Académique Documents
Professionnel Documents
Culture Documents
ABN: 81
81 141
141 521
521 571
571
4/2/2016
4/2/2016
conceptual
Introduction
In
A smart-
that
autonomously
will
monitor
the
smart
Edition
Volume 22
Edition 2016
2016 Volume
contract
framework.
Next issue
2008,
an
unknown
mathematician/cryptologist
going by the name of Satoshi
Nakamoto
(pseudonym)
BYOD
arrangements: staff
rules and the legal
risks involved.
Ransomware
which
technology
of
accidentally or
reckless
through
cleaver
causing
value.
third
collective
location
all eternity.
like
residence.
repossession
the
borrowers
use
of
both
these
The
Once a transaction is
for
the
same
Previously,
commerce
catastrophic
had
party
but
instead
arrangement
global
information.
transparent
Hence, it was
trusted environment.
third
adequately
lender.
implement
his
party,
though
what
business
technology
of
disruption.
Basically,
the
is
use
Page | 2 is,
of
4/2/2016
capable
of
blockchain
value
arrangement
transference
or
simply
the
business.
Money
The
blockchain will
the
become
are
its
details
of
the
from
perspective
the
becomes
tamper
digital
blockchain
evident
repository.
immediate
the
explain.
very
least)
to
preceding
block
What is Blockchain
Technology?
A blockchain is basically a
copy
is
the fourth
revolution.
information
to
the
start
of
information
blocks
that
are
of
verify
the
every
repository.
transaction
interconnected
unique
the
information
increases
record
though
repository
blockchain.
has
base
transfer
of
value
transactions;
the
been
information
in
blocks
stated
stored
that
in
the
a
manager
administrator
who
and
is
the
4/2/2016
key.
entire
bitcoin/blockchain
structure
The
trivial
Page | 3 repository.
The original bitcoin blockchain
is referred to a permission less /
open blockchain. Anyone is able
to see every transaction as it
occurs. There has recently been
developed
permissioned
blockchains
embedded
which
in
have
them
some
developing
permission-less
privacy
is,
numbers
the
which
are
to
in
blockchain
That
open
bitcoin
incorporated
element
into
she
he
possesses
the
the
the
participants
confidentiality.
personal
functionality
of
The beauty of
but
pseudo-
identifiable
instead
information
creating
to
the
published
The
public
key
can
be
advantages
of
this
organisations.
Business Characteristics
of the Blockchain
Currently,
the
principal
identified
that
the
4/2/2016
third
occurred so as to incorporate a
manufacturers
trust
environment.
party
involvement
factor
into
the
With
(a)
other
IoT
electronic
could
embed
technology
The underlying
it
third
away with
third party
in a substantial reduction in
transaction cost.
of value.
be
development.
can
disintermediate
the
It has been
able
to
interrogate
the
share
relevant
if a transaction is dependent
days.
disintermediate
to
involved.
For
example,
in
that
goods
check
are
its
not
validity
authenticity.
The serial number or Vehicle
follows:
thus
reduce
the
risk
involved.
Another benefit of blockchain
deployment
is
that
it
can
disintermediate
third
party
involvement.
Traditionally,
The
distributor.
Such
transaction
incorporated
blockchain.
will
into
be
the
The blockchain
all
transactions
involving
the
4/2/2016
will
due
will operate.
identified
transfer
of
Page | 5 consumer.
Each owner will want to take out
insurance on the product. How
does the insurance company
determine
that
the
person
The
insurance
using
the
serial
safety
post
fault
sale.
blockchain
the
recall
notice.
Now
some
safety
jurisdictions it
in
is
illegal
to
copies
issued.
been
corrected
then
the
deployment
the
already
reduce
intellectual
property
piracy
covering
movies,
interrogates
the
blockchain
office
Another
not
Microsoft
be unique.
are
of
goods
fraud.
have
one
not
only
does
that
The
owner
alone
some
should
The
aspect
to
ensure
use
of
can
example,
blockchain
be
each
in
the
For
released
If anyone
can
also
be
validate
authentic
to
utilise
registration
4/2/2016
the
blockchain is:
using
any
identifiable
designed
Recently,
the
Commodity
head
of
Futures
the
Trading
to
not
enact
rules
and
to
validate
every
expenditure
(this
is
quite
private
blockchain
do no harm principal.
difference
blockchain
mechanisms
transactions.
In Australia the
bitcoin
explained here).
be
the
operator/promoter of a private
The
will
In
can
There
(a) P2P
network:
product
transfers directly between
parties who control the
product.
(b) No
virtual
currency
is
involved: networks are built
for specific markets and can
issue & transfer product.
(c) No mining: transactions are
required by trusted parties that
form a "federation" or the
nodes on a distributed ledger.
(d) Accelerated confirmation in
seconds.
(e) Scalable:
Capable
of
thousands of transactions per
second.
new
private
the
from
of
structure
that
will
permission
each
Privacy
Principles
the
and
Australian
Competition
Consumer
consumer
authority
in
protection
Australia
with
4/2/2016
for
FinTech
(Financial
Technology) development.
disruptive
products.
immature
need
to
be
carefully
results
in
an
technology
then
the
Consequently, care
At
but
jurisdictions
is
in
most
there
are
regulatory
example
covering
smart-
authorities
In
set
vehicle
registration
authority
up
its
own
financial
development
relevant
each
authorities
jurisdiction
could
in
be
embodied
blockchain.
It
in
the
would
also
Conclusion
such contracts.
assessed by a lawyer
technology
it
has
concentrated
on
intervention.
epicenter
ASIC
4/2/2016
Page | 8
Email:
Mob:
Ajmccullagh57@gmail.com
If you wish to subscribe or unsubscribe to this newsletter then please contact the author by
email at the above email address.
IF YOU REQUIRE ANY IT LEGAL ASSISTANCE THEN PLEASE CONTACT THE AUTHOR
BY EMAIL AT THE ABOVE EMAIL ADDRESS.
PLEASE NOTE this paper is NOT the provision of legal advice. If a reader has an issue then
they should seek appropriate legal advice. The author makes no warranty as to
correctness of anything contained in this paper. This paper is the sole opinion of the author
and must not be relied upon as legal advice. Every situation is different and as such proper
analysis must be undertaken when seeking a legal opinion. Consequently, the author takes
no responsibility for any errors that may exist in this paper and certainly takes no
responsibility if any reader takes any actions based on what is (expressly or by implication)
contained in this paper. All readers take full responsibility for anything they may do in
reliance of anything contained in this paper.