631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

How Exactly Is the GDPR Working to Incorporate Blockchain?

How Exactly Is the GDPR Working to Incorporate Blockchain?

Now that the European Union’s General Data Protection Regulation (GDPR)--the most comprehensive individual data protection law in history--has gone into effect, it is important to know where your business stands in regard to your potential liability. One technology that has a rather lot of ambiguity surrounding it is blockchain, which is essentially an encrypted and distributed digital ledger. How is the development of blockchain, which is built on the idea of security through transparency, going to fare under the guidelines of the new GDPR regulations?

Let’s start with the GDPR itself. Despite not using the PII designation that we’ve come to know, the regulation is the strongest data protection law ever established for its overreaching stance of protecting any individual that is doing business within the member nations of the European Union. Additionally, any organization that works with suppliers or partners in the EU has to comply with the regulations found in the GDPR. If you’ve noticed that all of your favorite online businesses and websites have updated their privacy policy recently, it’s because the GDPR went into effect on May 25, and they need to protect themselves against the immense fines that come with non-compliance to the regulation.

The issue at hand for blockchain technology is actually in the GDPR mandate itself. Under the GDPR, if an organization that doesn’t need personal data, obtains personal data, they are not to keep that data, but are required to delete it. Since you can’t delete blockchain nodes, it stands to reason that the GDPR would be a problem for companies that are looking to innovate using blockchain technology. Ironically, blockchain and the GDPR, despite not having the same agenda in creation, have been cultivated with a shared purpose: to protect the rights of individuals to make the decisions about their own data, but blockchain is not designed to be GDPR-compatible as it is written today.

Technology moves fast so while the GDPR has just now gone into effect, it is already being challenged by technological innovation. The GDPR was designed to be technologically agnostic and flexible enough to allow for such innovations, the blockchain is already testing that. Many of the applications that blockchain is used for actually lend themselves well to the mandate triad of confidentiality, integrity, and availability. In blockchain, the transactions themselves use encryption to be confidential, but the overall ledger, and this is the problem, will still be transparent.

For example, Joe could pay with his blockchain-based account for a physical (as most of the EU has universal healthcare). The particulars (account number, and other personal information) could be hidden, but the record would show that Joe paid so many euros worth of cryptocurrency for a physical. Under the GDPR, because that information, while encrypted, is still in possession of the company that has no rights to it--and it can’t be deleted from the blockchain--it constitutes a breach of the GDPR. Many EU-based companies have stopped accepting Bitcoin and other distributed cryptocurrencies as payments (for a litany of reasons, one being the GDPR).

Now, the GDPR only covers EU-member countries and people doing business with them, but with how much money is being invested in venture capital for blockchain research and application development, it stands to reason that the EU governing body will have to make eventual amendments to the mandate.

The most interesting question going forward is, which is the future of data security? Is it GDPR-like mandates like the California Consumer Privacy Act (CCPA), or is it blockchain itself? What do you think about the GDPR regulation? Would you like to see data privacy be as protected in your country? Or do you think that it is a hindrance to innovation and progress? Leave your comments below and return to our blog regularly. 

Sexy Scam Relies on Your Belief that Someone Was W...
Intro to Your Tech: Software as a Service


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, December 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Privacy Network Security Cybersecurity User Tips Managed IT Services Tech Term Malware Productivity Backup Communications Microsoft Smartphones Internet Communication Business Management Google Business Hardware Outsourced IT Hosted Solutions Email Passwords Software Efficiency Hackers Browser Data Backup Ransomware Android Data Recovery VoIP Wi-Fi Small Business Social Media Windows 10 Mobile Device Cloud Computing Applications Alert Save Money IT Support Smartphone Microsoft Office IT Services Employer-Employee Relationship Users Innovation Internet of Things Miscellaneous Saving Money Network Router Mobile Devices Business Intelligence Bandwidth Computer Data Collaboration Twitter Managed IT Services Apps Data Management Excel Phishing Office Virtualization Holiday Wireless Automation Networking Analytics Patch Management VoIP Information Settings Password Vulnerability Business Continuity BDR Data Breach Marketing Gadgets Workplace Tips Government Access Control Blockchain Cost Management Compliance IT Support Office 365 Word Website Remote Monitoring Workers VPN Computers Law Enforcement How To BYOD Artificial Intelligence Spam WiFi Cybercrime Wireless Charging Scam Company Culture Mobile Device Management Physical Security Managed IT Service Data Protection Politics Remote Monitoring and Management Gmail Battery Windows Cortana Tech Terms Connectivity Dark Web App Productivity Hacking Managed Service Chrome Virtual Assistant Tip of the week Remote Computing Virus Retail Paperless Office Cleaning Big Data eCommerce Printers Staff RAM Work/Life Balance Eliminating Downtime Spam Blocking Business Technology Maintenance HP Database Telecommuting Access Server Management Downloads Managed IT Copy Apple CrashOverride WannaCry Environment Plug-In Error Botnet News Backup and Disaster Recovery Cables Office Tips Automobile Multi-Factor Security Conferencing Ink Licensing Upgrade Online Shopping Websites Microsoft Teams Wireless Internet Email Management Antivirus Sales Document Management Tactics Millennials Trends Troubleshooting Paste iPhone HIPAA e-waste Proactive IT PowerPoint Hard Drives Touchscreen Telephone System Phone System SSD Voice over Internet Protocol Education Content Filtering Smart Technology IT budget Reporting Travel Managing Stress Help Desk Tablet Digital Internet Explorer SaaS Machine Learning A.I. Server Update Hard Drive disposal IT Management Sports Microsoft Office 365 Two-factor Authentication Inventory Google Maps Medical IT Live Streaming Staffing Dongle G Suite Certification Knowledge Edge Threat Files Telephony Telecommute Movies Outlook Telephone Systems File Sharing Processors Value Analysis Authentication Remote Support Tech Support Gadget Lead Generation Mobile Security Amazon User Tip Information Technology GDPR WhatsApp Bring Your Own Device Spotify Mobility Google Drive Comparison Safety Laptop Printing Voice over IP Printer Server Data loss Unified Communications Profitability Remote Control User Security Spyware Network Attached Storage Streaming Media Hiring/Firing Authorization Hosted Solution Facebook Shortcut Operating System Entertainment Biometrics Storage Recovery Technology Tips Hybrid Cloud Specifications Disaster Recovery Paper Emergency IP Address Fun Quick Tips Current Events Freedom of Information Leadership Customer Service Regulation Computer Care Mobile Office Personal Information Domains Encryption Net Neutrality Yahoo Search Gaming Console Windows 10 Public Speaking Vendor Management Autocorrect Scalability Presentation Video Games Avoiding Downtime Synergy Lithium-ion battery IaaS Augmented Reality Scheduling Worker Dark Data Credit Cards Samsung Television Wireless Technology 5G Managed Service Provider IBM Emoji HaaS The Internet of Things Instagram Printer Hacker DDoS Money Budget Customer Relationship Management Employer Employee Relationship Unified Threat Management Competition

Newsletter Sign Up