312-253-4321    Get SUPPORT

Alchetec Blog

How is Blockchain Going to Work with the GDPR?

How is Blockchain Going to Work with the GDPR?

The European Union’s General Data Protection Regulation (GDPR) has gone into effect, and with this new law comes a lot of information your organization needs to consider regarding individual data protection. In particular, the technology of blockchain is difficult to talk about in regard to GDPR, as it’s basically an encrypted and distributed digital ledger. How can blockchain work properly in tandem with the new GDPR regulations?

GDPR itself is a bit tricky to understand. Even though it doesn’t have the PII designation, it’s still the strongest data protection law passed to date. Any organization that does business with businesses within the nations of the European Union needs to comply with the regulations outlined in the GDPR. One of the most notable results that we’re sure you’ve noticed regarding GDPR is that many websites have updated their privacy policy, and they are required by law to tell their viewers about this. This is to protect themselves from the fines associated with non-compliance to GDPR.

The biggest issue concerning blockchain technology is found in the GDPR mandate. According to the new regulations, if a company obtains personal information that doesn’t need it, they must delete it. Blockchain nodes can’t be deleted, so it makes sense that the GDPR would be an issue for companies that use them. It’s a strange coincidence that blockchain and GDPR are both meant to improve user privacy, even though the blockchain technology used to this end isn’t compatible with GDPR regulations.

Even though GDPR was designed to adapt to changes in technological innovations, blockchain is already testing its ability to do so. For example, applications that utilize blockchain technology already pair well with the three major points of GDPR: confidentiality, integrity, and availability. The blockchain uses encryption to remain confidential, but the ledger itself remains transparent.

Let’s think about a potential scenario for a customer named Jim. Jim can use a blockchain-based account to pay for his monthly checkup. This works out for him because most of the EU has universal healthcare as a principal. The details of this payment are hidden, but the record shows the overall price in the form of cryptocurrency. Because this company has collected information--encrypted or not--and it’s not needed, this would be a breach of GDPR policy. Consequently, some EU-based companies have stopped accepting Bitcoin and cryptocurrency as payment, though it’s worth mentioning that GDPR isn’t the exclusive cause of this.

Though the GDPR regulations only cover EU-member countries and organizations that do business with them, there is a considerable chance that these regulations will be amended as time goes on. What will this future look like? Will it be more like GDPR, or will it focus primarily on the blockchain? Let us know in the comments.

Monitoring Pros and Cons
Tip of the Week: Lead Your Remote Workers to Succe...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 19 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Malware Hackers Privacy Network Security Email Outsourced IT IT Services Software Productivity Data Backup Hosted Solutions Data Managed IT Services Productivity Internet Tech Term Business Ransomware Microsoft Computer Innovation Data Recovery IT Support Backup Hardware Mobile Devices Small Business Cloud Computing Business Continuity IT Support Google Internet of Things Data Management Smartphone Paperless Office User Tips Remote Monitoring Android VoIP Business Management Communication Managed Service Provider Managed IT Browser Smartphones Managed IT Services Efficiency Disaster Recovery Artificial Intelligence Save Money Passwords Collaboration BYOD Holiday Mobile Device Encryption Social Media Cybersecurity Windows 10 Windows 10 Workplace Tips Facebook Office 365 Employer-Employee Relationship Applications Government Phishing Wi-Fi Server SaaS Antivirus Telephone Systems Bandwidth Vulnerability Document Management IT Management Scam Project Management Recovery Infrastructure Saving Money Risk Management Upgrade Unified Threat Management Healthcare Compliance Communications Network BDR Tip of the week Maintenance Word Managed Service Training Information Blockchain Bring Your Own Device File Sharing Hosted Solution Office Microsoft Office Password Robot Customer Relationship Management Windows Storage Files Gmail Firewall Website Help Desk App Data loss Quick Tips Money Chrome Politics Wireless Data Security Virtualization Mobile Device Management Going Green Router Vendor Management Virtual Reality Data Storage Work/Life Balance Two-factor Authentication Regulations IT Service Assessment Flexibility Internet Exlporer IoT Patch Management Apps Printing Computing Mobile Security Alert Redundancy The Internet of Things Automation Network Management Outlook Computers Company Culture Upgrades Samsung Analytics Big Data Digital Payment Server Management VPN Identity Theft Miscellaneous Customer Service Licensing How To Chromebook Tablet Access Control Unified Communications Twitter Employees Virtual Private Network Monitors Health Social Remote Monitoring and Management Business Technology Smart Technology Machine Learning Remote Computing Uninterrupted Power Supply Mobility How To Electronic Medical Records HIPAA Remote Workers Downloads Network Congestion Alerts Enterprise Resource Planning WPA3 Operating System Lenovo Distributed Denial of Service Emoji Google Maps Modem Bluetooth Humor IT Solutions Travel Processors Hard Drive Backup and Disaster Recovery Address Supercomputer Augmented Reality E-Commerce Heating/Cooling Unified Threat Management Finance Technology Tips Wireless Technology End of Support Legal Tracking IT Technicians Law Enforcement Settings Geography Remote Worker Time Management Disaster Resistance Cortana Content Filtering Tech Support USB History Multi-Factor Security Personal Information Safety Education Cooperation Corporate Profile Mobile Fleet Tracking Tech Terms Consultation Superfish IBM Managed IT Service Cookies Private Cloud Bookmarks Office Tips Hacker Solid State Drive Cache Human Error Update IT Budget Social Networking Features Servers User Error G Suite Permissions Cabling Star Wars Authentication Mouse Mirgation Gadget Digital High-Speed Internet Monitoring ROI Proactive IT Gadgets Hacking Google Calendar Computer Care Staff Virus WannaCry Asset Tracking Theft Downtime Break Fix Nanotechnology Favorites Taxes Hotspot Hard Disk Drive Recycling MSP Permission Black Friday Motherboard Electronic Health Records Printer Users Unsupported Software Fraud Black Market Utility Computing Authorization Comparison Migration Spyware Development Consulting Touchscreen IT Consulting Conferencing Trending Legislation Display Computer Repair Operations Crowdsourcing Managing Stress OneNote Financial Networking 3D Printing Dark Web Screen Reader Dark Data Language Notifications eWaste Proactive Test Cyber Monday Mobile Computing Botnet Cyberattacks Websites Physical Security Mobile Data Disaster Specifications Social Engineering Sports Chatbots Cables Managed Services Provider Data Breach Meetings WiFi Wearable Technology VoIP Enterprise Content Management Employee-Employer Relationship Procurement Google Drive Spam Data Warehousing Business Growth Software Tips Smart Tech Computing Infrastructure Management RMM Firefox Apple Read Only Statistics SharePoint Net Neutrality Cost Management Wires Zero-Day Threat Mail Merge Search Identity Telephony Point of Sale Technology Laws Instant Messaging Shortcut Software as a Service GPS YouTube Vulnerabilities Security Cameras Avoiding Downtime Techology Microsoft Excel Connectivity Automobile Information Technology Lithium-ion battery Relocation Printers 5G Cleaning Marketing Motion Sickness Regulation Budget Competition Hiring/Firing Error IP Address Fun Notes Staffing Sync Public Cloud IT Consultant Mobile Office Emergency Domains CrashOverride Mobile Device Managment Hacks Hard Drives Administrator Cybercrime Public Speaking Presentation