{"id":26017,"date":"2023-07-16T13:30:59","date_gmt":"2023-07-16T11:30:59","guid":{"rendered":"https:\/\/www.kryptoakademie24.de\/?p=26017"},"modified":"2023-09-21T11:02:14","modified_gmt":"2023-09-21T09:02:14","slug":"was-sind-security-token","status":"publish","type":"post","link":"https:\/\/www.kryptoakademie24.de\/en\/glossar\/was-sind-security-token.html","title":{"rendered":"What are Security Tokens?"},"content":{"rendered":"<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-default orientation-horizontal buttonsize-medium\"><li class=\"shariff-button mastodon shariff-nocustomcolor\" style=\"background-color:#563ACC\"><a href=\"https:\/\/s2f.kytta.dev\/?text=Was%20sind%20Security%20Token%3F https%3A%2F%2Fwww.kryptoakademie24.de%2Fen%2Fglossar%2Fwas-sind-security-token.html\" title=\"Share at Mastodon\" aria-label=\"Share at Mastodon\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#6364FF; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"75\" height=\"79\" viewbox=\"0 0 75 79\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M37.813-.025C32.462-.058 27.114.13 21.79.598c-8.544.621-17.214 5.58-20.203 13.931C-1.12 23.318.408 32.622.465 41.65c.375 7.316.943 14.78 3.392 21.73 4.365 9.465 14.781 14.537 24.782 15.385 7.64.698 15.761-.213 22.517-4.026a54.1 54.1 0 0 0 .01-6.232c-6.855 1.316-14.101 2.609-21.049 1.074-3.883-.88-6.876-4.237-7.25-8.215-1.53-3.988 3.78-.43 5.584-.883 9.048 1.224 18.282.776 27.303-.462 7.044-.837 14.26-4.788 16.65-11.833 2.263-6.135 1.215-12.79 1.698-19.177.06-3.84.09-7.692-.262-11.52C72.596 7.844 63.223.981 53.834.684a219.453 219.453 0 0 0-16.022-.71zm11.294 12.882c5.5-.067 10.801 4.143 11.67 9.653.338 1.48.471 3 .471 4.515v21.088h-8.357c-.07-7.588.153-15.182-.131-22.765-.587-4.368-7.04-5.747-9.672-2.397-2.422 3.04-1.47 7.155-1.67 10.735v6.392h-8.307c-.146-4.996.359-10.045-.404-15.002-1.108-4.218-7.809-5.565-10.094-1.666-1.685 3.046-.712 6.634-.976 9.936v14.767h-8.354c.109-8.165-.238-16.344.215-24.5.674-5.346 5.095-10.389 10.676-10.627 4.902-.739 10.103 2.038 12.053 6.631.375 1.435 1.76 1.932 1.994.084 1.844-3.704 5.501-6.739 9.785-6.771.367-.044.735-.068 1.101-.073z\"\/><defs><lineargradient id=\"paint0_linear_549_34\" x1=\"37.0692\" y1=\"0\" x2=\"37.0692\" y2=\"79\" gradientunits=\"userSpaceOnUse\"><stop stop-color=\"#6364FF\"\/><stop offset=\"1\" stop-color=\"#563ACC\"\/><\/lineargradient><\/defs><\/svg><\/span><span class=\"shariff-text\">share<\/span>&nbsp;<\/a><\/li><li class=\"shariff-button facebook shariff-nocustomcolor\" style=\"background-color:#4273c8\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.kryptoakademie24.de%2Fen%2Fglossar%2Fwas-sind-security-token.html\" title=\"Share on Facebook\" aria-label=\"Share on Facebook\" role=\"button\" rel=\"nofollow\" class=\"shariff-link\" style=\"; background-color:#3b5998; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 18 32\"><path fill=\"#3b5998\" d=\"M17.1 0.2v4.7h-2.8q-1.5 0-2.1 0.6t-0.5 1.9v3.4h5.2l-0.7 5.3h-4.5v13.6h-5.5v-13.6h-4.5v-5.3h4.5v-3.9q0-3.3 1.9-5.2t5-1.8q2.6 0 4.1 0.2z\"\/><\/svg><\/span><span class=\"shariff-text\">share<\/span>&nbsp;<\/a><\/li><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.kryptoakademie24.de%2Fen%2Fglossar%2Fwas-sind-security-token.html\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><span class=\"shariff-text\">Share<\/span>&nbsp;<\/a><\/li><li class=\"shariff-button info shariff-nocustomcolor\" style=\"background-color:#eee\"><a href=\"https:\/\/www.kryptoakademie24.de\/en\/whitepaper\/\" title=\"Whitepaper\" aria-label=\"Whitepaper\" role=\"button\" rel=\"noopener \" class=\"shariff-link\" style=\"; background-color:#fff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 11 32\"><path fill=\"#999\" d=\"M11.4 24v2.3q0 0.5-0.3 0.8t-0.8 0.4h-9.1q-0.5 0-0.8-0.4t-0.4-0.8v-2.3q0-0.5 0.4-0.8t0.8-0.4h1.1v-6.8h-1.1q-0.5 0-0.8-0.4t-0.4-0.8v-2.3q0-0.5 0.4-0.8t0.8-0.4h6.8q0.5 0 0.8 0.4t0.4 0.8v10.3h1.1q0.5 0 0.8 0.4t0.3 0.8zM9.2 3.4v3.4q0 0.5-0.4 0.8t-0.8 0.4h-4.6q-0.4 0-0.8-0.4t-0.4-0.8v-3.4q0-0.4 0.4-0.8t0.8-0.4h4.6q0.5 0 0.8 0.4t0.4 0.8z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div><p><span style=\"color: #00ffff;\"><strong>What are Security Tokens?<\/strong><\/span><\/p>\n<p>Security tokens are digital assets based on blockchain technology that function as securities. In contrast to utility tokens, which provide access to certain products or services, security tokens represent an investment or stake in a company, asset or project and are therefore often subject to the legal provisions and regulations for securities.<\/p>\n<p>Here are some features and functions of security tokens:<\/p>\n<ol>\n<li><span style=\"color: #00ffff;\"><strong>Regulation and compliance:<\/strong><\/span> Security tokens are subject to the legal provisions and regulations that apply to traditional securities. Depending on the jurisdiction, this may include various requirements, such as registration with regulatory authorities, compliance with investor protection regulations and the disclosure of relevant information about the underlying company or project.<\/li>\n<li><span style=\"color: #00ffff;\"><strong>Rights and dividends:<\/strong><\/span> In contrast to utility tokens, security tokens grant holders certain rights and entitlements. These include, for example, voting rights in company decisions, dividend payments, equity interests or the right to repayment in the event of liquidation.<\/li>\n<li><span style=\"color: #00ffff;\"><strong>Asset-backed tokens:<\/strong><\/span> Security tokens can also be backed by real assets such as real estate, artworks or company shares. This allows investors to hold digital shares in these assets and benefit from potential increases in value or income.<\/li>\n<li><span style=\"color: #00ffff;\"><strong>Professionalism and investor protection:<\/strong><\/span> Security tokens are often issued by companies or start-ups that want to address a broader investor market. Compliance with regulatory standards and best practices is intended to ensure a higher level of transparency, accountability and protection for investors.<\/li>\n<\/ol>\n<p>It is important to note that the issuance and trading of Security Tokens requires specific regulations depending on the jurisdiction. These may vary from country to country and investors should comply with the applicable laws and regulations in their region.<\/p>\n<p>As security tokens are often associated with regulatory requirements, they can be more complex to create, manage and trade than utility tokens. It is advisable to obtain comprehensive information about the underlying conditions, the company, the legal structure and the associated risks before investing in security tokens. It is also recommended to seek legal advice to ensure that all legal requirements are met.<\/p>","protected":false},"excerpt":{"rendered":"<p>What are security tokens? Security tokens are digital assets that are based on blockchain technology and function as securities. In contrast<\/p>","protected":false},"author":1,"featured_media":22171,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_mi_skip_tracking":false,"footnotes":""},"categories":[151],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.kryptoakademie24.de\/en\/wp-json\/wp\/v2\/posts\/26017"}],"collection":[{"href":"https:\/\/www.kryptoakademie24.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kryptoakademie24.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kryptoakademie24.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kryptoakademie24.de\/en\/wp-json\/wp\/v2\/comments?post=26017"}],"version-history":[{"count":1,"href":"https:\/\/www.kryptoakademie24.de\/en\/wp-json\/wp\/v2\/posts\/26017\/revisions"}],"predecessor-version":[{"id":26018,"href":"https:\/\/www.kryptoakademie24.de\/en\/wp-json\/wp\/v2\/posts\/26017\/revisions\/26018"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kryptoakademie24.de\/en\/wp-json\/wp\/v2\/media\/22171"}],"wp:attachment":[{"href":"https:\/\/www.kryptoakademie24.de\/en\/wp-json\/wp\/v2\/media?parent=26017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kryptoakademie24.de\/en\/wp-json\/wp\/v2\/categories?post=26017"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kryptoakademie24.de\/en\/wp-json\/wp\/v2\/tags?post=26017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}