that you face matter!  We’d like to hear your view of the most important challenges in writing problem statements for your clients. We have a brief survey on the most important challenges that should take less than 2 minutes to complete. The survey takes less than 2 minutes and you can get started right away by going to this link. I look forward to sharing these insights and resources with you.

A course on the use of perspective to refine problem statements is now available.

  Problem Perspectives Course

 

If you need help bringing the power of perspective to your client problem statement contact me.

 

Technical, Business, and Legal Perspectives

Technical Perspectives

Technology refers to industrial, practical, or mechanical arts and applied sciences that are deployed to deliver a particular solution. The Technical Perspective provides a good, comprehensive picture of the system at an appropriate level of abstraction, appropriate for the objective of the modeling, and the size of the system being modeled. 

Technical Perspective
Photo Credit: Adobe Stock

The Technical Perspective defines the views of the system using models, processes, and other constructs of that particular technology. The various models used by the technology show how people (or other technical entities) interact with processes at various locations within the system. These technology models recognize a limited set of other technical entities and the things they handle and use. The models also show how these different aspects and things must statically and/or dynamically relate to one another, to produce the desired results. Technology models place emphasis on the structures, conditions, and interaction of entities, roles, locations, and processes and often rely on a specific modeling language (e.g. UMLBPMN) to capture the model.  Specific technologies are identified (e.g., Computational aspects, such as storage, computers, and communications), where necessary to describe a solution with specificity. A design pattern for the usage of particular technologies may also be identified or defined. 

 Taken together, the technical events (and rules), technical roles, technical entities, technical activities, and technical locations describe the system’s elements from a technical perspective. The technical perspective describes the process, or method, explaining how a specific result is to be achieved. The effectiveness of solutions developed from technical perspectives are often evaluated in terms of their efficiency, or resource utilization (e.g., energy consumption, throughput).

Business Perspectives

The Business Perspective defines the business level view of the problem using the resources available to the business and the tools available to the business to achieve its commercial objectives. While there are many corporate stakeholders, for most businesses, their commercial objectives include profitability from their transactions with clients or customers; efficiency in internal operations, and supplier interactions; minimization of regulatory oversight costs; and strategic positioning for advantage against competitors.  The business perspective shows clients’ (and employees’) interaction with business processes and resources at various locations within the business. 

Business Perspective
Photo Credit: Adobe Stock

The business perspective and technical perspective can address the same problem domain at different abstraction levels. The business perspective may focus on the level of a sales process with offers, and other marketing activities to influence or build a relationship with the client, resulting in a contract, followed by service delivery, while a technical perspective may focus on more detailed technical systems and entities (e.g., messages, protocols, databases, etc.) that might implement or support a business process like a sales transaction. 

A business perspective can assume a particular business model; or consider an alternative business model or business practice.  A business model may be impacted by the scale of responsibility of a particular business manager. The effectiveness of solutions and decisions developed from a business perspective is usually measured with accounting metrics and market or economic statistics. 

Legal Perspectives

A legal perspective is relating to or characteristic of the law or the profession of law; and analyses the problem in terms that are recognized, enforceable, or having a remedy at law rather than in equity. There are three essential components to a legal perspective – (1) the identification of the client, (2) the legal right, obligation, or risk, at issue within the circumstances of the problem and, (3) the posture of the client with respect to that legal issue (e.g., defensive vs offensive) i.e., the client’s objectives.

Legal Perspective
Photo Credit: Adobe Stock

The purpose and goals of the law as an instrument of public policies for society at large, provide a context for the legal perspective.  Different theories of law can be used by lawyers to define, explain, compare, and distinguish the facts and circumstances of particular controversies in their clients’ favor. For lawyers in private practice, clients may be individuals or other legal entities (e.g., corporations). Lawyers in administrative or judicial government roles may be representing those governmental organizations. Focusing on their clients’ potential for legal issues and outcomes enables the legal perspective to avoid some of the concerns of other parties’ views.

The narrative of a particular problem statement or situation may involve multiple legal issues, claims, rights, obligations, or risks at issue. The nature and likelihood of legal risks to business operations or other situations can be difficult to predict with certainty at any given moment as it involves some estimation of the likelihood of events occurring and the severity of the impact should the events occur, as well as the interpretations of those events that may be constructed by others (e.g., a court). 

The client’s posture (with respect to, and awareness of, particular legal issues, and possible legal remedies) may change between the moment of a particular incident and upon later reflection and other considerations. The clients’ range of acceptable goals, and the likelihood of achievement, also impacts the legal posture to be adopted.  

Triangulating the Problem Statement and Innovation Potential

Framing and reframing perspectives on problems highlights the differences between different perspectives. The contrast achieved by describing a problem statement from these three different perspectives enables insight into opportunities for new innovation.  A common innovation pattern is for technology innovation to enable new business services or practices which are then reinforced by reducing legal risks through experience and authoritative legal decisions that then enable further technology innovation in a reinforcing cycle.  While this is a common innovation pattern, disruptive innovation is not restricted to technology. Innovations in business practices or legal concepts may also provide significant opportunities.

When developing the problem statement for your client, understanding the technical, business and legal perspectives can impact the scope of the desired future state as well as constraints on viable solutions. If you are developing client problem statements, you might be interested in our free Guide to Writing Problem Statements

Everyone has Client’s problems that they need to solve, but are they solving the right problem? Are you solving your best problem? Whether you are a researcher, business professional or social entrepreneur, the solutions you develop to the problems that you face matter!  We’d like to hear your view of the most important challenges in writing problem statements for your clients. We have a brief survey on the most important challenges that should take less than 2 minutes to complete. The survey tackles less than 2 minutes, and you can get started right away by going to this link. I look forward to sharing these insights and resources with you.

A course on the use of perspective to refine problem statements is now available.

  Problem Perspectives Course

If you need help bringing the power of perspective to your client’s problem statement, contact me.

 

Framing and Reframing Perspectives

Framing is a mental structure that is built upon the beliefs you have about yourself, your roles, your resources, your circumstances, and about other people. It is a structure you use to ascribe meaning in what you observe of the world around you. In other words, the meaning you perceive from any event is dependent upon how you frame it in your mind. As such, your frames shape how you perceive the world, yourself, and others. Our human perceptual capacity is like a magnifying glass that we can move over text or images. We focus in on something and often lose awareness of what originally surrounded that magnified area. It’s like cropping photos on our digital cameras. We crop the image to our preferred view of the scene and forget the bigger picture. Frames are inherent in your perception of the world; as such, they are either helpful within the context you are using them, or they are not. Frames can be optimistic or pessimistic, expand your possibilities or limit them (e.g. a growth or fixed mindset – (Dweck 2008)).  Frames are therefore appropriate or inappropriate, good or bad, depending on your objectives. The more control you can achieve of the frame, the more options you have for selecting a frame that is more appropriate for your objectives. Framing and reframing perspectives on problem statements brings greater clarity to that problem statement.

Framing and Reframing Perspectives
Photo Credit: Adobe Stock

When you decide to work on a project with others, you frame that problem with a scope in a project statement so that everyone knows what is included and excluded. With an explicit project statement, everyone can understand what a successful project outcome is and what they need to focus on in order to complete their part of the project. In the same way, the frames you use on a daily basis provide a context for your thoughts, attitudes, decisions, and actions. They help guide the direction of your thoughts, attitudes, decisions, and actions to help you accomplish your desired outcomes. Your desired outcomes may be an internal change (e.g. in creating new habits) or an external change in the world around you. Problems have been described at the discrepancy between the current state and some desired future state (your objective). Just as a project statement guides the completion of a project, a problem statement can be used to guide the solution of a problem to achieve your objectives.

When you’re stuck on a problem it often helps to look at it from another perspective. A “fresh pair of eyes” can be all that you need to come up with a great solution. Reframing is seeing the current situation from a different perspective. Reframing can be tremendously helpful in problem solving, decision making and learning. With reframing, one shifts one’s perspective to be more empowered to act effectively and impactfully. The goal of reframing is to expand your vision of a problem’s context so that you can consider a wider range of interpretations of what’s happened (the current state), or a wider range of potential future states (the desired outcomes), or a wider range of control mechanisms to transform the current state into the desired outcomes. Many times, merely reframing one’s perspective on a situation can also help people change how they feel about the situation.  Reframing enables a choice of how to frame a problem, an opportunity for empowerment through learning and decision making. Recall that some frames may be more or less helpful for achieving particular objectives. Frame selection choices may enable easier, more efficient problem resolution, and/ or greater impact or value in the achievable outcomes.

Framing and reframing perspectives on problems

Framing and reframing perspectives on problems highlights the differences between different perspectives. When we consciously reframe, we look for patterns, examine our filters, and question our perceptions, we can emerge with a new picture of reality. We can reframe by shifting the perspective in a variety of dimensions (e.g. time, people, risk, resources (input scale), results (output scale). Many problems require participation by others for solution. Truly wicked problems require significant attitude shift by large numbers of other stakeholders. If we share our new perceptions with others and hear theirs, we can shift perspective into an enlarged reality. It can create change and movement, in personal relationships, in organizations, and even society at large.

The first step in solving your problem is to define the problem with a problem statement so that you can focus on the important aspects of your problem and remove the distractions that obscure its essential features. The process of selecting the essential aspects of your problem creates a (problem solving) framework for its resolution. Even without an explicit problem-solving framework, you inherently select some subset of information about your problem. If the problem is framed in such a way that essential elements remain obscured, then this frame may not be very helpful to resolving the problem. When consciously using a Problem-Solving Framework, you explicitly identify the essential features that you want to see in your problem statement.  Using and explicit frame to structure your problem statement provides a starting point. Framing and reframing perspectives on the problem statement typically proceeds by asking a series of questions from a new perspective and then recreating the problem statement based on that perspective.

Is your client’s problem sensitive to the way it is framed?

Framing and Reframing Perspectives
Photo Credit: Adobe Stock

Is your client’s problem sensitive to the way it is framed? Your client may not recognize the impact of framing the problem statement on potential problem solutions. Viable solutions may be cheaper and easier to develop if they only need to be applicable to clients within a reduced scope developed by refining the problem statement. 

When developing the problem statement for your client, understanding diverse perspectives can impact the scope of the desired future state as well as constraints on viable solutions. If you are developing client problem statements, you might be interested in our free Guide to Writing Problem Statements.  Everyone has Client’s problems that they need to solve, but are they solving the right problem? Are you solving your best problem? Whether you are a researcher, business professional or social entrepreneur, the solutions you develop to the problems that you face matter!  We’d like to hear your view of the most important challenges in writing problem statements for your clients. We have a brief survey on the most important challenges that should take less than 2 minutes to complete. The survey tackles less than 2 minutes and you can get started right away by going to this link. I look forward to sharing these insights and resources with you.

A course on the use of perspective to refine problem statements is now available.

  Problem Perspectives Course

If you need help bringing the power of perspective to your client problem statement contact me.

References

(Dweck 2008) Dweck, C. S. (2008). Mindset: The new psychology of success. Random House Digital, Inc..

 

Ethics, Law and Technology Adoption

Technology is changing the world at an unprecedented pace, creating new opportunities and challenges for humanity. How do we ensure that technology is used for good and not evil? How do we regulate and govern technology in a fair and transparent way? How do we adapt and thrive in a rapidly evolving technological landscape? These are some of the questions that this blog will explore, focusing on three key areas: technology ethics, technology law, and technology adoption. In this blog, you’ll find:

  • Technology Ethics: This section will examine the moral and ethical implications of emerging technologies, such as blockchain, DAOs, and AI. We’ll discuss topics such as privacy, security, accountability, responsibility, and social impact of these technologies. We’ll also explore the ethical frameworks and principles that can guide us in making ethical decisions about technology.
  • Technology Law: This section will analyze the legal and regulatory aspects of emerging technologies, such as blockchain, DAOs, and AI. We’ll cover topics such as intellectual property, contracts, liability, compliance, and governance of these technologies. We’ll also review the current and proposed laws and regulations that affect these technologies in different jurisdictions and contexts.
  • Technology Adoption: This section will investigate the factors and processes that influence the adoption and diffusion of emerging technologies, such as blockchain, DAOs, and AI. We’ll look at topics such as innovation, diffusion, adoption, resistance, and acceptance of these technologies. We’ll also share best practices and tips on how to adopt and use these technologies effectively and efficiently.

By reading this blog, you’ll gain a deeper understanding of the complex and dynamic relationship between technology and society. You’ll also learn how to navigate the opportunities and challenges that technology presents in your personal and professional life. Whether you’re a tech enthusiast, a tech skeptic, or somewhere in between, this blog is for you. Join us as we explore the fascinating world of technology ethics, technology law, and technology adoption. Some recent examples of my work include books on Ethics, Law and Technology Adoption and Blockchains, Smart Contracts and the Law as well as a Udemy course on the use of perspective to enable you to solve a better problem. 

Ethics, Law, and Technology Adoption

One of the challenges in Technology adoption is ensuring that you are solving your best problem. If you are developing client problem statements to enable greater insight on creative/disruptive approaches, you might be interested in our free Guide to Writing Problem Statements, or our course: Problem Perspectives: Solve your best problem! If you need help with your problem statement contact me.

Perspective Dimensions

The Power of Perspective can be distinguished in multiple dimensions

Perspectives are the lenses through which we see the world whether you are a school studentbusiness professional, social entrepreneur or concerned with your own creativity. Perspectives shape how we interpret information, solve problems, and make decisions. Perspectives can be distinguished by three factors: (i) the data they observe, (ii) the methods of processing that data, and (iii) the values attributed to the outcomes of that data processing. The Power of Perspective is that taking diverse perspectives exposes assumptions and inconsistencies, enabling better problem-solving. Consider how these dimensions of a perspective can vary between different perspectives and shed new insight into the problems you confront.

Image Credit: Adobe StockPerspective Dimenions

Perspective Dimenions

Explicit Data Observations exposes the Power of perspective

A specific perspective focuses on the data that it deems relevant. The selected data becomes the basis for the analysis and evaluation associated with that perspective, framing the limits of what that perspective can deliver.  Selecting some data for analysis means rejecting other data, and being explicit about the data selection exposes potential blind spots. Consider how these different perspectives are constrained by the data they select.

  • From a scientific perspective, data is typically primary observations from carefully designed experiments.
  • From a technological perspective, data might include design objectives, environmental measurements, secondary data on component characteristics etc.
  • From a market perspective, market data may be primary observations or secondary studies concerning the need for or intended use of a new product or service.
  • From a regulatory perspective, secondary data on industry performance is typically collected through regulatorily required reporting.

Explicit Processing Methods demonstrate the skills associated with specific perspectives

A specific perspective may have particular skills associated with it that provide methods for processing or analyzing the data selected by that perspective. Some perspectives utilize data analysis methods that are very quantitative with some degree of implied precision, while others are more qualitative recognizing e.g. different categories of data.

  • From a scientific perspective, scientific methods develop models of the world which enable predictions that can be tested for validity, falsifiability etc.
  • From a technological perspective, design methods include industry best practices, use of scientific models, calculations of expected performance in various conditions
  • From a market perspective, key requirements and product concepts can be articulated and tested prior to implementation.  Such testing can also be used in the estimation of expected market size, value etc.
  • From a regulatory perspective, economic studies, judicial outcomes and other policy considerations can be used to guide the development of policies affecting specific industries or technologies

The power of perspective is often seen best in divergent valuation approaches

Perspectives use values to gauge the results of their analysis. Values can be idiosyncratic or informed by some explicit rule to associate some meaning of “goodness” to an analytic output.  For example, a two perspectives may both look at real estate sales data and conclude that there is a trend of rising prices. One perspective may interpret this as a good result because the value of that perspective holder’s real estate wealth is increasing. A different perspective may conclude this trend is a social disaster as young folks forming new households would not be able to afford to purchase a house.  Consider the valuation mechanisms that these perspectives use:

  • From a scientific perspective, scientific progress is achieved through the dissemination and adoption by others of new models of model extensions.
  • From a technological perspective, successful implementations are typically evaluated in terms of the delivery of design objectives and various performance metrics such as cost or efficiency
  • From a market perspective, market success is usually measured in terms of market adoption and value received.
  • From a regulatory perspective, regulatory outcomes are typically valued in terms of alignment with policy objectives and more general social and legal concepts such as fairness

Conclusions

Perspective-taking is not only a social skill but also a cognitive skill. It enables you to see things differently, think creatively, and solve problems more effectively. Perspective-taking can also help you build rapport, trust, and loyalty with your team and stakeholders. If you are interested in taking this Power of Perspective course, please visit our website for more information and registration details. Don’t miss this opportunity to unlock the Power of Perspective for yourself and your organization.

Smart Contract Life Cycle Operations

There are disparate views in the literature regarding the life cycles of contracts compared with smart contracts. [Gisler 2000] identified four phases of the legal contracting process – Information (contract conception), Intention (contract preparation), agreement (contract negotiation), settlement (contract fulfillment). The smart contract life cycle in [Sillaber 2017]’s view consists of four different phases: Creation, freezing, execution, and finalization. [ISO 2019] also considered the smart contract lifecycle, but in terms of three phases: creation, operation and termination. Note that the operation phase also included consideration of modifying smart contracts in public blockchains systems, the update and rollback mechanisms supported by the blockchain and migration mechanisms defined by smart contracts. As the more recent definition, and the result of a group consensus, let us adopt the ISO life cycle structure. Gisler’s information, intention and agreement phases would map to the smart contract creation phase of ISO; the settlement phase then being the smart contract operation. Similarly, Sillaber’s creation and freezing phases map to the smart contract creation phase of ISO; the execution phase to smart contract operation; and the finalization phase to smart contract termination.

Blockchain, or, more generally, distributed ledger, technologies are rising in popularity because of smart contracts.  Not all dapps will qualify as smart contracts, and not all smart contracts will be legally recognizable under contract law [Guadamuz 2019] but some portion will be. A great deal of attention is given to the practice of development, i.e. programming, of smart contracts; [AlKahlil 2019] argues that more attention should be given to the needs of lawyers as the traditional developers of contracts. Commercial contracts are sometimes ruefully described as “documents written by lawyers, for lawyers,” artifacts of a negotiated exchange wrapped tightly in pages of clauses intended to insulate the agreement against litigation attacks [Barton 2019]. It is not intuitively obvious that all of the contractual terms for some set of contracts can be implemented in smart contract logic (i.e., many contractual terms require some aspect of performance by external actors in the physical world); but for some subset of contracts, smart contract can implement the necessary terms to provide value in automating the transaction execution. In the following sections we consider typical smart contract life cycle operations, and whether legal roles are necessary in those phases.

The discussion is largely based on Ethereum as the most prevalent smart contract platform. Ethereum distinguishes between externally owned accounts (often called users), and smart contract accounts. For any account, its data is stored at its address.  Contracts additionally have bytecode stored at their respective addresses. This code is executed only when receiving a call; ie the smart contract reacts as a server (in a client server architecture) responding to requests from other clients. Transactions are signed data packages sent from users to other users (or smart contracts); and recorded on the blockchain. Messages are data packages sent from smart contracts to other smart contracts or users and are reflected in the execution trace and potential permanent data changes.

Smart contract creation

Business lawyers add value by structuring the agreement during its creation [Gilson 1984]. Sometimes this may be achieved through non-price related terms such as warranties and indemnifications [Jastrzebski 2019]. Some of these terms may be difficult to execute directly in the smart contract, as they often rely on performance by other actors in the physical world. For the subset of contractual terms implementable by smart contracts, lawyers may still need to add value for their clients by reviewing contract proposals prior to agreement and negotiating alternative transaction structures. Negotiation on deal structuring likely happens prior to developing the smart contract code, as any changes negotiated would then need to be modified, essentially requiring a new smart contract to be created.  Implementation of existing industry standardized contracts as (parametrized) smart contracts reduces the need for contract negotiation, leaving only the contract review aspect. A business lawyer might review a standardized contract prior to its initial use (or upon its revision), and then develop business guidelines on acceptable parameter ranges given other business policies, regulatory constraints etc.

Smart contract code development typically starts with an existing contract as the objective. Code development and testing occur prior to deployment on the blockchain. Modern software development approaches tend to be incremental; stressing development of verifiable functionality first with later optimization on non-functional characteristics like performance. While devops approaches may be applicable in a blockchain context; continuous integration/ continuous deployment (CI/CD) approaches may be more challenging due to the nature of the blockchain.  For a smart contract to exist on the blockchain, it needs to be created by another address via the deployment (constructor) code, which is executed once by the EVM.  A smart contract can be created by either a user or by another smart contract [DiAngelo 2019]. Contracts become deployed as part of Ethereum’s global state by wrapping their initialization code in a transaction, signing it and broadcasting it to the network. The state and the code of smart contracts are publicly accessible, enabling inspections and audits [Patsonakis 2019]. Developers typically implement their smart contracts with the Solidity language, then build the source code using the Solidity compiler (solc) to generate the EVM bytecode. A typical EVM bytecode is composed of three parts: creation code, runtime code and swarm code. Swarm code is not served for execution purpose. Solc uses the metadata of a contract, including compiler version, source code and the located block number, to calculate the so-called Swarm hash, which can be used to query on Swarm (a decentralized storage system) to prove the consistency between the contract in swarm storage and the contract being deployed. As a result, re-deploying a smart contract would result in a different swarm code, even with the same creation code and runtime code [He 2019]. The swarm hash can provide an indication of version changes, but does not provide indications of the scope of the change similar to other versioning systems (e.g., semver.org)

In practice, how a lawyer could review a smart contract implementation for these aspects is problematic unless they have also developed skills in the appropriate smart contract platform, programming language, etc. traditional legal skills are helpful in distinguishing subtle ambiguities in the conceptual agreement capturing the contract, but new skills would be required to validate the subtleties of smart contract implementations. Several implementations of distributed ledgers have been proposed, and different languages for the development of smart contracts have been suggested. [AlKahlil 2019] proposed a list of requirements for a human and machine-readable contract authoring language, friendly to lawyers, serving as a common (and a specification) language, for programmers, and the parties to a contract.

Operational Aspects of Smart Contracts

The costs of computing on the blockchain are non-trivial – estimated at two orders of magnitude greater than cloud computing, and in some cases the blockchain design requires transaction fees. Transaction fees, which compensate miners for their work in validating transactions, are a function of their byte size and the complexity of the code they invoke (if any). Ethereum employs a flat cost model, i.e., each transaction byte and EVM operation costs some predefined amount of gas. Transactions specify a gas price, which converts ether to gas and influences the incentive of miners to include it in their next block. The higher the gas price, the higher its real monetary cost and priority to be mined [Patsonakis 2019]. Transaction costs provide incentives for smart contract designers to be efficient and minimize the operational costs of their smart contracts.  There is a tradeoff between cost efficiency for a particular smart contract vs the development and reuse of standardized code libraries of other smart contracts on the blockchain. Cost awareness in the code also implies a complication at code design time by requiring this cost awareness. Cloud computing in contrast also charges for the execution, but this decision is made at run time, and typically out of band to the code being executed.

In light of potentially devastating financial consequences from smart contracts, several regulatory bodies have identified a need to audit smart contracts for security and correctness guarantees [Zhou 2018]. Auditors need to be able to establish the existence, valuation and ownership of assets managed by a smart contract [Pimentel 2019]. Where the blockchain is public and software inspectable, software inspecting the blockchain is limited to the digital asset; it does not reach to any underlying physical assets. Standardized tokens may facilitate such inspections, but it remains to be seen if they are sufficient for audit and other purposes. While smart contracts could be designed to monitor the results of other smart contracts for conformance to some set of rules, it is not clear that such monitoring contracts would cover the full scope of applicable compliance, financial reporting, and other regulations. In addition, common operational performance metrics like service liveness, availability etc. remain to be standardized in the context of blockchain systems (e.g. is the existence of a smart contract in the block sufficient to determine availability of the service it offers?). Lawyers may be engaged in settlement operations (e.g. a residential real estate closing), though most of the work they perform is the document review and preparation prior to the settlement meeting event. A smart contract could automate the asset transfers on a closing statement, but this still requires the prior document review and preparation by competent professionals. In the case of smart contracts, the equivalent review and preparation is likely to be focused on the creation and inspection of the securitized tokens to assure their fitness for purpose.

Mechanisms to upgrade an existing deployed smart contract are not obvious. Barring some disruptive hard fork of the blockchain, smart contract code is immutably recorded in the distributed ledgers. Hence, design patterns using smart contract registries or delegatecall() constructs have emerged to upgrade contracts; these patterns, however, introduce problems [Harz 2018]. It is difficult, but not impossible, to provide for a smart upgrade mechanism. [McCloskey 2019] provides an example method for upgrading a smart contract system on Ethereum.

The blockchains underlying the smart contracts also need to be able to upgrade. Hard forks are not unknown, even in relatively mature blockchains. In 2017 (almost 10 years after its introduction), Bitcoin upgraded to implement “segregated witness” (“SegWit”). Some data in transactions was moved from one portion of the block to another in a way that effectively increased the number of transactions that could fit in each block. The blockchain before SegWit and the blockchain after had different semantics. It takes human actions to upgrade blockchains and Bitcoin’s users collectively acted to modify Bitcoin’s semantics in ways that would invalidate some transactions. A critical mass of miners announced their support for SegWit, and then on the agreed-upon date started enforcing the new rules; everyone else went along for the ride [Grimmelman 2019]. Governance of blockchain upgrades varies across the different blockchain implementations. Tezos is a self-amending crypto-ledger. The protocol that validates blocks and implements the consensus algorithm can amend itself. Concretely a new protocol is downloaded from the network, compiled and how-swapped to replace the current one. In order to amend itself, Tezos uses an on-chain voting system where users of the blockchain participate to propose, select, adopt or reject new amendments. [Allombert 2019]. Support for contract code upgrades and explicit reference to dispute resolution procedures can be supported in permissioned blockchains like CORDA [Brown 2016]. Blockchain hard forks are a potentially disruptive aspect of the operational environment that should be considered in the design of smart contracts.

Hard forks can impact the value of assets held in the distributed ledgers, and the operation of smart contracts deployed on the blockchain. Human action is required to implement hard forks, typically by programmers developing the blockchain code or operating the miners. Owners of assets impacted by a blockchain fork may seek redress from those initiating the fork [Walch 2019]. In such cases, these developers may also need legal services. The development of standardized behaviors for upgrades in both smart contracts and blockchains may help reduce such liability risks during the operating phase of the smart contract life cycle.

Termination of smart contract

Smart contracts are supposed to be self-executing and terminate on completion. Ethereum’s Solidity language for smart contracts provides a function for that purpose. A Turing complete language provides no intrinsic guarantees that a program will terminate. There are three primary methods [Harris 2019] to guarantee termination in smart contract programs (i) Turing Incompleteness: To avoid entering an endless loop, a Turing Incomplete blockchain (e.g. Bitcoin) will have limited functionality and may be incapable of making jumps and loops;(ii) Steps and Fee Meters: A smart contract can keep track of the number “steps” it has taken and then terminate once a step count has been reached, or with a fee meter, smart contracts are executed with a pre-paid amount put into a reserve. Every instruction execution requires a specified fee. The contract is subsequently terminated if the fee spent exceeds the pre-paid allocated amount; (iii) Timers: Here a pre-determined timer is maintained; if the contract execution exceeds the time limit then it is externally aborted. Ethereum uses the fee meter approach for termination, requiring “gas” (a fee) to deploy and execute smart contracts. Once the gas used exceeds the pre-paid allocated amount, the contract is terminated.

As a result of both technical and human factors, contractual disputes can still occur, even in automated settings. Abnormal contract terminations are typical triggers for the contracting parties to engage their lawyers to review their options. Abnormal smart contract terminations may be due to a mistake of fact (e.g. the smart contract reacts to reports of some external event that are incorrect) or mistakes in operation (e.g., the smart contract fails to terminate, or terminates early). Reliance on detecting anomalous transactions is too late – the transaction has already been recorded on the blockchain; and standard methods to reverse transactions on blockchains do not exist. Termination of a legal contact and termination of a smart contract may not perfectly coincide in time. Consider a legal contract to transfer some physical asset to a new owner through a smart contract. The “tokenization” of the asset must occur prior to the termination of the smart contract. The smart contract likely concludes on the transfer of the token. The recipient may have additional steps to gain control of the physical asset given the token representing it. Such “detokenization” may take some time, and possibly interaction with a third party custodian of the physical asset.

References

[AlKahlil 2019] F. Al Khalil, et al. “Trust in smart contracts is a process, as well.” International Conference on Financial Cryptography and Data Security. Springer, Cham, 2017.

[Allombert 2019] V. Allombert, et. al., “Introduction to the Tezos Blockchain.” arXiv preprint arXiv:1909.08458 (2019).

[Barton 2019] T. Barton, et al. “Successful Contracts: Integrating Design and Technology.” Legal Tech, Smart Contracts and Blockchain. Springer, Singapore, 2019. 63-91.

[Brown 2016] R. Brown, et. al.,  “Corda: an introduction.” R3 CEV, August 1 (2016): 15.

[DiAngelo 2019] M. Di Angelo, & G. Salzer. “Collateral Use of Deployment Code for Smart Contracts in Ethereum.” 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2019.

[Gisler 2000] M. Gisler, et. al., “Legal Aspects of Electronic Contracts.” ISDO. 2000.

[Gilson 1984] R. Gilson, “Value creation by business lawyers: legal skills and asset pricing.” Yale LJ 94 (1984): 239.

[Grimmelman 2019] J. Grimmelmann, “All Smart Contracts Are Ambiguous.” Penn Journal of Law and Innovation (Forthcoming) (2019).

[Guadamuz 2019] A. Guadamuz, “All watched over by machines of loving grace: A critical look at smart contracts.” Computer Law & Security Review (2019): 105338.

[Harz 2018] D. Harz, & W. Knottenbelt. “Towards safer smart contracts: A survey of languages and verification methods.” arXiv preprint arXiv:1809.09805 (2018).

[He 2019] N. He, et. al., “Characterizing Code Clones in the Ethereum Smart Contract Ecosystem.” arXiv preprint arXiv:1905.00272 (2019).

[ISO 2019] ISO/TC307 “Blockchain and distributed ledger technologies — Overview of and interactions between smart contracts in blockchain and distributed ledger technology systems,” ISO/TR 23455:2019

[Jastrzebski 2019] J. Jastrzębski, “Value Creation in Negotiations of Contractual Warranties and Indemnifications.” European Company and Financial Law Review 16.3 (2019): 273-309.

[McCloskey 2019] S. McCloskey, et. al. “Innovation Ecosystem Built on the Blockchain. Token Ticker-MTX Updated February 28, 2019.

[Patsonakis 2019] C. Patsonakis, et. al., “On the Practicality of Smart Contract PKI.” arXiv preprint arXiv:1902.00878 (2019).

[Pimentel 2019] E. Pimentel, et. al., “Systemizing the Challenges of Auditing Blockchain-Based Assets.” Available at SSRN 3359985(2019).

[Rimba 2018] P. Rimba, et. al., “Quantifying the Cost of Distrust: Comparing Blockchain and Cloud Services for Business Process Execution.” Information Systems Frontiers (2018): 1-19.

[Sillaber 2017] C. Sillaber, & B. Waltl. “Life cycle of smart contracts in blockchain ecosystems.” Datenschutz und Datensicherheit-DuD 41.8 (2017): 497-500

[Walch 2019] Walch, Angela. “In Code (Rs) We Trust: Software Developers as Fiduciaries in Public Blockchains.” (2019). SSRN abstract 3203198

[Zou 2018] Y. Zhou, et al. “Erays: reverse engineering ethereum’s opaque smart contracts.” 27th {USENIX} Security Symposium ({USENIX} Security 18). 2018.

Cryptocurrencies as Commodities: A Primer

Bitcoins can be considered an asset or speculative investment rather than a currency [Yermack 2013]. The tradability of Bitcoin units on specialized trading platforms has made practical for investment professionals. The launch of Bitcoin-linked funds by global investment banks increased the accessibility to the Bitcoin market. Importantly, the launch of futures contracts based on Bitcoin prices in late 2017 enhanced the legitimacy of Bitcoin as an investment and moved it into the mainstream of the financial world. Gold, and to a lesser extent, commodities, in general, act as effective diversifiers against the downside risk in equity markets (for both advanced and emerging economies). Investors purchase bullion with gold futures and exchange-traded funds, and are thus exposed to the price variation in gold, and a hedge against stock price volatility. The oil market is one of the most volatile commodity markets.  In a derivatives marketplace, individuals and businesses everywhere are able to lock in a future price by putting it into a binding contract. These products are called futures and options – contractual agreements to buy or sell an amount of something at a fixed price at a future date. When people and companies come to futures exchanges to buy and sell commodities and financial products, what they’re really trying to do is remove risk from their business or make money as an investor when prices fluctuate. An investment asset which provides not just diversification, but also a safe haven during stress periods is particularly valuable in construction of an investment portfolio.  Various market indices are used to benchmark commodity trades. The S&P Goldman Sachs Commodity Index (GSCI), is a world production-weighted index including 24 exchange-traded futures contract commodities from five sectors -energy products, industrial metals, agricultural products, agricultural and livestock products, and precious metals. This is a widely tracked benchmark commodity index and the most liquid commodity futures index and can play the role of a diversifier asset. It can also be used as a measure of general price movement and inflation in the world economy. Bitcoins were the first virtual currency and consequently much of the regulatory discussions have been framed in terms of bitcoin, though other blockchain applications may have quite different characteristics and uses. In the following section the terminology related to futures, options and swaps is reviewed. The US regulatory framework for commodities is then briefly summarized, and recognized roles in commodity markets noted. The current US regulatory framework for commodities recognizes virtual currencies as a commodity, enabling the issuance of futures and options on these currencies. Some of the effects of this as a financial asset are then considered. This article concludes with some recent controversies arising from this regulatory treatment of crypto currencies as commodities.

Futures, Options & Swaps Terminology

Clearing: The procedure through which a Clearing House becomes the buyer to each seller of a futures contract and the seller to each buyer. The Clearing House assumes the responsibility of ensuring that each buyer and seller performs on each contract. Futures exchanges process millions of trades each day. With so many orders coming at once, you need a lot of checkpoints to make sure everything goes smoothly.

Clearing firm: A company that works directly through an exchange’s Clearing House to execute trades on behalf of futures market participants.  clearing firms check the financial strength of both parties to the trade, whether they’re a big institution or an individual trader. They also provide access to trading platforms, where the buyer and seller agree on the price, quantity, and maturity of the contract. Then, when the contract is cleared by matching these offsetting (one buy, one sell) positions together, the Clearing House guarantees that both buyer and seller get paid. This offsetting or “netting” process takes risk out of the financial system as a whole.

Clearing House: The division of a futures exchange that confirms, clears and settles all trades through an exchange. Clearing Houses act as a neutral counterparty for every single trade that crosses a futures exchange, assuming responsibility for ensuring buyer and seller performance on each contract.

Commodity: Any product approved and designated for trading or clearing in accordance with the rules of an exchange. Also: may refer to a physical commodity.

Counterparty: The individual or company (i.e., the buyer or seller) on the opposite side of any trade.

Delivery: The changing of ownership or control of a commodity once a futures contract date expires.

Derivative: A financial instrument, such as a futures or options contract, whose value is based upon a physical commodity or other financial instruments.

Exchange: A central marketplace with established rules and regulations where buyers and sellers meet to trade futures and options contracts.

Financial Future: A future contract whose value is based upon financial instruments such as a stock index, interest rates or foreign currency exchange rates. Generally, three types of financial futures – foreign currency market, interest rate market, equity index market.

Future: A standardized contract for the purchase and sale of financial instruments or physical commodities on a futures exchange for future delivery.

Futures Exchange: A central marketplace where buyers and sellers come together to trade futures and options contracts.

Hedge: To buy or sell a futures contract in order to lock in the price of the underlying commodity at a later date.

Option: A contract that gives the bearer the right, but not the obligation, to buy or sell a futures contract at a specified price within a specified time period.

Over-The-Counter Derivative: Futures and options contracts with terms that do not necessarily adhere to those of a standardized futures contract.

Over-The-Counter Trading: Trades that take place outside of a formal futures exchange. OTC derivatives let traders go beyond standardized futures products and customize the terms of the contracts they trade. Usually, the traders work through a network of dealers who negotiate these agreements on a one-to-one basis. Though it offers greater freedom and potentially lower trading costs, OTC trading may leave both parties at risk for counterparty default if they are not using the services of a clearing house.

Self-Regulatory Organization: (SRO) Futures exchanges and regulatory entities that set rules and regulations and have internal functions that perform complex checks and balances to adhere to the principles they set.

Settlement: The delivery of cash or commodities in exchange for payment, as specified by the terms of the underlying contract.

US Regulatory Framework for Commodities

The Commodity Exchange Act (1936) (CEA) provides for Federal regulation of all commodities and futures trading activities. It requires all futures and commodity options to be traded on organized exchanges. The CFTC was created by the Act and its powers substantially revised in the Commodity Futures Trading Commission Act (1974) which expanded the scope beyond listed agricultural products. The mission of the U.S. Commodity Futures Trading Commission is to promote the integrity, resilience, and vibrancy of the U.S. derivatives markets through sound regulation. A trillion-dollar market for interest rate and currency swaps emerged in the 1980s. These transactions were similar to forward delivery futures contracts for agricultural commodities. The Futures Trading Practices Act (1992) gave the CFTC the power to exempt some transactions from the requirement for exchange trading. The Commodity Futures Modernization Act (CFMA) [ CMFA 2000] modernized regulations for over the counter (OTC) transactions between “sophisticated parties” so these would not be regulated as “commodities” under CEA or “securities” under federal securities laws. The definition of “commodity” in the CEA is broad. It can mean a physical commodity, such as an agricultural product (e.g., wheat, cotton) or natural resource (e.g., gold, oil). It can mean a currency or interest rate. The CEA definition of “commodity” also includes “all services, rights, and interests . . . in which contracts for future delivery are presently or in the future dealt in.” Beyond instances of fraud or manipulation, the CFTC generally does not oversee “spot” or cash market exchanges and transactions involving virtual currencies that do not utilize margin, leverage, or financing. The CFTC looks beyond form and considers the actual substance and purpose of an activity when applying the federal commodities laws and CFTC regulations

The CFTC’s Advisory Committees were created to provide input and make recommendations to the Commission on a variety of regulatory and market issues that affect the integrity and competitiveness of U.S. markets. The committees facilitate communication between the Commission and U.S. futures markets, trading firms, market participants, and end-users. The committees currently include: 

LabCFTC is the focal point for the CFTC’s efforts to promote responsible FinTech innovation and fair competition for the benefit of the American public. LabCFTC is designed to make the CFTC more accessible to FinTech innovators. It serves as a platform to inform the Commission’s understanding of new technologies. Further, LabCFTC is an information source for the Commission and the CFTC staff on responsible innovation that may influence policy development. There are two major components of LabCFTC- Guidepoint and CFTC 2.0

GuidePoint accepts a wide range of inquiries ranging from specific registration or compliance requirements to broader questions about the CFTC’s regulatory framework – e.g., how it may accommodate new systems, business models, or services made possible through responsible FinTech innovation. Within the CFTC, inquiries may be referred to the appropriate groups and subject matter experts with the aim to ensure that any response is both accurate and tailored to the entity’s circumstances.

CFTC 2.0 is intended to provide the agency opportunities to engage with new technologies to discover ideas and technologies that have the potential to improve the effectiveness and efficiency of the agency in carrying out its day-to-day activities.

The CFTC has published a number of documents as guidance on Cryptocurrencies:

The CFTC first found that Bitcoin and other virtual currencies are properly defined as commodities in 2015. In the Matter of: Coinflip, Inc., d/b/a Derivabit, and Francisco Riordan, CFTC Docket No. 15-29 (Section 1a(9) of the Act defines “commodity” to include, among other things, “all services, rights, and interests in which contracts for future delivery are presently or in the future dealt in.” 7 U.S.C. § 1a(9). The definition of a “commodity” is broad. See, e.g., Board of Trade of City of Chicago v. SEC, 677 F. 2d 1137, 1142 (7th Cir. 1982)). Bitcoin and other virtual currencies are encompassed in the definition and properly defined as commodities. CFTC authority to regulate virtual currency as a commodity was affirmed in CFTC v. McDonnell  (2018). The CFTC has a number of other causes of action it can pursue, e.g., Price manipulation of a virtual currency traded in interstate commerce; pre-arranged or wash trading in an exchange-traded virtual currency swap or futures contract; certain schemes involving virtual currency marketed to retail customers, such as off-exchange financed commodity transactions with persons who fail to register with the CFTC. CFTC has had several successful prosecutions for ponzi schemes in the context of virtual currency (e.g., CFTC v Dean ,CFTC vs My Big Coin Pay Inc.) and for  future exchanges not registered with the CFTC as a SEF or DCM  (e.g., In re BXFNA Inc. d/b/a Bitfinex, Dkt. No. 16-19 ).

The National Futures Association (NFA) is the industrywide, self-regulatory organization for the U.S. derivatives industry. Designated by the CFTC as a registered futures association, NFA strives to safeguard the integrity of the derivatives markets, protect investors and ensure their members meet their regulatory responsibilities. NFA’s formal designation as a “registered futures association” was granted by the CFTC on September 22, 1981. NFA began its regulatory operations in 1982. CFTC regulations also require, with few exceptions, CFTC registered firms to be NFA Members. The CFTC has delegated registration responsibility to NFA. The NFA requires additional reporting on virtual currency transactions:

Internationally, the International Swaps and Derivatives Association (ISDA) has a similar role to NFA; reducing counterparty credit risk, increasing transparency, and improving the industry’s operational infrastructure in support of its primary goals; to build robust, stable financial markets and a strong financial regulatory framework. While not specifically focussed on cryptocurrencies, ISDA has published a number of documents related to smart contracts.

Recognized Roles in Commodity Markets

NFA Commodity Pool Operator (CPO) A commodity pool operator (CPO) is an individual or organization that operates a commodity pool and solicits funds for that commodity pool. A commodity pool is an enterprise in which funds contributed by a number of persons are combined for the purpose of trading futures contracts or options on futures, retail off-exchange forex contracts, or swaps, or to invest in another commodity pool.

NFA Commodity Trading Adviser (CTA) A commodity trading advisor (CTA) is an individual or organization that, for compensation or profit, advises others, directly or indirectly, as to the value of or the advisability of buying or selling futures contracts, options on futures, retail off-exchange forex contracts or swaps. Indirect advice includes exercising trading authority over a customer’s account or giving advice through written publications or other media.

On-exchange trading is the trading of commodities and contracts that are listed on an exchange. Off-exchange trading, also known as over-the-counter (OTC) trading, is the trading of commodities, contracts or other financial instruments that are not listed on-exchange. Off-exchange trading can occur electronically or over the phone. Some foreign currency (forex) contracts are traded off-exchange.

Designated Contract Market (DCM) – an exchange that may list for trading futures or option contracts based on all types of commodities and that may allow access to their facilities by all types of traders, including retail customers. Some DCMs have been operating for many years as traditional futures exchanges, while others are new markets that were only recently designated as contract markets by the CFTC. CFTC staff perform regular reviews of each DCM’s ongoing compliance with the required core principles called Rule Enforcement Reviews.  CFTC maintains a List of DCMs.

Derivatives Clearing Organization (DCO) – an entity that enables each party to an agreement, contract, or transaction to substitute, through novation or otherwise, the credit of the DCO for the credit of the parties; arranges or provides, on a multilateral basis, for the settlement or netting of obligations; or otherwise provides clearing services or arrangements that mutualize or transfer credit risk among participants. A DCO that seeks to provide clearing services with respect to futures contracts, options on futures contracts, or swaps must register with the CFTC before it can begin providing such services. The CFTC maintains a List of DCOs.

Futures Commission Merchant (FCM) – an intermediary that solicits or accepts orders for futures or options contracts traded on or subject to the rules of an exchange; and in or in connection with such solicitation or acceptance of orders, accepts money, securities, or property (or extends credit in lieu thereof) to margin, guarantee, or secure any trades or contracts that result or may result.

Introducing Broker (IB) – an intermediary that solicits or accepts orders for futures or options contracts traded on or subject to the rules of an exchange; and does not accept any money, securities, or property (or extend credit in lieu thereof) to margin, guarantee, or secure any trades or contracts that result or may result.

Swap Execution Facilities – Section 733 of the Dodd-Frank Wall Street Reform and Consumer Protection Act (“Dodd-Frank Act”) adopts new Section 5h of the Commodity Exchange Act (“CEA”), which provides that no person may operate a facility for the trading or processing of swaps unless the facility is registered as a swap execution facility (“SEF”) or as a designated contract market (“DCM”). The CFTC maintains a List of SEFs.

Effects of Cryptocurrency Commoditization

Several organizations (e.g., Cantor Exchange, CBOE Futures Exchange (CFE), Chicago Mercantile Exchange (CME). LedgerX, Nadex, TeraExchange) had registered with the CFTC as exchanges for Bitcoin Futures, Options or swaps. The Chicago Board Options Exchange (CBOE) has announced that it is dropping any new bitcoin futures contracts (XBT). This may have been due to low trading volumes. Bitcoin futures (BTC) are still live at CME. You can hedge Bitcoin exposure or harness its performance with a futures product. Based on the growing interest in cryptocurrencies and a strong demand for more tools to manage bitcoin exposure, CME Group plans to launch options on Bitcoin futures (BTC) in early 2020. The CME settles its contracts against an index called BRR (Bitcoin reference rate) which is an average of spot prices quoted on different exchanges. CME created a Bitcoin Reference Rate (BRR) and CME Bitcoin Real-Time Index (BRTI) as a standardized reference rate and spot price index, respectively, with independent oversight to accelerating the professionalization of bitcoin trading. CME has been generating BRR and BRTI rates since November 2016 with several bitcoin exchanges and trading platforms providing pricing data, including Bitstamp, Coinbase, itBit, Kraken, and Gemini. (See CME’s Bitcoin Reference Rate Analysis). Note that trading in Bitcoin futures doesn’t imply trading in Bitcoin itself. Bitcoin Futures Quotes are available online from the CME.

While the commodity markets for crude oil and gold are characterized by considerable short-run supply-side uncertainty (e.g., political events, surprise discoveries, and technological developments).  Uncertainty of this type does not exist on the supply-side of Bitcoin. Thus, the observed price fluctuations of Bitcoin can be interpreted as demand shocks. [Ali 2014)] asserted that “digital currencies have meaning only to the extent that participants agree that they have meaning.” A change in this “meaning” due to changes in demand is not different from a demand shock in the crude oil market. Empirical analysis reveals that Bitcoin price dynamics are particularly influenced by extreme price movements. This influence is found to be larger than in the markets for crude oil and gold. Among the explanations for this is certainly the immaturity of the market [Gronwald 2019]. Cryptocurrencies have taken a further step in the direction of commodities with the emergence of cold storage [Geman 2019]. Cold storage means generating and storing the crypto coins’ private keys in an offline environment in order to avoid the online vulnerability to hacking. The most popular cold storage options are:

a) A paper wallet containing a pair of private/public keys printed on a piece of paper, with keys generated offline securely;

b) A hardware wallet is an electronic device, but the most robust cold storage choice for cryptos. The three popular options offered on the market are Ledger Nano, Trezor and Keepkey;

c) A USB drive can also be a cold wallet, easy to obtain but with the risk that anyone having access to the USB can access the crypto

Call options give buyers the possibility of getting a financial exposure to Bitcoin prices while puts provide the classical protection to those owning the cryptocurrency. Bitcoin futures were launched by the Chicago Board of Options Exchange and the Chicago Mercantile Exchange group on December 18th, 2017. The total market capitalization of all cryptocurrencies was 828 billion dollars in January 2018 (just after two Exchanges launched futures), 200 billion in August 2018 and 272 billion in September 2019. Note that the fraction of bitcoin in the total market capitalization was 86% in January 2017, went to 34% in January 2018 and back to 68% in September 2019. Futures trading drove up the price of Bitcoin immediately after the announcement day. This reaction started to decrease noticeably following the launch of the futures contracts. Such an outcome seems in line with the trading behavior that typically accompanies the launch of futures markets for an asset. [Bouoiyou 2019]. CME Futures are subject to significant regulatory oversight by the (CFTC), and are protected from counterparty risk by the Clearing House of the Exchange. This is a desirable feature since more than 36 cryptocurrency trading venues had closed by the end of December 2018. Moreover, they partly allow avoiding the fragmentation that sometimes prevailed in the Bitcoin spot market: during periods of high volatility, prices observed for Bitcoins on different platforms over identical time periods could diverge by more than 10%. Storability and convenience yield enables the derivation of a (valuable) spot-forward relationship. Applying the traditional options pricing mechanism of the Black-Scholes Model in this setting provides bounds on option prices [Geman 2019].

Some commodities provide diversification benefits while others may not be useful for portfolio diversification.  Bitcoin adds portfolio diversification benefits above and beyond other commodities. The correlation between bitcoin and other assets is exceptionally low and the inclusion of bitcoin dramatically improves the risk-adjusted returns of the portfolios. Bitcoin’s inclusion in optimal portfolios leads to a better risk-return ratio. Bitcoin can play an important role in enhancing the efficiency of an investor’s portfolio. These findings are robust to expanding and rolling estimation windows, transaction costs, the 2018 downturn in Bitcoin, different values of risk aversion, alternative indices, as well as to alternative portfolio construction techniques and to simulated data and when short selling is permitted, although the analysis is still based on the historical mean asset returns as return forecasts and the historical return variances and covariances [Platanakis 2019]. Historical returns, however, can be poor estimates of future returns, especially given Bitcoin prices’ large volatility. The inclusion of Bitcoin (BTC) in oil, gold, and equity portfolios substantially reduced the portfolio risk. BTC and gold markets have respectively negative and weak conditional correlations with oil. The correlation between S&P GSCI and BTC as well as gold is close to zero. [Al-Yahyaee 2019]. The Dollar is a better alternative to hedge oil implied volatility (OVX) than Bitcoin. Bitcoin outperforms gold and commodity in hedging OVX. Bitcoin is a better hedge to demand-side oil shocks in comparison to the Dollar. Bitcoin hedges the demand-side shocks better that supply-side shocks [Das 2019]. This does not necessarily mean that Bitcoin is a superior asset over others to hedge oil-related uncertainties. The hedging capacity of different assets is conditional upon the nature of commodity risks and market situation. A single asset cannot hedge downside risks in different economic situations and market states.  Investors may prefer different investment instruments to hedge downside risks in different economic situations and market states.

An asset is labeled a strong safe-haven if there is evidence of predictability from a stock index to that asset in the low quantiles of both the stock and the asset returns, and the sign of this predictability is negative. This ensures that extreme negative stock returns are followed by future positive returns in the (safe-haven) asset, i.e. the movement of the (safe-haven) asset in the opposite direction of that of the stock index ensures that the losses occurring in stock investments are counterbalanced. In contrast, an asset is labeled a weak safe-haven if there is no evidence of predictability from a stock index to that asset in the low quantiles of both the stock and the asset returns [Shahzad 2019]. Bitcoin, gold, and commodities have a similarity in their weak safe-haven properties for the world stock market index, which is not the case for the developed, emerging, US, and Chinese stock markets. In fact, gold is the only weak safe-haven asset in developed stock markets, whereas both gold and commodities play that role in emerging stock markets. Interestingly, Bitcoin shares with commodities the weak safe-haven property in China, whereas commodities are the only weak safe-haven asset in the US [Shahzad 2019a]. While futures on virtual currencies have facilitated trading in this asset class, regulatory ambiguity on the treatment of the underlying assets also impedes its viability as a safe haven.

      With cryptocurrencies becoming more connected and more prominent within the system, the nature of information spillovers changes over time. The role of energy commodities, in contrast, is dependent on their price dynamics. Cryptocurrencies are integrated within broadly-defined commodity markets. From a theoretical point of view, different information channels and factors may play a role in forming a connection between the cryptocurrency market and the commodity markets. One correlated-information channel through which connections occur is via the price-discovery process. A second is the risk premium channel, through which a shock in one market may adversely affect the willingness of market participants to hold risk in any market. Industry-specific development may provide additional information linkages (e.g. A blockchain platform has been established to facilitate trade in crude oil between commodity firms). Potential linkages between energy and Bitcoin markets have been based on the rationale that energy, in the form of electricity, is the main cost of Bitcoin production (i.e., for mining). Commodities enjoy a strong network structure that is also intertwined with financial assets. Increasing connectedness [Ji 2019] between commodity and cryptocurrency markets weakens the attractiveness of portfolio diversification across these markets:

  • energy and agricultural commodities are the driving forces of the whole commodity system.
  • cryptocurrencies are not detached from the system and are more connected to the global commodity markets than are metals (including gold).
  • cryptocurrencies are not strongly affected by energy commodities, which goes against the basic idea that electricity prices form an important part of cryptocurrency production costs.
  • cryptocurrencies become more connected to and more important within the overall commodity network over time.
  • energy commodities become less important over time as they are evidently connected to the price dynamics of crude oil as a representative commodity.
  • the portfolio management role of cryptocurrencies as diversifiers is not necessarily as strong as is commonly believed, at least during times of general asset appreciation.

Controversies from the Commoditization of Cryptocurrencies

            [Kogan 2019] argues that the holding in CFTC vs McDonnell is overly broad. Many virtual currencies are designed for drastically different purposes, with distinct technological protocols. The term “virtual currency” encompasses many different, independently developed applications of distributed ledger technology. Need to distinguish between virtual currencies, cryptocurrencies, tokens, digital currencies – the court used a virtual currency definition as simply a digital representation of value that exists solely online, has no government legal tender status and can be traded as a medium of exchange, a unit of account or a store of value. The agency’s regulatory authority under CEA should not include services and tokens that cannot underlay DCM transactions, but the court decision would appear to grant that authority. For example, smart contracts running on a blockchain would appear to fall within the court’s definition. The CFTC has not directly addressed how liability for Commodity Exchange Act (CEA) violations involving blockchain or distributed ledger technology should be allocated among the various parties involved in the distributed ledger network, such as the network itself, persons running consensus nodes, developers building applications on the platform, and businesses and end-users using such applications [Mathews 2019].

CFTC regulation requires that any new contract not be readily susceptible to manipulation, but a careful review of the record indicates that bitcoin futures are susceptible to manipulation because the bitcoin spot market can be manipulated. In reviewing the contracts leading up to their self-certification, [Reiners 2019] argues that the CFTC ignored underlying dynamics in the bitcoin spot market and chose to exclusively focus on the ability of the contracts themselves to be manipulated; doubting that a futures contract can be resistant to manipulation when the asset underlying the contract is readily manipulated. The price of bitcoin varies depending on the exchange it trades on, and some exchanges have very low volume, so CME carefully constructed a reference rate for their futures contracts that could not be manipulated. The Securities and Exchange Commission (“SEC”), in contrast, took a different approach when reviewing a proposal for a bitcoin exchange-traded product and concluded that manipulation in the bitcoin spot market precluded any kind of exchange-traded product tied to bitcoin. The CFTC has very little jurisdiction over the cash market— the trading of Bitcoin or other crypto-assets that are not securities for cash (or other crypto-assets that are not securities). That’s where most of the trading of Bitcoin and other cryptocurrencies takes place today. The agency can pursue cases of fraud and manipulation in the cash market. It can also bring actions pertaining to retail leveraged trades where there is a failure to deliver the commodity—that has been the basis for some enforcement actions. as a general matter, it cannot set oversight standards for the cash market in crypto-assets as it does with derivatives on those crypto-assets. The cash market for crypto-assets—which is where most of the trading takes place today—does not have well-developed standards. This is a problem for oversight generally and for the quality of crypto derivatives: if the underlying cash market is susceptible to (or characterized by) fraud and manipulation, then what confidence can one have in the derivatives?  [Massad 2019]. Blockchain technologies and cryptocurrencies in particular, are variously treated as commodities, securities, property by different governmental agencies [Goforth 2019]. The list of governmental agencies impacted by cryptocurrency concerns goes beyond the CFTC to include the SEC, FBI, Treasury, IRS etc. Resolving the regulatory ambiguity and jurisdictional boundaries seems likely to take some time.

References

[Al-Yahyaee 2019] K. Al-Yahyaee, et al. “Volatility forecasting, downside risk, and diversification benefits of Bitcoin and oil and international commodity markets: A comparative analysis with yellow metal.” The North American Journal of Economics and Finance 49 (2019): 104-120.

[Ali 2014] R. Ali, et. al., “The economics of digital currencies.” Bank of England Quarterly Bulletin (2014): Q3.

[Bouoiyour 2019] J. Bouoiyour, & R. Selmi. “How do futures contracts affect Bitcoin prices?.” (2019).

[CEA 1936] Public Law 74-675, 74th Congress, H. R. 6772: Commodity Exchange Act

[Das 2019] D. Das, et. al., “Does Bitcoin hedge crude oil implied volatility and structural shocks? A comparison with gold, commodity and the US Dollar.” Finance Research Letters(2019): 101335.

[Geman 2019] H. Geman, & H. Price. “Bitcoin Futures and Option Markets: Searching for Completeness.” Available at SSRN 3457167 (2019).

[Goforth 2019] C. Goforth, “US Law: Crypto Is Money, Property, A Commodity, And A Security, All At The Same Time.” Journal of Financial Transformation 49 (2019): 102-109.

[Gronwald 2019] M. Gronwald, “Is Bitcoin a Commodity? On price jumps, demand shocks, and certainty of supply.” Journal of International Money and Finance 97 (2019): 86-92.

[Ji 2019] Q. Ji, et al. “Information interdependence among energy, cryptocurrency and major commodity markets.” Energy Economics 81 (2019): 1042-1055.

[Kogan 2019] Kogan, Allen. “Not All Virtual Currencies Are Created Equal: Regulatory Guidance in the Aftermath of CFTC v. McDonnell.” Am. U. Bus. L. Rev. 8 (2019): 199.

[Lucking 2019] D. Lucking, & V. Aravind. “Cryptocurrency as a Commodity: The CFTC’s Regulatory Framework.” Global Legal Insights (2019).

[Massad 2019] T. Massad,  “It’s Time to Strengthen the Regulation of Crypto-Assets.” Economic Studies at Brookings (2019).

[Mathews 2019] N. Mathews, &  J. Robison. “Smart contracts that violate the Commodity Exchange Act: which parties are liable?.” Journal of Investment Compliance (2019).

[Platanakis 2019] E. Platanakis, & A. Urquhart. “Should investors include bitcoin in their portfolios? A portfolio theory approach.” The British Accounting Review (2019): 100837.

[Reiners 2019] Reiners, Lee. “Bitcoin Futures: From Self-Certification to Systemic Risk.” NC Banking Inst. 23 (2019): 61.

[Shahzad 2019] Shahzad, Syed Jawad Hussain, et al. “Is Bitcoin a better safe-haven investment than gold and commodities?.” International Review of Financial Analysis 63 (2019): 322-330.

[Shahzad 2019a] Shahzad, Syed Jawad Hussain, et al. “Safe haven, hedge and diversification for G7 stock markets: Gold versus bitcoin.” Economic Modelling (2019).

[Yermack 2013] D. Yermack, “Is Bitcoin a real currency? An economic appraisal [nber Working Paper no. 19747].” Available online at: National Bureau of Economic Research

Why IoT Architectures Must Consider Privacy Impacts

There are increasing concerns about data privacy and online security around the world; this is somewhat of a paradox, as users continue to give away personal data (and thus their privacy) in exchange for different services. A recent survey [CIGI-Ipsos 2019] on Internet security and trust found that 78 percent of Internet users in 25 economies were at least somewhat concerned about their privacy online. Internet scams of various types have also been demonstrated to raise internet users’ sensitivity to privacy issues [Chen 2017]. While economic development theory has long grappled with the consequences of cross-border flows of goods, services, ideas, and people, the most significant growth in cross-border flows now comes in the form of data. Some of these flows represent ‘raw’ data while others represent high-value-added data; this can make a difference in the trajectory of national economic development [Weber 2017]. Public awareness about privacy risks on the Internet is increasing; with the evolution of the Internet to the Internet of Things, these privacy risks are likely to become even more significant due to the large amount of data collected and processed by IoT architectures [Baldini 2018]. The Sony pictures hack[1] illustrates that privacy is not just an individual concern; unease over privacy expectations has emerged at the individual, governmental and international levels. Conceptually and methodologically, privacy is often confounded with security. [Spiekerman-Hoff 2012]. Gartner expressed a concern that the biggest inhibitor to IoT growth will be the absence of security by design[Gartner 2018] (which would include some aspects of privacy). While there has been considerable attention placed on some aspects of security, privacy has received less attention from the IoT community.  Privacy was identified this year by Deloitte[2] to be the factor driving regulatory uncertainties over data management. This regulatory uncertainty challenges enterprises’ adoption of new technologies (like blockchain, or IoT). Social expectations for privacy are evolving, particularly in regard to aggregate representations of personal data in cyberspace. IoT devices and architectures are emerging as a major new data source for capturing representations of human activity. Rising cyberspace privacy concerns are moving beyond isolated activities like web browsing or social networks to consideration of the privacy impacts of the aggregate representation of personal data, including foreseeable data generation capabilities of IoT architectures. At a minimum, this creates a public relations problem for the deployment and operation of IoT Architectures.

IoT networks, like many other networks, are not technically constrained within geographical or political boundaries, but these political constructs may imply legal obligations for participants. Many of these legal notions of privacy evolved prior to the availability of the internet. International treaties like the UNDHR [UN 1948] and ICCPR [UN 1976] provide some definitional guidance on privacy rights, and [ALI 1977] identifies US common law privacy torts related to intrusion upon seclusion, appropriation of name or likeness, and publicity given to private life. These legal concepts, however, were all in place before the deployment of the Internet and the emergence of IoT. US legal requirements on privacy also come from a variety of other sources including constitutional limits, legislation, regulation, common law, and contract law; while litigation processes like discovery also implicate privacy. The Federal Trade Commission provides some cross-industry-sector privacy enforcement, but other industry-specific agencies in the health, finance, education, telecommunications, and marketing enforce industry-specific privacy regulations. States have also promulgated their own laws (e.g., on data breach notification and reporting obligations). [Solove 2006] proposed a privacy taxonomy with four main groups of activities that threated privacy (1) information collection (including surveillance and interrogation); (2) information processing (including aggregation, identification, insecurity, secondary use and exclusion); (3) information dissemination (including breach of confidentiality, disclosure, exposure, increased accessibility, blackmail, appropriation, and distortion); and (4) invasions (including intrusions and decisional interference). More recently, the General Data Protection Regulation [EU 2016] (GDPR) applies extraterritorially to protect EU citizens and has also been influential in other national privacy efforts. In particular, GDPR identifies roles in managing data (e.g., Data Protection Officers); rights for data subjects (including breach notification, access to their personal information, data erasure (the right to be forgotten), and data portability); and requires privacy to be incorporated into the design of systems (Privacy by Design). Globally, privacy laws are continuing to evolve towards bringing greater rights to data subjects [Greenleaf 2019]. Legal considerations on privacy generally revolve around the rights and obligations of legal entities; the IoT, however, is generally considered from the perspective of “things” and the data they generate or consume.  The “things” in IoT are not usually considered legal entities, but many recent proposals for IoT architectures have been based on blockchains, and some have argued that blockchains could be implemented as Digital Autonomous Organizations (DAOs) structured to be recognized as independent legal entities (e.g., zero-member LLCs [Bayern 2014] or BBLLCs [Vermont 2018]). Manufacturers of IoT systems often seek the scale of global markets, and so cannot avoid these international trends in privacy regulation. IoT architectures have historically not emphasized privacy features, or considered IoTs operating as independent legal entities. The threats of increased regulation and the opportunities of new legal options will challenge existing IoT deployments and create opportunities for new IoT architectures.

The data we collectively create and copy each year is growing at 40% annually is estimated[3] to be around 44ZB/yr in 2020 (that’s around 6TB/yr for every person on earth), with much of this data expected (in future) to come from IoT devices sensing the world around them. Today, while people may choose to consume their portion of all their data as internet cat videos, many are not mindful of the digital footprints they leave in cyberspace [Camacho 2012].  An entirely new value chain has evolved around firms that support the production of insights from data.  Individual data are worth very little on their own; the real value of data comes from the data being pooled together. [Beauvisage, 2017]. IoT provides a major new source of data for the big data value chain. Beyond intentional internet interactions, IoT sensor networks can also passively collect data on human activities. At the earlier stages of the data value chain, information content is limited, and therefore the scope for value generation is also low; at the same time, the data is more personalized and hence more susceptible to privacy threats.  Some types of data should not be extracted, for instance, if it impinges on fundamental privacy rights. Some data, such as health data, may be usefully extracted under highly regulated circumstances. For many IoT architectures, the privacy threat arising from information processing (e.g., aggregated data) may be more severe than individual data samples. IoT data does not have to be as bandwidth-intensive and focused as video surveillance to threaten privacy. Patterns of private human activity can be discerned from aggregating data from disparate IoT architectures. The ownership and control options for IoT architecture generated data (as relating to human privacy) may be more complex than previous IoT architectures had considered – perhaps rather than centralizing data from IoT sensors in the cloud, IoT data may need to remain distributed, but responding to a limited set of authorized queries. Some actors may also have access across multiple IoT architectures providing a further degree of information aggregation and processing. Even IoT architectures intended for other purposes (e.g. environmental monitoring) may have the data they generate repurposed in ways that violate human privacy.  For IoT architectures to succeed in large scale commercial deployments, they must be prepared to address evolving privacy concerns. This will require IoT architecture to identify which of the data they generate can implicate human privacy concerns.

Humans are interacting with vast amounts of data in new and unusual ways.  Sensor density in consumer products is also increasing. Cyberspace historically was just an environment in which computer communication occurred; now it is already defined more by users’ social interactions rather than technical implementation concerns [Morningstar 2003]. Cyberspace computation today is often an augmentation of the communication channel between real people. People seek richness, complexity, and depth within a virtual world; and at the same time require increasing annotation of real-world entities with virtualized data in augmented reality.  Humans increasingly use cyberspace for social interaction merging cyberspace and social spaces into social computing. The environments, however, are not the same; humans’ expectations and intuitions from the physical world do not always carry over into cyberspace.  For example, real-world experiences are ephemeral; thanks to data storage, however, representations of personal data do not naturally decay; applying this to privacy violations, a transient real-world peeping incident equivalent in cyberspace could result in an ongoing data peeping threat. Legal notions of privacy are typically sensitive to the context (e.g., public spaces vs homes) and actors (e.g., people, organizations, governments). If IoT deployment scale projections are correct, then cyberspace in the near future will be dominated by data flows from IoT architectures. Cyberspace may create notions of new types of entities that may implicate privacy [Kerr 2019], and DAOs are one example of this. Devices are evolving to provide more “human-like” interfaces (e.g. voice assistants (e.g. Alexa, Siri) AI chatbots [Luo 2019]) and autonomous activity (e.g. UAV drones, Level 5 self-driving cars).  The Apple iPhone 11 sensors include[4] faceID, barometer, three-axis gyro, accelerometer, proximity sensor, ambient light sensor, audio, and multiple cameras. The Tesla Model 3 includes[5] rear side and forward cameras, forward-facing radar and 12 ultrasonic sensors. The increasing data intensity in human experience is affecting human behavior and perceptions. While data generically is a very abstract concept, IoT sensor data is very much concerned with creating and aligning various linkages between physical reality and its cyberspace counterpart. Many actors may have an interest in the data about humans created by IoT devices and architectures. Beyond data ownership considerations, recent privacy legal initiatives have created new roles and additional obligations for operators of IoT architectures – e.g. GDPR’s rights to correct data or to be forgotten. The scope, scale, and serendipity of individual human interactions with cyberspace are reaching a qualitative change as IoT architectures become more pervasive.

The human-computer interaction (HCI) with the IoT blockchain is also an important factor affecting whether privacy enhancements are successful. Click through licenses can easily permit users to contract away their privacy rights (unless otherwise limited by regulation). There have been some efforts[6] to provide better exemplars of legal patterns for privacy information; adoption, however, is voluntary unless there is some superseding regulation (e.g., requiring specific notices to “opt-in” for certain types of information disclosures). Given the evolving nature of privacy concepts, HCI approaches may be helpful [Wong 2019] to better define users’ perceptions of the privacy problem space. Trademarks and certification seals may be useful [Wirth 2018], [Bansal 2008] for consumers to identify and trust products and services that provide privacy assertions (e.g., conformance to privacy regulations such as the GDPR). Beyond disclosures, new privacy rights create functions (e.g., for authorized modification or deletion of data) that need to be supported in IoT architectures. The effectiveness of such functions in providing humans with more advanced controls of their personal data will depend in large part on their ease of use. The usability/ operability of such user controls of their data will also be impacted by the visibility and accessibility of the privacy controls. IoT use cases need to evolve to consider these new roles and functions within IoT architectures and how humans can effectively use them to maintain control of their privacy.

Two fundamental technology trends are driving the Internet of Things (IoT). Firstly, the continued miniaturization of devices through Moore’s law, nanotechnology, new materials, etc.,  is providing an increased density of functionality in devices, and a consequent increase in the variety and volume of the data these devices can generate and consume. Secondly, the number and quality of connections are increasing.  Gartner estimated[7] there would be 8.4 billion connected Internet-of-Things (IoT) devices in use worldwide in 2017 and projects an increase to 50 billion by 2020. IoT use cases are one driver for 5G deployments and these deployments are also expected to increase connectivity density towards ubiquity in many areas.  Ericsson estimates[8] there will be 1.5 billion IoT devices with cellular connections by 2022 with cumulative annual growth rates on the order to 20%-30%. This is significantly faster growth than the US GDP growth (estimated[9]in the range 2-3% 2018-2019) or world population growth rates (estimated[10]at 1-2%). Even the job outlook for software developers is only expected[11] to improve by ~21% (2018-2018). The number of IoT devices and their connectivity is evolving the Internet to be primarily an Internet of Things, where the IoT devices, and the data they communicate, forms the dominant usage pattern. This massive IoT investment comprises multiple information infrastructures; forming a cyberspace data environment within which people will interact for an increasing portion of their lives. With massive IoT deployments expected within the next 5 years, to avoid stranded investments, it is important to get the appropriate IoT architecture requirements in place to address common human concerns, particularly around privacy. Existing IoT deployments will also be impacted by privacy as public relations headwinds, evolving regulatory requirements on management of IoT data, changing human attitudes due to the qualitative changes in cyberspace experiences from pervasive IoT environments, and increased user control of IoT data. Retrofitting privacy (or security) into an existing distributed architecture is unlikely to be simple cheap or complete. New IoT architectures must consider privacy impacts.

References

[ALI 1977] American law Institute, “Restatement of the law, Second, Torts”, 1977, § 652

[Baldini 2018] G. Baldini, et al. “Ethical design in the internet of things.” Science and engineering ethics 24.3 (2018): 905-925.

[Bansal 2008] G. Bansal, et.al., “The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: A multiple-context investigation.” ICIS 2008 Proceedings (2008)

 [Bayern 2014] S.Bayern, “Of bitcoins, Independently wealth software and the zero member LLC”, Northwestern U.Law Rev. vol 108, pp 257-270, 2014

[Beauvisage 2017] T. Beauvisage (2017). Selling one’s behavioral data: An impossible market? (Research blog). Orange. April 18. Available at: https://recherche.orange.com/en/selling-ones-behavioral-data-an-impossible-market/.

[Camacho 2012] M.Camacho, et. al., “Self and identity: Raising undergraduate students’ awareness on their digital footprints.” Procedia-Social and Behavioral Sciences 46 (2012): 3176-3181.

[Chen 2017] H.Chen, et.al., “Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors.” Computers in Human Behavior 70 (2017): 291-302.

[CIGI-Ipsos 2019] CIGI-Ipsos, UNCTAD and Internet Society (2019). 2019 CIGI-Ipsos Global Survey on Internet Security and Trust. Centre for International Governance Innovation, UNCTAD and the Internet Society. Available at: https://www.cigionline.org/internet-survey-2019.

[EU 2016] European Union: Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation)

 [Gartner 2018] R.Contu, et.al.,“Forecast: IoT Security, Worldwide, 2018”, Gartner, Tech. Rep., 2018. 

[Greenleaf 2019] G. Greenleaf, “Global Data Privacy Laws 2019: New Eras for International Standards.” (2019).

[Kerr 2019] Kerr, Ian. “Schrödinger’s Robot: Privacy in Uncertain States.” Theoretical Inquiries in Law 20.1 (2019): 123-154.

[Luo 2019] Luo, Xueming, et al., “Frontiers: Machines vs. Humans: The Impact of Artificial Intelligence Chatbot Disclosure on Customer Purchases.” Marketing Science (2019).

[Morningstar 2003] C.Morningstar, et. al., The Lessons of Lucasfilm’s Habitat. The New Media Reader. Ed. Wardrip-Fruin and N. Montfort: The MIT Press, 2003. 664-667. 

[Solove 2006] Daniel J. Solove “A Taxonomy of Privacy”. U. Pa. L. Rev., 154:477–560, 2006.

[Weber 2017] S. Weber, “Data, development, and growth.” Business and Politics 19.3 (2017): 397-423.

[Spiekerman-Hoff 2012]. S.Spiekermann-Hoff,  “The challenges of privacy by design.” Communications of the ACM (CACM) 55.7 (2012): 34-37.

[UN 1948] United Nations, “Universal Declaration of Human Rights”, 1948

[UN 1976] United Nations, “International Covenant on Civil and Political Rights”, 1976

[Vermont 2018] Vermont S.269 (Act 205) 2018 §4171-74

[Wirth 2018] C. Wirth, et. al., “Privacy by blockchain design: a blockchain-enabled GDPR-compliant approach for handling personal data.” Proc. of 1st ERCIM Blockchain Workshop. European Society for Socially Embedded Technologies (EUSSET), 2018.

[Wong 2019] R. Wong, et.al., “Bringing Design to the Privacy Table: Broadening ‘Design’ in ‘Privacy by Design through the lens of HCI” Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, 2019.


[1] https://bit.ly/35AmrTF

[2] https://bit.ly/2RLp156

[3] https://bit.ly/2jMfjOq

[4] https://apple.co/2krqDlT

[5] https://bit.ly/2MefQGO

[6] https://bit.ly/33vyyzt

[7] https://gtnr.it/2Mcqz56

[8] https://bit.ly/2tjDYeY

[9] https://bit.ly/2L6ybDw

[10] https://bit.ly/2Pb5IlC

[11] https://bit.ly/2OgAJii

Blockchain Loyalty Programs

“What gets us into trouble is not what we don’t know. It’s what we know for sure that just ain’t so.”
― Mark Twain

Under current taxation regimes, cryptocurrencies are treated as property by the IRS, which implies a host of existing rules and regulations regarding the reporting and taxation of property transactions.  This reporting and tax collection can be manually burdensome and is rarely automated given the current state of the technology. The IRS has recently started increased enforcement actions on cryptocurrency transactions. Blockchain and cryptocurrency enthusiasts have sought to apply some of the underlying technology and concepts in a variety of other ways to avoid these burdens.  One proposed use is in customer loyalty programs.

Customer loyalty programs can provide differentiation and sustain competitive advantages, particularly where the switching costs are low[1].  Customer loyalty programs have a long history with applications in the 1700s and 1800s with tokens and stamps that could be used by the customer for discounts on future purchases with the same supplier. Perhaps the modern stereotype is the frequent flyer mile. Originally acquired and used solely for air travel, these can now be acquired without using air transport and exchanged for a variety of other goods and services.  While typically not fungible beyond the partner ecosystem, customer loyalty tokens (e.g. frequent flyer miles) are sometimes seen as alternative currencies by both the creators and users. The analogy with cryptocurrency schemes as an alternative currency seems obvious.

Most consumers don’t think about taxation of their frequent flyer miles; and, most would typically assume that they are not taxable.  This, unfortunately, ain’t always so. The IRS has issued limited guidance on the taxation of frequent flyer miles with IRS announcement 2002-18 stating they would not pursue a tax enforcement program on frequent flyer miles – and not that these were not taxable. This relief does not apply to travel or other promotional benefits that are converted to cash, to compensation that is paid in the form of travel or other promotional benefits, or in other circumstances where these benefits are used for tax avoidance purposes. And there are a couple of court cases[2] where the value asserted in a frequent flyer miles transaction has exceeded de minimus limits and resulted in the issuance of 1099-MISC income statements with tax impacts. There are many variants in customer loyalty programs and opinions on the practicality of heir taxability[3]. Unexpected tax enforcement against consumers of loyalty program tokens would significantly impact the value of such programs.  No consumer-facing company wants to give its customers promotional tokens that result in tax problems from unexpected liabilities or reporting concerns.

Considering the potential for increased tax enforcement against cryptocurrency transactions, proponents of blockchain-based customer loyalty programs should consider how closely their proposed loyalty programs match the original concept of discounts against future purchases with the same supplier vs fungible alternative currency.

For companies considering a blockchain-based loyalty program there are additional considerations. FINCEN has recently issued guidance involving convertible virtual currencies.   While this guidance seems directed to virtual currency exchanges, it is not clear that businesses exchanging virtual currencies for goods and services are exempt. If applicable, then the business would need to comply with state money transmission regulations. This gives companies considering blockchain-based loyalty programs added incentives for restricting the program to match the original concept of discounts against future purchases with the same supplier vs fungible alternative currency.

Blockchain-based customer loyalty programs are not impossible; however, due diligence needs to be undertaken with the applicable regulations, to ensure the loyalty program is designed appropriately.


[1] A. Nastasiou, M. Vandenbosch, “Competing with loyalty: How to design successful customer loyalty reward programs”, Business Horizons Vol 62, Is 2. March-April 2019 pp 2017-214.

[2] See e.g., Shankar v Commissioner 143 T.C. No 5 (2014), Hirsch v Citibank (S.D.N.Y) Case 1:12-cv-01124-DAB-JLC (2016)

[3] J. A. Mankin, J.J. Jewell, “Frequent Flyer Miles as company scrip: implications on taxation” Business Studies Journal, Vol 7, No. 1, 2015