Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

How is Blockchain Going to Work with the GDPR?

How is Blockchain Going to Work with the GDPR?

The European Union’s General Data Protection Regulation (GDPR) has gone into effect, and with this new law comes a lot of information your organization needs to consider regarding individual data protection. In particular, the technology of blockchain is difficult to talk about in regard to GDPR, as it’s basically an encrypted and distributed digital ledger. How can blockchain work properly in tandem with the new GDPR regulations?

GDPR itself is a bit tricky to understand. Even though it doesn’t have the PII designation, it’s still the strongest data protection law passed to date. Any organization that does business with businesses within the nations of the European Union needs to comply with the regulations outlined in the GDPR. One of the most notable results that we’re sure you’ve noticed regarding GDPR is that many websites have updated their privacy policy, and they are required by law to tell their viewers about this. This is to protect themselves from the fines associated with non-compliance to GDPR.

The biggest issue concerning blockchain technology is found in the GDPR mandate. According to the new regulations, if a company obtains personal information that doesn’t need it, they must delete it. Blockchain nodes can’t be deleted, so it makes sense that the GDPR would be an issue for companies that use them. It’s a strange coincidence that blockchain and GDPR are both meant to improve user privacy, even though the blockchain technology used to this end isn’t compatible with GDPR regulations.

Even though GDPR was designed to adapt to changes in technological innovations, blockchain is already testing its ability to do so. For example, applications that utilize blockchain technology already pair well with the three major points of GDPR: confidentiality, integrity, and availability. The blockchain uses encryption to remain confidential, but the ledger itself remains transparent.

Let’s think about a potential scenario for a customer named Jim. Jim can use a blockchain-based account to pay for his monthly checkup. This works out for him because most of the EU has universal healthcare as a principal. The details of this payment are hidden, but the record shows the overall price in the form of cryptocurrency. Because this company has collected information--encrypted or not--and it’s not needed, this would be a breach of GDPR policy. Consequently, some EU-based companies have stopped accepting Bitcoin and cryptocurrency as payment, though it’s worth mentioning that GDPR isn’t the exclusive cause of this.

Though the GDPR regulations only cover EU-member countries and organizations that do business with them, there is a considerable chance that these regulations will be amended as time goes on. What will this future look like? Will it be more like GDPR, or will it focus primarily on the blockchain? Let us know in the comments.

Monitoring Pros and Cons
Tip of the Week: Lead Your Remote Workers to Succe...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, January 21 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Malware Privacy Email Hosted Solutions Hackers IT Services Internet Network Security Productivity Outsourced IT Managed IT Services Software Data IT Support Data Backup Business Productivity Mobile Devices Innovation Ransomware Tech Term Computer Hardware Microsoft Data Recovery Backup Small Business Google Cloud Computing Internet of Things Managed Service Provider Smartphone Business Continuity Smartphones Android Disaster Recovery Efficiency Social Media Remote Monitoring Data Management Windows 10 Paperless Office Artificial Intelligence Browser Encryption Managed IT User Tips Communication VoIP Windows Upgrade IT Support Business Management Facebook BYOD Save Money Workplace Tips App Mobile Device Management Holiday Windows 10 Collaboration Risk Management Cybersecurity Mobile Device Phishing Applications communications Government Network Unified Threat Management Firewall Managed IT Services Recovery Saving Money Bandwidth Employer-Employee Relationship Server Wi-Fi Bring Your Own Device BDR Robot Passwords Gmail Telephone Systems Password Office 365 SaaS Big Data Healthcare IT Management Document Management Chrome Virtualization Tip of the week Scam Project Management Antivirus Money Hosted Solution Data storage Website Going Green Infrastructure Apps Vulnerability Vendor Management Compliance Wireless Content Filtering Regulations Analytics Remote Computing Files Office IT Service Computers Microsoft Office Storage Two-factor Authentication Politics Automation Router Apple Unified Communications Social Work/Life Balance Quick Tips Help Desk Customer Service Computing Managed Service Information Customer Relationship Management Training Blockchain Virtual Reality Data Security Data loss Miscellaneous Printing File Sharing How To Outlook Company Culture Server Management Mouse Tablet End of Support Health Sports Uninterrupted Power Supply Google Drive Monitors Settings Electronic Medical Records Business Growth Private Cloud Alert Tech Support The Internet of Things Word Redundancy Mobile Computing Users Smart Technology Hacker Spam Digital Payment How To Remote Monitoring and Management Samsung Maintenance WiFi Websites Identity Theft YouTube Licensing Flexibility Remote Workers Chromebook Wireless Technology Legal Downtime VPN Avoiding Downtime Administration Internet Exlporer Patch Management IoT HIPAA Education LiFi Virtual Private Network Budget Upgrades Access Control Network Management Information Technology IT solutions Machine Learning Mobility Twitter Mobile Security Assessment Business Technology Employees Operating System Asset Tracking SharePoint Staff Mail Merge Display Conferencing Break Fix Social Networking Technology Laws Security Cameras 3D Printing VoIP Sponsor Windows 8 Save Time Crowdsourcing Meetings Recycling Cyberattacks Black Friday Roanoke — Central Technology Solutions Touchscreen Techology Supercomputer MSP Processors RMM Unified Threat Management Hotspot G Suite History Office Tips Utility Computing Consulting Mirgation Consultation Lenovo Marketing Tracking Development Zero-Day Threat Fraud Screen Reader Identities Unsupported Software OneNote Virus Downloads Augmented Reality Address Gadgets Taxes Managing Stress Update Instant Messaging Dark Web Motherboard Statistics Buisness Remote Worker Google Maps Digital Obstacle eWaste Read Only Cyber Monday technology services provider Disaster Resistance Google Wallet IT Budget Proactive Tech Terms User Error Language Cabling Managed Services Provider Software as a Service Migration Superfish Social Engineering Cables USB Backup and Disaster Recovery Smart Tech Search Hard Drives Google Docs Mobile Data Employee-Employer Relationship Operations Humor Enterprise Content Management Finance Data Warehousing Bluetooth ROI Spyware Course Backups Point of Sale Management Technology Assurance Group ’s 18 Proactive IT Drones Theft Computing Infrastructure Dark Data Cost Management Personal Information E-Commerce Technology Tips Chatbots Deep Learning Safety Wires Human Error Net Neutrality Shortcut Solid State Drive Connectivity Multi-Factor Security Wearable Technology Firefox Current Events Telephony Vulnerabilities Authentication Microsoft Excel Modem Sync Law Enforcement Enterprise Resource Planning Bookmarks Distributed Denial of Service Annual Convention Heating/Cooling Alt Codes IT Consulting Public Cloud WPA3 Notifications Financial Printer Alerts Travel Hard Drive Features Comparison Identity Time Management Networking Botnet Black Market Permission WannaCry Cryptocurrency Mobile Device Managment Software Tips Google Calendar Writing Geography Emoji Authorization Cookies Hacking Cooperation Hacks Virtual Desktop Gadget Network Congestion Mobile Favorites Managed IT Service San Diego Servers Typing Data Breach Automobile Computer Care Fleet Tracking Procurement Bitcoin Cache Computer Repair Electronic Health Records Specifications Best Practice Test Star Wars Physical Security Monitoring Legislation IT Technicians GPS Retail High-Speed Internet Cortana Permissions Nanotechnology Disaster Trending CCTV Administrator Relocation Webcam IT Consultant Printers Error Cybercrime Hard Disk Drive Notes Web Server Emergency CrashOverride Cameras Motion Sickness Regulation