312-253-4321    Get SUPPORT

Alchetec Blog

How is Blockchain Going to Work with the GDPR?

How is Blockchain Going to Work with the GDPR?

The European Union’s General Data Protection Regulation (GDPR) has gone into effect, and with this new law comes a lot of information your organization needs to consider regarding individual data protection. In particular, the technology of blockchain is difficult to talk about in regard to GDPR, as it’s basically an encrypted and distributed digital ledger. How can blockchain work properly in tandem with the new GDPR regulations?

GDPR itself is a bit tricky to understand. Even though it doesn’t have the PII designation, it’s still the strongest data protection law passed to date. Any organization that does business with businesses within the nations of the European Union needs to comply with the regulations outlined in the GDPR. One of the most notable results that we’re sure you’ve noticed regarding GDPR is that many websites have updated their privacy policy, and they are required by law to tell their viewers about this. This is to protect themselves from the fines associated with non-compliance to GDPR.

The biggest issue concerning blockchain technology is found in the GDPR mandate. According to the new regulations, if a company obtains personal information that doesn’t need it, they must delete it. Blockchain nodes can’t be deleted, so it makes sense that the GDPR would be an issue for companies that use them. It’s a strange coincidence that blockchain and GDPR are both meant to improve user privacy, even though the blockchain technology used to this end isn’t compatible with GDPR regulations.

Even though GDPR was designed to adapt to changes in technological innovations, blockchain is already testing its ability to do so. For example, applications that utilize blockchain technology already pair well with the three major points of GDPR: confidentiality, integrity, and availability. The blockchain uses encryption to remain confidential, but the ledger itself remains transparent.

Let’s think about a potential scenario for a customer named Jim. Jim can use a blockchain-based account to pay for his monthly checkup. This works out for him because most of the EU has universal healthcare as a principal. The details of this payment are hidden, but the record shows the overall price in the form of cryptocurrency. Because this company has collected information--encrypted or not--and it’s not needed, this would be a breach of GDPR policy. Consequently, some EU-based companies have stopped accepting Bitcoin and cryptocurrency as payment, though it’s worth mentioning that GDPR isn’t the exclusive cause of this.

Though the GDPR regulations only cover EU-member countries and organizations that do business with them, there is a considerable chance that these regulations will be amended as time goes on. What will this future look like? Will it be more like GDPR, or will it focus primarily on the blockchain? Let us know in the comments.

Monitoring Pros and Cons
Tip of the Week: Lead Your Remote Workers to Succe...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, April 24 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Productivity Malware Hackers Privacy IT Services Network Security Email Data Backup Outsourced IT Software Hosted Solutions Data Internet Productivity Managed IT Services Business Innovation Data Recovery Tech Term Ransomware Microsoft Computer Cloud Computing IT Support Hardware Small Business IT Support Backup Mobile Devices Business Continuity Google User Tips Business Management Efficiency Communication Collaboration Paperless Office Managed IT Services Remote Monitoring VoIP Android Workplace Tips Phishing Disaster Recovery Internet of Things Data Management Smartphone Upgrade Passwords Server Browser Managed IT Managed Service Provider Windows 10 Encryption Smartphones Cybersecurity Artificial Intelligence Save Money Office 365 Holiday Social Media BYOD Windows 10 Mobile Device Communications Document Management Saving Money Applications Facebook Employer-Employee Relationship Risk Management Government Wi-Fi Compliance Network Antivirus Vendor Management Vulnerability SaaS Microsoft Office IT Management Scam Telephone Systems Windows Analytics Project Management Healthcare Bandwidth Infrastructure Quick Tips Automation Chrome Managed Service Information Recovery Unified Threat Management Business Technology BDR Tip of the week Virtual Reality Word Going Green Work/Life Balance IT Service Data Storage Regulations Apps Training Customer Relationship Management VPN File Sharing Website Firewall Bring Your Own Device Password Office Data loss Router Hosted Solution Robot Files Tablet Help Desk Data Security Storage Money Gmail Wireless App Mobile Device Management Politics Blockchain Two-factor Authentication Maintenance Virtualization Patch Management Remote Computing Proactive Electronic Medical Records Company Culture Settings Redundancy Employees The Internet of Things Network Management Remote Monitoring and Management Flexibility Computing Server Management Big Data Remote Workers Printing Alert Digital Payment Unified Communications Networking Identity Theft Licensing Management Customer Service Smart Technology Outlook Miscellaneous Access Control Net Neutrality Computers Virtual Private Network Upgrades Samsung HIPAA Internet Exlporer Chromebook Software as a Service Uninterrupted Power Supply How To Twitter Mobility How To IoT Health Cooperation Assessment Mobile Security Monitors Machine Learning Social Augmented Reality OneNote Financial Technology Tips Telephony Travel Mirgation High-Speed Internet Time Management Conferencing Disaster Resistance Shared resources Supercomputer Permissions Star Wars Test Multi-Factor Security Content Filtering History Staff Search Tech Support Consultation Cyberattacks Superfish Voice over Internet Protocol Automobile Tracking Break Fix Nanotechnology Wireless Technology Hotspot Recycling IBM Managed Services Provider PowerPoint Emoji Black Friday Corporate Profile Motherboard Safety Servers User Error Employee-Employer Relationship Procurement Mouse Solid State Drive Migration Development Hacker Meetings Proactive IT IT Solutions Processors IT Budget Fraud Utility Computing Network Congestion Hacking RMM Google Calendar Legal Law Enforcement G Suite Cabling Operations Managing Stress Gadgets Read Only Windows 7 USB Dark Web Digital Screen Reader Humor Personal Information Downtime Language eWaste End of Support Point of Sale Professional Services Private Cloud Computer Care Cyber Monday WannaCry Mobile Computing Cortana Wires Zero-Day Threat Printer Education Security Cameras Comparison Update Taxes Hard Disk Drive Chatbots Cables Touchscreen Instant Messaging IT Consulting WPA3 Trending Operating System Legislation Gadget Wearable Technology Enterprise Content Management Users Transportation Data Warehousing Spyware Smart Tech Office Tips Virus Computing Infrastructure E-Commerce Virtual Assistant Websites Backup and Disaster Recovery Cost Management Remote Worker Specifications Identity Finance Data Breach Fleet Tracking Tech Terms Disaster Vulnerabilities Google Drive Bookmarks Black Market Microsoft Excel Connectivity Computer Repair Crowdsourcing Software Tips Alerts Enterprise Resource Planning Spam Firefox Features Wasting Time WiFi Distributed Denial of Service VoIP Modem Unsupported Software Statistics Human Error SharePoint Apple Hard Drive Display Monitoring Mail Merge ROI Botnet 3D Printing Authentication Technology Laws Notifications Asset Tracking Shortcut Theft Sports IT Technicians Geography Avoiding Downtime Favorites Techology Teamwork Physical Security Dark Data Downloads Mobile Social Engineering Electronic Health Records Lenovo Database Business Growth GPS Managed IT Service YouTube Cookies Mobile Data MSP Bluetooth Permission Google Maps Cache Consulting Address Notes Social Networking Heating/Cooling Authorization Unified Threat Management Hard Drives 5G Relocation Cleaning Motion Sickness Marketing Budget Competition IP Address Printers Sync Emergency Error Staffing IT Consultant Hiring/Firing Mobile Office Domains Students CrashOverride Mobile Device Managment Fun Public Cloud Regulation Administrator Public Speaking Cybercrime Presentation Information Technology Lithium-ion battery Hacks