Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

How is Blockchain Going to Work with the GDPR?

How is Blockchain Going to Work with the GDPR?

The European Union’s General Data Protection Regulation (GDPR) has gone into effect, and with this new law comes a lot of information your organization needs to consider regarding individual data protection. In particular, the technology of blockchain is difficult to talk about in regard to GDPR, as it’s basically an encrypted and distributed digital ledger. How can blockchain work properly in tandem with the new GDPR regulations?

GDPR itself is a bit tricky to understand. Even though it doesn’t have the PII designation, it’s still the strongest data protection law passed to date. Any organization that does business with businesses within the nations of the European Union needs to comply with the regulations outlined in the GDPR. One of the most notable results that we’re sure you’ve noticed regarding GDPR is that many websites have updated their privacy policy, and they are required by law to tell their viewers about this. This is to protect themselves from the fines associated with non-compliance to GDPR.

The biggest issue concerning blockchain technology is found in the GDPR mandate. According to the new regulations, if a company obtains personal information that doesn’t need it, they must delete it. Blockchain nodes can’t be deleted, so it makes sense that the GDPR would be an issue for companies that use them. It’s a strange coincidence that blockchain and GDPR are both meant to improve user privacy, even though the blockchain technology used to this end isn’t compatible with GDPR regulations.

Even though GDPR was designed to adapt to changes in technological innovations, blockchain is already testing its ability to do so. For example, applications that utilize blockchain technology already pair well with the three major points of GDPR: confidentiality, integrity, and availability. The blockchain uses encryption to remain confidential, but the ledger itself remains transparent.

Let’s think about a potential scenario for a customer named Jim. Jim can use a blockchain-based account to pay for his monthly checkup. This works out for him because most of the EU has universal healthcare as a principal. The details of this payment are hidden, but the record shows the overall price in the form of cryptocurrency. Because this company has collected information--encrypted or not--and it’s not needed, this would be a breach of GDPR policy. Consequently, some EU-based companies have stopped accepting Bitcoin and cryptocurrency as payment, though it’s worth mentioning that GDPR isn’t the exclusive cause of this.

Though the GDPR regulations only cover EU-member countries and organizations that do business with them, there is a considerable chance that these regulations will be amended as time goes on. What will this future look like? Will it be more like GDPR, or will it focus primarily on the blockchain? Let us know in the comments.

Monitoring Pros and Cons
Tip of the Week: Lead Your Remote Workers to Succe...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, November 15 2018

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Best Practices Cloud Technology Business Computing Privacy Email Malware Hosted Solutions Hackers IT Services Productivity Internet Managed IT Services Network Security Outsourced IT IT Support Data Software Data Backup Business Mobile Devices Tech Term Computer Microsoft Ransomware Backup Innovation Productivity Data Recovery Smartphone Google Managed Service Provider Business Continuity Internet of Things Hardware Small Business Cloud Computing Android Disaster Recovery Windows 10 Data Management Managed IT User Tips Communication Browser Efficiency Encryption Remote Monitoring Social Media Artificial Intelligence Windows Smartphones IT Support Facebook VoIP BYOD Paperless Office App Business Management Save Money Mobile Device Risk Management Workplace Tips Cybersecurity Phishing Network Government Applications Unified Threat Management Upgrade Collaboration Robot Mobile Device Management Saving Money Firewall Server BDR Gmail Recovery Virtualization Going Green Office 365 Vendor Management Windows 10 Holiday Wi-Fi Password Big Data Document Management Tip of the week Chrome Project Management Compliance Telephone Systems Bandwidth SaaS Hosted Solution Infrastructure Website Vulnerability Apps Money Data storage Passwords Bring Your Own Device Content Filtering Files Wireless Help Desk IT Management Customer Service Managed IT Services Healthcare Politics Virtual Reality Analytics Remote Computing Unified Communications Work/Life Balance Antivirus Miscellaneous Employer-Employee Relationship Two-factor Authentication Router Customer Relationship Management Regulations Apple Office IT Service Managed Service Training Data loss Data Security Computers Storage File Sharing Automation Computing Uninterrupted Power Supply Tablet How To Samsung Mobile Security Sports Budget Flexibility Chromebook Information Technology Word Avoiding Downtime Printing communications Outlook Redundancy Mouse Tech Support Google Drive Users Quick Tips Scam Upgrades Digital Payment Spam Twitter Settings Remote Monitoring and Management The Internet of Things Websites Identity Theft VPN WiFi Business Growth YouTube Remote Workers Patch Management Licensing Maintenance End of Support Health Mobile Computing Smart Technology Social Virtual Private Network Administration Hacker IoT Information Education Monitors Network Management LiFi Assessment Business Technology Microsoft Office Alert Wireless Technology Legal Internet Exlporer Machine Learning Mobility How To IT solutions Server Management Blockchain HIPAA Asset Tracking Access Control Cooperation Company Culture Conferencing Consultation Lenovo Managed IT Service San Diego Dark Data Personal Information Hacks Supercomputer Recycling Cyberattacks Address Specifications Safety Crowdsourcing Typing Meetings MSP Statistics Permissions Nanotechnology Bitcoin Tracking Utility Computing Consulting Digital Obstacle Marketing Legislation IT Technicians Best Practice G Suite History Development Zero-Day Threat Disaster Resistance Taxes Operating System OneNote Search Gadgets SharePoint Staff Google Maps Managing Stress Instant Messaging Superfish Buisness Break Fix Social Networking Notifications Unified Threat Management Hotspot Private Cloud IT Budget eWaste Read Only Black Friday Roanoke — Central Technology Solutions Black Market Proactive Bluetooth Fraud Screen Reader Windows 8 Save Time Managed Services Provider Spyware Course Mirgation Writing Emoji Cabling Cables Proactive IT Identities Employee-Employer Relationship Shortcut Downloads Augmented Reality Network Congestion Enterprise Content Management Finance Dark Web Motherboard User Error Language Computer Repair Management Firefox Cyber Monday technology services provider Point of Sale Smart Tech Physical Security Cost Management E-Commerce Software as a Service Migration Retail Cortana Google Wallet Wires Human Error Heating/Cooling IT Consulting Telephony Hard Drives Google Docs Connectivity WannaCry Operations Display Sync Vulnerabilities Authentication Time Management Networking Downtime Data Warehousing 3D Printing Hacking Computing Infrastructure Public Cloud Humor Enterprise Resource Planning Bookmarks Technology Assurance Group ’s 18 Processors Law Enforcement WPA3 Net Neutrality Office Tips Botnet Backups Hard Drive Features Technology Tips Chatbots Travel Drones Permission Servers Data Breach Unsupported Software Virus Solid State Drive Multi-Factor Security Wearable Technology Update Deep Learning Mobile Device Managment Software Tips Geography Authorization Microsoft Excel Modem Fleet Tracking Disaster Trending Virtual Desktop Printer Alerts Electronic Medical Records Automobile Current Events Computer Care Mobile Favorites Distributed Denial of Service Annual Convention Gadget Cache Electronic Health Records Mail Merge Comparison Identity Social Engineering USB Alt Codes Test Technology Laws Cookies Mobile Data Cryptocurrency GPS Star Wars Monitoring VoIP Sponsor Google Calendar High-Speed Internet Employees Touchscreen Techology CCTV Administrator Relocation Webcam Backup and Disaster Recovery IT Consultant Hard Disk Drive Error Printers Cybercrime Emergency Web Server CrashOverride Cameras Motion Sickness Regulation