admissions@cyberlawacademy.com | +91-XXXXXXXXXX
Part 2 of 7

Classification of Tokens: Utility, Security, Payment

Develop a systematic framework for classifying digital tokens into utility, security, and payment categories, understanding the regulatory implications of each classification under Indian and international law.

Reading Time: ~55 minutes 7 Sections Classification Methodology

6.2.1 Introduction: Why Classification Matters

Token classification is the foundational analysis that determines the entire regulatory framework applicable to a digital asset. The same blockchain-based token may face dramatically different regulatory treatment depending on whether it is classified as a utility token, security token, or payment token. This part provides a systematic methodology for classification analysis.

The token classification problem is not merely academic - it has profound practical consequences. A token classified as a security must comply with SEBI regulations, prospectus requirements, and trading restrictions. A token classified as a payment instrument may face RBI regulation. A utility token may operate with significantly lighter regulatory burden but must genuinely function as claimed.

The Classification Spectrum

Digital tokens exist on a spectrum with three primary categories:

Token TypePrimary FunctionValue DriverPrimary Regulator (India)
Utility TokenAccess to product/serviceConsumption utilityConsumer protection laws
Security TokenInvestment/ownershipProfit expectationSEBI
Payment TokenMedium of exchangeExchange functionRBI
*Key Concept: Functional Analysis

Classification depends on the token's actual function, not its label. A token marketed as "utility" but providing investment returns functions as a security regardless of nomenclature. Courts and regulators apply functional analysis, examining how the token operates in practice and how it is marketed to purchasers.

Classification Challenges

Several factors complicate token classification:

  • Multi-functionality: Many tokens serve multiple purposes, creating hybrid classification issues
  • Temporal changes: A token's function may evolve - what starts as a security may become utility once a network is functional
  • Marketing vs. reality: Token marketing often emphasizes investment returns even for functional tokens
  • Secondary market dynamics: Utility tokens traded speculatively may acquire security characteristics
  • Jurisdictional variation: Classification may differ across jurisdictions for the same token

6.2.2 Utility Tokens: Definition and Characteristics

Utility tokens are digital assets that provide holders with access to a product, service, or platform. When properly structured, utility tokens may fall outside securities regulation because they are acquired for consumption rather than investment.

Utility Token
A digital token that provides the holder with access to a specific product or service, or represents a pre-payment for goods/services to be delivered, where the primary purpose of acquisition is consumption or use rather than investment or speculation.

Characteristics of Pure Utility Tokens

For a token to qualify as a utility token and potentially avoid securities classification, it should exhibit the following characteristics:

  1. Immediate Functionality: The token provides access to a working product or service at the time of sale, not a promise of future functionality
  2. Consumptive Purpose: Purchasers acquire the token primarily to use the associated service, not to profit from resale
  3. Fixed Pricing Model: Token value is tied to the cost of the underlying service, not speculative appreciation
  4. Utility-Based Marketing: The token is marketed based on its use case, not investment potential
  5. Limited Transferability: Restrictions on secondary trading reduce speculative activity (though this is not determinative)

Examples of Utility Token Use Cases

  • Platform Access: Tokens required to access a software platform (e.g., decentralized storage)
  • Service Credits: Tokens representing prepaid credits for specific services
  • Governance Rights: Tokens providing voting rights in decentralized protocols
  • Gas/Transaction Fees: Tokens used to pay for blockchain operations
  • Discount Tokens: Tokens providing discounts on platform services
Utility Token Analysis: Filecoin
Illustrative Example

Token Mechanics

Filecoin (FIL) is used to pay for decentralized file storage on the Filecoin network. Users pay storage providers in FIL to store their data, and retrieve data by paying in FIL.

Utility Characteristics

FIL has genuine utility - it is required to use the network. The token price correlates with storage demand and supply, not purely speculative factors. Users acquire FIL to store/retrieve files.

Complicating Factors

However, the initial token sale (ICO) raised funds before the network was operational, and many purchasers bought for investment rather than immediate use. This temporal gap creates securities risk for pre-launch sales even of utility tokens.

The "Pre-Functional" Utility Token Problem

A critical issue for utility token classification is the timing of token sales relative to platform functionality. Many projects sell tokens before the platform is operational, promising future utility. This creates significant securities risk:

!Pre-Functional Token Warning

Tokens sold before the underlying platform is functional face heightened securities risk. The SEC has consistently found that pre-launch token sales constitute securities offerings because: (1) purchasers cannot immediately use the token; (2) value appreciation depends on development team efforts; and (3) purchasers reasonably expect profits from the development work. Indian regulators applying CIS analysis would likely reach similar conclusions.

Utility Token Documentation Requirements

For tokens intended as utility tokens, documentation should clearly establish:

  • Functional specification: Detailed description of what utility the token provides
  • Use case documentation: How purchasers will actually use the token
  • Pricing rationale: How token price relates to underlying utility value
  • Marketing guidelines: Prohibition on investment-oriented marketing
  • Terms of service: Clear articulation of rights and limitations

6.2.3 Security Tokens: Definition and Characteristics

Security tokens are digital assets that represent ownership rights in underlying assets, provide investment returns, or otherwise function as traditional securities in tokenized form. Security tokens are subject to full securities regulation.

Security Token
A digital token that represents ownership in an underlying asset (equity, debt, real estate, revenue rights), provides investment returns (dividends, interest, profit-sharing), or otherwise meets the legal definition of a security under applicable law.

Types of Security Tokens

1. Equity Tokens

Tokens representing ownership shares in a company:

  • Represent fractional equity ownership
  • May include voting rights, dividend rights
  • Subject to Companies Act share issuance requirements
  • Clearly securities under Section 2(h)(i) SCRA

2. Debt Tokens

Tokens representing debt obligations:

  • Represent loan or bond-like obligations
  • Promise principal repayment plus interest
  • May be secured or unsecured
  • Debentures under Section 2(h)(i) SCRA

3. Revenue/Profit-Sharing Tokens

Tokens providing rights to share in revenue or profits:

  • Holders receive portion of enterprise revenue/profits
  • No ownership stake, but economic participation
  • Likely CIS or "marketable securities of like nature"

4. Asset-Backed Tokens

Tokens representing ownership in real-world assets:

  • Real estate tokenization (fractional property ownership)
  • Commodity-backed tokens (gold, oil)
  • Art/collectibles tokenization
  • May be securities if investment-focused

Indicators of Security Token Status

The following factors suggest a token should be classified as a security:

FactorSecurity IndicatorUtility Indicator
Primary acquisition purposeInvestment, profit expectationConsumption, platform use
Value driverAppreciation, dividends, revenue shareUtility consumption value
Marketing emphasis"Investment," "returns," "appreciation""Access," "use," "functionality"
Platform status at salePre-functional, development stageOperational, immediate use
Dependency on promoterSuccess depends on team's effortsDecentralized, user-driven
Secondary tradingEmphasized, exchange listings soughtIncidental to utility purpose
*Key Concept: The Marketing Test

How a token is marketed is often determinative. If purchasers are told (explicitly or implicitly) that they can profit from the token's appreciation, the token is likely a security. Even a functionally utility token becomes a security if marketed as an investment. Conversely, a security cannot escape regulation by labeling itself "utility."

Regulatory Consequences of Security Classification

When a token is classified as a security, it faces comprehensive regulatory requirements:

  • Registration/Prospectus: Public offerings require SEBI-compliant prospectus and registration
  • Private Placement Limits: Section 42 Companies Act limits private placements to 200 persons
  • Intermediary Licensing: Platforms facilitating security token trading must be SEBI-registered
  • Continuous Disclosure: Ongoing reporting and disclosure obligations
  • Insider Trading Rules: SEBI insider trading regulations apply
  • Takeover Code: Substantial acquisitions may trigger takeover requirements

6.2.4 Payment Tokens: Definition and Characteristics

Payment tokens are digital assets designed primarily to function as a medium of exchange, store of value, or unit of account. Unlike utility tokens (product access) or security tokens (investment), payment tokens serve monetary functions.

Payment Token
A digital token designed to function as a medium of exchange for goods and services, a store of value, or a unit of account, analogous to traditional currency functions but without central bank issuance or legal tender status.

Categories of Payment Tokens

1. Cryptocurrencies

Decentralized payment tokens operating on native blockchains:

  • Bitcoin (BTC): First cryptocurrency, designed as peer-to-peer electronic cash
  • Litecoin (LTC): Bitcoin fork with faster transaction times
  • Bitcoin Cash (BCH): Bitcoin fork focusing on payment utility
  • No issuer, decentralized operation, deflationary supply (typically)

2. Stablecoins

Payment tokens designed to maintain stable value:

  • Fiat-collateralized: Backed by reserve of fiat currency (USDT, USDC)
  • Crypto-collateralized: Backed by cryptocurrency reserves (DAI)
  • Algorithmic: Use supply adjustment algorithms to maintain peg
  • Designed to minimize volatility for payment/transfer use

3. Central Bank Digital Currencies (CBDCs)

Government-issued digital currencies:

  • Issued by central banks (RBI Digital Rupee pilot in India)
  • Legal tender status possible
  • Not typically subject to securities regulation
  • Distinct regulatory framework under central bank authority

Regulatory Framework for Payment Tokens

Payment tokens face distinct regulatory considerations from securities:

RegulatorJurisdictionKey Concern
RBIPayment systems, monetary policyFinancial stability, payment system integrity
EDForeign exchangeFEMA compliance for cross-border transfers
FIU-INDAnti-money launderingPMLA reporting, KYC requirements
Income TaxTaxationVDA taxation under Section 115BBH

Payment Token vs. Security Token Distinction

The distinction between payment tokens and security tokens is crucial:

*Key Distinction

Payment tokens derive value from their utility as a medium of exchange. Bitcoin holders do not expect profits from "the efforts of others" - Bitcoin has no development team promising returns. In contrast, tokens where value depends on a development team's efforts, platform growth, or enterprise success are more likely securities. This "efforts of others" distinction is critical for classification.

Stablecoin Specific Issues

Stablecoins present unique classification challenges:

  • Reserve backing: Fiat-backed stablecoins may function like money market funds
  • Redemption rights: If holders can redeem for fiat, issuer has deposit-like obligations
  • Interest payments: Stablecoins paying interest on holdings likely securities
  • Algorithmic stability: Complex algorithmic mechanisms may create investment characteristics
!Stablecoin Regulatory Risk

Stablecoins face regulatory attention from both securities and banking regulators. The U.S. SEC has suggested that some stablecoins may be securities if they pay interest or if their reserve management creates investment characteristics. In India, RBI has expressed concerns about stablecoins potentially affecting monetary policy. Stablecoin issuers face multi-regulatory compliance requirements.

6.2.5 Hybrid Tokens and Multi-Function Analysis

Many real-world tokens do not fit neatly into a single category. Hybrid tokens combine utility, security, and/or payment characteristics, creating complex classification challenges. This section provides frameworks for analyzing multi-function tokens.

The Hybrid Token Problem

Consider a token that:

  • Provides access to a decentralized computing platform (utility)
  • Pays staking rewards from protocol fees (potential security)
  • Can be used to pay for services (payment)
  • Appreciates in value as the platform grows (investment)

Such a token exhibits characteristics of all three categories. How should it be classified?

The Dominant Purpose Test

One approach is to identify the "dominant purpose" of token acquisition:

QuestionAnalysis
Why do most purchasers acquire the token?If primarily for investment returns, security treatment more likely
How is the token marketed?Marketing materials reveal intended purpose
What is the token's primary use in practice?Actual usage patterns inform classification
What drives token price movements?Correlation with utility use vs. speculative factors

The Regulatory Overlay Approach

An alternative approach applies the most protective regulatory framework:

  • If ANY security characteristic exists: Treat as security for those aspects
  • Comply with highest standard: Apply the most stringent applicable regulation
  • Segregate functions: Consider separating utility and security features into different tokens
Hybrid Token Analysis: Ethereum (ETH)
Illustrative Example

Multi-Function Characteristics

ETH exhibits multiple characteristics: (1) Utility: Gas for Ethereum transactions and smart contract execution; (2) Payment: Accepted as payment for services; (3) Investment: Staking rewards under Proof of Stake; (4) Speculative: Traded for appreciation.

Classification Debate

The SEC has historically suggested Bitcoin is not a security (fully decentralized, no issuer) but has been less clear on ETH. The initial ETH sale (2014) had security characteristics, but current ETH may be sufficiently decentralized to avoid security status. Staking rewards complicate analysis.

Indian Analysis

Under Indian law, current ETH is likely a Virtual Digital Asset under Section 2(47A) IT Act, subject to VDA taxation. Whether it constitutes a security under SCRA would require case-by-case analysis of the specific characteristics at issue.

Token Feature Segregation

One structuring approach is to segregate token functions:

Token TypeFunctionRegulatory Treatment
Platform TokenPlatform access, gas feesUtility token treatment
Governance TokenVoting rights only, no economic rightsMay avoid security status
Revenue TokenShare of protocol revenueClearly security
!Structuring Recommendation

For hybrid token projects, consider separating utility and investment functions into distinct tokens. A "utility token" for platform access and a separate "security token" for investment/governance rights can achieve clearer regulatory classification. However, the economic relationship between tokens must be carefully structured to avoid treating the utility token as a derivative of the security token.

6.2.6 Practical Classification Framework

This section provides a practical, step-by-step framework for classifying tokens. The framework can be applied by legal practitioners advising on token offerings or by regulators analyzing token characteristics.

Step 1: Gather Token Information

Collect comprehensive information about the token:

  • Whitepaper and technical documentation
  • Token sale terms and conditions
  • Marketing materials (website, social media, presentations)
  • Smart contract code (if available)
  • Team background and development roadmap
  • Platform/network status (operational or planned)

Step 2: Apply Initial Screening Questions

QuestionIf YESIf NO
Does the token represent ownership in a company?Security (Equity Token)Continue
Does the token represent debt with repayment obligation?Security (Debt Token)Continue
Does the token provide profit/revenue sharing rights?Likely Security/CISContinue
Is the token backed by reserve assets?Assess reserve structureContinue
Is the primary function payment/exchange?Payment TokenContinue
Does the token provide access to a specific service?Potential Utility TokenRequires deeper analysis

Step 3: Apply CIS/Howey-Style Analysis

For tokens not clearly falling into a category, apply the following analysis:

  1. Investment of Money: Do purchasers contribute value (fiat, crypto) to acquire the token? (Almost always yes)
  2. Pooling/Common Enterprise: Are purchaser funds pooled? Do purchaser returns depend on enterprise success or other purchasers?
  3. Profit Expectation: Do reasonable purchasers expect profits or returns? Is appreciation/income marketed?
  4. Derived from Efforts of Others: Does token value depend on the promoter's or third party's efforts? Is there an active development team whose work drives value?
  5. Investor Control: Do purchasers have day-to-day control over how their contribution is used? (For CIS analysis)

Step 4: Assess Marketing and Purchaser Intent

Analyze how the token is marketed and why purchasers acquire it:

  • Review website, whitepaper, presentations for investment language
  • Check social media for return promises or appreciation suggestions
  • Assess whether reasonable purchasers would expect profits
  • Evaluate secondary market emphasis and exchange listing plans

Step 5: Document Classification Conclusion

Prepare a classification memorandum documenting:

  • Token characteristics and mechanics
  • Analysis under each classification category
  • Application of CIS/Howey-style test
  • Marketing assessment
  • Classification conclusion with confidence level
  • Regulatory implications of classification
  • Risk factors and uncertainties
!Documentation Best Practice

Always document token classification analysis in writing. The analysis should be prepared before token launch and updated as facts change. In enforcement proceedings, a contemporaneous, well-reasoned classification memorandum demonstrates good faith compliance efforts, which may mitigate penalties even if regulators ultimately disagree with the classification.

6.2.7 Token Classification in Indian Legal Context

While the classification framework is internationally consistent, specific Indian statutory provisions and regulatory approaches must be considered. This section applies the classification framework to Indian law.

Virtual Digital Asset Definition

Section 2(47A) of the Income Tax Act provides a broad definition that captures most tokens regardless of classification:

"Virtual digital asset means any information or code or number or token (not being Indian currency or foreign currency), generated through cryptographic means or otherwise, by whatever name called, providing a digital representation of value exchanged with or without consideration, with the promise or representation of having inherent value, or functions as a store of value or a unit of account..." Section 2(47A), Income Tax Act, 1961

This definition captures utility tokens, security tokens, and payment tokens equally for taxation purposes. However, for securities regulation, more specific classification remains necessary.

SEBI Classification Considerations

For SEBI jurisdiction, focus on:

  • Section 2(h) SCRA: Is the token a "security" under the inclusive definition?
  • Section 11AA SEBI Act: Is the token offering a "collective investment scheme"?
  • Derivative analysis: Is the token a "derivative" under Section 2(ac) SCRA?

Companies Act Considerations

For tokens issued by Indian companies, consider:

Section 42 - Private Placement

If tokens constitute "securities" and are offered by a company:

  • Private placement limit of 200 persons (excluding QIBs) per offer
  • Private placement offer letter requirements
  • No public advertising permitted
  • Filing requirements with Registrar of Companies

Section 62 - Issue of Shares

If tokens represent equity interests:

  • Rights issue to existing shareholders required unless otherwise authorized
  • Valuation requirements for preferential allotment
  • SEBI ICDR compliance for listed companies

RBI Considerations for Payment Tokens

Payment tokens face RBI regulatory considerations:

  • Not legal tender - cannot mandate acceptance
  • Payment System Act authorization may be required for systematic use
  • Cross-border transfer FEMA implications
  • RBI has expressed general concerns about cryptocurrency risks

Key Takeaways from Part 2

  • Functional analysis determines classification: Labels like "utility token" are irrelevant if the token functions as a security
  • Utility tokens require genuine, immediate functionality: Pre-functional tokens face heightened securities risk
  • Security tokens face comprehensive regulation: SEBI CIS/securities requirements, Companies Act provisions
  • Payment tokens face RBI and tax regulation: Not securities but subject to monetary and AML regulation
  • Hybrid tokens require dominant purpose analysis: Or segregation of functions into separate tokens
  • Documentation is essential: Written classification analysis provides compliance evidence
  • VDA definition captures all tokens for tax: Section 2(47A) applies regardless of classification