Digital Assets Unveiled: Deciphering Intellectual Property Rights and Privacy Considerations

Digital Assets Unveiled: Deciphering Intellectual Property Rights and Privacy Considerations

Introduction

Digital asset refers to an asset that has been issued or transferred through a distributed-ledger technology like block chain rather than in a tangible form.1 It covers all types of virtual and electronic assets and this includes cryptocurrencies, security tokens, utility tokens, virtual collectibles, and altcoins among others.2 Digital assets can further be divided into two main categories namely backed digital assets and native digital assets.3 The value of backed digital assets is defined by the value of the underlying real world physical asset while native assets lack real world representation.4

The common types of digital assets are cryptocurrencies and Non-Fungible tokens (NFTs).5 Popular cryptocurrencies include Bitcoin, Ethereum, Cardano, Solana and also Dogecoin.6 Cryptocurrency has been defined as a virtual asset that is utilised as a form of digital currency.7 It is also not controlled by a governing body like the banking system but instead utilises a public transaction ledger which logs each sale or trade and is not monitored by a body or an organisation.8 NFTs on the other hand represent artwork and other content that have been presented in digital form.9 They grant their holders ownership of digital tokens of music, artwork, videos and other virtual collectibles.10They also have a unique identifier stored on a blockchain.11

Digital assets involve both intellectual property and privacy aspects for instance among the concerns of intellectual property law is how digital assets can be copied and also be distributed without an owner’s consent.12Smart contracts on the other hand are useful tools in intellectual property that can aid in automating licensing, and they also ensure that creators are compensated for the use of their creations.13 Also, considering that digital assets use block chain technology, it is fundamental to analyse privacy issues associated with it. Block chain technology can store personal data like financial transactions, medical records and even identity information.14

It is therefore crucial to safeguard the data collected to prevent identity theft, fraud and other malicious activities.15Block chain transparency also poses a challenge to privacy because once data is stored on the block chain, it is visible to all participants and can cause sensitive data to be compromised.16Other concerns include smart contract vulnerabilities, taking advantage of pseudonyms to conduct illegal activities like terrorist financing and compliance with data protection laws in the context of block chain technology.17Further analysis of the intellectual property and privacy considerations is discussed below.

Unpacking Intellectual Property Dynamics in Digital Assets

Considering that digital assets are intangible and can be replicated easily, it is crucial to protect their ownership and rights to encourage creativity, investment and innovation in the digital sphere.18This is where intellectual property comes into play. Some of the roles that intellectual property rights (IPRs) play when it comes to digital assets include protection of creativity and innovation, digital content ownership, protection against digital piracy, NFTs and digital art ownership and finally, blockchain and provenance tracking.19 Concerning protection of creativity and innovation, the various IPRs especially trademarks, copyright and patents ensure that original works and digital innovations belonging to creators and inventors are protected from infringement.20

Regarding digital content ownership, copyright plays a fundamental role in curbing distribution, illegal duplication and exhibition of digital works like computer programs or even musical compositions.21 Concerning digital assets specifically, IPRs promote a sustainable and equitable digital content system. This is possible because it enables creators retain ownership over their work.22IPRs are also important in curbing digital piracy which may cause monetary loss for content creators and businesses. Additionally, IPRs play a key role in the NFT ecosystem especially when it comes to digital art ownership. The inclusion of copyright information terms on NFTs metadata enables artists to set boundaries on the distribution, display and sale of their work.23

Blockchain on the other hand is a key component in digital assets since it enables the creation, storage, transfer and real time transaction of digital assets.24Thus, the combination of blockchain technology and provenance tracking provides a trustworthy log of rights and digital assets transactions like music and digital artwork.25Provenance tracking enables one to trace the origin and ownership of a digital item.26It is a key feature in blockchain technology since it enables the verification of a digital item. IPRs rely on this system to establish authorship and ownership claims for creative works and works of art.27 The same also applies to digital assets like digital artwork which enables producers to protect their intellectual property.28

Privacy Aspects in the Digital Asset Spectrum

Since digital assets leverage blockchain technology to execute specific functions, it is equally essential to grasp the privacy aspects that are involved. Blockchain data typically encompasses various types of information. This encompasses balances and transactions involving cryptocurrencies or digital assets, certification of ownership of NFT and other tokens, as well as membership in decentralized autonomous organisations (“DAOs”).29 Additionally, the data may consist of other information, possibly encrypted, exchanged through transaction payloads resembling concise text messages.30Classification of the above types of data raises the question of which category personal data belongs to. Personal data is embodied in several privacy laws across different jurisdictions. The Kenya Data Protection Act 2019 for instance defines personal data as any information relating to an identified or identifiable natural person.31

Frequently, data is pseudonymized to eliminate specific personal attributes or obscure personally identifying traits. However, even in its pseudonymous state, it still constitutes personal data, even if it cannot be directly linked to an individual without employing additional identifiers.32Consequently, personal data that is encrypted or hashed in the blockchain will be considered pseudonymous.33The Kenya Data Protection Act 2019 has defined pseudonymisation as the processing of personal data in a manner that the personal data cannot be attributed to a data subject without the use of additional information.34Encrypted personal data may still be traced back to an individual with the expertise or access to decryption keys. Thus, encrypted data retains its classification as personal data rather than anonymous data.35 Therefore, privacy laws will still be applicable to some of the data involved in blockchain systems.36

Further, it is crucial to identify the roles of the various parties involved when evaluating data protection compliance issues. This involves identifying the data controllers whose main purpose is determining the purpose and means of processing, and data processors, who are responsible for processing data at the instruction of a data controller.37Applying this to blockchain is not straightforward since blockchain networks comprise various types of systems that operate uniquely and involve different types of participants that conduct distinct activities.38
Participants who contribute personal data to the blockchain platform will likely be considered controllers, as they determine the purpose (such as executing transactions) and the technical and organisational aspects of processing at the application layer. On the other hand, nodes and miners, who primarily process data on behalf of users at the infrastructure layer, arguably serve as processors rather than controllers, as their role mainly involves facilitating the network’s operation.39

Data protection principles also play a fundamental role when leveraging blockchain technology. To evaluate the data protection principles applicable, it is essential to identify the key attributes of blockchain since they are crucial in determining compliance. Blockchain exhibits two main features namely, data passing through the blockchain is visible to every node and once data is added to the blockchain, it cannot be removed.40 These attributes are contrary to the data protection principles of minimisation and storage limitation. These principles are encapsulated in the Kenya Data Protection Act 2019. According to the Act, the principle of data minimisation requires data controllers or data processors to ensure that personal data is adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed.41On the other hand, the storage limitation principle entails storing personal data in a form which identifies data subjects for no longer than is necessary.42Making data visible to every node might be deemed excessive, while maintaining the data on the blockchain indefinitely goes against the storage limitation principle.43

The transparency nature of blockchain technology enables all transactions to be visible. The benefit of this is that it hinders tampering of transactions, changing the money supply or adjusting the rules mid-game.44In the context of cryptocurrencies, it enables anyone to view the transaction history of any wallet address and it also deters fraud and fosters accountability within the network.45However, public dissemination in blockchain technology can present difficulties, particularly concerning the safeguarding of trade secrets, disclosure of proprietary business data or exposure of personal data.46The transparent nature of blockchain also poses a challenge to the purpose limitation requirement47 since data entered into the blockchain will be visible to all participants with no restrictions on further processing.48

In conclusion, the above analysis provides a general overview of the intellectual property and privacy considerations in the realm of digital assets. Notably, specific intellectual property rights applicable to the main types of digital assets have not been analysed in this article. However, by acknowledging intellectual property rights, embracing data protection principles and safeguarding the privacy of individuals, a trustworthy digital assets ecosystem can be created. Finally, as digital asset ownership gains popularity, it is incumbent upon policy makers to formulate comprehensive digital asset laws that embody intellectual property and privacy aspects to protect both creators’ rights and users of digital asset platforms.

Image is by easy-peasy.ai.

1 CCMC, Digital Assets: A Framework For Regulation To Maintain The United States’ Status as an Innovation Leader <https://www.centerforcapitalmarkets.com/wp-content/uploads/2021/01/CCMC_DigitalAssets2021_v3.pdf > accessed 23 November 2023

2 Wulf A. Kaal, Digital Asset Market Evolution <https://jcl.law.uiowa.edu/sites/jcl.law.uiowa.edu/files/2021-08/Kaal_Final_Web_0.pdf > accessed 23 November 2023

3 T.Koens, The Future of Digital Assets: Trends, Challenges and Opportunities <https://www.ingwb.com/binaries/content/assets/insights/themes/distributed-ledger-technology/the-future-of-digtal-assets-whitepaper.pdf > accessed 23 November 2023

4 ibid

5 Akhilesh Ganti, What are Digital Assets? (18 December 2021) <https://www.thebalancemoney.com/what-are-digital-assets-5207790 > accessed 23 November 2023

6 ibid

7 Cameron Harwick, ‘Cryptocurrency and the Problem of Intermediation’ (2016) 20 (4) The Independent Review 569-588

8 Mitchell Rice, Cyrptocurrency: History, Advantages, Disadvantages and the Future <https://core.ac.uk/download/pdf/288850271.pdf > accessed 23 November 2023

9 Ganti (n 5)

10 Pearlyne Omamo, Digital Asset Ownership on the Rise in Kenya (27 March 2023) <https://adra-advocates.com/digital-asset-ownership-on-the-rise-in-kenya/ > accessed 23 November 2023

11 Seyed Mojtaba Hosseini and others, Patents and intellectual property assets as non-fungible tokens; key technologies and challenges< https://www.nature.com/articles/s41598-022-05920-6 > accessed 4 March 2024

12 Jose Austin, Emerging Trends in Intellectual Property Law (4 August 2023) <https://www.lexinter.net/emerging-trends-in-intellectual-property-law > accessed 23 November 2023

13 ibid

14 AMLEGALs, Data Privacy Issues in Blockchain (19 April 2023) < https://amlegals.com/data-privacy-issues-in-blockchain/# > accessed 23 November 2023

15 ibid

16 ibid

17 ibid

18 Mariam Banire, Digital Assets and Intellectual Property Rights: A New Frontier <https://coinscreed.com/digital-assets-and-intellectual-property-rights-a-new-frontier.html > accessed 31 January 2024

19 ibid

20 ibid

21 ibid

22 ibid

23 ibid

24 Deloitte, Blockchain and Digital Assets <https://www2.deloitte.com/us/en/pages/about-deloitte/solutions/blockchain-digital-assets-definition.html > accessed 31 January 2024

25 Banire (n 18)

26 ibid

27 ibid

28 ibid

30 ibid

31 Section 2

32 CIPL (n 29)

33 ibid

34 Section 2

35 Winston Maxwell and John Salmon, A guide to blockchain and data protection < https://engagepremium.hoganlovells.com/_uploads/blockchain-insights/5649DataProtection-BlockchainPaperARTWORKSTAGE3Low-res-gumfy.pdf> accessed 5 March 2024

36 ibid

37 CIPL (n 29)

38 Salmon (n 35)

39 ibid

40 Salmon (n 35)

41 Section 25(d)

42 Data Protection Act 2019, section 25(g)

43 Salmon (n 35)

44 CIPL (n 29)

45 YSU, Cryptocurrency and Privacy: Balancing Transparency and Security < https://jiwelsh.people.ysu.edu/cryptocurrency-and-privacy-balancing-transparency-and-security/> accessed 11 March 2024

46 CIPL (n 29)

47 Section 25 (c) of the Data Protection Act 2019 addresses the purpose limitation principle and it stipulates that personal data should be collected for explicit, specified and legitimate purposes and should not be processed further in a manner incompatible with those purposes.

48CIPL (n 29)

Leave a Comment

Your email address will not be published. Required fields are marked