312-253-4321    Get SUPPORT

Alchetec Blog

How is Blockchain Going to Work with the GDPR?

How is Blockchain Going to Work with the GDPR?

The European Union’s General Data Protection Regulation (GDPR) has gone into effect, and with this new law comes a lot of information your organization needs to consider regarding individual data protection. In particular, the technology of blockchain is difficult to talk about in regard to GDPR, as it’s basically an encrypted and distributed digital ledger. How can blockchain work properly in tandem with the new GDPR regulations?

GDPR itself is a bit tricky to understand. Even though it doesn’t have the PII designation, it’s still the strongest data protection law passed to date. Any organization that does business with businesses within the nations of the European Union needs to comply with the regulations outlined in the GDPR. One of the most notable results that we’re sure you’ve noticed regarding GDPR is that many websites have updated their privacy policy, and they are required by law to tell their viewers about this. This is to protect themselves from the fines associated with non-compliance to GDPR.

The biggest issue concerning blockchain technology is found in the GDPR mandate. According to the new regulations, if a company obtains personal information that doesn’t need it, they must delete it. Blockchain nodes can’t be deleted, so it makes sense that the GDPR would be an issue for companies that use them. It’s a strange coincidence that blockchain and GDPR are both meant to improve user privacy, even though the blockchain technology used to this end isn’t compatible with GDPR regulations.

Even though GDPR was designed to adapt to changes in technological innovations, blockchain is already testing its ability to do so. For example, applications that utilize blockchain technology already pair well with the three major points of GDPR: confidentiality, integrity, and availability. The blockchain uses encryption to remain confidential, but the ledger itself remains transparent.

Let’s think about a potential scenario for a customer named Jim. Jim can use a blockchain-based account to pay for his monthly checkup. This works out for him because most of the EU has universal healthcare as a principal. The details of this payment are hidden, but the record shows the overall price in the form of cryptocurrency. Because this company has collected information--encrypted or not--and it’s not needed, this would be a breach of GDPR policy. Consequently, some EU-based companies have stopped accepting Bitcoin and cryptocurrency as payment, though it’s worth mentioning that GDPR isn’t the exclusive cause of this.

Though the GDPR regulations only cover EU-member countries and organizations that do business with them, there is a considerable chance that these regulations will be amended as time goes on. What will this future look like? Will it be more like GDPR, or will it focus primarily on the blockchain? Let us know in the comments.

Monitoring Pros and Cons
Tip of the Week: Lead Your Remote Workers to Succe...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, September 21 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Malware IT Services Email Hackers Network Security Outsourced IT Managed IT Services Software Productivity Internet Hosted Solutions Data Backup Data Tech Term Ransomware Microsoft Backup IT Support Computer Data Recovery Business Mobile Devices Innovation Business Continuity Cloud Computing Hardware Productivity Small Business Smartphone Google User Tips IT Support Android Data Management Managed IT Remote Monitoring Paperless Office Disaster Recovery VoIP Internet of Things Communication Cybersecurity Windows 10 Artificial Intelligence Workplace Tips Managed Service Provider BYOD Browser Applications Office 365 Mobile Device Encryption Smartphones Phishing Social Media Save Money Efficiency Business Management Passwords Facebook Infrastructure Tip of the week Recovery Compliance Holiday Saving Money Unified Threat Management Network Risk Management Server Managed IT Services Government Wi-Fi SaaS Telephone Systems Document Management Employer-Employee Relationship App Data Security Website Firewall Password Data loss Files Managed Service Virtualization Money Going Green Vendor Management Regulations BDR Data Storage Antivirus Two-factor Authentication Virtual Reality Vulnerability Word Work/Life Balance IT Service IT Management Healthcare Project Management Hosted Solution Training Collaboration Robot Router Storage Chrome Bandwidth Windows 10 Gmail File Sharing Windows Big Data Digital Payment Automation Internet Exlporer Identity Theft Business Technology How To Samsung Blockchain IoT Miscellaneous Licensing Information Upgrade Help Desk Monitors Tablet Mobile Security Assessment Chromebook Wireless Politics Patch Management Mobile Device Management Twitter Uninterrupted Power Supply Health Mobility How To Flexibility Machine Learning Redundancy Remote Computing Network Management Maintenance Scam Unified Communications Server Management Bring Your Own Device Analytics Outlook VPN Office Apps Upgrades The Internet of Things Computers Smart Technology Quick Tips Microsoft Office Computing Alert Customer Relationship Management HIPAA Virtual Private Network 3D Printing Remote Workers Taxes Hard Disk Drive Gadget Alerts Enterprise Resource Planning Display Distributed Denial of Service Google Drive Modem WPA3 Virus Statistics Hard Drive SharePoint Dark Data Spyware Firefox Technology Laws Mobile Data E-Commerce Customer Service IT Technicians Mail Merge Geography Social Engineering Avoiding Downtime Cookies Techology Cooperation Shortcut Mobile Software as a Service Black Market Managed IT Service Fleet Tracking Disaster Computer Repair Crowdsourcing Bluetooth Cache Downloads Social Networking Lenovo Notifications Permissions Heating/Cooling Star Wars Unified Threat Management Features Spam WiFi VoIP Botnet Mirgation Address High-Speed Internet Search Software Tips Break Fix Time Management Nanotechnology Disaster Resistance Monitoring Sports Staff Company Culture Technology Tips Apple Physical Security Asset Tracking Hotspot Recycling Multi-Factor Security Network Congestion Business Growth Communications Black Friday Consultation Motherboard Superfish Social Fraud Servers Utility Computing User Error Humor Electronic Health Records GPS YouTube Migration Development MSP Dark Web Screen Reader Proactive IT Cortana Consulting Telephony Operations Managing Stress Mouse End of Support Google Maps OneNote Augmented Reality Travel Electronic Medical Records Language Hacking eWaste Google Calendar Education Supercomputer Automobile Cyber Monday Mobile Computing Printing Content Filtering History Printer Office Tips Cyberattacks Tech Support Tracking Settings Emoji Chatbots Cables Proactive Wireless Technology IT Solutions Processors Data Warehousing Touchscreen Smart Tech IT Consulting Managed Services Provider IBM Corporate Profile Wearable Technology Enterprise Content Management Comparison Safety Employee-Employer Relationship Solid State Drive Legal Law Enforcement Computing Infrastructure Trending Management Legislation Hacker IT Budget USB Networking G Suite Cabling Personal Information Net Neutrality Websites Cost Management Access Control Read Only Gadgets Digital Identity Remote Monitoring and Management Microsoft Excel Connectivity Data Breach Unsupported Software Point of Sale Computer Care WannaCry Update Vulnerabilities Specifications Wires IP Address Printers Users Error Staffing Sync IT Consultant Mobile Office Domains CrashOverride Public Cloud Hard Drives Regulation Mobile Device Managment Administrator Public Speaking Cybercrime Hacks Presentation Information Technology Lithium-ion battery 5G Relocation Cleaning Motion Sickness Marketing Hiring/Firing Budget Private Cloud Emergency Fun Competition Downtime