Disrupting Secured Transactions

Christopher G. Bradley

Research output: Contribution to journalArticle


Article 9 of the Uniform Commercial Code (UCC) governs secured transactions in personal property in all fifty states and has been lauded as “the most successful commercial statute ever.” But while Article 9 has facilitated commerce and economic growth, it remains complicated and inefficient in numerous respects. Its weaknesses are well known but have been considered necessary evils, accepted because no better approaches were available. But just as the UCC was motivated initially by the idea of streamlining the law to accommodate modern commerce, now that goal should motivate revision of the UCC itself.

This Article proposes to remove and replace a primary structural component of Article 9 of the UCC—the filing system by which secured creditors put others on notice of their interest in items of collateral. The proposal would jettison this outdated and often ineffective method of providing notice of security interests, and instead, would look to modern technologies to stake clearer and more reliable claims on collateral. It would no longer be necessary to file financing statements indexed under the name and location of the owner of collateral. Instead, the proposed regime would allow creditors to stake their claims directly—by means of online “smart” maps or by electronic tags identifying interests in particular items of collateral—and would eliminate numerous arcane, inefficient, and inequitable features of the current regime.

The proposal serves the broader goals of commercial law as well, by reducing needless legal complexity and more closely aligning legal requirements with business realities. The “disruptive” changes proposed in this Article would increase certainty in commerce and shape secured transactions law to emerging practices in business and finance.

Original languageAmerican English
Pages (from-to)965-1032
JournalHouston Law Review
Issue number5
StatePublished - Jan 1 2019


Dive into the research topics of 'Disrupting Secured Transactions'. Together they form a unique fingerprint.

Cite this