Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Overview  
 7     Regulatory challenges          
        7.1     Leakage of confidential information   
        7.2     Immutability of records and absence of functionality to erase transactions/contents   
        7.3     Security threats           
        7.4     Loss of tokens, digital currency and other assets           
        7.5     Financial and other crimes      
 8     Technical capacities to cope with regulation               
        8.1     Technical framework
        8.2     Application level capacities     
        8.3     Privacy/Confidentiality capacities        
        8.4     Data erasure capacities            
        8.5     Data security capacities           
        8.6     Base level capacities  
Bibliography