631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

How Exactly Is the GDPR Working to Incorporate Blockchain?

How Exactly Is the GDPR Working to Incorporate Blockchain?

Now that the European Union’s General Data Protection Regulation (GDPR)--the most comprehensive individual data protection law in history--has gone into effect, it is important to know where your business stands in regard to your potential liability. One technology that has a rather lot of ambiguity surrounding it is blockchain, which is essentially an encrypted and distributed digital ledger. How is the development of blockchain, which is built on the idea of security through transparency, going to fare under the guidelines of the new GDPR regulations?

Let’s start with the GDPR itself. Despite not using the PII designation that we’ve come to know, the regulation is the strongest data protection law ever established for its overreaching stance of protecting any individual that is doing business within the member nations of the European Union. Additionally, any organization that works with suppliers or partners in the EU has to comply with the regulations found in the GDPR. If you’ve noticed that all of your favorite online businesses and websites have updated their privacy policy recently, it’s because the GDPR went into effect on May 25, and they need to protect themselves against the immense fines that come with non-compliance to the regulation.

The issue at hand for blockchain technology is actually in the GDPR mandate itself. Under the GDPR, if an organization that doesn’t need personal data, obtains personal data, they are not to keep that data, but are required to delete it. Since you can’t delete blockchain nodes, it stands to reason that the GDPR would be a problem for companies that are looking to innovate using blockchain technology. Ironically, blockchain and the GDPR, despite not having the same agenda in creation, have been cultivated with a shared purpose: to protect the rights of individuals to make the decisions about their own data, but blockchain is not designed to be GDPR-compatible as it is written today.

Technology moves fast so while the GDPR has just now gone into effect, it is already being challenged by technological innovation. The GDPR was designed to be technologically agnostic and flexible enough to allow for such innovations, the blockchain is already testing that. Many of the applications that blockchain is used for actually lend themselves well to the mandate triad of confidentiality, integrity, and availability. In blockchain, the transactions themselves use encryption to be confidential, but the overall ledger, and this is the problem, will still be transparent.

For example, Joe could pay with his blockchain-based account for a physical (as most of the EU has universal healthcare). The particulars (account number, and other personal information) could be hidden, but the record would show that Joe paid so many euros worth of cryptocurrency for a physical. Under the GDPR, because that information, while encrypted, is still in possession of the company that has no rights to it--and it can’t be deleted from the blockchain--it constitutes a breach of the GDPR. Many EU-based companies have stopped accepting Bitcoin and other distributed cryptocurrencies as payments (for a litany of reasons, one being the GDPR).

Now, the GDPR only covers EU-member countries and people doing business with them, but with how much money is being invested in venture capital for blockchain research and application development, it stands to reason that the EU governing body will have to make eventual amendments to the mandate.

The most interesting question going forward is, which is the future of data security? Is it GDPR-like mandates like the California Consumer Privacy Act (CCPA), or is it blockchain itself? What do you think about the GDPR regulation? Would you like to see data privacy be as protected in your country? Or do you think that it is a hindrance to innovation and progress? Leave your comments below and return to our blog regularly. 

Sexy Scam Relies on Your Belief that Someone Was W...
Intro to Your Tech: Software as a Service
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 26 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Network Security Productivity User Tips Microsoft Cybersecurity Malware Communication Google Communications Tech Term Smartphones Managed IT Services Efficiency Hardware Email Passwords Hackers Backup Business Internet Data Business Management Software Outsourced IT Small Business Windows 10 Ransomware Android Browser Innovation Hosted Solutions Mobile Devices VoIP Wi-Fi IT Services Data Backup Data Recovery Mobile Device Users Collaboration IT Support Smartphone Internet of Things Cloud Computing Holiday Network Microsoft Office Applications Alert Social Media Save Money Managed IT Services Computer Employer-Employee Relationship Apps Business Intelligence Router Bandwidth Workplace Tips Miscellaneous Password Saving Money Twitter Wireless Access Control Government Word Paperless Office Data Management Excel Information Networking Phishing Office Marketing Virtualization Settings Gadgets Patch Management Vulnerability Automation Analytics BDR Office 365 VoIP Blockchain Chrome Business Continuity Data Breach Mobile Device Management Hacking Facebook Computers Retail Cost Management IT Support Artificial Intelligence How To Remote Monitoring and Management Workers VPN Remote Monitoring Medical IT Law Enforcement Wireless Charging Data Protection Productivity Physical Security Managed IT Service BYOD G Suite WiFi Cybercrime Gmail Data Security Scam Company Culture Mobility Managed Service Politics Tech Terms Connectivity Website Dark Web Battery Compliance Virtual Assistant Windows Cortana Tip of the week Remote Computing Spam App Virus Spam Blocking Business Technology Chrome OS WannaCry Environment Wireless Internet eCommerce Server Management Downloads Printer Server Backup and Disaster Recovery Shortcut Troubleshooting Telecommuting Ink Entertainment Biometrics Hiring/Firing Copy Proactive IT Apple instant Messaging Recovery Multi-Factor Security Touchscreen Conferencing Document Management Tactics Two-factor Authentication Disaster Recovery Voice over Internet Protocol News Wearables Websites Microsoft Teams Work/Life Balance Email Management Reporting Sales HIPAA e-waste Maintenance Licensing Help Desk Online Shopping Trends Cleaning Printers SSD CrashOverride Update Millennials IT budget PowerPoint Access Managed IT Paste iPhone Vulnerabilities Managing Stress Office Tips Automobile Microsoft Office 365 Content Filtering Digital Internet Explorer Tech Support Botnet Telephone System Healthcare Tablet Hard Drive disposal Antivirus Travel Certification Machine Learning A.I. Safety Analysis Cryptocurrency Inventory Outlook IT Management Sports Personal Information Dongle Phone System Authentication Edge Threat Education Smart Technology Hard Drives Amazon GDPR Knowledge Processors Value Live Streaming Telecommute Movies Telephone Systems File Sharing Lead Generation Mobile Security Big Data Files Profitability Telephony SaaS Server Bring Your Own Device Google Maps Authorization User Tip Laptop Printing Remote Support E-Commerce Staffing Google Drive Storage Comparison Spyware WhatsApp Training Data loss Unified Communications Remote Control User Security Time Management Operating System Upgrade Eliminating Downtime Voice over IP Network Attached Storage Streaming Media Technology Tips Hybrid Cloud Gadget Paper Information Technology Hosted Solution Plug-In Payment Spotify Error Specifications HP Database Cables Security Cameras Staff RAM Instagram Regulation Windows 10 Printer DDoS Emergency HaaS Public Speaking Money Presentation Employer Employee Relationship Unified Threat Management Fun Lithium-ion battery Current Events Augmented Reality Freedom of Information Leadership Wireless Technology 5G IBM Computer Care The Internet of Things Net Neutrality Yahoo Hacker Encryption Budget Customer Relationship Management Search Competition Gaming Console Windows 7 IP Address Vendor Management Scalability Autocorrect Avoiding Downtime Synergy Customer Service Video Games Worker Dark Data IaaS Mobile Office Scheduling Domains Credit Cards Samsung Quick Tips Television Emoji Managed Service Provider

Newsletter Sign Up