301-571-5040    Get SUPPORT

Washington Works Blog

How is Blockchain Going to Work with the GDPR?

How is Blockchain Going to Work with the GDPR?

The European Union’s General Data Protection Regulation (GDPR) has gone into effect, and with this new law comes a lot of information your organization needs to consider regarding individual data protection. In particular, the technology of blockchain is difficult to talk about in regard to GDPR, as it’s basically an encrypted and distributed digital ledger. How can blockchain work properly in tandem with the new GDPR regulations?

GDPR itself is a bit tricky to understand. Even though it doesn’t have the PII designation, it’s still the strongest data protection law passed to date. Any organization that does business with businesses within the nations of the European Union needs to comply with the regulations outlined in the GDPR. One of the most notable results that we’re sure you’ve noticed regarding GDPR is that many websites have updated their privacy policy, and they are required by law to tell their viewers about this. This is to protect themselves from the fines associated with non-compliance to GDPR.

The biggest issue concerning blockchain technology is found in the GDPR mandate. According to the new regulations, if a company obtains personal information that doesn’t need it, they must delete it. Blockchain nodes can’t be deleted, so it makes sense that the GDPR would be an issue for companies that use them. It’s a strange coincidence that blockchain and GDPR are both meant to improve user privacy, even though the blockchain technology used to this end isn’t compatible with GDPR regulations.

Even though GDPR was designed to adapt to changes in technological innovations, blockchain is already testing its ability to do so. For example, applications that utilize blockchain technology already pair well with the three major points of GDPR: confidentiality, integrity, and availability. The blockchain uses encryption to remain confidential, but the ledger itself remains transparent.

Let’s think about a potential scenario for a customer named Jim. Jim can use a blockchain-based account to pay for his monthly checkup. This works out for him because most of the EU has universal healthcare as a principal. The details of this payment are hidden, but the record shows the overall price in the form of cryptocurrency. Because this company has collected information--encrypted or not--and it’s not needed, this would be a breach of GDPR policy. Consequently, some EU-based companies have stopped accepting Bitcoin and cryptocurrency as payment, though it’s worth mentioning that GDPR isn’t the exclusive cause of this.

Though the GDPR regulations only cover EU-member countries and organizations that do business with them, there is a considerable chance that these regulations will be amended as time goes on. What will this future look like? Will it be more like GDPR, or will it focus primarily on the blockchain? Let us know in the comments.

Monitoring Pros and Cons
Tip of the Week: Lead Your Remote Workers to Succe...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, April 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Productivity Privacy Malware Hackers Network Security Business Email Software Internet Hosted Solutions Tech Term IT Support Data Backup Data Data Recovery Computer User Tips Mobile Devices Google Efficiency Innovation Backup IT Services Ransomware Microsoft Managed IT Services Business Management Hardware Cloud Computing Small Business Outsourced IT Workplace Tips Productivity Managed Service Provider Collaboration Android Managed IT Services Paperless Office Smartphone Encryption Business Continuity Office 365 Upgrade Social Media Remote Monitoring Phishing Communication Windows 10 Server Save Money Browser Smartphones Windows 10 Communications Data Management Disaster Recovery Bandwidth Cybersecurity Holiday Government Employer-Employee Relationship VoIP Passwords Internet of Things Infrastructure Tip of the week Managed Service App Scam Information Antivirus Compliance Vulnerability Healthcare Saving Money IT Management BYOD Quick Tips Business Technology Unified Threat Management Wi-Fi Work/Life Balance Artificial Intelligence Document Management Chrome Facebook BDR Apps Automation Windows Risk Management How To Microsoft Office Mobile Device Customer Relationship Management Vendor Management Big Data Blockchain SaaS Hosted Solution Politics VPN Office Password Maintenance Analytics Word Two-factor Authentication File Sharing Money Chromebook Virtual Reality Applications Network Company Culture Machine Learning Alert Patch Management Router Health Identity Theft Point of Sale Website Telephone Systems Samsung Data loss G Suite Electronic Medical Records Gmail Physical Security Twitter Networking Computing Professional Services Regulations How To Private Cloud Computer Care IoT Storage Firewall Taxes Wireless Downtime Robot Management Mobile Device Management Data Security Training Recovery Server Management Social Settings Websites Virtual Private Network Proactive Access Control HIPAA Remote Computing Bring Your Own Device Mobile Security Meetings Tech Support Botnet Remote Monitoring and Management Employees Smart Technology Hacker Automobile Remote Workers Tablet Gadgets Budget Spyware Address Education Smart Tech WPA3 RMM Downloads IT Technicians ROI Monitors Gadget Distributed Denial of Service Zero-Day Threat Unified Threat Management Avoiding Downtime Staff Cortana Black Market Financial Utility Computing Features Crowdsourcing Database Geography Instant Messaging Language WiFi Internet Exlporer Emoji Comparison Users Managing Stress Help Desk Relocation Cleaning Connectivity Fleet Tracking Operating System Disaster Multi-Factor Security Heating/Cooling Travel Mirgation Notes Managed IT Service Modem Backup and Disaster Recovery User Error Time Management Supercomputer Procurement Customer Service Electronic Health Records Personal Information Voice over Internet Protocol High-Speed Internet Finance Computing Infrastructure GPS Value Monitoring Specifications Enterprise Content Management Bookmarks Permissions Update Asset Tracking Tech Terms Uninterrupted Power Supply Google Calendar Servers Motion Sickness PowerPoint YouTube Break Fix Cookies Legal MSP Human Error Printer Network Management Wearable Technology IT Budget Security Cameras Spam Cyberattacks Net Neutrality Development Authentication Office Tips Alerts Tracking USB Consulting Black Friday Managed IT Web Server Social Networking Unified Communications Favorites Error Fraud Star Wars OneNote Theft Legislation Chatbots Notifications Virtual Assistant Files Dark Web IT Consultant Nanotechnology Sports Permission IT Support Touchscreen Digital Payment IT Solutions Printing Enterprise Resource Planning Computer Repair Windows 7 Cables Authorization Google Drive Licensing Virtualization Dongle Managed Services Provider Corporate Profile Cyber Monday Outlook Cameras Motherboard Project Management Lenovo Staffing Cost Management Employee-Employer Relationship Augmented Reality Solid State Drive Mouse Statistics Identity Software as a Service Mobile Read Only Digital Microsoft Excel Mail Merge Screen Reader Search Test Cabling SharePoint Cybercrime Upgrades Processors Remote Worker Shortcut CCTV Wires VoIP Administrator Cooperation Techology Service Level Agreement IBM E-Commerce WannaCry Law Enforcement Wasting Time Vulnerabilities Conferencing Firefox Hotspot Superfish Assessment The Internet of Things Hard Disk Drive Bluetooth Webcam Printers Competition IP Address CrashOverride Regulation Miscellaneous Mobile Office Hiring/Firing Emergency Domains Fun Public Speaking Presentation Lithium-ion battery Hard Drives Wireless Technology 5G Transportation Safety Marketing