MFSA’s Approach to Tokenisation in Collective Investment Schemes
The MFSA outlines two primary forms of tokenisation:
- Native tokens, which are newly created assets issued directly on a DLT;
- Non-native tokens, which represent pre-existing off-chain assets, such as securities held by a custodian.
Tokenisation Eligibility Criteria
The MFSA permits the tokenisation of fund units for the following fund types:
- Licensed Alternative Investment Funds (AIFs)
- Licensed Professional Investor Funds (PIFs)
- Notified AIFs (NAIFs)
- Notified Professional Investor Funds (NPIFs)
- UCITS, provided they maintain core regulatory principles such as liquidity, investor protection, and transparency
Critical Role of Fund Administrators
In addition to managing the operational mechanics, Fund Administrators must conduct due diligence on both the digital wallets used and the individuals or entities holding them, ensuring that AML/KYC compliance standards are upheld. Their role is essential in maintaining both the integrity and the regulatory compliance of the tokenised investment structure.
Regulatory and Operational Safeguards
Even though tokenised funds are still denominated in fiat currency, the MFSA emphasises that several regulatory and operational measures must be adhered to:
a) Competency Requirements
Fund management and service providers must demonstrate a sound understanding of tokenisation technologies to fulfill their responsibilities effectively.
b) Disclosure Obligations
Offering documentation must clearly indicate the fund’s ability to issue tokenised units. These disclosures should cover:
- AML and KYC obligations, including data-sharing practices
- Issuance and redemption timelines and procedures
- Transferability constraints
- Safekeeping measures for digital units
- Blockchain and wallet-related risks
c) Risk Management Practices
Key areas of risk and corresponding mitigation strategies include:
- DLT Architecture: Utilise secure, standardised smart contract protocols
- Key Management: Implement robust procedures for key generation, handling, and loss prevention
- Privacy & Identity: Ensure GDPR compliance and protect sensitive data
- Business Continuity: Establish and test recovery and continuity plans
- System Reliability: Use redundant infrastructure to minimise downtime
- Access Controls: Employ strong multi-factor authentication (MFA)
- Risk Clarity: Define roles and responsibilities clearly in the documentation
- Third-party Dependencies: Coordinate with external service providers using predefined protocols
- Governance Oversight: Establish clear and accountable governance frameworks