This document discusses key elements of security token offerings, including concepts, standards, and the lifecycle. It outlines the major building blocks, including security token platforms that connect issuers, investors, exchanges, liquidity providers, custodians, and other stakeholders. Finally, it poses several key questions about requirements for identity and asset validation, compliance, interactions between platforms and providers, liquidity, voting, governance, privacy, and data access for security tokens.
6. Key Questions
What is the required
identity validation method
What is the required asset
ownership validation
method
What is the required
compliance validation
method
7. Key Questions
What are the required
interactions between
security tokens and issuer
platforms, liquidity
providers, regulatory
models, market places,
funds etc.
What are the liquidity
providers for this security
token
8. Key Questions
What are the required voting
functionalities for the security
tokens
What are the governance
functionalities for the security
tokens
What are the privacy
functionalities for the security
tokens?
What are the data access features
required for the security tokens?