An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock
()
or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Please find written input submissions to the Crypto Task Force below. The written input is posted without modification. We hope sharing the submissions will help encourage productive dialogue and continued engagement. Please note that the “Key Points” and “Topics” are AI generated. AI can make mistakes, and the Key Points and Topics are not a replacement for you reading the submissions. The Crypto Task Force has not reviewed these AI-generated summaries for accuracy or completeness. If you believe a Key Point or Topic is inaccurate, please email the Crypto Task Force at crypto@sec.gov. The written input provided to the SEC and posted on this page does not necessarily reflect the views of the Crypto Task Force or others in the U.S. Securities and Exchange Commission.
Replace Rule 603’s prescriptive SIP-based consolidated display requirement with a principles-based “Fair Quote Presentation Rule” that focuses on anti-misleading standards, disclosure of data sources, and transparency rather than mandating a single data model.
Explicitly allow alternative, verifiable data sources—including cryptographically verifiable distributed ledger states, venue-native order books, and modern feeds like Pyth—for DeFi platforms, tokenized ATSs, and crypto-native venues under the Commission’s Innovation Exception framework.
Maintain investor protection through disclosure, timestamp integrity, and supervisory controls instead of enforcing reliance on centralized SIP infrastructure, which imposes cost and governance inefficiencies incompatible with modern markets.
Implements cryptographic content-addressing (SHA-256) and hash-chaining to provide tamper-evident proof of authenticity, supporting Federal Rules of Evidence 901 and 1002 for admissibility.
Establishes structured workflows for court-ordered or regulatory preservation, including dual authorization, enhanced replication (5 nodes across 3 jurisdictions), and air-gapped vault storage to ensure compliance with litigation and enforcement obligations.
Maintains immutable custody event logs for every evidence lifecycle action (creation, replication, access, transfer, disposal), enabling complete audit trails and supporting business records exception under FRE 803(6).
The SEC should use its exemptive authority and staff guidance to enable tokenized securities trading under clear, principles-based conditions while formal rulemaking is developed.
A technology-neutral regulatory approach is essential to avoid rules that become obsolete and to ensure fair competition without favoring specific technologies.
Interim measures like pilot programs and conditional relief are critical to gather data, address investor protection and oversight concerns, and inform comprehensive rulemaking.
OTCM’s ST22 Security Token model fully satisfies SEC Category 1 requirements, including direct issuer board authorization, SEC-registered transfer agent custody, CUSIP assignment, and 1:1 preferred share backing.
The submission advocates targeted regulatory relief and safe harbor provisions for issuer-authorized tokenization models serving abandoned OTC markets, emphasizing qualified custody and verifiable 1:1 backing.
OTCM integrates protective conversion triggers and programmable compliance controls (e.g., circuit breakers, wallet concentration limits) to mitigate counterparty and bankruptcy risks identified by the SEC.
The framework mandates a machine-readable Standardized Disclosure Schema (SDS) for tokenized real-asset securities, requiring issuers to provide verifiable, version-controlled disclosures, each field of which must be backed by specific evidence artifacts (Disclosure Evidence Pack, or DEP). This transforms vague disclosure obligations into auditable, regulator-ready data, reducing legal ambiguity and examination friction under U.S. securities laws.
The Exit & Liquidity Annex (ELA) establishes legally binding protocols for investor exit, secondary market transfer, liquidity stress modes, and offboarding to legacy systems. It requires explicit disclosure of liquidity modes (normal, limited, stress, offboarding), transfer restrictions, redemption rights (if any), and failure remediation, ensuring investors are never permanently locked in and that all exit mechanisms are transparent and enforceable.
The standard introduces a three-lane attestation model: (1) issuer self-certification, (2) service provider verification, and (3) independent assessor certification, with increasing levels of independence and legal assurance. Critical disclosures (e.g., valuation, financials) require independent third-party attestation for pilot eligibility, and all evidence must be digitally signed, checksummed, and retained per SEC recordkeeping requirements.
The proposed Digital Markets Restructure Act of 2026 establishes a uniform federal framework for the issuance, trading, custody, and supervision of digital assets, preempting inconsistent state laws and eliminating duplicative registration requirements for entities operating under joint SEC and CFTC oversight.
Regulatory jurisdiction over digital assets is determined by a risk-based classification model: enterprise risk falls under SEC, exposure risk under CFTC, and market risk is subject to joint oversight, with hybrid instruments supervised collaboratively and lead supervisor designation rotating as risk profiles change.
The Act introduces proportionate, technologically adaptive regulation, recognizing that digital assets may modularize economic rights and risks, and mandates that regulatory requirements scale according to residual risk rather than asset form or label, with safe harbor provisions for innovation and privacy-preserving compliance mechanisms.
The Kit does not create new regulatory requirements or legal mandates; it operationalizes existing market integrity expectations (such as those under Rule 15c3-5 and Rule 17a-4) for tokenized markets, providing standardized surveillance evidence and workflows that align with current statutory and regulatory frameworks.
Surveillance operates under a strict tiered access model (Tier 0/1/2), ensuring that participant identities remain pseudonymous unless objective manipulation indicators are met and dual legal/compliance approval is obtained, in line with Regulation S-P and due process standards.
The Kit mandates cryptographic hash chaining, digital signatures, and tamper-evident storage for all surveillance evidence, ensuring admissibility and integrity for enforcement actions, and aligning with SEC books and records retention requirements.
The SEC’s exemptive authority under Section 36 of the Exchange Act allows exemptions only if “necessary or appropriate in the public interest” and consistent with investor protection, requiring consideration of efficiency, competition, and capital formation.
Exempting DeFi trading venues and order-entry firms from registration could disapply core investor protections (e.g., best execution, trade reporting, financial responsibility), creating a parallel regulatory regime for the same securities.
Granting exemptions based solely on technological differences risks regulatory arbitrage, undermining market integrity and potentially impairing liquidity, transparency, and resiliency across U.S. equity markets.
The framework explicitly rejects global harmonization and ensures that domestic laws and supervisory authority remain primary, with bilateral MoUs defining coordination procedures without transferring decision-making authority.
Cross-border evidence portability operates under a strict “no raw PII export by default” principle, relying on attestations, pseudonymization, and purpose-limited extracts, with exceptions only under Tier 2 emergency protocols and documented legal authority.
Seven operational playbooks address legal tensions such as retention vs. deletion mandates, data localization restrictions, secrecy obligations, and privilege assertions, providing structured escalation paths and bilateral governance for resolution.
The kit establishes technical controls and standardized evidence artifacts to demonstrate continuous compliance with SEC Customer Protection Rule 15c3-3 and the Custody Rule, enabling verifiable segregation and control of digital assets without reliance on trust.
It provides examiner query packs and failure scenario playbooks, allowing independent regulatory verification of asset segregation, key management, and recovery procedures, including protocols for insolvency, key compromise, and asset return.
The kit translates existing custody requirements into auditable operational procedures but does not create new regulatory obligations, assert legal conclusions, or seek SEC endorsement of specific custody models or technology implementations.