301-571-5040    Get SUPPORT

Washington Works Blog

How is Blockchain Going to Work with the GDPR?

How is Blockchain Going to Work with the GDPR?

The European Union’s General Data Protection Regulation (GDPR) has gone into effect, and with this new law comes a lot of information your organization needs to consider regarding individual data protection. In particular, the technology of blockchain is difficult to talk about in regard to GDPR, as it’s basically an encrypted and distributed digital ledger. How can blockchain work properly in tandem with the new GDPR regulations?

GDPR itself is a bit tricky to understand. Even though it doesn’t have the PII designation, it’s still the strongest data protection law passed to date. Any organization that does business with businesses within the nations of the European Union needs to comply with the regulations outlined in the GDPR. One of the most notable results that we’re sure you’ve noticed regarding GDPR is that many websites have updated their privacy policy, and they are required by law to tell their viewers about this. This is to protect themselves from the fines associated with non-compliance to GDPR.

The biggest issue concerning blockchain technology is found in the GDPR mandate. According to the new regulations, if a company obtains personal information that doesn’t need it, they must delete it. Blockchain nodes can’t be deleted, so it makes sense that the GDPR would be an issue for companies that use them. It’s a strange coincidence that blockchain and GDPR are both meant to improve user privacy, even though the blockchain technology used to this end isn’t compatible with GDPR regulations.

Even though GDPR was designed to adapt to changes in technological innovations, blockchain is already testing its ability to do so. For example, applications that utilize blockchain technology already pair well with the three major points of GDPR: confidentiality, integrity, and availability. The blockchain uses encryption to remain confidential, but the ledger itself remains transparent.

Let’s think about a potential scenario for a customer named Jim. Jim can use a blockchain-based account to pay for his monthly checkup. This works out for him because most of the EU has universal healthcare as a principal. The details of this payment are hidden, but the record shows the overall price in the form of cryptocurrency. Because this company has collected information--encrypted or not--and it’s not needed, this would be a breach of GDPR policy. Consequently, some EU-based companies have stopped accepting Bitcoin and cryptocurrency as payment, though it’s worth mentioning that GDPR isn’t the exclusive cause of this.

Though the GDPR regulations only cover EU-member countries and organizations that do business with them, there is a considerable chance that these regulations will be amended as time goes on. What will this future look like? Will it be more like GDPR, or will it focus primarily on the blockchain? Let us know in the comments.

Monitoring Pros and Cons
Tip of the Week: Lead Your Remote Workers to Succe...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, January 21 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Malware Hackers Productivity Business Network Security Email Software Tech Term Hosted Solutions Internet Data Backup Mobile Devices Computer Data Managed IT Services Ransomware Backup IT Support Data Recovery Google Microsoft User Tips Outsourced IT Hardware Productivity Efficiency Innovation Cloud Computing IT Services Smartphone Small Business Managed Service Provider Social Media Business Management Business Continuity Paperless Office Android Workplace Tips Encryption Smartphones Data Management Windows 10 Save Money Managed IT Services Remote Monitoring Communication Collaboration Browser Windows 10 Office 365 Government Employer-Employee Relationship Holiday Server Disaster Recovery Bandwidth Scam Antivirus Vulnerability Healthcare IT Management VoIP BYOD BDR Wi-Fi Cybersecurity App Internet of Things Passwords Work/Life Balance Facebook Artificial Intelligence Unified Threat Management Phishing Infrastructure Tip of the week Communications Managed Service Hosted Solution Information Windows Office Network Applications Password Mobile Device Two-factor Authentication Money Quick Tips Maintenance Chromebook Word Apps Virtual Reality Compliance Blockchain Politics Chrome Risk Management How To Customer Relationship Management Big Data File Sharing SaaS Document Management Upgrade Saving Money Computing Botnet Vendor Management Access Control HIPAA Wireless Data loss Mobile Security Robot Automobile Mobile Device Management Machine Learning Smart Technology Recovery How To Social Identity Theft Point of Sale VPN Remote Computing Data Security Telephone Systems Router G Suite Business Technology Tech Support Server Management Virtual Private Network Firewall Automation Private Cloud Computer Care Hacker Microsoft Office Taxes Gmail Downtime Bring Your Own Device Alert Regulations IoT Training Remote Monitoring and Management Storage Health Website Websites Employees Samsung Remote Workers Meetings Patch Management Company Culture Physical Security Twitter Electronic Medical Records Utility Computing Features Dark Web Nanotechnology Zero-Day Threat Personal Information ROI Cybercrime Motherboard Update Law Enforcement CCTV Geography Instant Messaging Licensing Spam Financial Administrator Disaster Heating/Cooling Cyber Monday Legal Webcam Managing Stress Help Desk Cost Management Time Management Fleet Tracking Operating System Mouse Identity Electronic Health Records Microsoft Excel Screen Reader Education Networking Backup and Disaster Recovery SharePoint Gadget High-Speed Internet Finance Cooperation Notifications Procurement Uninterrupted Power Supply Servers Professional Services Monitoring Sports YouTube Enterprise Content Management Bookmarks Hotspot Assessment IT Solutions WiFi Network Management Asset Tracking Tech Terms Tablet Managed IT Management Cyberattacks Smart Tech Augmented Reality Virtualization Relocation Cleaning MSP Human Error Downloads IT Technicians Computer Repair Travel Distributed Denial of Service Analytics Development Authentication Unified Threat Management Staff Security Cameras Supercomputer USB Consulting Search Settings Unified Communications Favorites Language Internet Exlporer IBM Upgrades Processors IT Support GPS Touchscreen OneNote Theft Comparison Motion Sickness Corporate Profile Outlook Enterprise Resource Planning Files Connectivity The Internet of Things Google Drive Proactive Permission Multi-Factor Security Mirgation Managed IT Service Modem Lenovo Cables Authorization User Error Gadgets Budget Printing Solid State Drive IT Budget Statistics Dongle Managed Services Provider Web Server Digital Mail Merge Project Management Computing Infrastructure Value Office Tips Cabling Tracking Employee-Employer Relationship Specifications WannaCry Shortcut Mobile Read Only Permissions Cortana Black Market Error VoIP Techology Test Google Calendar E-Commerce Break Fix Cookies Emoji IT Consultant Firefox Superfish Wires Printer Wearable Technology Users Crowdsourcing Remote Worker Hard Disk Drive Digital Payment Bluetooth Service Level Agreement Cameras Spyware Address Vulnerabilities Conferencing Alerts Customer Service Black Friday Social Networking Monitors Fraud Star Wars Staffing Avoiding Downtime WPA3 RMM Legislation Chatbots Domains Hiring/Firing CrashOverride Fun Public Speaking Regulation Notes Presentation Emergency Lithium-ion battery Wireless Technology 5G Hard Drives Safety Marketing Competition IP Address Miscellaneous Printers Mobile Office