Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Banking and Finance Law

PDF

University of Michigan Law School

Journal

Technology

Articles 1 - 3 of 3

Full-Text Articles in Law

The Commodification Of Cryptocurrency, Neil Tiwari Jan 2018

The Commodification Of Cryptocurrency, Neil Tiwari

Michigan Law Review

Cryptocurrencies are digital tokens built on blockchain technology. This allows for a product that is fully decentralized, with no need for a third-party intermediary like a government or financial institution. Cryptocurrency creators use initial coin offerings (ICOs) to raise capital to build their tokens. Cryptocurrency ICOs are problematic because they do not fit neatly within either of two traditional categories—securities or commodities. Each of these categories has their own regulatory agency: the SEC for securities and the CFTC for commodities. At first blush, ICOs seem to be a sale of securities subject to regulation by the SEC, but this is …


Industrial Policy: Diverting Resources From The Winners, Edwin L. Harper, Lehmann K. Li Jr. Jan 1984

Industrial Policy: Diverting Resources From The Winners, Edwin L. Harper, Lehmann K. Li Jr.

Michigan Journal of International Law

This article argues that the various forms of industrial policy currently being proposed are inappropriate for the United States (U.S.). They would fail not only on economic grounds, but on political grounds as well. The article outlines the appropriate role for government in the economy.


Efts: Consumer Protection Under The Ucc, Susan E. Jinnett Apr 1977

Efts: Consumer Protection Under The Ucc, Susan E. Jinnett

University of Michigan Journal of Law Reform

In view of the economic significance of the payments system, the laws governing it must be equitable and comprehensive. The development of the commercial law applicable to EFTS's, however, currently lags behind the growth of these systems. Threats to the integrity of EFTS's stem from lost, stolen, or forged access cards, illegal taps into communication lines, physical impairment of the equipment, or improper programming. The legal rights and liabilities of consumers where the integrity of an EFTS has been breached remains unclear, in part because the status of EFTS's under current law is uncertain. The rights of the parties involved …