Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

How is Blockchain Going to Work with the GDPR?

How is Blockchain Going to Work with the GDPR?

The European Union’s General Data Protection Regulation (GDPR) has gone into effect, and with this new law comes a lot of information your organization needs to consider regarding individual data protection. In particular, the technology of blockchain is difficult to talk about in regard to GDPR, as it’s basically an encrypted and distributed digital ledger. How can blockchain work properly in tandem with the new GDPR regulations?

GDPR itself is a bit tricky to understand. Even though it doesn’t have the PII designation, it’s still the strongest data protection law passed to date. Any organization that does business with businesses within the nations of the European Union needs to comply with the regulations outlined in the GDPR. One of the most notable results that we’re sure you’ve noticed regarding GDPR is that many websites have updated their privacy policy, and they are required by law to tell their viewers about this. This is to protect themselves from the fines associated with non-compliance to GDPR.

The biggest issue concerning blockchain technology is found in the GDPR mandate. According to the new regulations, if a company obtains personal information that doesn’t need it, they must delete it. Blockchain nodes can’t be deleted, so it makes sense that the GDPR would be an issue for companies that use them. It’s a strange coincidence that blockchain and GDPR are both meant to improve user privacy, even though the blockchain technology used to this end isn’t compatible with GDPR regulations.

Even though GDPR was designed to adapt to changes in technological innovations, blockchain is already testing its ability to do so. For example, applications that utilize blockchain technology already pair well with the three major points of GDPR: confidentiality, integrity, and availability. The blockchain uses encryption to remain confidential, but the ledger itself remains transparent.

Let’s think about a potential scenario for a customer named Jim. Jim can use a blockchain-based account to pay for his monthly checkup. This works out for him because most of the EU has universal healthcare as a principal. The details of this payment are hidden, but the record shows the overall price in the form of cryptocurrency. Because this company has collected information--encrypted or not--and it’s not needed, this would be a breach of GDPR policy. Consequently, some EU-based companies have stopped accepting Bitcoin and cryptocurrency as payment, though it’s worth mentioning that GDPR isn’t the exclusive cause of this.

Though the GDPR regulations only cover EU-member countries and organizations that do business with them, there is a considerable chance that these regulations will be amended as time goes on. What will this future look like? Will it be more like GDPR, or will it focus primarily on the blockchain? Let us know in the comments.

Monitoring Pros and Cons
Tip of the Week: Lead Your Remote Workers to Succe...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, April 20 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Malware Privacy Hosted Solutions Hackers IT Services Internet Productivity Network Security Data Productivity Outsourced IT Software Managed IT Services Data Backup Business IT Support Innovation Mobile Devices Data Recovery Tech Term Computer Ransomware Hardware Microsoft Google Backup Cloud Computing Small Business Internet of Things Business Continuity Efficiency Smartphone Managed Service Provider Upgrade IT Support Business Management Remote Monitoring User Tips Android Disaster Recovery Encryption Social Media Data Management Paperless Office Windows 10 Phishing Smartphones Communication VoIP Artificial Intelligence Workplace Tips Collaboration Managed IT Windows Browser BYOD Risk Management Server Cybersecurity Save Money communications Windows 10 Facebook Managed IT Services Saving Money Holiday Passwords App Mobile Device Management Mobile Device Compliance Firewall Chrome Robot Office 365 Bandwidth Employer-Employee Relationship Government Applications Unified Threat Management Document Management Bring Your Own Device Apps Automation Recovery Vendor Management Gmail BDR Analytics Wi-Fi Network Tip of the week Quick Tips Scam Project Management Telephone Systems Antivirus SaaS Healthcare Hosted Solution Website Infrastructure Money Data storage Microsoft Office Going Green Vulnerability Business Technology Managed Service Content Filtering Virtualization Information Wireless Password IT Management Big Data Unified Communications Tablet Miscellaneous Apple Social Files Regulations VPN IT Service Office Customer Relationship Management Computing Computers Politics Data Security Storage Work/Life Balance Data loss Two-factor Authentication Router Printing Help Desk Training Remote Computing Customer Service Settings Blockchain Virtual Reality File Sharing Access Control Twitter Users Mobile Computing Proactive Spam Mobile Security YouTube Hacker WiFi Downtime End of Support Health Private Cloud Management Networking Remote Monitoring and Management Patch Management Wireless Technology Legal Administration Monitors Tech Support LiFi Alert Education Electronic Medical Records Remote Workers Virtual Private Network Digital Payment Network Management Assessment Software as a Service Budget IT solutions The Internet of Things Websites Identity Theft How To Samsung Licensing Server Management Information Technology IoT How To Maintenance Smart Technology Operating System Outlook Flexibility Uninterrupted Power Supply Mouse Sports Net Neutrality Chromebook Employees Avoiding Downtime Company Culture Google Drive Word Internet Exlporer Machine Learning Mobility HIPAA Upgrades Business Growth Redundancy Cooperation Managing Stress Instant Messaging Proactive IT Managed IT Service San Diego Computer Repair OneNote Windows 7 Spyware Course Hard Drives Google Docs Supercomputer eWaste Read Only Humor Specifications Physical Security Crowdsourcing Meetings Professional Services Tech Terms Shortcut Retail Cortana Firefox Backups Legislation IT Technicians 3D Printing G Suite History Cables Security Cameras Backup and Disaster Recovery Drones Permissions Display Nanotechnology Tracking Managed Services Provider SharePoint Staff Processors Google Maps Enterprise Content Management Finance Heating/Cooling IT Consulting Deep Learning Break Fix Social Networking Taxes Employee-Employer Relationship Transportation Solid State Drive IT Budget Time Management Current Events Black Friday Office Tips Roanoke — Central Technology Solutions Virtual Assistant Theft WannaCry Unified Threat Management Hotspot Mirgation Unsupported Software Virus Cabling Wires Remote Worker Human Error Hacking Alt Codes Fraud Screen Reader Update Cost Management E-Commerce Downloads Augmented Reality Vulnerabilities Authentication Servers Data Breach Dark Web Motherboard Connectivity Cryptocurrency Language Social Engineering USB Enterprise Resource Planning Bookmarks Virtual Desktop Cyber Monday technology services provider Point of Sale WPA3 Wasting Time Financial User Error Features Hacks Migration Mobile Data ROI Permission Disaster Trending Typing Smart Tech Hard Drive Bitcoin Operations Sync Geography Authorization Technology Laws Best Practice Data Warehousing Telephony Mail Merge Computing Infrastructure Safety Public Cloud Mobile Favorites Touchscreen Techology Dark Data Technology Assurance Group ’s 18 Personal Information Law Enforcement Fleet Tracking Database Procurement VoIP Sponsor Cache Electronic Health Records Consultation Lenovo Technology Tips Chatbots Travel Notes Test Botnet Windows 8 Save Time Multi-Factor Security Wearable Technology Notifications Mobile Device Managment Software Tips High-Speed Internet Statistics Marketing Microsoft Excel Modem Star Wars Monitoring Address Printer Alerts Black Market Automobile Computer Care Conferencing Disaster Resistance Gadgets Distributed Denial of Service Annual Convention Gadget Asset Tracking Voice over Internet Protocol Digital Obstacle Identities Buisness Recycling Cyberattacks Superfish Comparison Identity MSP PowerPoint RMM Search Writing Emoji Google Calendar Development Zero-Day Threat Bluetooth Google Wallet Network Congestion Cookies GPS Utility Computing Consulting Administrator CCTV Relocation Hard Disk Drive Printers Webcam Emergency IT Consultant Students CrashOverride Error Cybercrime Teamwork Web Server Regulation Shared resources Cameras Motion Sickness