Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

How is Blockchain Going to Work with the GDPR?

How is Blockchain Going to Work with the GDPR?

The European Union’s General Data Protection Regulation (GDPR) has gone into effect, and with this new law comes a lot of information your organization needs to consider regarding individual data protection. In particular, the technology of blockchain is difficult to talk about in regard to GDPR, as it’s basically an encrypted and distributed digital ledger. How can blockchain work properly in tandem with the new GDPR regulations?

GDPR itself is a bit tricky to understand. Even though it doesn’t have the PII designation, it’s still the strongest data protection law passed to date. Any organization that does business with businesses within the nations of the European Union needs to comply with the regulations outlined in the GDPR. One of the most notable results that we’re sure you’ve noticed regarding GDPR is that many websites have updated their privacy policy, and they are required by law to tell their viewers about this. This is to protect themselves from the fines associated with non-compliance to GDPR.

The biggest issue concerning blockchain technology is found in the GDPR mandate. According to the new regulations, if a company obtains personal information that doesn’t need it, they must delete it. Blockchain nodes can’t be deleted, so it makes sense that the GDPR would be an issue for companies that use them. It’s a strange coincidence that blockchain and GDPR are both meant to improve user privacy, even though the blockchain technology used to this end isn’t compatible with GDPR regulations.

Even though GDPR was designed to adapt to changes in technological innovations, blockchain is already testing its ability to do so. For example, applications that utilize blockchain technology already pair well with the three major points of GDPR: confidentiality, integrity, and availability. The blockchain uses encryption to remain confidential, but the ledger itself remains transparent.

Let’s think about a potential scenario for a customer named Jim. Jim can use a blockchain-based account to pay for his monthly checkup. This works out for him because most of the EU has universal healthcare as a principal. The details of this payment are hidden, but the record shows the overall price in the form of cryptocurrency. Because this company has collected information--encrypted or not--and it’s not needed, this would be a breach of GDPR policy. Consequently, some EU-based companies have stopped accepting Bitcoin and cryptocurrency as payment, though it’s worth mentioning that GDPR isn’t the exclusive cause of this.

Though the GDPR regulations only cover EU-member countries and organizations that do business with them, there is a considerable chance that these regulations will be amended as time goes on. What will this future look like? Will it be more like GDPR, or will it focus primarily on the blockchain? Let us know in the comments.

Monitoring Pros and Cons
Tip of the Week: Lead Your Remote Workers to Succe...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, September 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Best Practices Cloud Technology Business Computing Privacy Email Malware IT Services Hosted Solutions Hackers Productivity Internet Managed IT Services IT Support Network Security Software Outsourced IT Data Mobile Devices Data Backup Ransomware Microsoft Business Backup Computer Tech Term Innovation Internet of Things Hardware Data Recovery Smartphone Google Business Continuity Small Business Managed Service Provider Cloud Computing Data Management Windows 10 Android Remote Monitoring Disaster Recovery Social Media Managed IT User Tips Communication Facebook Browser Efficiency Encryption Artificial Intelligence Paperless Office BYOD Productivity Windows Smartphones VoIP Workplace Tips Cybersecurity Risk Management Save Money IT Support App Network Mobile Device Management Firewall Saving Money Recovery Business Management Gmail Phishing Applications Unified Threat Management Mobile Device Robot Upgrade Telephone Systems Big Data SaaS Server Chrome BDR Infrastructure Bandwidth Hosted Solution Money Office 365 Virtualization Website Data storage Bring Your Own Device Apps Going Green Holiday Government Passwords Vendor Management Wi-Fi Content Filtering Document Management Password Tip of the week Compliance Project Management Router Antivirus Two-factor Authentication Employer-Employee Relationship Regulations Unified Communications IT Service Apple Training Computers Vulnerability Storage Managed Service Data Security Data loss File Sharing Automation Computing Windows 10 Wireless IT Management Virtual Reality Collaboration Work/Life Balance Miscellaneous Analytics Remote Computing Licensing Settings VPN Smart Technology End of Support Health Business Growth Office Patch Management Customer Relationship Management Spam Mobile Computing Monitors Alert Virtual Private Network WiFi Social YouTube Hacker Microsoft Office Network Management Internet Exlporer Mobility HIPAA Wireless Technology Legal Assessment Business Technology Blockchain IoT Information How To Samsung How To Administration Server Management Tablet Education Mobile Security LiFi Flexibility Files Chromebook Uninterrupted Power Supply Budget IT solutions Avoiding Downtime Help Desk Customer Service Information Technology Tech Support Printing Word Mouse Upgrades Managed IT Services Redundancy Politics Sports Outlook Digital Payment Twitter Google Drive Quick Tips Scam Websites The Internet of Things Identity Theft communications Healthcare Sync Operations 3D Printing Enterprise Content Management Firefox Telephony Data Warehousing Display Employee-Employer Relationship Management Law Enforcement Technology Assurance Group ’s 18 Remote Monitoring and Management Heating/Cooling IT Consulting Maintenance Public Cloud Computing Infrastructure Google Wallet Processors Technology Tips Travel Chatbots Users Hard Drives Office Tips Google Docs Wires Time Management Networking Botnet Net Neutrality Cost Management E-Commerce WannaCry Multi-Factor Security Mobile Device Managment Wearable Technology Software Tips Unsupported Software Virus Vulnerabilities Microsoft Excel Modem Humor Update Connectivity Remote Workers Hacking Enterprise Resource Planning Gadget Distributed Denial of Service Annual Convention Backups Electronic Medical Records WPA3 Servers Data Breach Printer Automobile Alerts Computer Care Drones Comparison Identity Solid State Drive Machine Learning Downtime Deep Learning Social Engineering USB Hard Drive Features Google Calendar Mobile Data Geography GPS Cookies Current Events Disaster Trending Alt Codes Mobile Mail Merge Managed IT Service San Diego Fleet Tracking Technology Laws Access Control Cooperation VoIP Sponsor Crowdsourcing Specifications Cryptocurrency Dark Data Personal Information Touchscreen Techology Supercomputer Safety Cache Electronic Health Records Legislation G Suite IT Technicians History Virtual Desktop High-Speed Internet Consultation Lenovo Permissions Tracking Nanotechnology Star Wars Monitoring Typing Notifications Company Culture Address Break Fix Taxes Social Networking Hacks Asset Tracking Statistics SharePoint Staff Google Maps Digital Obstacle Black Friday Roanoke — Central Technology Solutions Bitcoin MSP Disaster Resistance Unified Threat Management Private Cloud Hotspot IT Budget Best Practice Black Market Recycling Mirgation Cabling Operating System Development Superfish Fraud Screen Reader Writing Emoji Utility Computing Consulting Search Managing Stress Dark Web Motherboard Network Congestion OneNote Bluetooth Downloads Augmented Reality eWaste Spyware Course Cyber Monday Point of Sale technology services provider Marketing Windows 8 Save Time Computer Repair Proactive Proactive IT User Error Language Software as a Service Migration Gadgets Identities Physical Security Cables Smart Tech Buisness Retail Cortana Managed Services Provider Shortcut Printers Web Server Emergency CrashOverride Cameras Motion Sickness CCTV Administrator Meetings Regulation Relocation Cyberattacks Webcam IT Consultant Read Only Error Cybercrime Hard Disk Drive