转换加密资产

IF 3.3 3区 社会学 Q1 LAW
{"title":"转换加密资产","authors":"","doi":"10.1016/j.clsr.2024.106060","DOIUrl":null,"url":null,"abstract":"<div><div>It is common for cryptoassets to be stolen, which raises the legal issue of whether cryptoassets can be converted. Under the current law, the tort of conversion applies only to tangibles. Cryptoassets cannot be converted because they are intangible. However, this article argues that it is arbitrary to determine whether cryptoassets are amenable to conversion based on the tangible/intangible distinction. Refusing to extend the tort of conversion to cryptoassets will lead to unfair treatment between cryptoassets and other assets. It will also provide inadequate protection for cryptoassets, which can be interfered with in ways similar to tangibles. This article argues that the tort of conversion should be extended to cryptoassets because they are property capable of possession. A tort for conversion of cryptoassets is established when a defendant has deliberately and exclusively interfered with a claimant's cryptoassets, and the defendant does not have a defence. Since conversion is a tort of strict liability, extending the tort to cryptoassets may create uncertain legal risks to third parties. To protect innocent third parties robustly, five defences should be established: innocent purchaser defence, abandonment, consent, self-help and safe harbour.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3000,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Conversion of cryptoassets\",\"authors\":\"\",\"doi\":\"10.1016/j.clsr.2024.106060\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>It is common for cryptoassets to be stolen, which raises the legal issue of whether cryptoassets can be converted. Under the current law, the tort of conversion applies only to tangibles. Cryptoassets cannot be converted because they are intangible. However, this article argues that it is arbitrary to determine whether cryptoassets are amenable to conversion based on the tangible/intangible distinction. Refusing to extend the tort of conversion to cryptoassets will lead to unfair treatment between cryptoassets and other assets. It will also provide inadequate protection for cryptoassets, which can be interfered with in ways similar to tangibles. This article argues that the tort of conversion should be extended to cryptoassets because they are property capable of possession. A tort for conversion of cryptoassets is established when a defendant has deliberately and exclusively interfered with a claimant's cryptoassets, and the defendant does not have a defence. Since conversion is a tort of strict liability, extending the tort to cryptoassets may create uncertain legal risks to third parties. To protect innocent third parties robustly, five defences should be established: innocent purchaser defence, abandonment, consent, self-help and safe harbour.</div></div>\",\"PeriodicalId\":51516,\"journal\":{\"name\":\"Computer Law & Security Review\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":3.3000,\"publicationDate\":\"2024-10-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Law & Security Review\",\"FirstCategoryId\":\"90\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0267364924001262\",\"RegionNum\":3,\"RegionCategory\":\"社会学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"LAW\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Law & Security Review","FirstCategoryId":"90","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0267364924001262","RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"LAW","Score":null,"Total":0}
引用次数: 0

摘要

加密资产被盗的情况很常见,这就提出了加密资产是否可以转换的法律问题。根据现行法律,转换侵权行为只适用于有形资产。加密资产不能转换,因为它们是无形的。然而,本文认为,根据有形/无形的区别来确定加密资产是否可以转换是武断的。拒绝将转换侵权延伸至加密资产将导致加密资产与其他资产之间的不公平待遇。它还将为加密资产提供不充分的保护,因为加密资产可能会受到与有形资产类似的干扰。本文认为,转换侵权行为应扩展至加密资产,因为它们是能够占有的财产。当被告故意且专门干扰原告的加密资产,且被告没有抗辩理由时,转化加密资产的侵权行为即成立。由于转换是一种严格责任侵权行为,将该侵权行为扩展到加密资产可能会给第三方带来不确定的法律风险。为有力保护无辜第三方,应确立五项抗辩:无辜购买者抗辩、放弃、同意、自助和安全港。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Conversion of cryptoassets
It is common for cryptoassets to be stolen, which raises the legal issue of whether cryptoassets can be converted. Under the current law, the tort of conversion applies only to tangibles. Cryptoassets cannot be converted because they are intangible. However, this article argues that it is arbitrary to determine whether cryptoassets are amenable to conversion based on the tangible/intangible distinction. Refusing to extend the tort of conversion to cryptoassets will lead to unfair treatment between cryptoassets and other assets. It will also provide inadequate protection for cryptoassets, which can be interfered with in ways similar to tangibles. This article argues that the tort of conversion should be extended to cryptoassets because they are property capable of possession. A tort for conversion of cryptoassets is established when a defendant has deliberately and exclusively interfered with a claimant's cryptoassets, and the defendant does not have a defence. Since conversion is a tort of strict liability, extending the tort to cryptoassets may create uncertain legal risks to third parties. To protect innocent third parties robustly, five defences should be established: innocent purchaser defence, abandonment, consent, self-help and safe harbour.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
5.60
自引率
10.30%
发文量
81
审稿时长
67 days
期刊介绍: CLSR publishes refereed academic and practitioner papers on topics such as Web 2.0, IT security, Identity management, ID cards, RFID, interference with privacy, Internet law, telecoms regulation, online broadcasting, intellectual property, software law, e-commerce, outsourcing, data protection, EU policy, freedom of information, computer security and many other topics. In addition it provides a regular update on European Union developments, national news from more than 20 jurisdictions in both Europe and the Pacific Rim. It is looking for papers within the subject area that display good quality legal analysis and new lines of legal thought or policy development that go beyond mere description of the subject area, however accurate that may be.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信