1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
7 Regulatory challenges
7.1 Leakage of confidential information
7.2 Immutability of records and absence of functionality to erase
transactions/contents
7.3 Security threats
7.4 Loss of tokens, digital currency and other assets
7.5 Financial and other crimes
8 Technical capacities to cope with regulation
8.1 Technical framework
8.2 Application level capacities
8.3 Privacy/Confidentiality capacities
8.4 Data erasure capacities
8.5 Data security capacities
8.6 Base level capacities
Bibliography